Encryption and Encoding

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CSCI 3 Chapter 1.8 Data Compression. Chapter 1.8 Data Compression  For the purpose of storing or transferring data, it is often helpful to reduce the.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Document and Query Forms Chapter 2. 2 Document & Query Forms Q 1. What is a document? A document is a stored data record in any form A document is a stored.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Chapter 2 Basic Encryption and Decryption (part B)
Lossless Data Compression Using run-length and Huffman Compression pages
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Classical Encryption Techniques
CSE 651: Introduction to Network Security
Chapter 2 – Classical Encryption Techniques
Section 2.3: Substitution Ciphers Practice HW from Barr Textbook (not to hand in) p. 92 # 1, 2 # 3-5 (Use Internet Site)Use Internet Site.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Chapter 2 Source Coding (part 2)
Section 2.4 Transposition Ciphers Practice HW (not to hand in) From Barr Text p. 105 #
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Data Compression and Encryption zUnderstand reversible and non-reversible data compression. zIdentify Huffman code and FAX compression algorithm zUnderstand.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Crypto Laboratory Winter Alexander Grechin and Zohar Rogel Under supervision of Zvika Berkovich.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Lecture Objectives  To learn how to use a Huffman tree to encode characters using fewer bytes than ASCII or Unicode, resulting in smaller files and reduced.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Introduction to Modern Symmetric-key Ciphers
Lecture 23 Symmetric Encryption
Section 2.3: Substitution Ciphers
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
CS 101 – Sept. 11 Review linear vs. non-linear representations. Text representation Compression techniques Image representation –grayscale –File size issues.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Cryptography and Network Security
CS4780 Cryptography and Information Security
Basic Encryption Methods
Chapter-2 Classical Encryption Techniques.
Data Compression and Encryption
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
The Huffman Algorithm We use Huffman algorithm to encode a long message as a long bit string - by assigning a bit string code to each symbol of the alphabet.
Cryptography: Cesar Cipher
Presentation transcript:

Encryption and Encoding

Table of Content Introduction Text Encryption Techniques Data Encoding Techniques

Data/Text Encryption The primary objective of data encryption is to transform the data in order to conceal the information during network transmission (internet, intranet).

Special Terms in Encryption The original unaltered contents of the message or text is called plaintext. Encipherment or encryption is a process whereby plaintext is converted into enciphered text or ciphertext. The enciphering process is an algorithm that operated on the plaintext based on the value of a key. The key defines the operation or the method of the encipherment algorithm. Different keys produce different ciphertext from a fixed plaintext.

Text Encryption Encryption Plaintext X Ciphertext Y Key K Encryption is a process whereby plaintext is converted into enciphered text or ciphertext.

Text Encryption Different types of key represent different types of text encryption techniques. There are different techniques with various security levels in text encryption, depending on the level of confidentiality of the data.

Text Decryption Decryption or decipherment is the reverse process of encryption or encipherment, which is to convert ciphertext back to its original form of plaintext. Decryption Ciphertext Y Plaintext X Key K

Text Decryption Decryption process needs to use the same key that is used in the encryption process to obtain the original plaintext. Although one may obtain a copy of the encrypted message, one must use the correct key to successfully decrypt the message.

Text Encryption Technique A common encryption technique is known as substitution method Substitution method can be divided into 3 forms: fixed displacement substitution keyword based substitution matrix based substitution.

Fixed Displacement Substitution Ciphertext represent a fixed displacement in the alphabet. The relationship between the mapping of plaintext and ciphertext characters are as below: Plaintext : ABCDEFGHIJKLMNOPQRSTUVWXYZ Key : BCDEFGHIJKLMNOPQRSTUVWXYZA

Fixed Displacement Substitution Example : Plaintext : ABCDEFGHIJKLMNOPQRSTUVWXYZ Key : BCDEFGHIJKLMNOPQRSTUVWXYZA This encrypts “multimedia”(plaintext) into “nvmujnfejb” (ciphertext)

Fixed Displacement Substitution

Keyword Based Substitution Simplest type of keyword based substitution is implemented in three steps : A word or phrase is selected as keyword and use for forming the letters of the ciphertext alphabet Repeated letters are omitted after their first occurrence At the end of the word or phrase, remaining letters of the alphabet are used in the normal sequence

Keyword Based Substitution For example, suppose we use the phrase “MULTIMEDIA UNIVERSITY”. We then form one word and remove the duplicated letters to get a newly formed word “MULTIEDANVRSY”. The remaining alphabet letters are then added at the end of the keyword to give you the keyword-based mixed alphabet “MULTIEDANVRSYBCFGHJKOPQWXZ” (key)

Keyword Based Substitution Example: Plaintext : ABCDEFGHIJKLMNOPQRSTUVWXYZ Key : MULTIEDANVRSYBCFGHJKOPQWXZ This encrypts “Hello”(plaintext) to “Aissc”(ciphertext)

Matrix Based Substitution By placing an alphabet into an n x n matrix or array, one can obtain the ability to design the ciphertext alphabet in many different ways For example, consider the matrix below: 1 2 3 4 5 6 7 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Columns Rows

Matrix Based Substitution By extracting the matrix element in a predefined sequence, you can develop a transpose alphabet. If you extract the matrix elements in each column, commencing with column 7 working backward, extracting the elements in column 6, 5 and so on, the alphabet GNUFMTELSZDKRYCJQXBIPWAHOV (key) is created. If matrix elements are extracted in a progressive column order, alphabet AHOVBIPWCJQXDKRYELSZFMTGNU (key) is created.

Data encoding techniques Data encoding techniques can be classified into two broad types:- Repetition Encoding/Suppression Zero or Blank Encoding Run-length Encoding Statistical Encoding Pattern Substitution Diatomic Encoding Huffman Encoding

Statistical Encoding In this technique, patterns of bits (word) or that are more frequent are recorded using shorter codes. This method may have 3 forms Pattern Substitution Diatomic Encoding Huffman Encoding

Pattern Substitution In pattern substitution technique, frequent patterns or characters, or frequent words, are replaced by a shorter sequence. For example, lecture notes for this course can be encoded using pattern substitution by replacing all the occurrences of the word “Multimedia” with the character “*M”.

Pattern Substitution Networked Multimedia Systems is an exemplary example of a book on multimedia and networking. Nowhere else will you find this kind of coverage and completeness. This is truly a one-stop-shop for all that you want to know about multimedia and network.

Pattern Substitution a about all an and for is of on 1 2 3 4 5 6 7 8 9 that this to will multimedia networking + & = # m* n*

Diatomic Encoding This encoding is based on a combination of two data bytes which are frequently occurring. According to the analysis of English language, the most frequent occurring pairs are the following : “E_”, “T_”, “TH”, “_A”, “S_”, “RE”, “IN” and “HE”. Replacement of these pairs by special single byte that do not occur anywhere else in the text gives a data reduction of more than 10%.

Huffman Encoding Different characters need not be encoded with the same number of bits. With the help of the knowledge of frequency occurrence of characters, the Huffman encoding algorithm provides the more frequent characters with the code having lesser number of bits.

Huffman Encoding Eg: Consider weights 2, 4, 6, 7, 7, 9. First the algorithms repeatedly combines the smallest two weights to obtain shorter and shorter weight sequences. 2, 4, 6, 7, 7, 9 replaces 2 and 4 by 2 + 4 and calls for 6, 6, 7, 7, 9 which replaces 6 and 6 by 12 and calls for 7, 7, 9, 12 which calls for 9, 12, 14 which calls for 14, 21

Huffman Encoding 14 21 9 12 7 6 2 4 1 7 00 7 01 9 10 6 111 2 1100 4 1101

Summary 1. The primary objective of data encryption is to transform the data in order to conceal the information during network transmission (internet, intranet). 2. The original unaltered contents of the message or text is called plaintext. 3. Encipherment or encryption is a process whereby plaintext is converted into enciphered text or ciphertext. 4. The enciphering process is an algorithm that operated on the plaintext based on the value of a key. 5. Decryption or decipherment is the reverse process of encryption or encipherment, which is to convert ciphertext back to its original form of plaintext.

Summary 6. Text Encryption Techniques: fixed displacement substitution keyword based substitution matrix based substitution 7. Data encoding techniques: - Statistical Encoding Pattern Substitution Diatomic Encoding Huffman Encoding