Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session

Save this PDF as:

Size: px
Start display at page:

Download "Email Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session"

Transcription

1 Name: Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session Purpose: The purpose of this lab is to reinforce the key ideas behind cryptography and to expose how some simple cryptography algorithms work. There are a set of questions on pages 1 through 8 of this document that you should submit answers to by the due date. Simple Cryptography Implementation To start off the lab, let s look at a very simple implementation of encryption and decryption. One of the earliest, and now simplest, encryption algorithms developed is called the Caesar Cipher. This approach to encryption was used by Julius Caesar to protect military messages. The key idea behind the Caesar Cipher is that every original letter of the alphabet in the message is substituted with another letter in the alphabet one that is some number of spaces to the right (called the Shift) in the alphabet from the original letter. For example, let s assume that Shift is 3. Then every A would be changed to a D, every B would be changed to an E, and so on. The complete mapping of letters for a Shift of 3 is shown below: Original: ABCDEFGHIJKLMNOPQRSTUVWXYZ Position: Encrypted: DEFGHIJKLMNOPQRSTUVWXYZABC (assuming Shift is 3) The value Shift is the key for this encryption algorithm. Knowing the Shift used to find the letter to use as a substitute during encryption allows one to decrypt the message by shifting back in the reverse direction (for example, if Shift is 3, then every D in the encrypted message becomes an A [i.e. shifting backwards 3] when decrypting). Question 1 [1 pt each]: For the following three problems, apply the specified shift, by hand, to either encrypt or decrypt the following message. You can leave punctuation as is (it stays the same). a. Encrypt the following message using a Shift of 4 Message: Go Deacs! Encrypted: b. Decrypt the following message that was previously encrypted using a shift of 2 Message: EUE ncd Decrypted: c. Decrypt the following message that was previously encrypted using a shift of 1 Message: X-T Ebti Decrypted: For long messages, it is tedious to perform encryption by hand accordingly, there is software that is available to help us do Caesar Cipher encryptions and decryptions. Go to the following webpage using your webbrowser: When this webpage opens you will see a picture that appears similar to the one at right. In this application, there are areas where you can type in a message to encrypt, a message to decrypt, and a shift amount.

2 Question 2 [1 pt each]: Using the encryption software you just opened, apply the specified shift to either encrypt or decrypt the following messages. You will need to type the messages in they don t copy and paste correctly. Be careful in typing the encrypted messages that you don t mistype something. a. Encrypt the following message using a Shift of 21 Message: Keep your friends close, but your enemies closer. Encrypted: b. Decrypt the following message that was previously encrypted using a shift of 8 Message: Bpmzm a vw xtikm tqsm pwum. Decrypted: c. Decrypt the following message that was previously encrypted using a shift of 17 Message: Efsfup glkj Srsp ze r tfievi. Decrypted: (You may want to go back and check your answers to Question 1 through this software as well!) In the pre-lab, we discussed that one important aspect of encryption algorithms was how many possible keys there were. If there are too few keys, it may be possible to generate all possible keys and try them on an encrypted message until something readable (interpretable as English) appears. Remember that for the Caesar cipher, the key is the Shift that is being used. Question 3: [(a) 4 pts, (b) 3 pts] a) Try Caesar Cipher encryptions using Shifts of 1, 2, and 3 on a simple word (such as BYE ), and then try Shifts of (24, 25, 26, 27, and 28). Message: BYE Encrypted with Shift 1: Encrypted with Shift 2: Encrypted with Shift 3: Encrypted with Shift 24: Encrypted with Shift 25: Encrypted with Shift 26: Encrypted with Shift 27: Encrypted with Shift 28: b) Given your work from Part (a), suggest how many different keys exist in the Caesar Cipher? For encryption approaches where there are a limited number of keys, it is very possible with modern computers to attack the encryption approach by generating all possible keys and trying them all out on the encrypted message. This is called a brute force attack. The encryption software you have opened in your webbrowser supports brute force attacking the Caesar Cipher algorithm. Question 4 [2 pts]: Type the following encrypted message into the Encrypted Text field of the application you opened previously. Repeatedly hit the Brute Force button until you see something that appears as recognizable English. Message: Ncpo pk, epno ncpo pk. Tjp cvy hz vo czggj. What was the message you decrypted: What was the key that was used to encrypt the message (record this from the Shift Amount text field):

3 The Caesar Cipher is an example of a broader class of encryption algorithms called substitution ciphers, in all of which one letter of the alphabet is substituted for another letter. For the Caesar Cipher, the substitution is chosen based on a shift right in the alphabet some number of locations. However, we are not limited to just shifting some number of letters right. In theory, we could imagine that we put all the letters of the alphabet in a hat and then randomly choose a substitution letter for letter A (say X ), another substitution for letter B (say L ), a third substitution for letter C (say Z ), and so on. Thus, the substitutions are no longer uniform shifts over some number of positions but are just mappings between letters as drawn randomly out of a hat. Question 5 [3, 3, 2] a) Assume that Alice is using a general substitution cipher as described above instead of the Caesar Cipher used previously; how much information would she have to provide to Bob to inform him of the appropriate key to use to decrypt messages? b) If Alice was informing Bob of the appropriate key to use to decrypt her simpler Caesar Cipherencrypted message, how much information would she have to provide to Bob? c) The number of possible keys using a general substitution cipher is different than the number you came up with in 3b for the Caesar Cipher. For the description discussed in the previous paragraph (drawing mappings out of a hat), the number of keys is 26! (26! means the factorial of the factorial of a number is the product of all numbers from 1 up to the number, so 26! is 26*25*24*23*22*21*20.. *5*4*3*2*1). Go to and type in 26! Write down the number that is returned below, and think about how much larger it is than 26! Frequency Analysis A weakness with any substitution cipher where letters are just replaced with another letter is that they may reveal the key through an analysis of the frequency of letters being used. There are definite biased frequencies in letters in common English usage (think of the number of times an E appears in a paragraph compared to a Q ). It is very simple to count the frequency of letters appearing in encrypted text and then to map that back to the expected frequencies of common letters. A table of the frequencies of the five most common letters in English text is below. Letter Frequency E 12.70% T 9.06% A 8.17% O 7.51% I 6.97% We will use software to help us perform frequency analysis on text encrypted with the Caesar Cipher algorithm and then attempt to come up with the key. Go to the following webpage

4 When the webpage opens, you should see a screen similar to the following, except the first box will have what looks like a lot of random text in it. In the first box, we can enter text would we like to perform a frequency analysis of. After pressing the Frequency Analysis button, the second box will provide us with the frequency of each letter. Question 6 [1.5,1.5,1.5,3,2]: a. Perform a frequency analysis on the text that is already in the program by hitting the Frequency Analysis button. Write down the top three most frequently used letters below and their percentage: Most commonly used: Second most commonly used: Third most commonly used: Percentage: Percentage: Percentage: b. If a Caesar cipher was used, and we have had enough text to come up with appropriate statistics, we can now come up with the key that was used to encrypt the text. Take the most commonly used letter as reported in Part A and determine how far right-shifted it is from E, the expected most commonly used letter. This is a possible key for the encryption. What key did you come up with? c. Go back to the Caesar Cipher application. Copy and paste the encrypted text from the Frequency application (this should copy and paste correctly) in the Encrypted Text field and type the key you came up with in (b) in the Shift Amount field. Hit the decrypt button and write down the first few words of the decrypted text below. d. The key you came up with in Part B should have not worked correctly. Try mapping the 2 nd most common letter in English, T, to the most commonly used letter in the text. What key did you come up with? Go back to the Caesar Cipher application. Type the key you came up with here (Part D) in the Shift Amount field. Hit the decrypt button and write down the first few words of the decrypted text below. You should be able to recognize the text now. e. What is it about the decrypted text you are now looking at which led to the top two letters being flipped in frequency?

5 Steganography: While encrypting messages is one technique to keep information private, another technique is to literally hide the information being sent in a message in another form of media, such as an image, and to send the image to the recipient. This technique is called steganography, and is very powerful as it is difficult to even tell that a hidden message is being sent. In working with digital images, you learned that every pixel in an image has associated with it R, G, and B color values. Typically, 8 bits are given to each R, G, and B value (meaning each pixel is assigned 24 total bits for colors). Steganography strategically changes these color bits to hide information inside an image. If we change the appropriate bits (usually the last bit of the eight, ordered left to right), it is often impossible to the eye to be able to tell that the color has been changed. Go to the website where you will see a webpage like the one at right. Use this webpage to answer the next few questions. Question 7: [1,2,1] a. Enter FFFFFF in the box at the top (after the # symbol). What color did the small square at the top right turn? b. Explain why this is the appropriate color for #FFFFFF, given what you know about color models? c. The R, G, B fields should all read 255 at this point. Change the bottom B (not the middle one!) field from 255, to 254 and press enter, then to 253 and press Enter, all the way down to 248. Indicate below whether you could tell that the color of the small square you wrote down in step (a) changed for any of these values (255 to 248)? Changing these color bits in such a way that the color change is not visible to the naked eye is a way of storing information without it being known that the information has been embedded in the image. Question 8: [1,1,1,3] a) Given that in (7c), you should have discovered we could change the blue value from 255 to 247 (a shift of 8 colors) without a noticeable change in color, how many bits per pixel does this suggest we could encode information in without it being noticeable? b) For a 640x480 image, how many total bits could we then use to store our information in (using your answer from part (a)) in the image? c) Using your answer from part (b), how many bytes of information could we encode? d) If we are going to fiddle with bits that represent colors, suggest why we want to change the rightmost bits instead of the leftmost bits representing a color (i.e. why change the bits in italics instead of underlined, given what you know about binary numbers: )

6 Make a folder in your CSC101Lab folder called lab11 and download and save the following three files from the class website into that folder: mascot.bmp, deacon.bmp, and steg.zip. The first two files are images of the Demon Deacon mascot. The third contains a program that will allow us to work with steganography. Unzip the steg.zip file by right-clicking on it and choosing to unzip it using the 7-Zip option, then the Extract Here option. If you are unfamiliar with unzipping programs (you did this last week!), please ask one of the instructors. Once the program has been unzipped, double-click on the S- Tools.exe file. This will open a window that appears like the one at right. Now, drag the mascot.bmp and deacon.bmp files from your folder into this S-tools window. They should both appear in the window as shown diagonally at right. One, mascot.bmp, is an original image as distributed by WFU Athletics, while the other, deacon.bmp, has a message embedded in it. Viewing these files side by side on your computer screen, answer the questions below: Question 9: [1,1] a) Can you tell any differences visually between the two images? If so, describe them. b) Back in your lab 11 folder where you downloaded the files, click on each image so you can see at the bottom of the window their size and dimension information. Can you tell any differences in the size or dimensions of the two files? If so, what are they? Question 10: [1 pt each subanswer (8 total)] Right click on the deacon.bmp image in the S-tools program and choose the Reveal menu option. Enter 123 in both passphrase fields and keep the Encryption algorithm as IDEA. This should reveal a text file with a message I embedded in the image. 1. What is the name of the text file? 2. Right click on the name of the text file in the window that appears and choose Save as. Save the file in your lab11 folder and then double click it to open it. What is the codeword mentioned in the text file? 3. Now, back in the S-Tools program, right click on mascot.bmp and choose Properties. Write down or compute the information below: Width: Height: Determine total pixels (width x height): When mascot.bmp is clicked on S-Tools, it indicates in the lower right corner of the application that the image can hold how many bytes of information? How many bits is your answer to the above question? Approximately how many bits per pixel does this indicate could be used to hold a message?

7 Step to create a submission: Now we will ask you to hide your own message inside the mascot image. In your lab11 folder, right click on a blank space and choose the menu option New, followed by Text Document. This will create a new text document in your folder called New Text Document.txt. Rename this to MyLab11Message.txt. Double click the MyLab11Message.txt file and add to the document your name and any additional message you would like. Save the document. Then, drag the saved file into the S-Tools program and on top of the mascot.bmp image. This should bring up a window asking for a passphrase choose 123 and enter it in both passphrase fields (don t choose anything else otherwise we won t know what passphrase to use and won t be able to figure out your message). This will create a new image called hidden data. Right click on the hidden data image and choose the Save as option. Set the name to be mascotwithmessage.bmp Question 11: [3.5 each] Think about the two general techniques you saw for hiding sensitive information you experimented with today: cryptography and steganography and answer the following five thought questions. a. Suggest why real-world applications, such as online banking, prefer using cryptography instead of steganography for protecting their data. b. In our steganography examples, we hid plaintext messages inside of the images. Argue for whether or not we could have encrypted our messages first and then hidden them in the image? Why or why not? c. Someone might consider encrypting the private diary they are keeping on their computer to prevent their nosy siblings from looking at it. There is a potential problem with this, if the diary is kept for years and years why?

8 Question 11 (continued) d. Given what you know about the frequency analysis technique for figuring out the keys being used for ciphers, suggest whether, as a secret message writer, you would be better off sending short messages instead of long messages? e. In all of our scenarios used today, there was shared information between the sender and recipient of the message the Shift amount for the cryptography examples and the passphrase for the steganography examples (in steganography, it would also need to be shared in which bits to look for the data the S-Tools program has made the decision for us to only look in one place the rightmost bits). Reviewing your lecture notes, are our examples using secret key ciphers or public key ciphers? Choose one of the two types of ciphers, circle it below, and then argue why it is appropriate. Type of Cipher: secret key public key Argument: Submission: Upload the one mascotwithmessage.bmp file you created into Sakai under the Assignment named Lab 11 by 5:00pm the day after your lab session. This bitmap file is worth 10 of the 80 possible points for the lab. Submit this document with questions answered on paper by the same time. The points on the problems account for 70 of the 80 possible points.

4. Click Next and then fill in your Name and E-mail address. Click Next again.

NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to

More information

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What

More information

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

More information

Cyber Security Workshop Encryption Reference Manual

Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics

More information

Cryptography and Network Security

Cryptography and Network Security Xiang-Yang Li Introduction The art of war teaches us not on the likelihood of the enemy s not coming, but on our own readiness to receive him; not on the chance of his

More information

Weebly Step-by-Step Instructions

Weebly Step-by-Step Instructions Go to http://weebly.com/ Follow instructions to create site. Write your username, password, email address, and website URL down and send this information to yourself in

More information

Safer data transmission using Steganography

Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/

Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting shayz@comsecglobal.com Copyright 2006 - The OWASP

More information

An Introduction to Cryptography and Digital Signatures

An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through

More information

Today ENCRYPTION. Cryptography example. Basic principles of cryptography

Today ENCRYPTION The last class described a number of problems in ensuring your security and privacy when using a computer on-line. This lecture discusses one of the main technological solutions. The use

More information

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from

More information

Chapter 14: Links. Types of Links. 1 Chapter 14: Links

1 Unlike a word processor, the pages that you create for a website do not really have any order. You can create as many pages as you like, in any order that you like. The way your website is arranged and

More information

INTRODUCTION TO CRYPTOGRAPHY

INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH anas@tawileh.net Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License

More information

Microsoft Outlook. KNOW HOW: Outlook. Using. Guide for using E-mail, Contacts, Personal Distribution Lists, Signatures and Archives

Trust Library Services http://www.mtwlibrary.nhs.uk http://mtwweb/cgt/library/default.htm http://mtwlibrary.blogspot.com KNOW HOW: Outlook Using Microsoft Outlook Guide for using E-mail, Contacts, Personal

More information

Adobe Dreamweaver CC 14 Tutorial

Adobe Dreamweaver CC 14 Tutorial GETTING STARTED This tutorial focuses on the basic steps involved in creating an attractive, functional website. In using this tutorial you will learn to design a site

More information

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it

More information

E-mail Encryption. How do I send my e-mail encryption key?

E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout

More information

Network Security. HIT Shimrit Tzur-David

Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

More information

Instructions for Using i>clicker Blackboard Learning Management System Integration

Instructions for Using i>clicker Blackboard Learning Management System Integration Updated 9 1 2015 Download and Install the Custom Version of the i>clicker Software 1. Before you can use the i>clicker

More information

Encryption. Introduction to using 7-Zip

IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff

More information

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:

More information

Website Development Komodo Editor and HTML Intro

Website Development Komodo Editor and HTML Intro Introduction In this Assignment we will cover: o Use of the editor that will be used for the Website Development and Javascript Programming sections of

More information

Encrypting Files Using AxCrypt

Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else

More information

Wellesley College Alumnae Association. Volunteer Instructions for Email Template

Volunteer Instructions for Email Template Instructions: Sending an Email in Harris 1. Log into Harris, using your username and password If you do not remember your username/password, please call 781.283.2331

More information

Upon Installation, Soda

Upon Installation, Soda Prompts you to create your user profile to register for a new profile Note: Asks your for your particulars Prompts you to select a password. You would need to provide this password

More information

Conference Booking Enquiry & Maintenance

Conference Booking Enquiry & Maintenance Date: 10/09/2015 Prepared by: Eric Li 1 Contents Overview 3 Target Audience 3 Exercise 4 Logging on to OneStop Secure 4 Enquire Booking in OneStop 5 Remove Conference

More information

Outlook XP Email Only

Outlook XP Email Only Table of Contents OUTLOOK XP EMAIL 5 HOW EMAIL WORKS: 5 POP AND SMTP: 5 TO SET UP THE POP AND SMTP ADDRESSES: 6 TO SET THE DELIVERY PROPERTY: 8 STARTING OUTLOOK: 10 THE OUTLOOK BAR:

More information

Intro to Web Development

Intro to Web Development For this assignment you will be using the KompoZer program because it free to use, and we wanted to keep the costs of this course down. You may be familiar with other webpage editing

More information

Adobe Illustrator CS5 Part 1: Introduction to Illustrator

CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Adobe Illustrator CS5 Part 1: Introduction to Illustrator Summer 2011, Version 1.0 Table of Contents Introduction...2 Downloading

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

More information

Effective Programming in C and UNIX Lab 5 Image Encryption with BMP Images Due Date: Saturday March 28th, 2009 by 11:59pm

15-123 Effective Programming in C and UNIX Lab 5 Image Encryption with BMP Images Due Date: Saturday March 28th, 2009 by 11:59pm Background: Encryption is a method used to protect data from intruders during

More information

Simple Encryption/Decryption Application

Simple Encryption/Decryption Application Majdi Al-qdah Faculty of Information Technology Multimedia University Cyberjaya, 63100, Malaysia majdi.qdah@mmu.edu.my Lin Yi Hui Faculty of Information Technology

More information

9/17/2015. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography Basics IT443 Network Security Administration Instructor: Bo Sheng Outline Basic concepts in cryptography system Secret cryptography Public cryptography Hash functions 1 2 Encryption/Decryption

More information

Page 1. Session Overview: Cryptography

Cool Careers in Cyber Security Frequency Chart and Cipher Cryptography Delivery: Can be used as a table demo (hands-on) activity or during a presentation session. Best to have the wheels pre-made. Messaging

More information

File Share Service User guide

File Share Service User guide Version: 2.0 Written by: Sriram Rao Last Modified: 03/16/2012 1 Index Index... 2 Overview... 3 Change Log... 4 Login Instructions... 5 Searching files by name or content...

More information

Netigate User Guide. Setup... 2. Introduction... 5. Questions... 6. Text box... 7. Text area... 9. Radio buttons...10. Radio buttons Weighted...

Netigate User Guide Setup... 2 Introduction... 5 Questions... 6 Text box... 7 Text area... 9 Radio buttons...10 Radio buttons Weighted...12 Check box...13 Drop-down...15 Matrix...17 Matrix Weighted...18

More information

A Methodology to Conceal QR Codes for Security Applications

A Methodology to Conceal QR Codes for Security Applications Akshay Choche and Hamid R. Arabnia Department of Computer Science, University of Georgia, Athens, GA 30602 {choche, hra}@cs.uga.edu Abstract.

More information

EMAIL QUICK START GUIDE

IT Services Microsoft Outlook 2010 EMAIL QUICK START GUIDE Contents What is Outlook?...2 Quick Guide to Email...2 Create a new e-mail message...2 Forward or reply to an e-mail message...2 Creating new

More information

Personal Portfolios on Blackboard

Personal Portfolios on Blackboard This handout has four parts: 1. Creating Personal Portfolios p. 2-11 2. Creating Personal Artifacts p. 12-17 3. Sharing Personal Portfolios p. 18-22 4. Downloading Personal

More information

Creating Interactive PDF Forms

Creating Interactive PDF Forms Using Adobe Acrobat X Pro Information Technology Services Outreach and Distance Learning Technologies Copyright 2012 KSU Department of Information Technology Services This

More information

AKO Email Shutdown Quick Reference Guide

AKO Email Shutdown Quick Reference Guide NETWORK ENTERPRISE CENTER This guide explains how the Army is shutting down AKO Email and outlines steps you must take to ensure a smooth transition to full DoD

More information

Overview Keys. Overview

Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program

More information

Cryptography and Cryptanalysis

Cryptography and Cryptanalysis Feryâl Alayont University of Arizona December 9, 2003 1 Cryptography: derived from the Greek words kryptos, meaning hidden, and graphos, meaning writing. Cryptography is

More information

Dreamweaver: Getting Started Website Structure Why is this relevant?

Dreamweaver: Getting Started Dreamweaver is a Graphic Designer s tool to create websites as he or she designs. As part of the Adobe Creative Suite, Dreamweaver is able to work in conjunction with Photoshop,

More information

TheGreenBow CryptoMailer. User Guide. Contact: support@thegreenbow.com. Website: www.thegreenbow.com

TheGreenBow CryptoMailer User Guide Contact: support@thegreenbow.com Website: www.thegreenbow.com All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic,

More information

Facilities Work Order Attachments Work Instructions

Facilities Work Order Attachments Work Instructions 1 Work with Attachments in the IW32 or IW33 transaction 1.1 Access Order Select or enter the t-code IW32 or IW33 Enter Order information and press Enter

More information

Northwestern University IT Service Manager Knowledge Base Style Guide

Northwestern University IT Service Manager Knowledge Base Style Guide Prepared by NUIT Communications Northwestern University Information Technology (NUIT) Northwestern University Updated May 3, 2013 CONTENTS

More information

OUTLOOK WEB APP 2013 ESSENTIAL SKILLS

OUTLOOK WEB APP 2013 ESSENTIAL SKILLS CONTENTS Login to engage365 Web site. 2 View the account home page. 2 The Outlook 2013 Window. 3 Interface Features. 3 Creating a new email message. 4 Create an Email

More information

By Glenn Fleishman. WebSpy. Form and function

Form and function The simplest and really the only method to get information from a visitor to a Web site is via an HTML form. Form tags appeared early in the HTML spec, and closely mirror or exactly duplicate

More information

SecureZIP User Guide

SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform

More information

CS 1133, LAB 2: FUNCTIONS AND TESTING http://www.cs.cornell.edu/courses/cs1133/2015fa/labs/lab02.pdf

CS 1133, LAB 2: FUNCTIONS AND TESTING http://www.cs.cornell.edu/courses/cs1133/2015fa/labs/lab02.pdf First Name: Last Name: NetID: The purpose of this lab is to help you to better understand functions:

More information

Agile ICT Website Starter Guides

Agile ICT Website Guide V1.0 1 Agile ICT Website Starter Guides 2 The purpose of this guide is to show you how to edit some of the basics of the website you have purchased through Agile ICT. The website

More information

Word 1 Microsoft Word 2013

Word 1 Microsoft Word 2013 Mercer County Library System Brian M. Hughes, County Executive Quick Access Toolbar File Located on the title bar, above the Ribbon, the Quick Access Toolbar provides access

More information

USD WEB SERVICES UPLOADING DOCUMENTS TO PASSWORD-PROTECTED SECTIONS OF YOUR WEBSITE

USD WEB SERVICES UPLOADING DOCUMENTS TO PASSWORD-PROTECTED SECTIONS OF YOUR WEBSITE INFORMATION TECHNOLOGY SERVICES UNIVERSITY OF SAN DIEGO DEVELOPED BY MORGAN ANDERSEN WEBSUPPORT@SANDIEGO.EDU JUNE 2011

More information

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4

More information

Hardware is everything on your computer that can be directly touched. Software is the icons, programs, menus, and buttons on your computer.

What s a Computer? Computers are devices that let you digitally do almost anything. They do calculations, functions, or operations quickly and efficiently. However, they don t run on their own! You use

More information

Blackboard 9.1 Basic Instructor Manual

Blackboard 9.1 Basic Instructor Manual 1. Introduction to Blackboard 9.1... 2 1.1 Logging in to Blackboard... 3 2. The Edit Mode on... 3 3. Editing the course menu... 4 3.1 The course menu explained...

More information

Web Ambassador Training on the CMS

Web Ambassador Training on the CMS Learning Objectives Upon completion of this training, participants will be able to: Describe what is a CMS and how to login Upload files and images Organize content Create

More information

PGP Desktop Email Quick Start Guide version 9.6

What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

More information

A Concept of Digital Picture Envelope for Internet Communication

A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,

More information

DOING MORE WITH WORD: MICROSOFT OFFICE 2010

University of North Carolina at Chapel Hill Libraries Carrboro Cybrary Chapel Hill Public Library Durham County Public Library DOING MORE WITH WORD: MICROSOFT OFFICE 2010 GETTING STARTED PAGE 02 Prerequisites

More information

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface...

2 CONTENTS Module One: Getting Started... 6 Opening Outlook... 6 Setting Up Outlook for the First Time... 7 Understanding the Interface...12 Using Backstage View...14 Viewing Your Inbox...15 Closing Outlook...17

More information

Macromedia Dreamweaver Tutorial

Macromedia Instructions: Work through this tutorial Ask when you need help Complete all tasks set in the tutorial Refer back to this tutorial when you design your own website Enjoy 1 Macromedia SET UP

More information

Each physical sign is represented by a Redirect page. A URL will be provided for this page and your sign will always load that URL.

Creating Signs Locating the Folder Signs are located in Gato-edit s AdminCentral within the folder called University Digital Signage. The signs are then organized by Building, Owning Department and then

More information

CSC 101: Lab #4 HTML and the World Wide Web (Part III) Lab Report Due Date: 5:00pm, day after lab session

Name: Email username: Lab Date and Time: CSC 101: Lab #4 HTML and the World Wide Web (Part III) Lab Report Due Date: 5:00pm, day after lab session Pledged Assignment: This lab document should be considered

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond

More information

Tech-KNOW Topic. for Microsoft Office 2000. Outlook - "You've Got Mail!"

Tech-KNOW Topic for Microsoft Office 2000 Outlook - "You've Got Mail!" Christina School District Network Users: Log in and save today s work in your My Documents folder. Objectives: Participants will be

More information

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...

More information

Windows 7 Basics. Notification Area. Start Button. Show Desktop Button. Taskbar. Windows Explorer

Windows 7 Basics Windows 7 is an operating system, a computer program that controls the operation of your computer and programs you run on it. Programs also known as applications help you accomplish specific

More information

AES Crypt User Guide

AES Crypt User Guide Publication Date: 2013-12-26 Original Author: Gary C. Kessler (gck@garykessler.net) Revision History Date Contributor Changes 2012-01-17 Gary C. Kessler First version 2013-03-03 Doug

More information

Symmetric Key cryptosystem

SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single

More information

KeePass Getting Started on Windows

KeePass Getting Started on Windows This guide includes the initial installation of KeePass 2.x on a Windows PC, creating your first password database, testing the software and entering your first accounts.

More information

anonymous secure decentralized SMS stealthtext transactions

anonymous secure decentralized SMS stealthtext transactions WHITEPAPER STATE OF THE ART 2/8 WHAT IS STEALTHTEXT? stealthtext is a way to send stealthcoin privately and securely using SMS texting. stealthtext

More information

ACADEMIC TECHNOLOGY SUPPORT

ACADEMIC TECHNOLOGY SUPPORT Adobe Photoshop Introduction Part 1 (Basics- Image Manipulation) ats@etsu.edu 439-8611 www.etsu.edu/ats Table of Contents: Overview... 1 Objectives... 1 Basic Graphic Terminology...

More information

Part 1 Foundations of object orientation

OFWJ_C01.QXD 2/3/06 2:14 pm Page 1 Part 1 Foundations of object orientation OFWJ_C01.QXD 2/3/06 2:14 pm Page 2 1 OFWJ_C01.QXD 2/3/06 2:14 pm Page 3 CHAPTER 1 Objects and classes Main concepts discussed

More information

Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points

Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various

More information

How to use PGP Encryption with iscribe

How to use PGP Encryption with iscribe iscribe e-mail seamlessly supports e-mail encryption and digital signatures. This bulletin describes how to setup iscribe so that you can send and receive encrypted

More information

Data Encryption A B C D E F G H I J K L M N O P Q R S T U V W X Y Z. we would encrypt the string IDESOFMARCH as follows:

Data Encryption Encryption refers to the coding of information in order to keep it secret. Encryption is accomplished by transforming the string of characters comprising the information to produce a new

More information

1) A very simple example of RSA encryption

Solved Examples 1) A very simple example of RSA encryption This is an extremely simple example using numbers you can work out on a pocket calculator (those of you over the age of 35 45 can probably even

More information

IST 195 Lab 11: MS Access

Title of lab: Microsoft Access 2010 IST 195 Lab 11: MS Access Learning goal: Databases are collections of information, and database programs are designed to maintain data in structured tables. In this

More information

Online Sharing User Manual

Online Sharing User Manual June 13, 2007 If discrepancies between this document and Online Sharing are discovered, please contact backupfeedback@verizon.net. Copyrights and Proprietary Notices The information

More information

Getting Started with Excel 2008. Table of Contents

Table of Contents Elements of An Excel Document... 2 Resizing and Hiding Columns and Rows... 3 Using Panes to Create Spreadsheet Headers... 3 Using the AutoFill Command... 4 Using AutoFill for Sequences...

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer

More information

COMMON CUSTOMIZATIONS

COMMON CUSTOMIZATIONS As always, if you have questions about any of these features, please contact us by e-mail at pposupport@museumsoftware.com or by phone at 1-800-562-6080. EDIT FOOTER TEXT Included

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

GoodReader User Guide. Version 1.0 GoodReader version 3.16.0

GoodReader User Guide Version 1.0 GoodReader version 3.16.0 Contents Operating GoodReader 1 Send PDF files to Your ipad 2 Copy Files with itunes 2 Copy Files to a Cloud Service 5 Download Files from the

More information

Lecture 5 - Cryptography

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

More information

Using SSH Secure File Transfer to Upload Files to Banner

Using SSH Secure File Transfer to Upload Files to Banner Several Banner processes, including GLP2LMP (Create PopSelect Using File), require you to upload files from your own computer to the computer system

More information

Outlook Live Basics. for Students

Outlook Live Basics for Students 2 Outlook Live for Support Staff Outlook Live for Support Staff 3 Getting Started... 6 Signing into your Outlook Account... 6 Migrating your Account... 8 Address Book...

More information

WEBMAIL User s Manual

WEBMAIL User s Manual Overview What it is: What it is not: A convenient method of retrieving and sending mails while you re away from your home computer. A sophisticated mail client meant to be your primary

More information

PowerPoint 2007: Basics Learning Guide

PowerPoint 2007: Basics Learning Guide What s a PowerPoint Slide? PowerPoint presentations are composed of slides, just like conventional presentations. Like a 35mm film-based slide, each PowerPoint slide

More information

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret

More information

6. If you want to enter specific formats, click the Format Tab to auto format the information that is entered into the field.

Adobe Acrobat Professional X Part 3 - Creating Fillable Forms Preparing the Form Create the form in Word, including underlines, images and any other text you would like showing on the form. Convert the

More information

Getting the most from Apple Mail

Getting the most from Apple Mail Larry Kerschberg, Roy Wagner, Jonathan Bernstein and Friends February 28, 2015 1 Topics Mail on Macs and ios devices Configuring your accounts IMAP Folders VIP Contacts,

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography

More information

Outlook Web Access (OWA or WebMail) Frequently Asked Questions

Outlook Web Access (OWA or WebMail) Frequently Asked Questions If you are a part-time staff member, adjunct faculty member, or Villanova student, you will access your Villanova email using a program called

More information

The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer

Jean-Baptiste Mardelle Rolf Eike Beer 2 Contents 1 Introduction 5 2 Getting Started 6 3 Using KGpg 8 3.1 Generating a key...................................... 8 3.2 Revoking a key.......................................

More information

Practice Questions. CS161 Computer Security, Fall 2008

Practice Questions CS161 Computer Security, Fall 2008 Name Email address Score % / 100 % Please do not forget to fill up your name, email in the box in the midterm exam you can skip this here. These practice

More information

PhoneCrypt Desktop. Phone Encryption Software. PhoneCrypt Manual Mobile phone encryption for Windows Platforms

PhoneCrypt Desktop Phone Encryption Software PhoneCrypt Manual Mobile phone encryption for Windows Platforms Introduction Contents http:// www. securstar.com info@securstar.com 2009 by SecurStar GmbH,

More information