CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (2) Information Security.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Conventional Encryption: Algorithms
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Making “Good” Encryption Algorithms
Cryptography Introduction Last Updated: Aug 20, 2013.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 10/06/2015 | pag. 2.
Cryptography, for Fun and Profit. Synopsis What is Cryptography? Some simple cryptographic systems and a modern application. An unbreakable cipher. Some.
ICS 454: Principles of Cryptography
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Chapter 2 – Classical Encryption Techniques
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Introduction to Cryptography
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Information Systems Security
Network Security7-1 Chapter 8: Network Security Chapter goals: r understand principles of network security: m cryptography and its many uses beyond “confidentiality”
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Classical Encryption techniques
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Ln Lou Modern Cyphers. 0. Security System Key Plain Text Cipher Text Encryption (K × P → C) Decryption (K × C → P)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Encryption CS110: Computer Science and the Internet.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Shahram Khazaei Siavash Ahmadi Fall 2015
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Computer Security (CS4800)
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
CPIS 312 Chapter Two: Classic Cryptography By Dr. Daniyal Alghazzawi 2011 Term 2.
Chapter Two: Classic Cryptography
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
Lecture 3 1. TRANSPOSITION CIPHERS 2 Transposition Ciphers now consider classical transposition or permutation ciphers these hide the message by rearranging.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CPIS 312 Chapter Three: Symmetric KEY CRYPTO By Dr. Daniyal Alghazzawi 2011 Term 2.
Computer Security Revision Week
Columnar Transposition
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Cryptography Survey.
Transposition Ciphers
Cryptography Survey.
Unit 2: Cryptography & Cryptographic Algorithm
Introduction to Cryptography I
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (2) Information Security

Cryptography Ciphers 1. Classic Substitution e.g., Caesar Cipher Transposition e.g., Route Cipher Hybrid 2. Modern Symmetric (Private Key) Stream Cipher e.g., RC4, A5/1 Block Cipher e.g., DES, AES Asymmetric (Public Key) e.g., RSA Hybrid

Substitution Cipher Caesar Cipher

Substitution Cipher Tap Code

Substitution Cipher Pigpen Cipher

Substitution Cipher Vigenère Cipher

Substitution Cipher Codebook Cipher

Transposition Cipher Route Cipher

Transposition Cipher Rail Fence Cipher

Transposition Cipher Columnar Transposition

Homework ? Develop a program for one of the ciphers above and use the following structure? string encode(string Plaintext, string key) {: return (Ciphertext); } string decode(string Ciphertext, string key) {: return (Plaintext); }