Computer Science 101 Data Encryption And Computer Networks.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CLASSICAL ENCRYPTION TECHNIQUES
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
1 Cryptosystems When defining a cryptosystem, details must be given of: The alphabets M and C the keyspace K and how keys are to be chosen The encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Network Management and Security
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Unit 1 Protocols Learning Objectives: Understand the need to detect and correct errors in data transmission.
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 8 Information Security 1.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Lecture 2 Overview.
Cryptography Programming Lab
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
TMAT 103 Supplemental Chapter Cryptography. Sending messages that cannot be read if stolen –Been in use for centuries (wars) –Used to transmit data securely.
1 Chapter 2 Plain Text Also called as clear text Language that we normally use Easily understood by everybody.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Introduction to Cryptography Techniques How secure is that banking network traffic?
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Practical Session 10 Error Detecting and Correcting Codes.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Data Transmission and Networks Transmission error checking & correcting.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Substitution Ciphers.
Encryption.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Representing characters
Chapter-2 Classical Encryption Techniques.
Part III Datalink Layer 10.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
Lesson 4-5 AP Computer Science Principles
Chapter 3:Cryptography (16M)
PART VII Security.
Encryption and Decryption
Fundamentals of Data Representation
Simple Encryption- Lesson 5
Computer Security Chapter Two
Chapter Goals Define cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Computer Science 101 Data Encryption And Computer Networks

Reading for This Week and Next Week Chapter 7 - Networks, the Internet and the Web Chapter 8 - Information Security

The Problem Back in the old days, information was kept secure by locking the door to the computer room When computers are connected via networks and information can be transmitted, we need another way to secure it What happens when you send your credit card number to Amazon?

Cryptography The science of secret writing – thousands of years old Encrypt plain text into a cipher text, using a cipher key Decrypt cipher text back into plain text, using a cipher key

A Simple Algorithm: The Caesar Cipher Let S = an integer between 1 and 25 Encode each letter in plain text by replacing it with the letter that is S positions to its right in the alphabet Shift the last S letters in a cycle to the first S letters

Example Encryption Let S = 3 Then A encodes as D, B as E, X as A, etc. ARMY encodes as DUPB

Problem With Caesar Cipher Because there are only 25 possible keys, one can decode a cipher text by brute force, by trying all possible keys (a computer makes that easy) Caesar cipher is a stream/substitution cipher, wherein each letter of plain text generates a letter of cipher text The structure of the plain text is preserved in the structure of the cipher text

Block Cipher Encode a block of plaintext letters as a block of cipher text letters More difficult for a cryptanalyst (i.e., a hacker) to detect the patterns

The Key: An Encryption Matrix A two-dimensional grid of characters Each successive pair of characters in the plaintext maps to a pair of characters in the ciphertext

Example Encryption Plaintext:Ken Lambert Ciphertext: I?

Example Encryption Plaintext:Ken Lambert Ciphertext: I?%Y

Example Encryption Plaintext:Ken Lambert Ciphertext: I?%Y!4

Example Encryption Plaintext:Ken Lambert Ciphertext: I?%Y!4bm

Example Encryption Plaintext:Ken Lambert Ciphertext: I?%Y!4bmPb

Example Encryption Plaintext:Ken Lambert Ciphertext: I?%Y!4bmPbt Last step does not use the matrix, because the plaintext contains an odd number of characters

Decryption Plaintext:Ken Lambert Ciphertext: I?%Y!4bmPbt The same matrix and algorithm are used to decrypt or generate the plaintext from the ciphertext

The Algorithm Set the ciphertext string to the empty string For each pair of characters in the plaintext string Locate the positions of each character in the matrix If the positions are in the same row or column, then Append the two characters in reverse order to the ciphertext string else Locate the opposite corners of the imaginary rectangle formed by these positions Append the two characters at these corners to the ciphertext string If the number of characters in the plaintext string is odd Append its last character to the ciphertext string Return the ciphertext string

Other Cryptography Issues The key must be sent with the message So, the key must be encrypted Send a public key to encrypt Keep a different, private key to decrypt

Network Transmissions Sender and receiver have different responsibilities Sender must encode information provided by user Receiver must notify sender to resend if some info is lost or corrupted Receiver must decode info for user

Encoding for Network Transmission Translate text to binary form Encrypt binary form if necessary Place each code in a packet Add a parity bit and a label to the packet

The ASCII Character Set American Standard Code for Information Interchange A set of 128 numbers, ranging from 0 to 127 Each character maps to a number

The ASCII Character Set ASCII 32 to 126 are codes for the printing characters ASCII 0 to 31 and 127 are codes for control characters Row # + column # locates character and specifies code Thus, the ASCII code for ‘A’ is 65, etc.

Step 1: Translate Character to Binary ‘A’ translates to ASCII 65 ASCII 65 translates to binary We use 8 bits for each character

Step 2: Encrypt Subtract an offset and shift bits a certain distance to the left or right We’ll subtract 1 and shift the bits to the right by 1 Subtract 1: Shift right by 1: The encoded ‘A’ is ASCII 32, or ‘ ’ (the space)

Step 3: Place Code in a Packet Each packet contains two character codes a parity bit a label that identifies the position of the packet in the original message If there is no character available, we use ASCII for the null character (0) to hold the place in the packet

Step 3: Place Code in a Packet Null ( ) encrypts as = (odd # of 1s) Add parity bit: Add label (first of four packets):

Receiving and Decoding Wait for all labeled packets to be placed in correct order Check parity bit for corrupted data Decrypt to binary Decode to ASCII and then to text