1.3 Compression, Encryption & Hashing

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ONLINE DATA STORAGE & DOCUMENTS Lesson 3. Lesson 3 – Online documents In this lesson we will be covering:  Online documents  Compression and expansion.
ICT Functional Skills Managing Files and Folders.
Real World Programming BBrewer Fall Programming - Bellwork 1.Log on 2.Go to edmodo 3.Open & Save Vocabulary Graphic Organizer and Analaysis Document.
Data Compression and Security Chapter 20, Exploring the Digital Domain.
How to Learn in This Course CS 5010 Program Design Paradigms “Bootcamp” Lesson 0.1 © Mitchell Wand, This work is licensed under a Creative Commons.
Using a Template to Create a Resume and Sharing a Finished Document
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Word Lesson 13 Sharing Documents Microsoft Office 2010 Advanced Cable / Morrison 1.
HTML. Hypertext Markup Language Lesson Objectives 1. We will be able to understand the need for HTML and where it is used 2. We will be edit HTML to.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Feb 17, 2003Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Loading Audacity and the LAME encoder for MP3 exports.
Lab 3 Paragraphs, and corpus tools. Read about paragraph structure grap/index.htm
This poster has been designed to act as a customisable template. You do not have to use this template but it might be a useful starting point. The poster.
Comp 335 File Structures Data Compression. Why Study Data Compression? Conserves storage space Files can be transmitted faster because there are less.
How to: Find forms, manuals and policies on the IRT intranet Use this button to access the next slide during the presentation.
Computer Security coursework 3 Dr Alexei Vernitski.
Let’s Get Savvy about Technology Mrs. George Dondero School.
Some of these PowerPoint pages were created by my friend Shawna Haider.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Computer Sciences Department1. 2 Data Compression and techniques.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
FILE COMPRESSION Lossy vs Lossless. Why compress a file? To save storage space. To speed up data transmission.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
ECS – Storyboarding and Introduction to Web Design
Module 1: Investigation 1 Moving, Turning and Stamping
Encryption with Keys and Passwords
Refworks Part I.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Refworks Part I.
3.3 Fundamentals of data representation
Vocabulary byte - The technical term for 8 bits of data.
Crypto in information security
Computer Science Higher
Lesson Objectives Aims You should know about: 1.3.1:
File Compression 3.3.
Beginning C++ Programming
Introduction Of System Security
Encryption
Information of the LO Subject: Information Theory
Vocabulary byte - The technical term for 8 bits of data.
AP CSP: Bytes, File Sizes, and Text Compression
Data Compression and Encryption
Cryptography.
Networks Encryption.
Arden University FTP Induction Resource
Real Life Computer Science Stories
Chapter 3:Cryptography (16M)
Giving instructions on how to do something
Data Compression.
OCR Level 02 – Cambridge Technical
Learning Outcomes –Lesson 4
Lesson Aims Vocabulary In this lesson you are going to:
The Art of the DBQ Writing a Successful Essay.
Do Now! Convert the following sequence of bits into an image using the protocol we discussed (first 8 bits are lengthxwidth, Then fill in the rows pixel.
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
Lesson Objectives By the end of the lesson you will:
Exercise: Hashing, Password security, And File Integrity
GCSE Computer Science System Software Workbook Year 10 Half Term 4
Homework #2 J. H. Wang Oct. 18, 2018.
Introduction to Python
STEP 2: 1. SELECT ‘TEXT’ FROM THE DROP DOWN
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Student Notebook Name:
Year 7 Computer Science Digital Portfolio
Presentation transcript:

1.3 Compression, Encryption & Hashing Student Notebook Name: Image from:https://h50003.www5.hpe.com/digmedialib/prodimg/lowres/c04165573.png

(a)Lossy vs Lossless compression. (b)Run length encoding and dictionary coding for lossless compression. (c)Symmetric and asymmetric encryption. (d)Different uses of hashing. Introduction to project Explanation of how the robot arm works Demonstrate setting up & basic expectations Handing out robots and setting groups Students attempt setup and check connection ok using Sliders

Note Taking Slide

Student Activity: Compression Explain why compression is considered necessary for images on the web. [2] Explain why Lossy compression techniques would not be suitable for use with files containing large bodies of text. [1] Suggest a suitable lossless method for compressing text. [1] Comparison Lossy Lossless

Student Activity: Compression RLE is a pattern substitution compression algorithm. Data is stored in the format (colour, run). (0,1), (1,5), (0,1) (1,7), (1,1), (0,2), (1,1),(0,2), (1,1), (0,1), (1,1), (0,1),(1,1), (0,1), (1,1)(0,1), (0,1), (1,1), (0,3),(1,1),(0,1) Reassemble the encoded sequence. What type of compression is likely to be used for the following: a website image, a zipped file or long text documents and images, a PDF instruction manual. Website Image: Zipped Folder of long text documents and images: PDF instruction manual:

Research Task Student Response Explore the website below about encryption and its uses in our history as a nation. https://www.bletchleypark.org.uk/our-story Identify 5 interesting facts from the site and note them down below. Student Response Introduction to project Explanation of how the robot arm works Demonstrate setting up & basic expectations Handing out robots and setting groups Students attempt setup and check connection ok using Sliders

Research Task Student Response Read some of the information from the following site and then write a paragraph to explain how quantum cryptology works. http://science.howstuffworks.com/science-vs-myth/everyday-myths/quantum-cryptology.htm Student Response Introduction to project Explanation of how the robot arm works Demonstrate setting up & basic expectations Handing out robots and setting groups Students attempt setup and check connection ok using Sliders

Student Activity: Encryption What word can be translated from the following cipher text using a key of -2: ZYBECP State what is meant by symmetric encryption and explain with the aid of an example how it can be implemented.[4] Explain what is meant by asymmetric encryption. [4]

Student Activity: Encryption Explain why asymmetric encryption is more secure than symmetric. [2] Governments sometimes demand copies of encryption keys so they can decrypt messages if necessary. What reasons are there for and against governments doing this? Useful story.

Student Activity: Encryption Copy the code shown below into a new Python file and save it with a sensible name. Run the code. When the shell appears after running, type on the command shown below. Replace “Hello” with something else if you want.

Student Activity: Encryption Copy the hash output into Google, can you find your plaintext online? What does this say about using common words in a password? Try to hash some of your strings and phrases, can you find the plaintext for them online?

Asymmetric Encryption Vocabulary Lossy Compression Lossless Compression Symmetric Encryption Asymmetric Encryption

Vocabulary Length Encoding Dictionary Coding Hashing

Terms of use & Legal Stuff This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Where work or ideas created by others have been used we have tried to contact them for permission and given appropriate credit. If you believe this to be untrue then please contact us.