Encryption & Steganography: Amazing Things To Do with Bits

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Cryptography Ch-1 prepared by: Diwan.
Computer Science 101 Data Encryption And Computer Networks.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Shared Secrets Keeping secrets on the web. Encryption Goal : hidden in plain sight.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Public Key Cryptography
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Chapter 12 Cryptography (slides edited by Erin Chambers)
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.
Encryption Encryption encodes information to hide it from everyone else … maintaining your privacy.
Encryption Coursepak little bit in chap 10 of reed.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Computing Is Pretty Strange.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Cryptography Dave Feinberg. Suppose I send an from to Who has access to that ? What if I want the.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
MAT 1000 Mathematics in Today's World Winter 2015.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 More details and explanation …
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Computing Is Pretty Strange.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Encryption with Keys and Passwords
Cryptography – Test Review
Substitution Ciphers.
Digital Signatures.
Security Using Armstrong Numbers and Authentication using Colors
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Reactive Android Development
Network Security.
Uses Uses of cryptography Lab today on RSA
Public-key Cryptography
Chapter 9 Security 9.1 The security environment
Chapters 14,15 Security.
Encryption
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
Lesson 4-5 AP Computer Science Principles
M3: Encryption r By Andrew Stringer.
Lesson 5: Simple Encryption
Chapter 3:Cryptography (16M)
Visit for more Learning Resources
PART VII Security.
Rivest, Shamir and Adleman
Fundamentals of Data Representation
Network Security.
NET 311 Information Security
Cryptography a Presentation Prepared by Vytautas Kondratas.
Lesson 7: Simple Encryption
Chapters 14,15 Security.
Chapter 3 - Public-Key Cryptography & Authentication
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Encryption & Steganography: Amazing Things To Do with Bits Computing Is Pretty Strange Encryption & Steganography: Amazing Things To Do with Bits Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004

Encryption Encryption is the process of “scrambling” data so it is difficult (impossible?) to understand it We encrypt data to keep it private Every site that you use as https:// is encrypted Familiar example: Caesar cipher: C: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z E: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C What would Julius be encrypted to? 8/18/2019 © 2011 Larry Snyder, CSE

Encryption Encryption is the process of “scrambling” data so it is difficult (impossible?) to understand it We encrypt data to keep it private Every site that you use as https:// is encrypted Familiar example: Caesar cipher: C: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z E: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C What would Julius be encrypted to? Mxolxv 8/18/2019 © 2011 Larry Snyder, CSE

More Typically … The fixed shift of an alphabet is easy to break Alternate: Sender uses a key, k, to multiply clear byte sequences (recall they’re numbers) by k -- Send encrypted result – looks like gibberish -- Receiver divides by k to decrypt getting clear 8/18/2019 © 2011 Larry Snyder, CSE

Example Let the clear be: “MEET @ 9” and k=13 Break clear text into 2-letter sequences: ME ET b@ b9 Interpret text as numbers 7769 6984 3264 3257 Multiply by key: Send encrypted (6-digit) number Receiver does the reverse process … 776913=100997 698413=090792 326413=042432 325713=042341 8/18/2019 © 2011 Larry Snyder, CSE

An Alternate: Public Key Encrypt The problem with “private key” encryption: the two sides have to meet to agree on key Public Key fixes this: The receiver publishes (on Web site, say) a (very very special) key, K More importantly, the theory it uses means that NO practical amount of computing can break the code Here’s what you do … 8/18/2019 © 2011 Larry Snyder, CSE

Public Key Process Sender breaks up the message into blocks as before Sender cubes each block – yup, raises to the 3rd power – and mods it by K, i.e. (<text>3)%K Transmit results Receiver raises each remainder to a high power determined by prime numbers & known only to him Receiver mods by K, too, which are – surprisingly – the original blocks! The receiver assembles the message Thanks to Euler and Diffie & Hellman This Is Amazing!!! 8/18/2019 © 2011 Larry Snyder, CSE

Steganography The process of hiding information Two Greek roots meaning: “stego” == “roof” “stega” == “cover” 8/18/2019 © 2011 Larry Snyder, CSE

Why Hide Information? Most common reason to hide information is to avoid being caught with it Military and spy documents Repressive governments restricting news/info Avoid others “snooping” – privacy Hiding is different than encryption … uses the fact that the searcher doesn’t know it’s there 8/18/2019 © 2011 Larry Snyder, CSE

Illustrate A Way To Do It The Plan … hide “subversive” protest picture in “calendar art” Host Image Guest Image 8/18/2019 © 2011 Larry Snyder, CSE

Step 1: Reduce Bits of Guest We don’t need all of the bits in RGB to get a decent picture All bits Left 2 bits of each color 1011 0100 1101 0011 0001 1100 1011 0100 1101 0011 0001 1100 8/18/2019 © 2011 Larry Snyder, CSE

Step 2: Replace Bits In Host Put guest bits into right 2 bits of host 1111 0100 1101 0011 1011 1101 1011 0100 1101 0011 0001 1100 1111 0110 1101 0011 1011 1100 8/18/2019 © 2011 Larry Snyder, CSE

Compare fog.jpg with stegFog.png Really? Just Do It! fog.jpg 8/18/2019 © 2011 Larry Snyder, CSE

Let’s Look At Them … and then we’ll see the details 8/18/2019 © 2011 Larry Snyder, CSE

Processing Code For GuestHost Code To Save Result on Click Encoding Code 8/18/2019 © 2011 Larry Snyder, CSE

How Does It Work After the pictures are loaded Clear right 2 bits of host Extract left 2 bits of guest New combined color 8/18/2019 © 2011 Larry Snyder, CSE

Code To Extract Image 8/18/2019 © 2011 Larry Snyder, CSE

How Does It Work Read in the file, and then on mouse click, pull out the bits and make a picture Remove right 2 bits Make them left 2 bits for each color New color 8/18/2019 © 2011 Larry Snyder, CSE

How Much Is Coded Like Original? Run A Test … www.tineye.com The Original 8/18/2019 © 2011 Larry Snyder, CSE

Check The “Steganized” File 8/18/2019 © 2011 Larry Snyder, CSE