DES : An example
Key is 64-bit
K=133457799BBCDFF1
Convert to binary:
K=00010011 00110100 01010111 01111001 10011011 10111100 11011111 11110001
Red bits are not used!
Use Permutation Choice-1 to create the permute key
The bit positions assume that
th
Softwarearchitecture
Softwarearchitectureencompassesthesetof
significantdecisionsabouttheorganizationofa
softwaresystem
selectionofthestructuralelementsandtheirinterfacesby
whichasystemiscomposed
behaviorasspecifiedincollaborationsamongthose
elements
c
CLASS IN INFORMATION SECURITY
AND CRYPTOGRAPHY
1902322
L26: STEGANOGRAPHY TECHNIQUES:
IMAGES!
Dec 5th, 2010
Steganography Techniques in Documents:
Hiding in a simple text by defining a key for places,
e.g., 2nd letter of each word.
In binary files, insert
CLASS IN INFORMATION SECURITY
AND CRYPTOGRAPHY
1902322
BEFORE WE PROCEED
L25: STEGANOGRAPHY TECHNIQUES:
DOCUMENTS
Make sure to discuss your project with me, soon!
By
Dr. Raja S. Alomari
Fall 2010
Dec 5th, 2010
Copyrights are reserved @ 2010 for Dr.
Alomar
CLASS IN INFORMATION SECURITY
AND CRYPTOGRAPHY
1902322
L22: INFORMATION HIDING:
WATERMARKING AND
STEGANOGRAPHY
By
Dr. Raja S. Alomari
Fall 2010
Nov 21st, 2010
PLAN
Copyrights are reserved @ 2010 for Dr. Alomari, CIS, JU
I will be providing handouts for th
CLASS IN INFORMATION SECURITY
AND CRYPTOGRAPHY
1902322
L11: HASH FUNCTIONS:
MODIFICATION DETECTION CODES
(MDCS)
By
Dr. Raja S. Alomari
Fall 2011
RECAP: HASH FUNCTIONS
H: D
R where D = cfw_0,1* and R=cfw_0,1n for some
integer n > 0
Bit Padding Methods:
Met
CLASS IN INFORMATION SECURITY
AND CRYPTOGRAPHY
1902322
L10: HASH FUNCTIONS,
MDCS, AND MACS
By
Dr. Raja S. Alomari
Spring 2011
REVIEW: HASH FUNCTIONS
Hash function: Variable length string
length string.
fixed
Output (h) is a fixed length string: hash-value
CLASS IN INFORMATION SECURITY
AND CRYPTOGRAPHY
1902322
L9: RSA
PUBLIC KEY ENCRYPTION
By
Dr. Raja S. Alomari
Spring 2011
REVIEW: PUBLIC KEY CRYPTOGRAPHY
DEFINITION!
cfw_ Ee : e
K, cfw_Dd : d
K
e is known while d is private.
Given e, it is infeasible to det
Hash function cipher
Types of cryptography algorithms:
1. Secret key.
2. Public key.
3. Hash functions.
There are several well-known hash functions in use today:
Hashed Message Authentication Code (HMAC): Combines authentication via a shared
secret with h
Information security
Dr. Loai Alnemer
Lecture 1
Introduction
Loai Alnemer 2012
Introduction
Security attacks: Any action that compromises the
security of information.
Security mechanism: A mechanism that is designed
to detect, prevent, or recover from a s
Information Security
Data Encryption Standard
Dr. Loai Alnemer
DES - Overview
The most widely used cipher for civilian applications.
Every time you use an ATM you are using DES.
Developed by IBM; Evolved from Lucifer.
A block cipher with block size = 64 b