NET 311D Information Security

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Network Security Section 1: Introduction to security.
Midterm Review Cryptography & Network Security
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
NET 311 Information Security
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Information Security Assignment- 01  What do you know about standards for information Security?  Suppose you are working in a Information Security department.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Encryption CS110: Computer Science and the Internet.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
CSCI-235 Micro-Computers in Science Privacy & Security.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Web Security.
Cryptography – Test Review
Basic Encryption: methods and tools
Symmetric and Asymmetric Encryption
Crypto in information security
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
What is network security?
Chapter 8 Network Security.
Introduction Of System Security
CS4780 Cryptography and Information Security
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Taehyung Kim HPC Lab. POSTECH
Encryption
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
CSCI-235 Micro-Computer Applications
Outline Some Basic Terminology Symmetric Encryption
Networks Encryption.
Topic 1: Data, information, knowledge and processing
Networks and Communication Systems Department
NET 311 Information Security
Chapter 3:Cryptography (16M)
PART VII Security.
NET 311 Information Security
NET 311D Information Security
Cryptography and Network Security
Simple Encryption- Lesson 5
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Lecture 1: Introduction
NET 311 Information Security
Slide design: Dr. Mark L. Hornick
Chapter 29 Cryptography and Network Security
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Computer Security Chapter Two
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Introduction to Encryption Technology
NET 311D Information Security
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

NET 311D Information Security Networks and Communication Systems Department TA. Anfal AlHazzaa TUTORIAL 1 (Traditional Ciphers “Character-oriented”)

Course syllabus Name of faculty member : TA.Maram AlMuhareb Email : Ma.abdulaziz1@gmail.com Office : 0.701.01 1-Dec-18 Networks and Communication Department

Intended learning outcomes Lab Contents Assessment methods Intended learning outcomes Activity Topic Week -   Introduction to the course content (tutorial part) 2 - Assignment - Participation -The ability to demonstrate the basic knowledge of Information Security. -The ability to solve problems related to the traditional ciphers. - Exercise solving - Lecture discussion Exercises on Lecture 2 (Traditional Ciphers). 3 1-Dec-18 Networks and Communication Department

Lab Contents - Assignment - Participation -The ability to solve problems related to the substitution and transposition ciphers - Exercise solving - Lecture discussion   Exercises on Lecture 2 cont. (Simple modern ciphers). 4 -The ability to solve a real DES example. Lecture 3 extension: How DES Works in Detail. 5 -The ability to solve RSA exercises. Exercises on lecture 4 ( RSA ). 6 -Practical assignment -Encrypt and decrypt a message practically using GPG4WIN. -Lab work Using GPG4WIN to encrypt and decrypt a message. 7 1-Dec-18 Networks and Communication Department

Lab Contents -Practical assignment -Sign a message practically using GPG4WIN. - Lecture discussion -Lab work Using GPG4WIN to apply the digital signature. 8 - Learn how to secure the OS using different ways. How to secure your system (ex. Windows 8). 9 10 -Learn how to use one of the anti-malware software practically. Using one of the anti-malware software( ex. Hijackthis). 11 - Free topic 12 Project Discussion 13-14 1-Dec-18 Networks and Communication Department

تقسيم الدرجات للجزء العملي – Grade distribution (Tutorial part) Percentage from overall grade Grade Assessment week Assessment method 8% 8 10, 12 Lab assignments (2 Sheets) 2% 2 weekly Participation 10% 10 13 Programming project 20% Total 1-Dec-18 Networks and Communication Department

Recalling Networks and Communication Systems Department

Example Networks and Communication Systems Department Plaintext : original message before being transformed. Ciphertext : The message after transformation (coded). Cipher : algorithm for transforming plaintext to ciphertext Key : information used in cipher known only to sender/receiver Encrypt : converting plaintext to ciphertext Decrypt: recovering ciphertext from plaintext Cryptography : study of encryption principles/methods Cryptanalysis (codebreaking) - study of principles/ methods of decrypting ciphertext without knowing key Networks and Communication Systems Department

Cryptography Categories Networks and Communication Systems Department

Symmetric Key Symmetric Key Traditional Ciphers Symmetric Key Modern Round Ciphers Traditional Ciphers Simple Modern Cipher Networks and Communication Systems Department

Traditional Ciphers Shift (Caesar) cipher Networks and Communication Systems Department

Questions Traditional Ciphers Networks and Communication Systems Department

Q1: Substitution cipher (Caesar) Encrypt the following texts using the shift (Caesar) cipher with the keys in brackets: “Welcome” (Key=10) GOVMYWO “Open the door” (Key=5) TUJS YMJ ITTW A 00 M 12 Y 24 B 01 N 13 Z 25 C 02 O 14 D 03 P 15 E 04 Q 16 F 05 R 17 G 06 S 18 H 07 T 19 I 08 U 20 J 09 V 21 K 10 W 22 L 11 X 23   GOVMYWO TUJS YMJ ITTW Networks and Communication Systems Department

Q2: Substitution cipher (Caesar) Alice wants to encrypt a message to Bob by using the shift cipher algorithm “Caesar cipher” and the key= 20. The plaintext = “QUIZ”. ( Hint: you may need to use the table) Answer: KOCT A 00 M 12 Y 24 B 01 N 13 Z 25 C 02 O 14 D 03 P 15 E 04 Q 16 F 05 R 17 G 06 S 18 H 07 T 19 I 08 U 20 J 09 V 21 K 10 W 22 L 11 X 23   1-Dec-18 Networks and Communication Systems Department

Q3: Substitution cipher (Monoalphbetic) Use the following table as the key to encrypt the following texts using the substitution cypher: “Announce it tomorrow” EVVRYVZH BF FRDRWWRX - “DO IT” - JR BF A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Networks and Communication Systems Department

Q4: Transposition cipher The following text was encrypted using the transposition cipher with the following mapping as the key, decrypt the message : 1 2 3 4 5 Decrypt Encrypt HI SARA I HOPE YOU ARE FINE LOOKING FORWARD TO SEE YOU Cipher Text: SAHRIHOAPIOUEAYFIRNEOOEKLGFIONARRDWSETEOUZYZO

Q4: Transposition cipher cont. Answer HI SARA I HOPE YOU ARE FINE LOOKING FORWARD TO SEE YOU Networks and Communication Systems Department

Q5: Transposition cipher Encrypt the following message using transposition cipher based on the key shown below: The message is “SWEET HEART”. Answer: WESTHEAREZZT Networks and Communication Systems Department