Page 1. Session Overview: Cryptography



Similar documents
Cyber Security Workshop Encryption Reference Manual

Properties of Secure Network Communication

Insight Guide. Encryption: A Guide

Students will operate in pairs and teams of four to decipher and encipher information.

Savitribai Phule Pune University

Network Security. HIT Shimrit Tzur-David

Chapter 8. Network Security

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Solutions to Problem Set 1

Caesar Ciphers: An Introduction to Cryptography

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

How To Understand And Understand The History Of Cryptography

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Content Teaching Academy at James Madison University

Application Layer (1)

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Hill s Cipher: Linear Algebra in Cryptography

XML Encryption Syntax and Processing. Duan,Limiao 07,12,2006

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Evaluation of the RC4 Algorithm for Data Encryption

Chapter 23. Database Security. Security Issues. Database Security

Safer data transmission using Steganography

IT Networks & Security CERT Luncheon Series: Cryptography

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Chapter 10. Network Security

NETWORK ADMINISTRATION AND SECURITY

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Network Security Technology Network Management

How To Understand Cryptanalysis

K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013

BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

Multiplicative Ciphers. Cryptography of Multiplicative Ciphers

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security: Cryptography CS/SS G513 S.K. Sahay

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Information Security in Big Data using Encryption and Decryption

Compter Networks Chapter 9: Network Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

EXAM questions for the course TTM Information Security May Part 1

MOVIES, GAMBLING, SECRET CODES, JUST MATRIX MAGIC

Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session

Lectures for the course: Electronic Commerce Technology (IT 60104)

Sandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology

How To Encrypt With A 64 Bit Block Cipher

NWIMS. Online Backup Security Documentation

Cryptography Worksheet Polybius Square

Blaze Vault Online Backup. Whitepaper Data Security

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

Understanding digital certificates

Is your data safe out there? -A white Paper on Online Security

Introduction to Hill cipher

NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT Explain any six benefits of Software as Service in Cloud computing?

CrypTool Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy

UNDERSTANDING COMPUTER FORENSICS. Doug White, PhD, CISSP, CCE Security Assurance Studies Roger Williams University

Randomly Encryption Using Genetic Algorithm

Chapter 10. Cloud Security Mechanisms

CIS433/533 - Computer and Network Security Cryptography

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

The science of encryption: prime numbers and mod n arithmetic

Diffusion and Data compression for data security. A.J. Han Vinck University of Duisburg/Essen April 2013

Chapter 17. Transport-Level Security

Chapter 23. Database Security. Security Issues. Database Security

Keywords : complexity, dictionary, compression, frequency, retrieval, occurrence, coded file. GJCST-C Classification : E.3

2014 IBM Corporation

CPSC 467b: Cryptography and Computer Security

Lukasz Pater CMMS Administrator and Developer

Priyanka et al. Page 17

Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle

Cryptography and Network Security

Message Authentication Codes

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Review On Incremental Encrypted Backup For Cloud

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Web Security: Encryption & Authentication

Why Encryption Is Essential and How to Address Potential Vulnerabilities

CS 758: Cryptography / Network Security

SSL/TLS: The Ugly Truth

Introduction To Security and Privacy Einführung in die IT-Sicherheit I

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Network Security. Outline of the Tutorial

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

Transcription:

Cool Careers in Cyber Security Frequency Chart and Cipher Cryptography Delivery: Can be used as a table demo (hands-on) activity or during a presentation session. Best to have the wheels pre-made. Messaging can be modified to align with event. Session Overview: Cryptography Objectives: Students will become aware of code systems and the art of cryptanalysis. Students will be able to encode and decode messages using simple shift ciphers. Understand that math can simplify processes and make encoding messages more efficient. Materials/Supplies: Encrypted messages to decode as ice breakers (on cards) Cipher wheel Frequency table Scenario message to decode Introduction: Types of Encryption Substitution o Replacing each letter with a different letter or symbol (a=@, b=j, c=2 so that a cat = @ 2@J ) Transposition o Rearranging the order of letters of the words of a message. (example: the letters in each word get moved around = eth ttseelr ni ceah drow etg veodm uarndo ) Mathematical o Uses advanced formulas to encrypt text Computer or Mechanically Assisted o Using complex algorithms and any single or combination of the mathematical, transposition, substitution and steganography to encrypt plain text. Scenario: Can you break the code? Page 1

Lesson: 1. Start by asking what cryptography is. Discuss as needed. See notes above. When would encryption be important? 2. Have students look at the first message (see below message will be on cards). Ask them to solve the encryption. Ask how they think this message was encrypted? (Answer: substitution) Can you solve this encryption? CRYPTOGRAPHY IS THE ART OF PROTECTING INFORMATION BY TRANSFORMING IT (ENCRYPTING IT) INTO AN UNREADABLE FORMAT CALLED CIPHER TEXT. ONLY THOSE WHO POSSESS A SECRET KEY CAN DECIPHER (OR DECRYPT) THE MESSAGE INTO PLAIN TEXT. 20-15-4-1-25 25-15-21 23-9-12-12 12-5-1-18-14 1-2-15-21-20 3-15-4-5-19 Answer: 1=A, 2=B Today you will learn about codes. 3. Have students explore the frequency table handout and answer the questions as a group. [next page] 4. Discuss the shift cipher. It gets its name from the way we encrypt our message. Simply put, we 'shift' the letter A for example, some number of spaces to the right, and start the alphabet from there, wrapping around when we get to Z. The way in which the shifted alphabet lines up with the un-shifted alphabet is the cipher. For example, a three shift looks like: [Can show below which will be available on a card, as well as, show the Cipher wheel. There should be one for each student] plaintext: X Y Z A B C D E F G H I J K L M N O P Q R S T U V W ciphertext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z For the photo below, the shift is 7 [Plaintext A is = Ciphertext H]. plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ciphertext: H I J K L M N O P Q R S T U V W X Y Z A B C D E F G Plaintext outer circle Ciphertext inner circle Page 2

HANDOUT: FREQUENCY CHART Thinking about Letters. Which letters do we use most frequently in English? Which letters do we use less frequently in English? How could you use this information to decrypt cipher text? Page 3

5. Using the frequency table and the cipher wheel, have the students decrypt the message. thief s computer. But what does it mean? Answer: using the frequency table the letter e occurs most often. In the message the letter B occurs the most; let b = e R -3 T -2 S -2 I - 3 Y -2 A -2 U -1 C-2 B -1 E -4 L -1 F -1 D -1 G -1 plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ciphertext: X Y Z A B C D E F G H I J K L M N O P Q R S T U V W cyber security is a great field Resources: Black Chamber http://www.simonsingh.net/the_black_chamber/caesar.html Krypto kids www.nsa.gov/kids Final Thoughts: Points you might want to make: Encryption is important in everyday use of computers and the internet. It helps us keep our user names and passwords private, keeps others from viewing messages and is important in online transactions. When you connect to a site via https, it uses SSL or Secure Sockets Layer to encrypt the connection between your computer and the website. Recommendations: Prepare the cipher wheels ahead of time Have messages on small notecards Page 4

Page 5