Presentation is loading. Please wait.

Presentation is loading. Please wait.

www.fakengineer.com Seminar on (ENCODING AND DECODING TECHNIQUES)

Similar presentations


Presentation on theme: "www.fakengineer.com Seminar on (ENCODING AND DECODING TECHNIQUES)"— Presentation transcript:

1

2 Seminar on (ENCODING AND DECODING TECHNIQUES)

3 Introduction What is Cryptography Why we need Cryptography

4 Some terms associated with Cryptography Plaintext Ciphertext Encryption Decryption Key

5 Methods for Encryption/Decryption Conventional Methods Public key Methods

6 Conventional methods Character-level encryption Substitutional Transpositional Bit-level encryption

7 Data encryption standard (DES) Bit-level encryption Designed by IBM and adopted by the U.S government for nonmilitary use Encrypts a 64-bit plaintext using a 56-bit key The text is put through 19 different procedures to create a 64-bit ciphertext

8

9 Publickey Encryption

10 RSA Encryption Rivest, Shamir, Adleman encryption Public key encryption technique One party uses a public key, k p Other party uses a private key, k s Both use a number, N

11

12 Encryption algorithm (RSA) Encode the data to be encrypted as a number to create the plaintext P Calculate the ciphertext C=P k p modulo N Send C as ciphertext

13 Decryption algorithm (RSA) Receive C, the ciphertext Calculate plaintext P=C k s modulo N Decode P to the original data

14 Example of RSA Let K p=5, K s=77, and N=119 Let the character F is encoded as 6 (sixth char in alphabet) We calculate 6 Kp modulo 119 =41 At the receiver side, we calculate 41 Ks modulo 119=6 Decode 6 as F

15 Choosing K p, K s and N First choose 2 prime numbers p and q (we choose 7 and 17) Calculate N=p*q (N=7*17=119) Select K p such that it is not a factor of (p- 1)*(q-1) (we choose 5, not factor of 96) Select K s such that (K p* K s ) modulo (p- 1)*(q-1)=1 (4*96+1=385 and 385/5=77)

16


Download ppt "www.fakengineer.com Seminar on (ENCODING AND DECODING TECHNIQUES)"

Similar presentations


Ads by Google