# Cyber Security Workshop Encryption Reference Manual

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e

2 Encoding Concepts Binary Encoding Basics Encoding is the art of putting a sequence of characters (such as letters, numbers, punctuations and some symbols) into a specialised digital format for the efficient transfer of data. Decoding is conversion of an encoded format back into the original sequence of characters. Binary data is a sequence of 8 binary digits, comprising of 0s and 1s ASCII is the most common encoding scheme used in computers and on the internet. ASCII uses 7 binary digits to represent English characters as numbers, with each letter assigned a number from 0 to 127. Example: Upper-case letter A is represented by the number 65 while lowercase z is represented by the number P a g e

3 Converting between Decimal (base 10), Binary (base 2) and Hex (Base 16) A single Decimal (base 10) digit can show ten possible values: A single Binary (base 2) digit can show two possible values: 0 1 A single Hexadecimal (base 16) digit can show sixteen possible values: A B C D E F Examples: Ex One - Converting 28 from Decimal into Binary 1) Draw the following table, filling in the first and third columns: x = ) Compare the number 28 with the numbers in the 3 rd row, starting with 64. Our working number is 28. 3) Is 28 less than or equal to 64? Yes, so we place a 0 in the box above 64 4) Is 28 less than or equal to 32? Yes, so we place a 0 in the box above 32 5) Is 28 less than or equal to 16? No, so we place a 1 in the box above 16 and subtract 16 from 28. Our working number is now 12. 6) Is 12 less than or equal to 8? No, so we place a 1 in the box above 8 and subtract 8 from 12. Our working number is now 4. 7) Is 4 less than or equal to 4? Yes, so we place a 1 in the box above 4 and subtract 4 from 4. Our working number is now 0. 8) Once your working number has reached 0, you can then fill in the remaining entries in the second row with 0. To verify your answer, multiply row 2 with row 3 and add up the entries: (0 x 64) + (0 x 32) + (1 x 16) + (1 x 8) + (1 x 4) + (0 x 2) + (0 x 1) = = 28 3 P a g e

4 Ex Two Converting 4158 from Decimal into Hexadecimal 1) Draw the following table: Decimal Number Operation Quotient Remainder Hex Result = E = E = E 1 16 = E 2) Divide 4158 by 16 to get a Quotient of 259 and a Remainder of 14. 3) Identify which Hex number matches with decimal 14. Remember: 0 in Hex = 0 decimal, 1 hex = 1 dec, 9 hex = 9 dec 10 in Hex = A, 11 = B, 12 = C, 13 = D, 14 = E, 15 = F 4) Our first hex result is E which we determined from our remainder. 5) Divide 259 by 16 to get a new quotient of 16 and a new Remainder of 3. 6) Our second hex result is 3 which we determined from our remainder of 3 (3 in decimal = 3 in hex). Our solution so far is 3E. 7) Divide 16 by 16 to get a new quotient of 1 and a new Remainder of 0. 8) Our third hex result is 0 (0 in decimal = 0 in hex). Our solution now is 03E. 9) Divide 1 by 16 to get a new quotient of 0 and a new remainder of 1. Our fourth hex result is 1 (1 in decimal = 1 in hex). Our final solution now is 103E. We stop the process once we get a quotient value of 0. Note: You can also use this technique to convert to binary (Base2)! 4 P a g e

5 Ex Three Converting Hex to ASCII text using a table e 6f f d An easy method for converting ASCII text to decimal or Hex is by using the table below. Converting the above hex code into ASCII text using the table gives us: This is a not so secret message! Note that the number 20 in hex corresponds to the SPACE character in ASCII, and the number 21 in hex corresponds to the! character. 5 P a g e

6 Base-64 encoding Overview Base-64 encoding is a way of taking binary data and turning it into text so that it s more easily transmitted in things like and HTML form data. Most computers store binary data in bytes consisting of 8 bits each, so ASCII is not ideal for transferring this type of data. Base-64 encoding uses 64 characters to encode strings, as seen in the table below: 1) A-Z, a-z, 0-9, +, and / are the 64 real characters 2) The = sign is the padding character, which we add to the end of the string to make it a multiple of 4 During the exchange of information over the internet, on web servers data is converted between Base-64 to ASCII and back to optimise efficiency. So it is therefore important that we gain a basic understanding on how to convert between ASCII and Base P a g e

7 Encode the string food using Base-64 Convert the text food to 8-bit binary. We can do this by looking up the letters f, o, o and d on the ASCII table on page 5, find the decimal equivalent value and convert the decimal value to 8-bit binary. Note: If your binary result is 7-bit (e.g for the letter f, just add an extra 0 to get 8-bit (e.g for f ) ASCII Text Decimal Value Binary f o o d Convert the text to 6-bit binary Put all the binary numbers together like so: Then, break them apart into groups of six, like so: We see that in the final column, we just have two characters, so we pad it out by adding four more zeros to give: Convert the 6-bit binary back into decimal: Convert the decimal numbers to ASCII: Z m 9 v Z A The Zm9vZA string is six characters long. Since six is not a multiple of four, we need to add padding characters to increase the total number of characters to eight (which is a multiple of four). Therefore we add two = characters to get eight characters: Zm9vZA== which is food in base-64 7 P a g e

8 Encryption Basics Encryption is the art of converting a plain message into a form called cipher text, which cannot be easily understood by unauthorised people. The cipher text can only be viewed in its original form if decrypted with the correct key. Data files and communications are often encrypted to protect the confidentiality and integrity of the data, to minimise the risk of tampering. Sometimes, we want to encrypt data so that only a certain person is able to decrypt and read it. We can do this using Public-Private key pairs. For example: Bob wants to send an encrypted message to Jane Jane sends Bob her Public Key, a key that can be used by Bob to encrypt the message specifically for Jane. Bob then sends the encrypted message to Jane Jane uses her Private Key, a key that only she has access to, in order to decrypt and read the message. In cryptography, a cipher is an algorithm or a method used for performing encryption or decryption. Different ciphers result in different cipher text, where some types are harder to crack than others. In the next few sections you will be introduced to two basic ciphers Transposition and Caesar. 8 P a g e

9 Transposition Cipher Example The Transposition cipher works by messing with the order of the letters to hide the message being sent. In this example, we will look at Columnar Transposition, where the encryption key specifies the number of columns used in the rectangular array. Exercise Encrypt the message ATTACK AT DAWN FROM WEST using the transposition cipher with key set to 5. To apply this encryption, we create a table with 5 columns (corresponding with the key) and populate it with the letters from left to right, like so: A T T A C K A T D A W N F R O M W E S T Next, we record each column as a word, resulting in the following cipher text: AKWM TANW TTFE ADRS CAOT If the key for the transposition cipher was set to 3, then we would have obtained the following cipher text instead: AAAAFMS TCTWRWT TKDNOE Generally it is easy to reverse cipher text encrypted using the transposition cipher, as all you need to do is look at the number of words and set that as the number of columns in the table. Then you can populate the table accordingly, and obtain the cleartext. 9 P a g e

10 Caesar Cipher Example The Caesar cipher (also known as the rotation or shift cipher) is a type of substitution cipher where each letter is shifted a certain number of places down the alphabet. For example, with a shift (key) of 1, the letter A would be replaced by B, letter B would become C and so on. With a shift of 25, the letter A would be replaced by Z, letter B would become A and so on. Note that the maximum shift is 25. As we only have 26 letters in the alphabet, we can only shift the letters 25 times. Exercise 1 Encrypt the message DEFEND THE FRONT OF CASTLE using a Caesar Cipher with a shift of 1. Plaintext Ciphertext DEFEND THE FRONT GATE OF CASTLE EFGFOE UIF GSPOU HBUF PG DBTUMF Exercise 2 Decrypt the message tmhsdb bxadq rdbtqhsx kza In order to decrypt this message, we need match the common letters in the Ciphertext with common letters in the English language. We can see that the letters b and d are the most common letters, with 3 instances each. The four most common letters in the English language are: E (12.7%), T (9.1%), A (8.2%) and O (7.5%). So let s start by doing some guess work, by matching the two sets of letter together to see if we get something. Let s assume that b is the letter e in the English language. This would then imply that a shift of 23 has been applied to the original text. If we apply a reverse shift of 23, we get: 10 P a g e wpkvge eadgt ugewtkva ncd It looks our guess was not right. Let s now try matching the letter d with the English letter e, giving us a reverse shift of 25 to apply on the text: unitec cyber security lab That looks readable now. We were able to crack the code!

### Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What

### Activity 1: Bits and Bytes

ICS3U (Java): Introduction to Computer Science, Grade 11, University Preparation Activity 1: Bits and Bytes The Binary Number System Computers use electrical circuits that include many transistors and

### Decimal to Binary Conversion

Decimal to Binary Conversion A tool that makes the conversion of decimal values to binary values simple is the following table. The first row is created by counting right to left from one to eight, for

### Data Encryption A B C D E F G H I J K L M N O P Q R S T U V W X Y Z. we would encrypt the string IDESOFMARCH as follows:

Data Encryption Encryption refers to the coding of information in order to keep it secret. Encryption is accomplished by transforming the string of characters comprising the information to produce a new

### Section 1.4 Place Value Systems of Numeration in Other Bases

Section.4 Place Value Systems of Numeration in Other Bases Other Bases The Hindu-Arabic system that is used in most of the world today is a positional value system with a base of ten. The simplest reason

### Digital Fundamentals

Digital Fundamentals with PLD Programming Floyd Chapter 2 29 Pearson Education Decimal Numbers The position of each digit in a weighted number system is assigned a weight based on the base or radix of

### Number System. Some important number systems are as follows. Decimal number system Binary number system Octal number system Hexadecimal number system

Number System When we type some letters or words, the computer translates them in numbers as computers can understand only numbers. A computer can understand positional number system where there are only

### Base Conversion written by Cathy Saxton

Base Conversion written by Cathy Saxton 1. Base 10 In base 10, the digits, from right to left, specify the 1 s, 10 s, 100 s, 1000 s, etc. These are powers of 10 (10 x ): 10 0 = 1, 10 1 = 10, 10 2 = 100,

### Chapter 4: Computer Codes

Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data

### Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

### 1 Basic Computing Concepts (4) Data Representations

1 Basic Computing Concepts (4) Data Representations The Binary System The Binary System is a way of writing numbers using only the digits 0 and 1. This is the method used by the (digital) computer. The

### 1) A very simple example of RSA encryption

Solved Examples 1) A very simple example of RSA encryption This is an extremely simple example using numbers you can work out on a pocket calculator (those of you over the age of 35 45 can probably even

### Today ENCRYPTION. Cryptography example. Basic principles of cryptography

Today ENCRYPTION The last class described a number of problems in ensuring your security and privacy when using a computer on-line. This lecture discusses one of the main technological solutions. The use

### uses same key for encryption, decryption classical, conventional, single-key encryption

CEN 448 Security and Internet Protocols Chapter 2 Classical Encryption Techniques Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University

### Homework 7. Using the monoalphabetic cipher in Figure 8.3, encode the message This is an easy problem. Decode the message rmij u uamu xyj.

Problems: 1 to 11. Homework 7 Question: 1 Using the monoalphabetic cipher in Figure 8.3, encode the message This is an easy problem. Decode the message rmij u uamu xyj. This is an easy problem. > uasi

### CHAPTER 5. Obfuscation is a process of converting original data into unintelligible data. It

CHAPTER 5 5.1. Introduction Obfuscation is a process of converting original data into unintelligible data. It is similar to encryption but it uses mathematical calculations or programming logics. Encryption

### Application Layer (1)

Application Layer (1) Functionality: providing applications (e-mail, Web service, USENET, ftp etc) providing support protocols to allow the real applications to function properly (e.g. HTTP for Web appl.)

### Hill s Cipher: Linear Algebra in Cryptography

Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a

Review of Number Systems The study of number systems is important from the viewpoint of understanding how data are represented before they can be processed by any digital system including a computer. Different

### UNIT 2 : NUMBER SYSTEMS

UNIT 2 : NUMBER SYSTEMS page 2.0 Introduction 1 2.1 Decimal Numbers 2 2.2 The Binary System 3 2.3 The Hexadecimal System 5 2.4 Number Base Conversion 6 2.4.1 Decimal To Binary 6 2.4.2 Decimal to Hex 7

### ORG ; ZERO. Introduction To Computing

Dec 0 Hex 0 Bin 00000000 ORG ; ZERO Introduction To Computing OBJECTIVES this chapter enables the student to: Convert any number from base 2, base 10, or base 16 to any of the other two bases. Add and

### Data Representation in Computers

Chapter 3 Data Representation in Computers After studying this chapter the student will be able to: *Learn about binary, octal, decimal and hexadecimal number systems *Learn conversions between two different

### Part 1 Theory Fundamentals

Part 1 Theory Fundamentals 2 Chapter 1 Information Representation Learning objectives By the end of this chapter you should be able to: show understanding of the basis of different number systems show

### Number Systems and Base Conversions

Number Systems and Base Conversions As you know, the number system that we commonly use is the decimal or base- 10 number system. That system has 10 digits, 0 through 9. While it's very convenient for

### Computer Science 281 Binary and Hexadecimal Review

Computer Science 281 Binary and Hexadecimal Review 1 The Binary Number System Computers store everything, both instructions and data, by using many, many transistors, each of which can be in one of two

### The largest has a 0 in the sign position and 0's in all other positions:

10.2 Sign Magnitude Representation Sign Magnitude is straight-forward method for representing both positive and negative integers. It uses the most significant digit of the digit string to indicate the

### Positional Numbering System

APPENDIX B Positional Numbering System A positional numbering system uses a set of symbols. The value that each symbol represents, however, depends on its face value and its place value, the value associated

### Unit 2: Number Systems, Codes and Logic Functions

Unit 2: Number Systems, Codes and Logic Functions Introduction A digital computer manipulates discrete elements of data and that these elements are represented in the binary forms. Operands used for calculations

### Digital Logic. The Binary System is a way of writing numbers using only the digits 0 and 1. This is the method used by the (digital) computer.

Digital Logic 1 Data Representations 1.1 The Binary System The Binary System is a way of writing numbers using only the digits 0 and 1. This is the method used by the (digital) computer. The system we

### Third Southern African Regional ACM Collegiate Programming Competition. Sponsored by IBM. Problem Set

Problem Set Problem 1 Red Balloon Stockbroker Grapevine Stockbrokers are known to overreact to rumours. You have been contracted to develop a method of spreading disinformation amongst the stockbrokers

### Review of Number Systems Binary, Octal, and Hexadecimal Numbers and Two's Complement

Review of Number Systems Binary, Octal, and Hexadecimal Numbers and Two's Complement Topic 1: Binary, Octal, and Hexadecimal Numbers The number system we generally use in our everyday lives is a decimal

### Section 2.1: Shift Ciphers and Modular Arithmetic

1 Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15 The purpose of this section is to learn about modular arithmetic, which

### For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) For binary numbers we have 2 digits available, 0 and 1.

Math 167 Ch 17 Review 1 (c) Janice Epstein, 2014 CHAPTER 17 INFORMATION SCIENCE Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 4731 = For binary

### Network Security. HIT Shimrit Tzur-David

Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

### Computer Science A Cryptography and Data Security. Claude Crépeau

Computer Science 308-547A Cryptography and Data Security Claude Crépeau These notes are, largely, transcriptions by Anton Stiglic of class notes from the former course Cryptography and Data Security (308-647A)

### Insight Guide. Encryption: A Guide

Encryption: A Guide for Beginners If you read anything about information security, you re likely to have come across the word encryption. It s a fundamental building block when it comes to securing your

### 1.3 Data Representation

8628-28 r4 vs.fm Page 9 Thursday, January 2, 2 2:4 PM.3 Data Representation 9 appears at Level 3, uses short mnemonics such as ADD, SUB, and MOV, which are easily translated to the ISA level. Assembly

### Binary Numbers. Bob Brown Information Technology Department Southern Polytechnic State University

Binary Numbers Bob Brown Information Technology Department Southern Polytechnic State University Positional Number Systems The idea of number is a mathematical abstraction. To use numbers, we must represent

### CSC 1103: Digital Logic. Lecture Six: Data Representation

CSC 1103: Digital Logic Lecture Six: Data Representation Martin Ngobye mngobye@must.ac.ug Mbarara University of Science and Technology MAN (MUST) CSC 1103 1 / 32 Outline 1 Digital Computers 2 Number Systems

### Topic 1: Cryptography

1 Introduction to Cryptography: 1.1 Science SCIE1000 Project, Semester 1 2011 Topic 1: Cryptography Cryptography is the science of using mathematics to hide information. Cryptography allows us to store

### Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:

### Activity 6: Encryption

Context: Security and Privacy Activity 6: Encryption We learned last week how easy it can be to examine network packets (e.g., using Wireshark) and how insecure the Internet can be. As a team, brainstorm

### 159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

### الدكتور المھندس عادل مانع داخل

الدكتور المھندس عادل مانع داخل / میسان جامعة / كلیة الھندسة قسم الھندسة الكھرباي یة Chapter 1: Digital Systems Discrete Data Examples: 26 letters of the alphabet (A, B etc) 10 decimal digits (0, 1, 2 etc)

### Symmetric Key cryptosystem

SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single

### Full Length Original Research Paper

Periodic table as a Binary table for Drug Encryption Copyright 2014 By IYPF All rights reserved Open Access Contents Int. J. Drug Dev. & Res. April - June 2014 Vol. 6 Issue 2 ISSN 0975-9344 www.ijddr.in

### Today s topics. Digital Computers. More on binary. Binary Digits (Bits)

Today s topics! Binary Numbers! Brookshear.-.! Slides from Prof. Marti Hearst of UC Berkeley SIMS! Upcoming! Networks Interactive Introduction to Graph Theory http://www.utm.edu/cgi-bin/caldwell/tutor/departments/math/graph/intro

### Page 1. Session Overview: Cryptography

Cool Careers in Cyber Security Frequency Chart and Cipher Cryptography Delivery: Can be used as a table demo (hands-on) activity or during a presentation session. Best to have the wheels pre-made. Messaging

### Cryptography and Network Security

Cryptography and Network Security Xiang-Yang Li Introduction The art of war teaches us not on the likelihood of the enemy s not coming, but on our own readiness to receive him; not on the chance of his

### Common Number Systems Number Systems

5/29/204 Common Number Systems Number Systems System Base Symbols Used by humans? Used in computers? Decimal 0 0,, 9 Yes No Binary 2 0, No Yes Octal 8 0,, 7 No No Hexadecimal 6 0,, 9, A, B, F No No Number

### A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 2, February 2015, PP 18-27 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org A

### EE 3170 Microcontroller Applications

EE 37 Microcontroller Applications Lecture 3 : Digital Computer Fundamentals - Number Representation (.) Based on slides for ECE37 by Profs. Sloan, Davis, Kieckhafer, Tan, and Cischke Number Representation

### Logic Design. Dr. Yosry A. Azzam

Logic Design Dr. Yosry A. Azzam Binary systems Chapter 1 Agenda Binary Systems : Binary Numbers, Binary Codes, Binary Logic ASCII Code (American Standard Code for Information Interchange) Boolean Algebra

### Secret Writing. Introduction to Cryptography. Encryption. Decryption. Kerckhoffs s ( ) Principle. Security of Cryptographic System

Introduction to Cryptography ECEN 1200, Telecommunications 1 Secret Writing Cryptography is the science and study of secret writing. More specifically, cryptography is concerned with techniques for enciphering

### Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

### Introduction to Symmetric and Asymmetric Cryptography

Introduction to Symmetric and Asymmetric Cryptography Ali E. Abdallah Birmingham CityUniversity Email: Ali.Abdallah@bcu.ac.uk Lectures are part of the project: ConSoLiDatE Multi-disciplinary Cooperation

### Number Representation

Number Representation Number System :: The Basics We are accustomed to using the so-called decimal number system Ten digits ::,,,3,4,5,6,7,8,9 Every digit position has a weight which is a power of Base

### Number Systems and Data Representation CS221

Number Systems and Data Representation CS221 Inside today s computers, data is represented as 1 s and 0 s. These 1 s and 0 s might be stored magnetically on a disk, or as a state in a transistor, core,

### Number Systems. Decimal Number System. Number Systems Week 3

Number Systems When we type some letters or words, the computer translates them in numbers as computers can understand only numbers. A computer can understand positional number system where there are only

### Introduction ToNumber Systems

Introduction ToNumber Systems Collected by: Zainab Alkadhem Page 1 of 25 Digital systems have such a prominent role in everyday life that we refer to the present technological period as the digital age.

### Solutions to Problem Set 1

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose

### Properties of Secure Network Communication

Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,

### Cryptography in Forensics: Check Sums, Hash Functions, and the MD5 Algorithm. An Undergraduate Teaching Module

Cryptography in Forensics: Check Sums, Hash Functions, and the MD5 Algorithm An Undergraduate Teaching Module By: Melanie Brown, Champlain College, mbrown@champlain.edu; Catherine Buell, Fitchburg State

### Chapter 23. Database Security. Security Issues. Database Security

Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

### Lecture 5 - Cryptography

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

### Number Representation

Number Representation CS10001: Programming & Data Structures Pallab Dasgupta Professor, Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Topics to be Discussed How are numeric data

### NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT-1. 1. Explain any six benefits of Software as Service in Cloud computing?

NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT-1 1. Explain any six benefits of Software as Service in Cloud computing? 2. List the different cloud applications available in the

### NUMBER REPRESENTATIONS IN THE COMPUTER for COSC 120

NUMBER REPRESENTATIONS IN THE COMPUTER for COSC 120 First, a reminder of how we represent base ten numbers. Base ten uses ten (decimal) digits: 0, 1, 2,3, 4, 5, 6, 7, 8, 9. In base ten, 10 means ten. Numbers

### THE BINARY NUMBER SYSTEM

THE BINARY NUMBER SYSTEM Dr. Robert P. Webber, Longwood University Our civilization uses the base 10 or decimal place value system. Each digit in a number represents a power of 10. For example, 365.42

### 2011, The McGraw-Hill Companies, Inc. Chapter 3

Chapter 3 3.1 Decimal System The radix or base of a number system determines the total number of different symbols or digits used by that system. The decimal system has a base of 10 with the digits 0 through

### How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing

### Binary Representation. Number Systems. Positional Notation

Binary Representation The basis of all digital data is binary representation. Binary - means two 1, 0 True, False Hot, Cold On, Off We must be able to handle more than just values for real world problems

### Binary Numbers. X. Zhang Fordham Univ.

Binary Numbers X. Zhang Fordham Univ. 1 Numeral System! A way for expressing numbers, using symbols in a consistent manner.!! "11" can be interpreted differently:!! in the binary symbol: three!! in the

### Binary Representation. Number Systems. Base 10, Base 2, Base 16. Positional Notation. Conversion of Any Base to Decimal.

Binary Representation The basis of all digital data is binary representation. Binary - means two 1, 0 True, False Hot, Cold On, Off We must be able to handle more than just values for real world problems

### Lecture 1: Digital Systems and Number Systems

Lecture 1: Digital Systems and Number Systems Matthew Shuman April 3rd, 2013 The Digital Abstraction 1.3 in Text Analog Systems Analog systems are continuous. Look at the analog clock in figure 1. The

### Authentication. Readings. Chapters 9, 10 Sections

Authentication Readings Chapters 9, 10 Sections 11.1-11.3 1 Authentication: Who and How User (human) can be authenticated logging into a workstation using resources of a system issues: humans find it difficult

### MT1 Number Systems. In general, the number a 3 a 2 a 1 a 0 in a base b number system represents the following number:

MT1 Number Systems MT1.1 Introduction A number system is a well defined structured way of representing or expressing numbers as a combination of the elements of a finite set of mathematical symbols (i.e.,

### Chapter II Binary Data Representation

Chapter II Binary Data Representation The atomic unit of data in computer systems is the bit, which is actually an acronym that stands for BInary digit. It can hold only 2 values or states: 0 or 1, true

### Data Representation. Data Representation, Storage, and Retrieval. Data Representation. Data Representation. Data Representation. Data Representation

, Storage, and Retrieval ULM/HHIM Summer Program Project 3, Day 3, Part 3 Digital computers convert the data they process into a digital value. Text Audio Images/Graphics Video Digitizing 00000000... 6/8/20

### Bits, Bytes, and Representation of Information

Bits, Bytes, and Representation of Information Digital representation means that everything is represented by numbers only The usual sequence: something (sound, pictures, text, instructions,...) is converted

### Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

### DIT250 / BIT180 - MATHEMATICS. Number Bases. Decimal numbers (base ten), Decimal numbers (base ten), Decimal numbers (base ten), 3/24/2014

DIT250 / BIT180 - MATHEMATICS ASSESSMENT CA 40% 3 TESTS EXAM 60% LECTURE SLIDES www.lechaamwe.weebly.com Lecture notes DIT250/BIT180 Number Bases In this lesson we shall discuss different Number Bases,

### Introduction Number Systems and Conversion

UNIT 1 Introduction Number Systems and Conversion Objectives 1. Introduction The first part of this unit introduces the material to be studied later. In addition to getting an overview of the material

### Email Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session

Name: Email Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session Purpose: The purpose of this lab is to reinforce the key ideas behind cryptography

### Available online at ScienceDirect. Procedia Computer Science 85 (2016 )

Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 85 (2016 ) 222 227 International Conference on Computational Modeling and Security (CMS 2016) Content Based Symmetric Key

### Network Security Technology Network Management

COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

### Signed Binary Arithmetic

Signed Binary Arithmetic In the real world of mathematics, computers must represent both positive and negative binary numbers. For example, even when dealing with positive arguments, mathematical operations

### Cyber security skills and competition

Cyber security skills and competition hhettema@unitec > whoami Hinne Hettema Day job: lead the cyber security team at the University of Auckland Lecture in cyber security at Unitec Education: theoretical

### Lecture 1: Digital Systems and Binary Numbers

Lecture 1: Digital Systems and Binary Numbers Matthew Shuman September 30th, 2009 1 Digital Systems 1-1 in Text 1.1 Analog Systems Analog systems are continuous. Look at the analog clock in figure 1. The

### Base64 is a different way of interpreting bits of data in order to transmit that data over a text-only medium, such as the body of an .

What is Base64? Base64 is a different way of interpreting bits of data in order to transmit that data over a text-only medium, such as the body of an e-mail. In the standard 8-bit ASCII character set,

### Number Systems I. CIS008-2 Logic and Foundations of Mathematics. David Goodwin. 11:00, Tuesday 18 th October

Number Systems I CIS008-2 Logic and Foundations of Mathematics David Goodwin david.goodwin@perisic.com 11:00, Tuesday 18 th October 2011 Outline 1 Number systems Numbers Natural numbers Integers Rational

### EE 261 Introduction to Logic Circuits. Module #2 Number Systems

EE 261 Introduction to Logic Circuits Module #2 Number Systems Topics A. Number System Formation B. Base Conversions C. Binary Arithmetic D. Signed Numbers E. Signed Arithmetic F. Binary Codes Textbook

### Binary Representation

Binary Representation The basis of all digital data is binary representation. Binary - means two 1, 0 True, False Hot, Cold On, Off We must tbe able to handle more than just values for real world problems

### Assembly Language for Intel-Based Computers, 4 th Edition. Chapter 1: Basic Concepts

Assembly Language for Intel-Based Computers, 4 th Edition Kip R. Irvine Chapter 1: Basic Concepts Slides prepared by Kip R. Irvine Revision date: 07/21/2002 Chapter corrections (Web) Assembly language

### Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret

### CDA 3200 Digital Systems. Instructor: Dr. Janusz Zalewski Developed by: Dr. Dahai Guo Spring 2012

CDA 3200 Digital Systems Instructor: Dr. Janusz Zalewski Developed by: Dr. Dahai Guo Spring 2012 Outline Data Representation Binary Codes Why 6-3-1-1 and Excess-3? Data Representation (1/2) Each numbering

### Chapter 5 Data Representation

Chapter 5 Data Representation Objectives Upon completion of this chapter you will be able to: Describe the binary and hexadecimal number systems, Given a number in one of base 2, 10, or 16, convert that