Download presentation
Presentation is loading. Please wait.
Published byLaurel Ellis Modified over 9 years ago
1
Fmdszqujpo! Encryption!
2
Encryption Group Activity 1: Take the message you were given, and create your own encryption. You can encrypt it anyway you want Try to make an interesting version that you think no other group will be able to guess!
3
Encryption What do you all think Encryption is? Where do you think a good place is to use encryption?
4
Encryption To change information from one form to another especially to hide its meaning. (from the merriam-webster dictionary) In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. (from our favorite site Wikipedia)cryptography
5
Encoding Encoding is the act of transforming data so that it may be properly consumed by another party Encoding is not used for security purposes Common Encoding Schemes HTML URL Unicode Hex
6
Encryption Encryption is similar to encoding, except it implements the use of a key A key is typically a random string of bits used to scramble and unscramble data Different types of Encryption Symmetric Key Encryption Public Key Encryption Common Encryption Schemes WEP TKIP AES-CCMP
7
Encryption Exhaustive Key Search
8
Cracking Activity 1 For this activity, we will list each of the messages up here, and then each group should choose a message and try to crack the encryption and get the message.
9
Cracking Activity 1 The messages are:
10
More Definitions, yay There are 2 types of encryption, weak encryption and strong encryption. Weak encryption means that although it is encrypted, it is a simple algorithm, or simple way to encrypt it, and can be cracked in minutes to anything less than a day or so. An example of this is from a security flaw found in March. This flaw is from the days when the government enforced that products be exported with weak encryption, but then was forgotten, and wasn’t discovered till this year, leaving a lot of time for any number of people to exploit it. The encryption was 512 bits, which can be cracked in about 7 hours if you have a good enough set of computers (or using a cloud of computers).
11
Definitions cont. Strong encryption means that the data/message is encrypted with either a very complex algorithm, or it is encrypted enough times that it takes a long time to decrypt. An example is that you use 2048 bit encryption, or if you want to keep the weak encryption algorithm, you can encrypt the data multiple times to make it stronger (like encrypting a message with one method, then encrypting the result with another, and so on for 5 different encrypted algorithms).
12
Definitions cont. One last definition that is good to know is what we mean when we say we will crack encryption. When we say crack we mean break it or decrypt it in some shape or form.
13
Example 1 – Caesar cipher
14
A Caesar cipher is an algorithm that uses the English alphabet to change a message into something else. You choose a number from 1 to 25, and for each letter in the message you want to encrypt, you add the number to it and change to the new letter. Example 1 – Caesar cipher
15
Let’s say we want to take this phrase ‘thisisencryptionclass’ and use the Caesar cipher to encrypt it. Let’s say we choose 5 as our ‘key’, which means the value we want to change it with. First thing we can do is right out the alphabet from 0 to 25, and place the letters with the numbers. 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 a b c d e f g h i j k l m n o p q r s t u v w x y z Example 1 – Caesar cipher
16
t h i s i s e n c r y p t i o n c l a s s 19 7 8 18 8 18 4 13 2 17 24 15 19 8 14 13 2 11 0 18 18 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 a b c d e f g h i j k l m n o p q r s t u v w x y z So the message in number form is: 19 7 8 18 8 18 4 13 2 17 24 15 19 8 14 13 2 11 0 18 18 Example 1 – Caesar cipher
17
Ok, now that we have the message as a number, let’s convert it using the key. Our key = 5 in this case, so add 5 to every number (and when it hits 25, start back at 0 ie. 23 + 5 = 25 + 3 = 2 Example 1 – Caesar cipher 19 7 8 18 8 18 4 13 2 17 24 15 19 8 14 13 2 11 0 18 18 +5 +5 …..…. +5 +5 24 12 13 23 13 23 9 18 7 22 3 20 24 13 19 18 7 16 5 23 23
18
Finally, let’s convert that back to letters: (remember: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 a b c d e f g h i j k l m n o p q r s t u v w x y z Example 1 – Caesar cipher 24 12 13 23 13 23 9 18 7 22 3 20 24 13 19 18 7 16 5 23 23 y m n x n x j s h w d u y n t s h q f x x
19
That means our original message: thisisencryptionclass Is now encrypted and looks like this: ymnxnxjshwduyntshqfxx Pretty simple right? Example 1 – Caesar cipher
20
Example 2 – Substitution Cipher
21
The Substitution cipher goes one step further, and instead of using a single key, we just arbitrarily change the way we have the letters. Example 2 – Substitution Cipher For this example, let’s use the following for our substitution key: a b c d e f g h i j k l m n o p q r s t u v w x y z j d k e b o a p r i l u m n w q s f z x c v b s t y
22
Now, using the same message we had in example one, we substitute each letter for the one in the key we made. thisisencryptionclass is the message and gets encrypted to: Example 2 – Substitution Cipher t h i s i s e n c r y p t i o n c l a s s x p r z r z b n k f t q x r w n k u j z z a b c d e f g h i j k l m n o p q r s t u v w x y z j d k e b o a p r i l u m n w q s f z x c v b s t y
23
Example 3
24
For this example, we will explore public/private key encryption First off, go to https://www.igolder.com/PGP/https://www.igolder.com/PGP/ We will use this site for the public/private key encryption
25
Example 3 unencrypted message: thisisencryptionclass
26
Example 3 public key: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: BCPG C# v1.6.1.0 mQENBFWUN4IBCACLRN0U0mcGe69UWvc0k7ZYZ5NH1eyIqpRzuISgjvC3AUBWqROk yveE/zKUDBcYTge3G2yEOuAfTA6lCGPhXfSug6un9r1ddWcmfQK4BSVqFurlZpcC x10f5ZLsIsJyDXML8GgKk3q0HhPxiE9qVnrhq1lV1KHaAaf60ifbr2dpTZkxLP9Q hd/1it+wpByNO6xq+lx47CVbOoiCDIQxqPI1CixqnZGmFQ8MNf5dqtDN2i6aVoIb TtYQSQppKO/bUG6//8mosmWfCQ9T7dHDRgX6KRVTv6PxsmXXFuj4iurcjFPK+9GP mBf/ml8LwxhHM0b2wc2RTouc7KMrZ2yEQ2VHABEBAAG0HHdiZjAwMDdAdGlnZXJt
27
Example 3 YWlsLmF1YnVybi5lZHWJARwEEAECAAYFAlWUN4IACgkQnqgOCvo1SJWYiAf/S8bH P/nUwfVTwyPQ4SHmhA7Dk4ywYuAsrMp6zuaHlPu1s21CMc88GLupcaT8CNdb9I7J qZeTKVUwRlZAR/CkkF8IcAq/02QrNrZA9Uj0ZaGvxvy9x6MjTazDPkqPJ7IoYmIG BlvSwGY2LQW5piuHuBgi2VSv8g3d1/4unVph0iiqCosAKldHrLJBkKe0evr0eF1H BG1htjf9M5t2GyUk2OQ/rw+wYE2bYPZQjtYdgjE3U+hyZpBotrTQFl4ZvuDQdffU ok2Hrw/vAy92KlM1UcjBO7m2VV52e5TdUVru/tnhvKADzpAn3LgQUVbj5W0GXPds T+qMeOSA6Iw2fO8gsg== =LzLX -----END PGP PUBLIC KEY BLOCK-----
28
Example 3 encrypted message: -----BEGIN PGP MESSAGE----- Version: BCPG C# v1.6.1.0 hQEMA56oDgr6NUiVAQf+OZxioO1wGz3nnEImnyjrKViYBCN4boM+gKGiVo2RRPWw +Pw8FDyjL2jO8CiX1+UTTZma0x9IXxHhoiQbA5Yncy9Hkn98SuPjvAm4CBvVqwTt p4l6vm8eGdN8PqHfyGOVgbmvyoAfF8ciG5v5WLk3hJOUYy5t8MHSEltK/DA2RWQw muUt5ExVxV7usHjUknRXT8FMbRfBZ+maGR5AxLbYnxFwQG5gkldjT4FbXI/cSxEC p1dgUBL9+TLB/S2SCUCTiblpAn6AlaSfA3lpSU767aoRFhFqdiX+ObYDM6duOXNG /VB80WwC3T9hMeHy1+KMPKeX3rfWRFmYmC8OfhCroskzr7AEPSOX19hwGijRPpUi 8IcaQyMcZ+mvuyIXP2XAtZgwDjWU9/twrQII1oUI/py6Tsq5 =5kkc -----END PGP MESSAGE-----
29
Cracking Activity 2 Let’s go to this website to do some encryption and decryption: https://picoctf.com/crypto_mats/index.html As a group, create a few messages Then take those messages and encrypt them Next, bring them up to me and put a note that tells me which encryption you used for it Finally, each group should choose a few (not your own) and try to decrypt them. Once you’ve decrypted them, tell us which you chose, what encryption it was, and what the message is
30
Public/Private Key Activity Go to the website: https://www.igolder.com/PGP/https://www.igolder.com/PGP/ Split each group in half, and each half will play a role One will be the owner of the public/private keys, and the other will be the one to send the message The owner should give the sender their public key, and the sender should use the public key to encrypt the message. The sender then gives the message to the owner, who decrypts it using the private key and password for their keys Next, each half should reverse roles Finally, both halves will be owners and senders.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.