Norissa Lamaute, Alexa Piccoli, Li-Chiou Chen, and Andreea Cotoranu

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CLASSICAL ENCRYPTION TECHNIQUES
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
CIS 5371 Cryptography Introduction.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
ITMS – 3153 Information Systems Security
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptography (Traditional Ciphers)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Outline Some Basic Terminology Symmetric Encryption
Lesson 5: Simple Encryption
Chapter 3:Cryptography (16M)
PART VII Security.
Simple Encryption- Lesson 5
Lesson 7: Simple Encryption
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Chapter Goals Define cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Norissa Lamaute, Alexa Piccoli, Li-Chiou Chen, and Andreea Cotoranu Musical Cryptography Norissa Lamaute, Alexa Piccoli, Li-Chiou Chen, and Andreea Cotoranu

Research Goals To create a musical cipher that the sender could use to mask a message effectively, not necessarily by making the message harder to decrypt, but rather by making the message sound inconspicuous and difficult to detect as cipher. To the unsuspecting ear, our messages will sound like regular tunes, but to someone expecting a secret message, the music would be simple to decode.

Cryptography Then main goal of cryptography is to create a way to protect information from an adversary There are different mathematical transformations one can use to convert plain text into cipher text including permutations, combinations, transpositions, etc. The message must be easy to encrypt but difficult to decrypt, unless the recipient of the message has a secret passcode or key.

Cryptography vocabulary Encryption = the process of converting plain text into cipher text. Decryption = the process of converting cipher text into plain text.

Music Theory There are 12 tones in a chromatic scale meaning that there are 12 keys black and white in between C and the following B on a piano A major scale uses 7 of the keys W-W-H-W-W-W-H

Music Theory cont. Key signatures show which black keys on the piano to use Find the next major scale key signature by using circle of fifths Use the reverse for the major flat scales (fourths) Inner circle shows relative minor keys.

Music Theory cont. Quarter notes take up 1 full beat and in a common time signature, there can be up to 4 per measure. An eighth note takes up ½ of a beat and in common time, there can be 8 notes per measure. A sixteenth note takes up ¼ of a beat and in a common time, there can be up to 16 per measure. A triplet note takes up ⅓ of a beat and in common time, there can be up to 12 per measure.

Substitution Cipher A monoalphabetic cipher (or substitution cipher) is the simplest type of cipherkey This cipher encrypts each individual character in the plaintext alphabet with an individual character in the ciphertext alphabet.

Substitution Cipher cont. Ex. Cesar Cipher If any iteration were to have the key of 2 or B, the alphabet would shift from ABCDEFGHIJKLMNOPQRSTUVWXYZ to BCDEFGHIJKLMNOPQRSTUVWXYZA As a result, the plain text message “HELLO” become cipher text “IDMMP.”

Purposed Musical Cipher The goal of our encryption cipher is to generate a cipher key that will abide by the conventions of music theory. We intend to avoid dissonance and uneven beats in a measure by creating a key that stays in one key signature in the context of a single major scale to generate a tune pleasing to the ear, regardless of the plain text composition.

Proposed Musical Cipher cont. The letters are ordered by their frequency in the English language. In order to generate a consonant cipher, we arranged the notes by fifths. We then assigned each individual letter a rhythm or beat division so that two letters with the same note can sound different

Proposed Musical Cipher cont.

Proposed Musical Cipher cont. Using this cipher, the plain text “hello” in the key of C major is encrypted into cipher text “C50 C100 A50 A50 A100

Existing Methods There are other methods for Musical Cryptography that have been researched. Variations of substitution ciphers are used. Our research differs in that we aim to make the music sound consonant by abiding to classical music theory standards. This research relies on the Ionic scale which generates a more harmonic cipher text.

Results and Future Work We were successful in creating a cipher table that generated consonant sounds, but the cipher itself does not have strong security. The application of the proposed cipher can be combined with existing public key or private key encryption algorithms It should also be limited to encrypting information that is short in length to make statistical analysis of the cipher text harder

Acknowledgements The authors would like to acknowledge GE Capital for funding the “STEM Women Achieve Greatness” program at Pace University. The funding made it possible for us to conduct a collaborative research workshop with high school girls at Pace University during spring 2016. The high school student participants, Allegra Copeland, Jenna Dolgetta, Kayley Lewis, and Kyra Wilkowski, were asked to contribute their own ideas for musical cryptography models, which were all taken into consideration when conducting this study.

The end. Thank you!