TMAT 103 Supplemental Chapter Cryptography. Sending messages that cannot be read if stolen –Been in use for centuries (wars) –Used to transmit data securely.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

(ENCODING AND DECODING TECHNIQUES)
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Computer Science 101 Data Encryption And Computer Networks.
Encryption and Encoding
An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Chapter 2 Basic Encryption and Decryption (part B)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Introduction to Cryptography
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
CSCI 115 Chapter 5 Functions. CSCI 115 §5.1 Functions.
Systems of Equations as Matrices and Hill Cipher.
Information Systems Security
Introduction to Cryptography
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Using Inverse Matrices in Real Life
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Traditional Symmetric-Key Ciphers
Making and decoding a code message
1 Data Encryption Standard (DES) An example of secret key (i.e., symmetric) encryption system Note: These figures are meant to help illustrating a few.
4.4 Identity and Inverse Matrices
Section 2.3: Substitution Ciphers
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Learning Objectives for Section 4.5 Inverse of a Square Matrix
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
CSCI 115 Chapter 1 Fundamentals. CSCI 115 §1.1 Sets and Subsets.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Notes Over 4.4 Finding the Inverse of 2 x 2 Matrix.
Cryptography Cryptography is the use of mathematics to encode messages and prevent them from being read by anyone who doesn’t know the code. One way that.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Investigating Identity and Inverse Matrices QUESTION: What are some properties of identity and inverse matrices? 1 Let A =, B =, and C=. Consider the 2.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Binary 1 Basic conversions.
Chapter 2 Basic Encryption and Decryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Columnar Transposition
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
Applications of Matrices
M3: Encryption r By Andrew Stringer.
Chapter 3:Cryptography (16M)
PART VII Security.
Applications of Inverse Matrices
Simple Encryption- Lesson 5
5.4 Permutation Functions
. Columnar Transposition
Computer Security Chapter Two
Chapter Goals Define cryptography
Presentation transcript:

TMAT 103 Supplemental Chapter Cryptography

Sending messages that cannot be read if stolen –Been in use for centuries (wars) –Used to transmit data securely over a network –Hundreds of techniques Utilizes mathematical functions and operations Requires a key Encode – uses corresponding function and key Decode – uses inverse of the function and key

TMAT 103 Method 1 Sir Francis Bacon’s Code

Algorithm to encrypt a message using Bacon’s code 1.For each letter, find the corresponding binary code 1.Determine the corresponding decimal number (a = 0, b = 1, c = 2, …, z = 25) 2.Convert the decimal number to binary 2.Concatenate the binary codes for all letters 3.Create the encoded message 1.The message must have the same number of characters as 0s and 1s in the concatenated binary codes 2.Key: Choose how to distinguish 1s from 0s Example: Use uppercase for 1s and lowercase for 0s

Sir Francis Bacon’s Code Encode ‘DISCRETE’ using Bacon’s code OREGO NISAS TATEI NTHEU NITED STATE SOFAM ERICA Message sent: oreGOn Is a sTatE in thE uNiteD stAteS of AMerIca Example: Encode ‘TECHNOLOGY’

Sir Francis Bacon’s Code Reverse the process to decode Example – decode the following WilLiAm iS A FaMous auTHOR from tHE SixteeNth cEntuRY Key: Lowercase stands for 0, uppercase stands for 1

TMAT 103 Method 2 Substitution Code

Algorithm to encrypt a message using the Substitution code 1.Choose a key (a word with no repeated letters) Example: DESTINY 2.Correlate alphabet characters according to the key 3.Create the encoded message by substituting the corresponding letters

Substitution Code Example: Encode ‘DISCRETE’ using a substitution code with the key ‘DESTINY’ Message sent: TBPSOIQI Example: Encode ‘TECHNOLOGY’ using this scheme

Substitution Code Reverse the process to decode Example: The following message was sent using a substitution code Decode the message: D M W I M L C U L R F I R D E W E E H E L K Key: BASKET

TMAT 103 Method 3 Transposition Code

Permutation Function Can also be written as a cycle

Transposition Code Algorithm to encrypt a message using the Transposition code 1.Choose a key (a permutation function) 2.Change the order of the characters in the message according to the key

Transposition Code Example: Encode ‘DISCRETE’ using a Transposition code with the key (1, 3, 7, 8, 2, 6) Message sent: EEDCRIST Example: Encode ‘TECHNOLOGY’

Transposition Code Reverse the process to decode Example – decode the following OICLPCYIGULSOYRRVTTEA Key: ( 16, 15, 6, 1, 3, 7, 11, 2)  (8, 13, 4, 5, 19)  (14, 10)  (21, 20, 17)

TMAT 103 Method 4 Keyword Columnar Transposition

Algorithm to encrypt a message using the keyword columnar transposition 1.Create a matrix (rows and columns) using the letters in the key as the column labels 2.Fit the message into the matrix (left to right, top to bottom) – pad with Xs if necessary 3.Form the new message by taking the columns in alphabetical order by the column labels

Keyword Columnar Transposition Example: Use a k eyword columnar transposition with the key ‘ JONES’ to encrypt: THE FIFTH GOBLET CONTAINS THE GOLD Result: FGTAHDTFBONGEHETTLHTLNSOIOCIEX

Keyword Columnar Transposition Example: Use a k eyword columnar transposition with the key ‘ JONES’ to encrypt: ALL DIFFICULT MATHEMATICAL PROBLEMS ARE CHARACTER BUILDING

Keyword Columnar Transposition Decoding a keyword columnar transposition – reverse the process –Algorithm to decrypt a message using the keyword columnar transposition 1.Create a matrix (rows and columns) using the letters in the key as the column labels 2.Count the characters in the message, and divide that number by the number of characters in the key 3.Starting from the beginning of the encrypted message, group the letters according to the calculation in step 2 4.Fit the message into the matrix 5.Read the message from the matrix (left to right, top to bottom)

Keyword Columnar Transposition Reverse the process to decode Example – decode the following AAK7ENWHRSOER9SAETOELNNWIDYELXBO1DXKTI3R Key: BASEBALL