Whirlpools & waterspouts by Callie Peders and Cody Kreczko.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Hashes and Message Digests
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Ocean Waves and Tides (67)
 Currents that run along the western coast of the United States are _________________.  Currents that run along the eastern coast of the United States.
Movements of the Ocean Chapter 21.
_______________’s Hurricane Booklet
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
By: Matthew Ng. SHA stands for Secure Hash Algorithm It is based off the Merkle-Dangard hash function There are 3 versions of it with one coming in 2012.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
CSE331: Introduction to Networks and Security Lecture 18 Fall 2002.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Movements of the Ocean Chapter 22.
.  A tsunami is a wave or series of waves generated at sea by the abrupt movement of a mass of seawater. This is usually caused by the sea floor moving.
Currents Currents.
Great Britain Geography and Nature.
Definition of Hydrography
NATURAL DISASTERS IN THE UNITED STATES DISASTERS CYCLONES EARTHQUAKES HURRICANES TORNADOS THUNDERSTOMS VOLCANOES.
The Misuse of RC4 in Microsoft Office A paper by: Hongjun Wu Institute for Infocomm Research, Singapore ECE 578 Matthew Fleming.
12.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 12 Cryptographic Hash Functions.
Hashing Algorithms: Basic Concepts and SHA-2 CSCI 5857: Encoding and Encryption.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Natural Disasters around the world. What is a natural disaster? A natural disaster is the effect of a natural hazard. There are many different types,
Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.
NAVIGATION TRAINING Section 10 Currents and Waves.
Chapter 6 Lessons 1 & 2 Test Thursday, December 10 th.
Chapter 7: Climate Weather. Precipitation  Precipitation occurs when a cold air mass meets a warm air mass.  The cold air, being more dense, forces.
Hash and MAC Functions CS427 – Computer Security
Natural Disasters Around the world.
12.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 12 Cryptographic Hash Functions.
6.375 Final Presentation Jeff Simpson, Jingwen Ouyang, Kyle Fritz FPGA Implementation of Whirlpool and FSB Hash Algorithms.
6fb52297e004844aa81be d50cc3545bc Hashing!. Hashing  Group Activity 1:  Take the message you were given, and create your own version of hashing.  You.
Hurricanes Hurricanes form in the water. From space they look like a huge cloud with an eye in the middle. Only a few hurricanes made it to land, when.
–wave –crest –trough –breaker Objectives Describe the physical properties of waves. Explain how tides form. Compare and contrast various ocean currents.
Waves Wave Spectrum Surface waves deep-water waves shallow-water waves Wave Development Wave Equations Global Wave Heights S.
Why does the ocean move? The tides, waves, and currents cause motion in the ocean They are the result of interactions of many forces and factors Conditions.
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
Tides, Waves, & Currents Manifestation of the Moon’s and Sun’s force of the gravity acting on the Earth hydrosphere Shallow water waves affecting the World’s.
Wave Energy By: Kaitlyn Wary. How does it work? It pretty much consists of a special floating device (also known as a buoy) which proceeds to rise and.
1 Chapter 12: Hash and MAC Algorithms Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal, U of Kentucky)
What Are Natural Disasters?
Information Security and Management 11. Cryptographic Hash Functions Chih-Hung Wang Fall
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
A flood happens when too much rain falls brought by stormy weather and stormy winds. Rivers burst their banks and the water spills onto the land strong.
Alexa, Lora, Dani, and Cody
Universal Gravitation Does the moon stay at a certain distance from the Earth or is it falling toward the Earth? - the moon is actually falling around.
Weather and Climate Unit Investigative Science. * Normally peaceful, tropical oceans are capable of producing one of Earth’s most violent weather systems—tropical.
Chapter 5 Erosion and Deposition
Information Security and Management (Abstract) 5
Great Britain Geography and Nature.
Hurricanes, Tornadoes, and Thunderstorms and Lightning
Chapter-2 Classical Encryption Techniques.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Warm-up What is one topic from this unit that you understand?
The Hydrosphere.
ICS 454 Principles of Cryptography
Section 3: Tropical Storms
ICS 454 Principles of Cryptography
Title Layout Subtitle.
Block Ciphers (Crypto 2)
Hashing Hash are the auxiliary values that are used in cryptography.
Cryptographic Hash Functions
Advanced Encryption Standard
Cryptographic Hash Functions
Presentation transcript:

Whirlpools & waterspouts by Callie Peders and Cody Kreczko

Chapter one

How do you read a waterspout F mile winds.not much damage F mile winds.simple damage F mile winds.moderate damage F mile winds.severe damage F mile winds.davesting damage F mile winds. You hope no one is around.

How are waterspouts made Waterspouts are sometimes made after a hurricane Waterspouts are a bunch condensed water droplets. Waterspouts are vortexes. Wind helps Waterspouts navigate through a coast.

Are waterspouts helpful No and yes. Water spouts are not helpful when they rip,rip,rip Up towns and cities that are by a coast. Waterspouts are helpful when they Throw fish onto the shore. But still they hurt more then they help.

What are normal waterspout victims Sea sponge Sea sponge Fish Fish Sea horse Sea horse Walrus Walrus Manatee Manatee

Chapter two

Famous whirlpools Corryvecken of the coast of Scotland Corryvecken of the coast of Scotland Moskstrauman of the coast of Norway Moskstrauman of the coast of Norway Saltsstrauman off of Norway Saltsstrauman off of Norway Old sow in the middle of new Brunswick and Maine Old sow in the middle of new Brunswick and Maine

Where do whirlpools occur most Whirlpools accrue most under bridges Whirlpools accrue most under bridges In the middle of the ocean In the middle of the ocean In outer space In outer space But to put it simple Japan, U.S.A, and China.

How is a whirlpool started Whirlpools at sea are caused by the meeting of opposing currents and tides, by ocean currents striking offshore rocks and other coastal configurations, and by the force of wind acting upon water. Irregularities in basin and channel bottoms usually cause whirlpools in rivers and lakes. Whirlpools in the open seas are giant suctionless eddies, such as the Sargasso Sea in the Atlantic ocean, were sometimes becalmed in them and were held fast in their centers or were swept by the slowly rotating currents against rugged coasts. Whirlpools with a strong vortical motion, on the other hand, can become very violent and are capable of sucking boats into their rapidly down- spiraling cavities. Noted whirlpools include the Charybdis in the Strait of Messina between mainland Italy and the island of Sicily, the Maelstrom, or Moskenstraumen, in the Lofoten Islands off Norway, and the Whirlpool Rapids below Niagara Falls. [Photo 43 KB] eddiesSargasso SeaNiagara Falls eddiesSargasso SeaNiagara Falls

What Is a Whirlpool WHIRLPOOL is a cryptographic hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto. The hash has been recommended by the NESSIE project. It has also been adopted by the International Organization for Standardization (ISO) and the International Electrotechnical cryptographic hash functionVincent RijmenPaulo S. L. M. BarretoNESSIEInternational Organization for Standardization International Electrotechnicalcryptographic hash functionVincent RijmenPaulo S. L. M. BarretoNESSIEInternational Organization for Standardization International Electrotechnical CommissionCommission (IEC) as part of the joint ISO/IEC international standard. international standard Commissioninternational standard WHIRLPOOL is a hash designed after the Square block cipher. WHIRLPOOL is a Miyaguchi-Preneel construction based on a substantially modified Advanced Encryption Standard (AES). Given a message less than bits in length, it returns a 512-bit message digest. WHIRLPOOL is a hash designed after the Square block cipher. WHIRLPOOL is a Miyaguchi-Preneel construction based on a substantially modified Advanced Encryption Standard (AES). Given a message less than bits in length, it returns a 512-bit message digest.Squareblock cipher Miyaguchi-PreneelAdvanced Encryption Standard message digest Squareblock cipher Miyaguchi-PreneelAdvanced Encryption Standard message digest The authors have declared that "WHIRLPOOL is not (and will never be) patented. It may be used free of charge for any purpose. The reference implementations are in the public domain." The algorithm is named after the Whirlpool Galaxy in Canes Venatici. Whirlpool GalaxyCanes VenaticiWhirlpool GalaxyCanes Venatici [edit] edit WHIRLPOOL hashes The WHIRLPOOL algorithm has undergone two revisions since its original 2000 specification. In the first revision in 2001, the s-box was changed from a randomly generated one with good cryptographic properties to one which has better cryptographic properties and is easier to implement in hardware. In the second revision (2003), the diffusion matrix was changed s-box s-box2003 People incorporating WHIRLPOOL will most likely use the most recent revision of WHIRLPOOL; while there are no known security weaknesses in earlier versions of WHIRLPOOL, the most recent revision has better hardware implementation efficiency characteristics, and is also likely to be more secure. As mentioned earlier, it is also the version adopted in the ISO/IEC international standard. international standardinternational standard The original WHIRLPOOL will be called WHIRLPOOL-0 and the first revision of WHIRLPOOL will be called WHIRLPOOL-1 in the following test vectors. The 512-bit (64-byte) WHIRLPOOL hashes (also termed message digests) are typically represented as 128-digit hexadecimal numbers. The following demonstrates a 43-byte ASCII input and the corresponding WHIRLPOOL hashes: hexadecimal ASCIIhexadecimal ASCII

Dangers Dangers

Here is a whirlpool in space. Fast Facts: Whirlpool Galaxy Name(s) Fast Facts: Whirlpool Galaxy Name(s) Whirlpool Galaxy, M51, NGC 5194 Whirlpool Galaxy, M51, NGC 5194 Description Description A face-on spiral galaxy with companion A face-on spiral galaxy with companion Location Location Found in the northern constellation Canes Venatici Found in the northern constellation Canes Venatici Distance from Earth Distance from Earth About 9.6 megaparsecs (31 million light-years) About 9.6 megaparsecs (31 million light-years) Size Size The galaxy is roughly 30 kiloparsecs (98,000 light-years) in diameter The galaxy is roughly 30 kiloparsecs (98,000 light-years) in diameter

The end This was by Callie Cody corporations. And thank you And thank you C.C Cody Callie