The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Template for the Storyboard stage. Title of the concept : Mechanism Synthesis : Motion Generation / Rigid Body Guidance, subject. Mechanical Engineering.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Inner Workings of the German Enigma. History of the Enigma The concept was invented by a German named Albert Scherbius in 1918 Scherbius tried to take.
Sigaba 1 Sigaba Sigaba 2 Sigaba  Used by Americans during WWII o And afterwards (to about 1948)  Never broken o Germans quit collecting, considered.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Lecture 23 Symmetric Encryption
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
Encryption Methods By: Michael A. Scott
Chapter 2 – Classical Encryption Techniques
Template for the Storyboard stage. General Instructions: The template shown is an example. You can add more slides if required. Include images for explaining.
Cryptography Week-6.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
Document that explains the chosen concept to the animator.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Chapter 20 Symmetric Encryption and Message Confidentiality.
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Data Security and Encryption (CSE348) 1. Lecture # 5 2.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
Template for Applet Design stage. General Instructions: The template shown is an example. Please add more slides wherever required. Include look of the.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Welcome This is a document to explains the chosen concept to the animator. This will take you through a 5 section process to provide the necessary details.
Section 2.5 Polyaphabetic Substitutions
Lecture 23 Symmetric Encryption
Turbojet engine (Rocket)‏
Template for the Storyboard stage. General Instructions: The template shown is an example. You can add more slides if required. Include images for explaining.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
Computer Security (CS4800)
Warm Up 1) Solve: -2(x + 9) + 13 = -11 2) A triangle has side lengths of 5, 15, and 14. Is the triangle a right triangle? Why or Why not?
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Template for the Storyboard stage. General Instructions: The template shown is an example. You can add more slides if required. Include images for explaining.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Template for the Storyboard stage. General Instructions: The template shown is an example. You can add more slides if required. Include images for explaining.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Template for the Storyboard stage 1. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA,
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Lecture 3 1. TRANSPOSITION CIPHERS 2 Transposition Ciphers now consider classical transposition or permutation ciphers these hide the message by rearranging.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Introduction Of System Security
History and Background Part 3: Polyalphabetic Ciphers
Rotor Ciphers.
Chapter 3:Cryptography (16M)
Welcome 1 This is a document to explains the chosen concept to the animator. This will take you through a 5 section process to provide the necessary details.
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Template for the Storyboard stage
WORLD OF WONDERS : THE ENIGMA MACHINE
Computer Security Chapter Two
Basics Of Symmetric Encryption
Presentation transcript:

The Storyboard stage

Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender, Shikav, Maya..etc Medium : 3D Software to be used for animation development: Blender

Title of the concept, subject. Name of the author 1 Title of the concept : Rotor Machine Subject : Cryptography Name of Author : Kadambari Devarajan

Definitions of the keywords used in the animation 2 Encryption : In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). Decryption : The reverse process of Encryption that is used to make the encrypted information readable again is called Decryption. Cipher : In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption. Rotor Machine : This is an electromechanical device used for encrypting and decrypting messages.The machine consists of a set of independently rotating cylinders through which electrical pulses can flow.

Describe the concept chosen and clearly illustrate how you want to explain the concept in the animation. 3 * The rotor machine is worth animating, since it offers great scope to explain ciphers, encryption, decryption, and provide an introduction to cryptography, along with a historical perspective using examples of existing rotor machines. * This would be a visual aid in understanding complex, polyalphabetic subsititution ciphers in general cryptography, apart from help understand related concepts of encryption, decryption, types of ciphers, etc. This could be done in 2D as well, but 3D would be apt as each stage of the transformation can be understood clearly this way, as would the step-by-step process of how encryption here works. * A Rotor Machine is an electro-mechanical device used for encrypting and decrypting secret messages. It contains a set of rotating discs, with an array of electrical contacts, called 'rotors'. A complex scrambling of the input if done using a fixed subsititution of letters implemented by means of the wiring in the electrcial contacts. The security of this is ensured since after encrypting each letter, the rotor advances positions and thereby changing the substitution.

Problem Statement :Describe examples/experiments/analogies through which you will explain (use bullets). 4 Problem Statement : The concept of a rotor machine is to be implemented in the form of an animation to explain the tenets of the use of ciphers in cryptography. Examples : Existing rotor machines such as the 'Enigma Machine' and types of ciphers, use of ciphers etc.in networks and other applications Experiments : Exercises involving enciphering and deciphering text based on classical ciphers. Analogies : Real-world applications of cryptography, ciphers etc., analogies involving famous ciphers.

Problem statement: Stepwise description and illustrations (Add more slides if necessary)‏ 5 * The machine consists of a set of independently rotating cylinders through which electrical pulses can flow. * Each cylinder has 'n' input pins and 'n' output pins, with internal wiring that connects each input pin to a unique output pin, where each input and output pin can be associated with a letter of the alphabet. * If the key for letter A is depressed, an electric signal is applied to the first pin in the first cylinder and flows through the internal connection to the (n-1)th output pin. * After each input key is depressed, the cylinder rotates one position, so that the internal connections are shifted accordingly. After 'n' letters of plaintext, the cylinder would be back to the initial position. Thus, we have a polyalphabetic substitution algorithm with a period of 'n'. * Use multiple cylinders wherein the output pins of one cylinder are connected to the input pins of the next. With multiple cylinders, the one closest to the operator input rotates one pin position with each keystroke. Suppose it is a three cylinder system, for every complete rotation of the innercylinder, the middle cylinder rotates one pin position. And, for every complete rotation of the middle cylinder, the outer cylinder rotates one pin position.

6 Weaknesses in Rotor Machines of use during interception: First, a letter can never be encrypted to itself. This property is of great help in using 'cribs'—short sections of plaintext thought to be somewhere in the ciphertext—and could be used to eliminate a crib in a particular position. For a possible location, if any letter in the crib matched a letter in the ciphertext at the same position, the location could be ruled out. A second Enigma weakness was that the plugboard connections were reciprocal, so that if A was plugged to N, then N likewise became A. Similarly, for some networks, the rules forbid a letter being connected to an adjacent one on the alphabet. Some devices such as the 'Cyclometer', 'Zygalski's Perforated Sheets', distributed computing, 'bomba kryptologiczna' or the Cryptologic Bomb and the British and American Bombe, can also be used for decryption. Even complex frequency analysis techniques would rarely be successful.

List out user interactions that will be there to enhance the understanding of the concept in the animation. * The user can try varying the input given to the Rotor Machine and understand how encryption works using this mechanism. * Another possible user interaction is to actually let the user design his/her own rotor machine by specifying number of cylinders, inputs etc. This will involve additional work and can be considered an extension of this animation, or simulated separately. 7

A small questionnaire with answers based on the concept. Q1. Is the rotor machine an effective tool for encrypting and decrypting secret messages? A1. Yes. Q2. How does the rotor machine ensure continuous secure encryption? A2. By advancing postions after each letter, i.e.changing subsitution. Q3. How can the complexity of encryption be increased? A3. By increasing the number of rotors / cylinders. Q4. Can the complexity of the system be varied? A4. Yes, my many means. Q5. Can rotor machines be applied in other domains? A5. Yes. For example, Image Processing and networks, among others. 8

Links for further reading/references Cryptography and Network Security : Principles and Practice, by William Stallings