Cryptology Tim Cahill Ryan Church.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Graohics CSC 171 FALL 2001 LECTURE 16. History: COBOL Conference on Data System Languages (CODASYL) - led by Joe Wegstein of NBS developed the.
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
An Expert System for Solving Simple Cryptograms Carolyn Rucci Dr. Ralph Morelli 1 year project.
Cryptography at The University of South Carolina Douglas B. Meade
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Section 2.9 The Hill Cipher; Matrices
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
Computer Science 101 Cryptography Part II
Cryptography Programming Lab
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
CS110: Computers and the Internet Encryption and Certificates.
a connection between language and mathematics
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Systems of Equations as Matrices and Hill Cipher.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Lec. 5 : History of Cryptologic Research II
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
NUMBER THEORY Chapter 5: Cryptology. Era of Electronic Electronic communication Electronic Banking.
Cryptology Tim Cahill Ryan Church. Project Progress We have researched hill ciphers and are in the process of understanding them. We are also in the process.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Web Tools for Classical Cryptology Tristan Beeble.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Information Security Assignment- 01  What do you know about standards for information Security?  Suppose you are working in a Information Security department.
Spam and the Ongoing Battle for the Inbox Joshua Goodman, Gordon Cormack, and David Heckerman Louis Szgalsky Andrew Burns.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Cryptology aka Cryptography Tim Cahill Ryan Church.
Shahram Khazaei Siavash Ahmadi Fall 2015
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
Computer Security (CS4800)
Some of these PowerPoint pages were created by my friend Shawna Haider.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
CRYPTOLOGY BY: Chris and Chris. Concepts & Definitions c ryptology- Is the art,or would be science, of designing and braking down secrecy systems c ryptology-
Columnar Transposition
Polyalphabetic Ciphers
FATİH SULTAN MEHMET VAKIF UNIVERSITY Faculty of Engineering & Architecture Computer Engineering Department MAT217E - DİSCRETE STRUCTURES Slides for a.
Permutations and Ciphers
Chapter 3:Cryptography (16M)
Simple Encryption- Lesson 5
Fun with Cryptography The Science of Secrecy.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Computer Security Chapter Two
Presentation transcript:

Cryptology Tim Cahill Ryan Church

Cryptology Cryptology - the science and study of cryptanalysis and cryptography. Cryptography - the procedures, processes, methods, etc., of making and using secret writing, as codes or ciphers. Ex: The process where you take your message and encode it using a key you make up. your sentence = yana is awesome your key = +3 Encoded message = bdqd lv dzhvrph Cryptanalysis - the procedures, processes, methods, etc., used to translate or interpret secret writings, as codes and ciphers, for which the key is unknown. Ex: encrypted segment = DEF cryptanalysis is the process where you go from the encrypted segment “DEF” to the decrypted segment “ABC” without using the key.

Terms (cont.) Public key = in cryptography, a value associated with a particular person and used to decrypt messages from that person or encrypt messages to him/her. Ex: key can be anything you make up, it could be as simple as encryption = letter +3, or more complicated like encryption = letter +3 -2 *3 /2. PROJECT PROGRESS Main project is a hill cipher. Which is a more complicated cipher which involves a two by two matrix.

Programming Example Caesar cipher: #include<stdio.h> #define SIZE 10 int main(){   int i=0;   char z, x[SIZE], c[SIZE]={0};   printf("Enter a 10 character message:  ");   while(i<10){     c[i]=getchar();     i++;   }   i=0;     while(i<10){     x[i]=c[i]+3;     printf("%c", x[i]);     i++;   } printf("\n\n");   i=0;   while(i<10){       z=x[i]-3;       i++;       printf("%c", z);     }         printf("\n");   return 0; }

Quiz 1) What is the difference between cryptology and cryptography? 2) What is the main use for cryptology? 3) Draw how public key is used. 4) What would the encoded message of Yana be if the key is +4?

References Spam and the ongoing battle for the inbox. Communications of the ACM, Volume 50, #2 (2007), pages 24-33. Joshua Goodman, Gordon V. Cormack, David Heckerman. Textbook: Invitation to computer science java version Edition 3, Schneider, copyright 07. pages 600-607 An overview of cryptography. Gary C. Kessler, may 1998 (23 January 2009). (website) www.garykessler.net/library/crypto.html#purpose