NET 311D Information Security

Slides:



Advertisements
Similar presentations
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Advertisements

CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
NET 311 Information Security
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
(Principles of Informatioan security)
Affine Cipher.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Columnar Transposition
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plain text is changed with one another
History and Background Part 4: Transposition Ciphers
Computer and Data Security 4th Class
Information and Computer Security CPIS 312 Lab 2
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Encryption
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
- Stream Cipher and Block Cipher - Confusion & Diffusion
Networks Encryption.
Networks and Communication Systems Department
NET 311 Information Security
Topic 3: Data Encryption.
Cryptography Survey.
NET 311 Information Security
User access levels, Passwords, Encryption, Cipher, Key
Chapter 3:Cryptography (16M)
PART VII Security.
Encryption on the Internet
NET 311D Information Security
NET 311D Information Security
Cryptography “The Secret Code Language”
Cryptography and Network Security
برگرفته از اسلایدهای © University of Glamorgan
Simple Encryption- Lesson 5
NET 311 Information Security
Lecture 9: Radix-64 Tutorial
Cryptography Cryptography is derived from the Green word ‘kryptos’
Cryptography a Presentation Prepared by Vytautas Kondratas.
Fun with Cryptography The Science of Secrecy.
Net 222: Communications and networks fundamentals (Practical Part)
Exercise 1: Let’s Communicate - Decrypt The message
NET 424: REAL-TIME SYSTEMS (Practical Part)
= x 2 = = 20 4 x 5 = = 16 4 x 4 = = 18 6 x 3 = = 12 2 x 6 = 12.
Unit 2: Cryptography & Cryptographic Algorithm
Introduction to Cryptography I
STEP 2: 1. SELECT ‘TEXT’ FROM THE DROP DOWN
GCSE COMPUTER SCIENCE Topic 3 - Data 3.10 Encryption.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Double Transpositions
. Columnar Transposition
Homophonic Substitution Cipher
Types of Cryptanalysis attacks
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

NET 311D Information Security Networks and Communication Systems Department TUTORIAL 1 (Traditional Ciphers “Character-oriented”)

Questions Traditional Ciphers Networks and Communication Systems Department

Q1: Substitution cipher (Caesar) Encrypt the following texts using the shift (Caesar) cipher with the keys in brackets: “Welcome” (Key=10) GOVMYWO “Open the door” (Key=5) TUJS YMJ ITTW GOVMYWO TUJS YMJ ITTW Networks and Communication Systems Department

Q1: Substitution cipher (Caesar) cont. Networks and Communication Systems Department

Q3: Substitution cipher (Monoalphbetic) Use the following table as the key to encrypt the following texts using the substitution cypher: “Announce it tomorrow” EVVRYVZH BF FRDRWWRX - “DO IT” - JR BF A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Networks and Communication Systems Department

Q4: Transposition cipher The following text was encrypted using the transposition cipher with the following mapping as the key, decrypt the message : 1 2 3 4 5 Decrypt Encrypt HI SARA I HOPE YOU ARE FINE LOOKING FORWARD TO SEE YOU Cipher Text: SAHRIHOAPIOUEAYFIRNEOOEKLGFIONARRDWSETEOUZYZO

Q4: Transposition cipher cont. Answer HI SARA I HOPE YOU ARE FINE LOOKING FORWARD TO SEE YOU Networks and Communication Systems Department