Fun with Cryptography The Science of Secrecy.

Slides:



Advertisements
Similar presentations
Computer Science 101 Data Encryption And Computer Networks.
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Public Key Cryptography
Index of Coincidence Meghan Emilio Professor Ralph Morelli February 18, 2004.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Rules of Integers. Positive numbers are numbers that are above zero. Negative numbers are numbers below zero.
MAT 1000 Mathematics in Today's World Winter 2015.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Cryptography.
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Cryptography Dr. X.
Affine Cipher.
Cesar & Vigenere Encryption
Introduction to Cryptography
Negative and Zero Exponents
Computer and Data Security 4th Class
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
- Stream Cipher and Block Cipher - Confusion & Diffusion
Topic 3: Data Encryption.
Cryptography Survey.
Permutations and Ciphers
Five-minute starter task
W Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
Chapter 3:Cryptography (16M)
ICS 454: Principles of Cryptography
B Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
NET 311D Information Security
Cryptography Survey.
H Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
B Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
Simple Encryption- Lesson 5
To get y, multiply x by 3 then add 2 To get y, multiply x by negative ½ then add 2 To get y, multiply x by 2 then subtract 3 To get y, multiply x.
W Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
Divide the number in C by 10.
Objective - To add and subtract decimals.
H Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
W Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
OPERATIONS WITH INTEGERS: ADD, SUBTRACT, MULTIPLY & DIVIDE.
W Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
Introduction to Cryptography I
STEP 2: 1. SELECT ‘TEXT’ FROM THE DROP DOWN
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Double Transpositions
. Columnar Transposition
Homophonic Substitution Cipher
Types of Cryptanalysis attacks
Symmetric Encryption or conventional / private-key / single-key
W Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
W Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
NET 311D Information Security
Science is fun. Science is fun. Science is fun. Science is fun. Science is fun. Science is fun. Science is fun. Science is fun. Science is fun. Science.
H Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Fun with Cryptography The Science of Secrecy

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 CAESAR CIPHER Choose plain text Choose a key in the range [1..25] For each letter: 1. find the position of the letter 2. if encrypt, add key to the position 3. if decrypt, subtract key from position 4. if the result is negative, add 26 5. divide the result by by 26 6. find the remainder in the table 7. the character is above the remainder Encrypt Letter = ‘D’, Key = 24 Sum = 26. 27 % 26 = 1. ‘B’ is at position 1 Decrypt Letter = ‘B’, Key = 24 1 – 24 = -23. - 23 + 26 = 3. 3 % 26 = 3 ‘D’ is at position 3 VIGNERE CIPHER Choose a plain text Choose a key word Write the key word over the plain text For each letter and corresponding key letter: find the position of the letter in the key find the position of the letter in the plaintext below the key if encrypt, add what’s found in step 1 to what’s found in step 2 if decrypt, subtract what’s found in step 1 to what’s found in step 2 if the result is negative, add 26 divide the result by 26. Find the remainder in the table above the character is above the remainder Key = GOZAGS Plain Text = COMPUTERSCIENCE G O Z A S C M P U T E R I N