Chapter 7 New

Chapter 7 New - Data Security Terminology: encryption key...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Data Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Terminology:: encryption key encryption decryption plaintext ciphertext encryption algorithm decryption algorithm
Background image of page 2
Why encrypt?
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security
Background image of page 4
Simplest Encryption Technique: Caesar Cipher: Not secure, easy to decipher monoalphabetic cipher
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Polyalphabetic Cipher Similar to caesar cipher except a given plaintext character is not always replaced with the same ciphertext character. We choose a replacement character based not only on the original plaintext character, but also on its position in the message. for (int I = 0; i<length of P; i++) c[i] = p[i] + k +( I mod 3); if k = 1, then 1 is added to ASCII codes in positions 1,4,7, and so on, and 3 is added to codes in positions 2,5,8 and so on. For the string THEMTHENTHEY, the ciphertext (encoded) string would be UJHNVKFPWIG. For example, THE would be encrypted UJF, VKF, and WIG.
Background image of page 6
Another example of a polyalphabetic cipher is the Vigenere cipher it uses a two dimensional array, each new row is formed by moving each character in the previous row, left one position, with wraparound A given letter is replaced based on its relative position in the message and its relative position in the alphabetic j = P[i] –’A’; C[i] = v[i% 26] [j]
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Transpositional Cipher Arrange your data in a 2-d array of m columns and d rows. Agree on a transpositional cipher of width m which specifies that column m x in plaintext is to be transposed with column m y in ciphertext message
Background image of page 8
Transpositional Encryption
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Bit leve encryption (ciphering) Use a bit level encryption of length M EXOR M bits of plaintext message with this encryption key and transmit result.
Background image of page 10
Data Encryption Standards DES Previous methods are neither complex, nor are they very good. long keys are better, but implementation is more difficult Approaches exist that keep the keys short relative to the size of the message and use complex procedures to encrypt the data. DES
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 31

Chapter 7 New - Data Security Terminology: encryption key...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online