Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session

Size: px
Start display at page:

Download "Email Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session"

Transcription

1 Name: Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session Purpose: The purpose of this lab is to reinforce the key ideas behind cryptography and to expose how some simple cryptography algorithms work. There are a set of questions on pages 1 through 8 of this document that you should submit answers to by the due date. Simple Cryptography Implementation To start off the lab, let s look at a very simple implementation of encryption and decryption. One of the earliest, and now simplest, encryption algorithms developed is called the Caesar Cipher. This approach to encryption was used by Julius Caesar to protect military messages. The key idea behind the Caesar Cipher is that every original letter of the alphabet in the message is substituted with another letter in the alphabet one that is some number of spaces to the right (called the Shift) in the alphabet from the original letter. For example, let s assume that Shift is 3. Then every A would be changed to a D, every B would be changed to an E, and so on. The complete mapping of letters for a Shift of 3 is shown below: Original: ABCDEFGHIJKLMNOPQRSTUVWXYZ Position: Encrypted: DEFGHIJKLMNOPQRSTUVWXYZABC (assuming Shift is 3) The value Shift is the key for this encryption algorithm. Knowing the Shift used to find the letter to use as a substitute during encryption allows one to decrypt the message by shifting back in the reverse direction (for example, if Shift is 3, then every D in the encrypted message becomes an A [i.e. shifting backwards 3] when decrypting). Question 1 [1 pt each]: For the following three problems, apply the specified shift, by hand, to either encrypt or decrypt the following message. You can leave punctuation as is (it stays the same). a. Encrypt the following message using a Shift of 4 Message: Go Deacs! Encrypted: b. Decrypt the following message that was previously encrypted using a shift of 2 Message: EUE ncd Decrypted: c. Decrypt the following message that was previously encrypted using a shift of 1 Message: X-T Ebti Decrypted: For long messages, it is tedious to perform encryption by hand accordingly, there is software that is available to help us do Caesar Cipher encryptions and decryptions. Go to the following webpage using your webbrowser: When this webpage opens you will see a picture that appears similar to the one at right. In this application, there are areas where you can type in a message to encrypt, a message to decrypt, and a shift amount.

2 Question 2 [1 pt each]: Using the encryption software you just opened, apply the specified shift to either encrypt or decrypt the following messages. You will need to type the messages in they don t copy and paste correctly. Be careful in typing the encrypted messages that you don t mistype something. a. Encrypt the following message using a Shift of 21 Message: Keep your friends close, but your enemies closer. Encrypted: b. Decrypt the following message that was previously encrypted using a shift of 8 Message: Bpmzm a vw xtikm tqsm pwum. Decrypted: c. Decrypt the following message that was previously encrypted using a shift of 17 Message: Efsfup glkj Srsp ze r tfievi. Decrypted: (You may want to go back and check your answers to Question 1 through this software as well!) In the pre-lab, we discussed that one important aspect of encryption algorithms was how many possible keys there were. If there are too few keys, it may be possible to generate all possible keys and try them on an encrypted message until something readable (interpretable as English) appears. Remember that for the Caesar cipher, the key is the Shift that is being used. Question 3: [(a) 4 pts, (b) 3 pts] a) Try Caesar Cipher encryptions using Shifts of 1, 2, and 3 on a simple word (such as BYE ), and then try Shifts of (24, 25, 26, 27, and 28). Message: BYE Encrypted with Shift 1: Encrypted with Shift 2: Encrypted with Shift 3: Encrypted with Shift 24: Encrypted with Shift 25: Encrypted with Shift 26: Encrypted with Shift 27: Encrypted with Shift 28: b) Given your work from Part (a), suggest how many different keys exist in the Caesar Cipher? For encryption approaches where there are a limited number of keys, it is very possible with modern computers to attack the encryption approach by generating all possible keys and trying them all out on the encrypted message. This is called a brute force attack. The encryption software you have opened in your webbrowser supports brute force attacking the Caesar Cipher algorithm. Question 4 [2 pts]: Type the following encrypted message into the Encrypted Text field of the application you opened previously. Repeatedly hit the Brute Force button until you see something that appears as recognizable English. Message: Ncpo pk, epno ncpo pk. Tjp cvy hz vo czggj. What was the message you decrypted: What was the key that was used to encrypt the message (record this from the Shift Amount text field):

3 The Caesar Cipher is an example of a broader class of encryption algorithms called substitution ciphers, in all of which one letter of the alphabet is substituted for another letter. For the Caesar Cipher, the substitution is chosen based on a shift right in the alphabet some number of locations. However, we are not limited to just shifting some number of letters right. In theory, we could imagine that we put all the letters of the alphabet in a hat and then randomly choose a substitution letter for letter A (say X ), another substitution for letter B (say L ), a third substitution for letter C (say Z ), and so on. Thus, the substitutions are no longer uniform shifts over some number of positions but are just mappings between letters as drawn randomly out of a hat. Question 5 [3, 3, 2] a) Assume that Alice is using a general substitution cipher as described above instead of the Caesar Cipher used previously; how much information would she have to provide to Bob to inform him of the appropriate key to use to decrypt messages? b) If Alice was informing Bob of the appropriate key to use to decrypt her simpler Caesar Cipherencrypted message, how much information would she have to provide to Bob? c) The number of possible keys using a general substitution cipher is different than the number you came up with in 3b for the Caesar Cipher. For the description discussed in the previous paragraph (drawing mappings out of a hat), the number of keys is 26! (26! means the factorial of the factorial of a number is the product of all numbers from 1 up to the number, so 26! is 26*25*24*23*22*21*20.. *5*4*3*2*1). Go to and type in 26! Write down the number that is returned below, and think about how much larger it is than 26! Frequency Analysis A weakness with any substitution cipher where letters are just replaced with another letter is that they may reveal the key through an analysis of the frequency of letters being used. There are definite biased frequencies in letters in common English usage (think of the number of times an E appears in a paragraph compared to a Q ). It is very simple to count the frequency of letters appearing in encrypted text and then to map that back to the expected frequencies of common letters. A table of the frequencies of the five most common letters in English text is below. Letter Frequency E 12.70% T 9.06% A 8.17% O 7.51% I 6.97% We will use software to help us perform frequency analysis on text encrypted with the Caesar Cipher algorithm and then attempt to come up with the key. Go to the following webpage

4 When the webpage opens, you should see a screen similar to the following, except the first box will have what looks like a lot of random text in it. In the first box, we can enter text would we like to perform a frequency analysis of. After pressing the Frequency Analysis button, the second box will provide us with the frequency of each letter. Question 6 [1.5,1.5,1.5,3,2]: a. Perform a frequency analysis on the text that is already in the program by hitting the Frequency Analysis button. Write down the top three most frequently used letters below and their percentage: Most commonly used: Second most commonly used: Third most commonly used: Percentage: Percentage: Percentage: b. If a Caesar cipher was used, and we have had enough text to come up with appropriate statistics, we can now come up with the key that was used to encrypt the text. Take the most commonly used letter as reported in Part A and determine how far right-shifted it is from E, the expected most commonly used letter. This is a possible key for the encryption. What key did you come up with? c. Go back to the Caesar Cipher application. Copy and paste the encrypted text from the Frequency application (this should copy and paste correctly) in the Encrypted Text field and type the key you came up with in (b) in the Shift Amount field. Hit the decrypt button and write down the first few words of the decrypted text below. d. The key you came up with in Part B should have not worked correctly. Try mapping the 2 nd most common letter in English, T, to the most commonly used letter in the text. What key did you come up with? Go back to the Caesar Cipher application. Type the key you came up with here (Part D) in the Shift Amount field. Hit the decrypt button and write down the first few words of the decrypted text below. You should be able to recognize the text now. e. What is it about the decrypted text you are now looking at which led to the top two letters being flipped in frequency?

5 Steganography: While encrypting messages is one technique to keep information private, another technique is to literally hide the information being sent in a message in another form of media, such as an image, and to send the image to the recipient. This technique is called steganography, and is very powerful as it is difficult to even tell that a hidden message is being sent. In working with digital images, you learned that every pixel in an image has associated with it R, G, and B color values. Typically, 8 bits are given to each R, G, and B value (meaning each pixel is assigned 24 total bits for colors). Steganography strategically changes these color bits to hide information inside an image. If we change the appropriate bits (usually the last bit of the eight, ordered left to right), it is often impossible to the eye to be able to tell that the color has been changed. Go to the website where you will see a webpage like the one at right. Use this webpage to answer the next few questions. Question 7: [1,2,1] a. Enter FFFFFF in the box at the top (after the # symbol). What color did the small square at the top right turn? b. Explain why this is the appropriate color for #FFFFFF, given what you know about color models? c. The R, G, B fields should all read 255 at this point. Change the bottom B (not the middle one!) field from 255, to 254 and press enter, then to 253 and press Enter, all the way down to 248. Indicate below whether you could tell that the color of the small square you wrote down in step (a) changed for any of these values (255 to 248)? Changing these color bits in such a way that the color change is not visible to the naked eye is a way of storing information without it being known that the information has been embedded in the image. Question 8: [1,1,1,3] a) Given that in (7c), you should have discovered we could change the blue value from 255 to 247 (a shift of 8 colors) without a noticeable change in color, how many bits per pixel does this suggest we could encode information in without it being noticeable? b) For a 640x480 image, how many total bits could we then use to store our information in (using your answer from part (a)) in the image? c) Using your answer from part (b), how many bytes of information could we encode? d) If we are going to fiddle with bits that represent colors, suggest why we want to change the rightmost bits instead of the leftmost bits representing a color (i.e. why change the bits in italics instead of underlined, given what you know about binary numbers: )

6 Make a folder in your CSC101Lab folder called lab11 and download and save the following three files from the class website into that folder: mascot.bmp, deacon.bmp, and steg.zip. The first two files are images of the Demon Deacon mascot. The third contains a program that will allow us to work with steganography. Unzip the steg.zip file by right-clicking on it and choosing to unzip it using the 7-Zip option, then the Extract Here option. If you are unfamiliar with unzipping programs (you did this last week!), please ask one of the instructors. Once the program has been unzipped, double-click on the S- Tools.exe file. This will open a window that appears like the one at right. Now, drag the mascot.bmp and deacon.bmp files from your folder into this S-tools window. They should both appear in the window as shown diagonally at right. One, mascot.bmp, is an original image as distributed by WFU Athletics, while the other, deacon.bmp, has a message embedded in it. Viewing these files side by side on your computer screen, answer the questions below: Question 9: [1,1] a) Can you tell any differences visually between the two images? If so, describe them. b) Back in your lab 11 folder where you downloaded the files, click on each image so you can see at the bottom of the window their size and dimension information. Can you tell any differences in the size or dimensions of the two files? If so, what are they? Question 10: [1 pt each subanswer (8 total)] Right click on the deacon.bmp image in the S-tools program and choose the Reveal menu option. Enter 123 in both passphrase fields and keep the Encryption algorithm as IDEA. This should reveal a text file with a message I embedded in the image. 1. What is the name of the text file? 2. Right click on the name of the text file in the window that appears and choose Save as. Save the file in your lab11 folder and then double click it to open it. What is the codeword mentioned in the text file? 3. Now, back in the S-Tools program, right click on mascot.bmp and choose Properties. Write down or compute the information below: Width: Height: Determine total pixels (width x height): When mascot.bmp is clicked on S-Tools, it indicates in the lower right corner of the application that the image can hold how many bytes of information? How many bits is your answer to the above question? Approximately how many bits per pixel does this indicate could be used to hold a message?

7 Step to create a submission: Now we will ask you to hide your own message inside the mascot image. In your lab11 folder, right click on a blank space and choose the menu option New, followed by Text Document. This will create a new text document in your folder called New Text Document.txt. Rename this to MyLab11Message.txt. Double click the MyLab11Message.txt file and add to the document your name and any additional message you would like. Save the document. Then, drag the saved file into the S-Tools program and on top of the mascot.bmp image. This should bring up a window asking for a passphrase choose 123 and enter it in both passphrase fields (don t choose anything else otherwise we won t know what passphrase to use and won t be able to figure out your message). This will create a new image called hidden data. Right click on the hidden data image and choose the Save as option. Set the name to be mascotwithmessage.bmp Question 11: [3.5 each] Think about the two general techniques you saw for hiding sensitive information you experimented with today: cryptography and steganography and answer the following five thought questions. a. Suggest why real-world applications, such as online banking, prefer using cryptography instead of steganography for protecting their data. b. In our steganography examples, we hid plaintext messages inside of the images. Argue for whether or not we could have encrypted our messages first and then hidden them in the image? Why or why not? c. Someone might consider encrypting the private diary they are keeping on their computer to prevent their nosy siblings from looking at it. There is a potential problem with this, if the diary is kept for years and years why?

8 Question 11 (continued) d. Given what you know about the frequency analysis technique for figuring out the keys being used for ciphers, suggest whether, as a secret message writer, you would be better off sending short messages instead of long messages? e. In all of our scenarios used today, there was shared information between the sender and recipient of the message the Shift amount for the cryptography examples and the passphrase for the steganography examples (in steganography, it would also need to be shared in which bits to look for the data the S-Tools program has made the decision for us to only look in one place the rightmost bits). Reviewing your lecture notes, are our examples using secret key ciphers or public key ciphers? Choose one of the two types of ciphers, circle it below, and then argue why it is appropriate. Type of Cipher: secret key public key Argument: Submission: Upload the one mascotwithmessage.bmp file you created into Sakai under the Assignment named Lab 11 by 5:00pm the day after your lab session. This bitmap file is worth 10 of the 80 possible points for the lab. Submit this document with questions answered on paper by the same time. The points on the problems account for 70 of the 80 possible points.

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What

More information

Cyber Security Workshop Encryption Reference Manual

Cyber Security Workshop Encryption Reference Manual Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics

More information

4. Click Next and then fill in your Name and E-mail address. Click Next again.

4. Click Next and then fill in your Name and E-mail address. Click Next again. NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to

More information

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Xiang-Yang Li Introduction The art of war teaches us not on the likelihood of the enemy s not coming, but on our own readiness to receive him; not on the chance of his

More information

Safer data transmission using Steganography

Safer data transmission using Steganography Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/ Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting shayz@comsecglobal.com Copyright 2006 - The OWASP

More information

An Introduction to Cryptography and Digital Signatures

An Introduction to Cryptography and Digital Signatures An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through

More information

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from

More information

Weebly Step-by-Step Instructions

Weebly Step-by-Step Instructions Weebly Step-by-Step Instructions Go to http://weebly.com/ Follow instructions to create site. Write your username, password, email address, and website URL down and send this information to yourself in

More information

Microsoft Outlook. KNOW HOW: Outlook. Using. Guide for using E-mail, Contacts, Personal Distribution Lists, Signatures and Archives

Microsoft Outlook. KNOW HOW: Outlook. Using. Guide for using E-mail, Contacts, Personal Distribution Lists, Signatures and Archives Trust Library Services http://www.mtwlibrary.nhs.uk http://mtwweb/cgt/library/default.htm http://mtwlibrary.blogspot.com KNOW HOW: Outlook Using Microsoft Outlook Guide for using E-mail, Contacts, Personal

More information

Adobe Dreamweaver CC 14 Tutorial

Adobe Dreamweaver CC 14 Tutorial Adobe Dreamweaver CC 14 Tutorial GETTING STARTED This tutorial focuses on the basic steps involved in creating an attractive, functional website. In using this tutorial you will learn to design a site

More information

Chapter 14: Links. Types of Links. 1 Chapter 14: Links

Chapter 14: Links. Types of Links. 1 Chapter 14: Links 1 Unlike a word processor, the pages that you create for a website do not really have any order. You can create as many pages as you like, in any order that you like. The way your website is arranged and

More information

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g. Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:

More information

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it

More information

INTRODUCTION TO CRYPTOGRAPHY

INTRODUCTION TO CRYPTOGRAPHY INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH anas@tawileh.net Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License

More information

Network Security. HIT Shimrit Tzur-David

Network Security. HIT Shimrit Tzur-David Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

More information

Encryption. Introduction to using 7-Zip

Encryption. Introduction to using 7-Zip IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff

More information

E-mail Encryption. How do I send my e-mail encryption key?

E-mail Encryption. How do I send my e-mail encryption key? E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout

More information

Website Development Komodo Editor and HTML Intro

Website Development Komodo Editor and HTML Intro Website Development Komodo Editor and HTML Intro Introduction In this Assignment we will cover: o Use of the editor that will be used for the Website Development and Javascript Programming sections of

More information

Upon Installation, Soda

Upon Installation, Soda Upon Installation, Soda Prompts you to create your user profile to register for a new profile Note: Asks your for your particulars Prompts you to select a password. You would need to provide this password

More information

Encrypting Files Using AxCrypt

Encrypting Files Using AxCrypt Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else

More information

Conference Booking Enquiry & Maintenance

Conference Booking Enquiry & Maintenance Conference Booking Enquiry & Maintenance Date: 10/09/2015 Prepared by: Eric Li 1 Contents Overview 3 Target Audience 3 Exercise 4 Logging on to OneStop Secure 4 Enquire Booking in OneStop 5 Remove Conference

More information

Creating Interactive PDF Forms

Creating Interactive PDF Forms Creating Interactive PDF Forms Using Adobe Acrobat X Pro Information Technology Services Outreach and Distance Learning Technologies Copyright 2012 KSU Department of Information Technology Services This

More information

Adobe Illustrator CS5 Part 1: Introduction to Illustrator

Adobe Illustrator CS5 Part 1: Introduction to Illustrator CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Adobe Illustrator CS5 Part 1: Introduction to Illustrator Summer 2011, Version 1.0 Table of Contents Introduction...2 Downloading

More information

A Methodology to Conceal QR Codes for Security Applications

A Methodology to Conceal QR Codes for Security Applications A Methodology to Conceal QR Codes for Security Applications Akshay Choche and Hamid R. Arabnia Department of Computer Science, University of Georgia, Athens, GA 30602 {choche, hra}@cs.uga.edu Abstract.

More information

Simple Encryption/Decryption Application

Simple Encryption/Decryption Application Simple Encryption/Decryption Application Majdi Al-qdah Faculty of Information Technology Multimedia University Cyberjaya, 63100, Malaysia majdi.qdah@mmu.edu.my Lin Yi Hui Faculty of Information Technology

More information

Blackboard 9.1 Basic Instructor Manual

Blackboard 9.1 Basic Instructor Manual Blackboard 9.1 Basic Instructor Manual 1. Introduction to Blackboard 9.1... 2 1.1 Logging in to Blackboard... 3 2. The Edit Mode on... 3 3. Editing the course menu... 4 3.1 The course menu explained...

More information

Web Ambassador Training on the CMS

Web Ambassador Training on the CMS Web Ambassador Training on the CMS Learning Objectives Upon completion of this training, participants will be able to: Describe what is a CMS and how to login Upload files and images Organize content Create

More information

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface...

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface... 2 CONTENTS Module One: Getting Started... 6 Opening Outlook... 6 Setting Up Outlook for the First Time... 7 Understanding the Interface...12 Using Backstage View...14 Viewing Your Inbox...15 Closing Outlook...17

More information

Page 1. Session Overview: Cryptography

Page 1. Session Overview: Cryptography Cool Careers in Cyber Security Frequency Chart and Cipher Cryptography Delivery: Can be used as a table demo (hands-on) activity or during a presentation session. Best to have the wheels pre-made. Messaging

More information

EMAIL QUICK START GUIDE

EMAIL QUICK START GUIDE IT Services Microsoft Outlook 2010 EMAIL QUICK START GUIDE Contents What is Outlook?...2 Quick Guide to Email...2 Create a new e-mail message...2 Forward or reply to an e-mail message...2 Creating new

More information

Personal Portfolios on Blackboard

Personal Portfolios on Blackboard Personal Portfolios on Blackboard This handout has four parts: 1. Creating Personal Portfolios p. 2-11 2. Creating Personal Artifacts p. 12-17 3. Sharing Personal Portfolios p. 18-22 4. Downloading Personal

More information

Northwestern University IT Service Manager Knowledge Base Style Guide

Northwestern University IT Service Manager Knowledge Base Style Guide Northwestern University IT Service Manager Knowledge Base Style Guide Prepared by NUIT Communications Northwestern University Information Technology (NUIT) Northwestern University Updated May 3, 2013 CONTENTS

More information

Instructions for Using i>clicker Blackboard Learning Management System Integration

Instructions for Using i>clicker Blackboard Learning Management System Integration Instructions for Using i>clicker Blackboard Learning Management System Integration Updated 9 1 2015 Download and Install the Custom Version of the i>clicker Software 1. Before you can use the i>clicker

More information

File Share Service User guide

File Share Service User guide File Share Service User guide Version: 2.0 Written by: Sriram Rao Last Modified: 03/16/2012 1 Index Index... 2 Overview... 3 Change Log... 4 Login Instructions... 5 Searching files by name or content...

More information

Intro to Web Development

Intro to Web Development Intro to Web Development For this assignment you will be using the KompoZer program because it free to use, and we wanted to keep the costs of this course down. You may be familiar with other webpage editing

More information

Overview Keys. Overview

Overview Keys. Overview Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program

More information

Dreamweaver: Getting Started Website Structure Why is this relevant?

Dreamweaver: Getting Started Website Structure Why is this relevant? Dreamweaver: Getting Started Dreamweaver is a Graphic Designer s tool to create websites as he or she designs. As part of the Adobe Creative Suite, Dreamweaver is able to work in conjunction with Photoshop,

More information

The Danger of Data Exfiltration over Social Media Sites

The Danger of Data Exfiltration over Social Media Sites The Danger of Data Exfiltration over Social Media Sites Dan Gunter, University of Louisville; Solomon Sonya, Western International University Abstract The pervasive utilization of social media sites within

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond

More information

Outlook XP Email Only

Outlook XP Email Only Outlook XP Email Only Table of Contents OUTLOOK XP EMAIL 5 HOW EMAIL WORKS: 5 POP AND SMTP: 5 TO SET UP THE POP AND SMTP ADDRESSES: 6 TO SET THE DELIVERY PROPERTY: 8 STARTING OUTLOOK: 10 THE OUTLOOK BAR:

More information

Netigate User Guide. Setup... 2. Introduction... 5. Questions... 6. Text box... 7. Text area... 9. Radio buttons...10. Radio buttons Weighted...

Netigate User Guide. Setup... 2. Introduction... 5. Questions... 6. Text box... 7. Text area... 9. Radio buttons...10. Radio buttons Weighted... Netigate User Guide Setup... 2 Introduction... 5 Questions... 6 Text box... 7 Text area... 9 Radio buttons...10 Radio buttons Weighted...12 Check box...13 Drop-down...15 Matrix...17 Matrix Weighted...18

More information

A Concept of Digital Picture Envelope for Internet Communication

A Concept of Digital Picture Envelope for Internet Communication A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,

More information

Wellesley College Alumnae Association. Volunteer Instructions for Email Template

Wellesley College Alumnae Association. Volunteer Instructions for Email Template Volunteer Instructions for Email Template Instructions: Sending an Email in Harris 1. Log into Harris, using your username and password If you do not remember your username/password, please call 781.283.2331

More information

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4

More information

DOING MORE WITH WORD: MICROSOFT OFFICE 2010

DOING MORE WITH WORD: MICROSOFT OFFICE 2010 University of North Carolina at Chapel Hill Libraries Carrboro Cybrary Chapel Hill Public Library Durham County Public Library DOING MORE WITH WORD: MICROSOFT OFFICE 2010 GETTING STARTED PAGE 02 Prerequisites

More information

Symmetric Key cryptosystem

Symmetric Key cryptosystem SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single

More information

By Glenn Fleishman. WebSpy. Form and function

By Glenn Fleishman. WebSpy. Form and function Form and function The simplest and really the only method to get information from a visitor to a Web site is via an HTML form. Form tags appeared early in the HTML spec, and closely mirror or exactly duplicate

More information

Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500

Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500 Outlook Email User Guide IS TRAINING CENTER 833 Chestnut St, Suite 600 Philadelphia, PA 19107 215-503-7500 This page intentionally left blank. TABLE OF CONTENTS Getting Started... 3 Opening Outlook...

More information

Macromedia Dreamweaver Tutorial

Macromedia Dreamweaver Tutorial Macromedia Instructions: Work through this tutorial Ask when you need help Complete all tasks set in the tutorial Refer back to this tutorial when you design your own website Enjoy 1 Macromedia SET UP

More information

USD WEB SERVICES UPLOADING DOCUMENTS TO PASSWORD-PROTECTED SECTIONS OF YOUR WEBSITE

USD WEB SERVICES UPLOADING DOCUMENTS TO PASSWORD-PROTECTED SECTIONS OF YOUR WEBSITE USD WEB SERVICES UPLOADING DOCUMENTS TO PASSWORD-PROTECTED SECTIONS OF YOUR WEBSITE INFORMATION TECHNOLOGY SERVICES UNIVERSITY OF SAN DIEGO DEVELOPED BY MORGAN ANDERSEN WEBSUPPORT@SANDIEGO.EDU JUNE 2011

More information

AES Crypt User Guide

AES Crypt User Guide AES Crypt User Guide Publication Date: 2013-12-26 Original Author: Gary C. Kessler (gck@garykessler.net) Revision History Date Contributor Changes 2012-01-17 Gary C. Kessler First version 2013-03-03 Doug

More information

SecureZIP User Guide

SecureZIP User Guide SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform

More information

TheGreenBow CryptoMailer. User Guide. Contact: support@thegreenbow.com. Website: www.thegreenbow.com

TheGreenBow CryptoMailer. User Guide. Contact: support@thegreenbow.com. Website: www.thegreenbow.com TheGreenBow CryptoMailer User Guide Contact: support@thegreenbow.com Website: www.thegreenbow.com All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic,

More information

Properties of Secure Network Communication

Properties of Secure Network Communication Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,

More information

OUTLOOK WEB APP 2013 ESSENTIAL SKILLS

OUTLOOK WEB APP 2013 ESSENTIAL SKILLS OUTLOOK WEB APP 2013 ESSENTIAL SKILLS CONTENTS Login to engage365 Web site. 2 View the account home page. 2 The Outlook 2013 Window. 3 Interface Features. 3 Creating a new email message. 4 Create an Email

More information

AKO Email Shutdown Quick Reference Guide

AKO Email Shutdown Quick Reference Guide AKO Email Shutdown Quick Reference Guide NETWORK ENTERPRISE CENTER This guide explains how the Army is shutting down AKO Email and outlines steps you must take to ensure a smooth transition to full DoD

More information

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Microsoft Excel 2010 Tutorial

Microsoft Excel 2010 Tutorial 1 Microsoft Excel 2010 Tutorial Excel is a spreadsheet program in the Microsoft Office system. You can use Excel to create and format workbooks (a collection of spreadsheets) in order to analyze data and

More information

GoodReader User Guide. Version 1.0 GoodReader version 3.16.0

GoodReader User Guide. Version 1.0 GoodReader version 3.16.0 GoodReader User Guide Version 1.0 GoodReader version 3.16.0 Contents Operating GoodReader 1 Send PDF files to Your ipad 2 Copy Files with itunes 2 Copy Files to a Cloud Service 5 Download Files from the

More information

Using Microsoft Picture Manager

Using Microsoft Picture Manager Using Microsoft Picture Manager Storing Your Photos It is suggested that a county store all photos for use in the County CMS program in the same folder for easy access. For the County CMS Web Project it

More information

KeePass Getting Started on Windows

KeePass Getting Started on Windows KeePass Getting Started on Windows This guide includes the initial installation of KeePass 2.x on a Windows PC, creating your first password database, testing the software and entering your first accounts.

More information

WEBMAIL User s Manual

WEBMAIL User s Manual WEBMAIL User s Manual Overview What it is: What it is not: A convenient method of retrieving and sending mails while you re away from your home computer. A sophisticated mail client meant to be your primary

More information

Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration

Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration This JavaScript lab (the last of the series) focuses on indexing, arrays, and iteration, but it also provides another context for practicing with

More information

Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points

Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various

More information

Getting the most from Apple Mail

Getting the most from Apple Mail Getting the most from Apple Mail Larry Kerschberg, Roy Wagner, Jonathan Bernstein and Friends February 28, 2015 1 Topics Mail on Macs and ios devices Configuring your accounts IMAP Folders VIP Contacts,

More information

Web Portal User Guide. Version 6.0

Web Portal User Guide. Version 6.0 Web Portal User Guide Version 6.0 2013 Pitney Bowes Software Inc. All rights reserved. This document may contain confidential and proprietary information belonging to Pitney Bowes Inc. and/or its subsidiaries

More information

PowerPoint 2007: Basics Learning Guide

PowerPoint 2007: Basics Learning Guide PowerPoint 2007: Basics Learning Guide What s a PowerPoint Slide? PowerPoint presentations are composed of slides, just like conventional presentations. Like a 35mm film-based slide, each PowerPoint slide

More information

Lecture 5 - Cryptography

Lecture 5 - Cryptography CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

Students will operate in pairs and teams of four to decipher and encipher information.

Students will operate in pairs and teams of four to decipher and encipher information. Title: SHHHHHH! It s a Secret Link to Outcomes: Patterns and Relationships Cooperation Connections Technology Problem Solving Algebra Writing Students will discover the need for a common understanding

More information

Outlook Live Basics. for Students

Outlook Live Basics. for Students Outlook Live Basics for Students 2 Outlook Live for Support Staff Outlook Live for Support Staff 3 Getting Started... 6 Signing into your Outlook Account... 6 Migrating your Account... 8 Address Book...

More information

Online Sharing User Manual

Online Sharing User Manual Online Sharing User Manual June 13, 2007 If discrepancies between this document and Online Sharing are discovered, please contact backupfeedback@verizon.net. Copyrights and Proprietary Notices The information

More information

Quick Reference Guide

Quick Reference Guide Simplified Web Interface for Teachers Quick Reference Guide Online Development Center Site Profile 5 These fields will be pre-populated with your information { 1 2 3 4 Key 1) Website Title: Enter the name

More information

PGP Desktop Email Quick Start Guide version 9.6

PGP Desktop Email Quick Start Guide version 9.6 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

More information

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015 CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret

More information

PhoneCrypt Desktop. Phone Encryption Software. PhoneCrypt Manual Mobile phone encryption for Windows Platforms

PhoneCrypt Desktop. Phone Encryption Software. PhoneCrypt Manual Mobile phone encryption for Windows Platforms PhoneCrypt Desktop Phone Encryption Software PhoneCrypt Manual Mobile phone encryption for Windows Platforms Introduction Contents http:// www. securstar.com info@securstar.com 2009 by SecurStar GmbH,

More information

Digital evidence obfuscation: recovery techniques

Digital evidence obfuscation: recovery techniques To appear in Proceedings of the Society for Optical Engineering Conference. Orlando, FL. Digital evidence obfuscation: recovery techniques J. Philip Craiger* a, Jeff Swauger b, Chris Marberry b a National

More information

Using SSH Secure File Transfer to Upload Files to Banner

Using SSH Secure File Transfer to Upload Files to Banner Using SSH Secure File Transfer to Upload Files to Banner Several Banner processes, including GLP2LMP (Create PopSelect Using File), require you to upload files from your own computer to the computer system

More information

Outline. Digital signature. Symmetric-key Cryptography. Caesar cipher. Cryptography basics Digital signature

Outline. Digital signature. Symmetric-key Cryptography. Caesar cipher. Cryptography basics Digital signature Outline Digital signature Cryptography basics Digital signature Dr. László Daragó, Ph.D. Associate professor Cryptography Cryptography encryption decryption Symmetric-key Cryptography Encryption with a

More information

Practice Questions. CS161 Computer Security, Fall 2008

Practice Questions. CS161 Computer Security, Fall 2008 Practice Questions CS161 Computer Security, Fall 2008 Name Email address Score % / 100 % Please do not forget to fill up your name, email in the box in the midterm exam you can skip this here. These practice

More information

Hill s Cipher: Linear Algebra in Cryptography

Hill s Cipher: Linear Algebra in Cryptography Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a

More information

6. If you want to enter specific formats, click the Format Tab to auto format the information that is entered into the field.

6. If you want to enter specific formats, click the Format Tab to auto format the information that is entered into the field. Adobe Acrobat Professional X Part 3 - Creating Fillable Forms Preparing the Form Create the form in Word, including underlines, images and any other text you would like showing on the form. Convert the

More information

Agile ICT Website Starter Guides

Agile ICT Website Starter Guides Agile ICT Website Guide V1.0 1 Agile ICT Website Starter Guides 2 The purpose of this guide is to show you how to edit some of the basics of the website you have purchased through Agile ICT. The website

More information

PopupProtect User Guide

PopupProtect User Guide Having the power to block or allow popup and popunder advertising www.contentwatch.com 2004 All rights reserved. 2369 West Orton Circle, Salt Lake City, UT 84119 Table of Contents Welcome and Installation

More information

Using the GroupWise Client

Using the GroupWise Client Spring 2006 (Our appreciation to Jennifer Sherouse for her assistance in editing and improving this document) Page 1 of 15 What is the GroupWise Client The GroupWise client is a program that installs on

More information

Item Editor Reference Guide

Item Editor Reference Guide Item Editor Reference Guide This reference guide is intended for all iwebfolio users. The item editor is the editing tool that appears when a user is editing an item within a portfolio or template. This

More information

Introduction to Drupal 6

Introduction to Drupal 6 Ready Reference 063014 Introduction Introduction to Drupal 6 This page provides instructions for using the Drupal Web Content Management System. Drupal makes publishing content relatively easy and allows

More information

Getting Started With Blackboard Learn 9.1

Getting Started With Blackboard Learn 9.1 Getting Started With Blackboard Learn 9.1 2010 Blackboard Inc. - 1 - Getting Started Table of Contents 1.0 Workshop Overview... 4 2.0 UT Arlington Procedures... 5 Course Shells... 6 Course Management...

More information

Getting Started with Excel 2008. Table of Contents

Getting Started with Excel 2008. Table of Contents Table of Contents Elements of An Excel Document... 2 Resizing and Hiding Columns and Rows... 3 Using Panes to Create Spreadsheet Headers... 3 Using the AutoFill Command... 4 Using AutoFill for Sequences...

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer

More information

smespire - Exercises for the Hands-on Training on INSPIRE Network Services April 2014 Jacxsens Paul SADL KU Leuven

smespire - Exercises for the Hands-on Training on INSPIRE Network Services April 2014 Jacxsens Paul SADL KU Leuven smespire - Exercises for the Hands-on Training on INSPIRE Network Services April 2014 Jacxsens Paul SADL KU Leuven These exercises aim at people who already have some basic knowledge of INSPIRE Network

More information

COMMON CUSTOMIZATIONS

COMMON CUSTOMIZATIONS COMMON CUSTOMIZATIONS As always, if you have questions about any of these features, please contact us by e-mail at pposupport@museumsoftware.com or by phone at 1-800-562-6080. EDIT FOOTER TEXT Included

More information

anonymous secure decentralized SMS stealthtext transactions

anonymous secure decentralized SMS stealthtext transactions anonymous secure decentralized SMS stealthtext transactions WHITEPAPER STATE OF THE ART 2/8 WHAT IS STEALTHTEXT? stealthtext is a way to send stealthcoin privately and securely using SMS texting. stealthtext

More information

Introduction to Encryption

Introduction to Encryption Computers and Society Introduction to Encryption Chris Brooks Department of Computer Science University of San Francisco Department of Computer Science University of San Francisco p.1/35 3-0: Terminology

More information