Encryption example Scrambling of the representation Using Exclusive OR, XOR,  If bits are the same, result is 0; if different 1 Apply a key to the plain.

Slides:



Advertisements
Similar presentations
6.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 Data Encryption Standard (DES)
Advertisements

Symmetric Message Authentication Codes Prof. Ravi Sandhu.
Chapter 11 Implementing an Assembler and a Linker Using C++ and Java.
Number Systems and Codes
Encryption/Decyprtion using RC4 Vivek Ramachandran.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Revision of Chapter III For an information source {p i, i=1,2,…,N} its entropy is defined by Shannon’s first theorem: For an instantaneous coding, we have.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
1 Pertemuan 11 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Hito-Shura Milestone 4 presentation Harlan Broughton Stephen Link.
Network Security Secure hypertext transfer protocol (https) Cookies Public Key Cryptography.
Chapter 1-C,D Computers and Digital Basics.
Command Prompt Chapter 7 Using ATTRIB, SUBST, XCOPY, DOSKEY, and the MS-DOS Text Editor Richard Goldman ©January 31, 2000.
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
7. Care for computer systems,. secondary storage media and
Bits and Data Storage. Basic Hardware Units of a Computer.
Padlock hard drive Louie Russo MIS 304 October 1, 2009.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
CSCI 5857: Encoding and Encryption
Data Representation A series of eight bits is called a byte. A byte can be used to represent a number or a character. As you’ll see in the following table,
Chapter 3 Section 1 Number Representation Modern cryptographic methods, unlike the classical methods we just learned, are computer based. Representation.
Chapter 18 – Miscellaneous Topics. Multiple File Programs u Makes possible to accommodate many programmers working on same project u More efficient to.
Cryptography Lynn Ackler Southern Oregon University.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Section 3.1: Number Representation Practice HW (not to hand in) From Barr Text p. 185 # 1-5.
Chapter 1 Data Storage © 2007 Pearson Addison-Wesley. All rights reserved.
Chapter 2 Section 2.7 Graphing Techniques. Multiplying the Function or the Independent Variable by a Number.
Programming with Visual C++: Concepts and Projects Chapter 3A: Integral Data (Concepts)
Data Storage © 2007 Pearson Addison-Wesley. All rights reserved.
CS 111 – Sept. 13 Error detection Error correction Review/practice chapter 1 questions Commitment: –Please read sections 2.1 and 2.2.
Communicationcommunication Created by- Upendra Sharma.
New for September  2 controlled assessments 30% each  1 exam 40%
Data Storage © 2007 Pearson Addison-Wesley. All rights reserved.
Conventional Encryption Chapter 4. Multiple DES Advantage of extra stages –Each stage gives 56 more bits of key length –Double DES subject to meet-in-the-middle.
Copyright 2011 – mlcu.com As presented to the Tulsa Chapter of the Information Systems Audit and Control Association (ISACA) On April 28, 2011 Many thanks.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Computer Security coursework 3 Dr Alexei Vernitski.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Google and the Cloud Review. Definition The Cloud refers to anything that involves delivering hosted services over the internet.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
CRYPTOGRAPHY – DES EMMANUEL M. BIBANGAMBA. TABLE OF CONTENTS Cryptography defined Definitions used Brief history of Cryptography DES & it’s history Technical.
Lecture Coding Schemes. Representing Data English language uses 26 symbols to represent an idea Different sets of bit patterns have been designed to represent.
Day 6 - Encoding and Sending Formatted Text
Day 6 - Encoding and Sending Formatted Text
Steganography Example
- Stream Cipher and Block Cipher - Confusion & Diffusion
ASSIGNMENT NO.-2.
Lecture 2.2: Private Key Cryptography II
MTH 209 Competitive Success/snaptutorial.com
MTH 530 Enthusiastic Study/snaptutorial.com
American History Chapter 7 Sections 1,2 and 3.
MTH 209 Education for Service/snaptutorial.com
MTH 209 Enthusiastic Studysnaptutorial.com
Chapter 19 advertising Section 19.1 Advertising Media Section 19.2
NET 311 Information Security
Encryption and Decryption
Simple Encryption- Lesson 5
NET 311 Information Security
DES (Data Encryption Standard)
Text for section 1 1 Text for section 2 2 Text for section 3 3
DATA ENCRYPTION STANDARD (DES)
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Presentation transcript:

Encryption example Scrambling of the representation Using Exclusive OR, XOR,  If bits are the same, result is 0; if different 1 Apply a key to the plain or clear text

Encryption example 0101 Cleartext  1001 Key 1100 Encrypted text XOR is its on reverse 1100 Encrypted text  1001 Key 0101 Decrypted-Cleartext

Encryption example If the cleartext is 1101 and the XOR key is 1001, what is the encrypted text? 1101 

Assignment Using XOR and determine the encrypted results for the ASCII text THE MAGIC WORDS Read Chapter 5, sections 1 and 2 What drives do you have on your PC? What media capacity do they provide? Identify safe handling techniques for portable media: do’s and don'ts