You are on page 1of 55

PAULINIAN GLEANERS’ PRAYER

God, our loving Father, through Your With TRANQUIL-DARING to proceed


Holy Spirit, enable us to participate in when we feel that the work and
Jesus’ saving mission to make You responsibilities given us are back-
known and loved throughout the world. breaking and beyond our capacity; and
May we joyfully live out our Paulinian
identity as gleaners who are: ALL TO ALL, willing to faithfully serve
everyone especially the least, the last,
PRAYERFUL, mindful of who we truly and the lost.
are and why we are here – Your children
called to follow Your Holy Will; Our Lady of Chartres, pray for us.
St. Paul the Apostle, our Patron, pray for
SELF-EFFACING, quick to transcend us.
when we are not recognized for the good Fr. Louis Chauvet and our First Sisters,
we have done or when we are taken for intercede for us.
granted; Caritas Christi urget nos,
now and for ever. Amen.
MATHEMATICS IN THE
MODERN WORLD
Module 5
MATHEMATICS AS A TOOL
FOR COMMUNICATION
•Codes
Codes were already around since ancient
times. A code is a symbolic way to represent
information. In qualitative inquiry, a code is most
often a word or short phrase that symbolically
assigns a summative, salient, essence capturing and
or evocative attribute for a portion of language based
or visual data (Saldana, 2013).
•Codes
During the ancient times, codes were already used
by humans. Hieroglyphics or “sacred writings” were codes
used by ancient Egyptians in their writing system. Roman
numerals were developed to easily determine the prices of
commodities and services rendered by the Romans.
Roman numerals were used throughout Europe up until
the 1600s. The more recently invented codes are musical
scores genetic codes and the DNA or deoxyribonucleic
acid.
Lesson 1
Communicating Efficiently
Binary Mathematics
Numbers
⚫ Ancient Africa
⚫ Notches on a bone.
⚫ Egyptians/Roman
⚫ Each magnitude is represented by a symbol.
⚫ Indian/Arabian (Modern numbering system)

1,475,268
Bi nar y
A numbering systems that only uses two
digits. 0 and 1.
Rather than a base ten that we are all
familiar with.
Computers use binary to store
information in a digital format.

Each digit ( 0 or 1) represents one bit


Eight bits are equal to one byte.
Bit
❖One Binary Digit
❖abbreviation is “b”

Can be thought of as one character


Either a 1 or a 0
Byt e

▪ Eight bits make up one byte


▪ Abbreviation “B”
▪ Combination of 1’s and0’s
▪ Can be thought of as one character
11101010
ki l obyt es

▪ Represented by KB
▪ Slang “Kilo”
▪ Is equal to 1024 bytes
▪ 210
Base 10 to Binary
192
What is the value?
1 1 0 0 0 0 0 0

Think of Binary as light bulbs

thatare either ON or
Off
255
What is the value?
1 1 1 1 1 1 1 1

128 64 32 16 8 4 2 1

Think of Binary as light bulbs

thatare either ON or
Off
Deci mal t o Bi nar y

▪ It follows a starightforward method.


▪ It involves dividing the number to be
converted, say N by 2 (since binary is in
base 2) until we reach the division of
(1/2), also making note of all
remainders.
Ex ampl e 1: Conv er t 98
f r o m deci mal t o bi nar y
▪ Divide 98 by 2, make note of all the
remainder.
▪ Continue dividingquotientsby 2, making
notes of the remainder.
▪ Also, note the star beside the last remainder.
Division Remainder, R
98/2 =49 R=0
49/2 =24 R=1
24/2 =12 R=0
12/2 =6 R=0
6/2 =3 R=0
3/2 =1 R=1
1/2 = 0 R=1

The sequence of remainders going up gives the answer. Starting from 1*,
we have 1100010.
Therefore, 98 in decimals is 1100010 in binary
Ex ampl e 2: Conv er t 21 i nt o
bi nar y
Division Remainder, R
21/2 =10 R=1
10/2 =5 R=0
5/2 =2 R=1
2/2 =1 R=0
1/2 =0 R=1

Therefore, 21 in decimals is 10101 in binary


Quiz
⚫ No Calculators!!!!
⚫ Convert binary code to Decimal number.
⚫ 10100101 (Bin)
⚫ Convert Decimal number to binary code
⚫ 176 (Dec)
Answer
⚫ 10100101 (Binary) = 165 (Decimal)
⚫ 176 (Decimal)= 10110000 (Binary)
Lesson 2
Communicating Securely:
Encryption
Secure Communication
Needs and Requirements

• Well established needs for secure communication


– War time communication
– Business transactions
– Illicit Love Affairs
• Requirements of secure communication
1. Secrecy
– Only intended receiver understands the message
2. Authentication
– Sender and receiver need to confirm each others identity
3. Message Integrity
– Ensure that their communication has not been altered, either maliciously
or by accident during transmission
Cryptography
Basics

• Cryptography is the science of secret, or hidden writing


• It has two main Components:
1. Encryption
– Practice of hiding messages so that they can not be read by
anyone other than the intended recipient
2. Authentication & Integrity
– Ensuring that users of data/resources are the persons they claim
to be and that a message has not been surreptitiously altered
Cryptography

Cryptography
The field of study related to encoded information (comes from Greek
word for "secret writing")
Encryption
The process of converting plaintext into ciphertext
Decryption
The process of converting ciphertext into plaintext

27
Cryptography

Encryption

plaintext ciphertext
message message
Decryption

Encrypted(Information) cannot be read


Decrypted(Encrypted(Information)) can be
28
Cryptography

Cipher
An algorithm used to encrypt and decrypt text; a method for
encrypting messages
Key
The set of parameters that guide a cipher
Neither is any good without the other

29
Encryption And Decryption
To ensure the privacy of messages sent over a
network between a source and destination, the text
can be encrypted.
◼ Cryptography - study of methods to encrypt text.
◼ Cryptanalysis - study of how to decode an encypted text.

30
Why is it important?
 Encryption used to be a word that people linked with
government and secret operations, however with the use
of computers becoming more and more common, it is
necessary for data to be disguised to help protect the
user.
 It keeps outsiders from viewing important company
documents
 It keeps information from being shared between users on
the same server or network
 It can be used to make “keys” to where only certain
people can view or access a document
•CAESAR CIPHER

The first cryptosystem was the


Caesar cipher or Caesar code by
Julius Caesar in sending messages to
his troops.
Caesar ciphers

Substitute the letters in the second row for the letters in the top row to encrypt a
message
Encrypt(COMPUTER) gives FRPSXWHU
Substitute the letters in the first row for the letters in the second row to decrypt a
message
Decrypt(Encrypt(COMPUTER))
= Decrypt(FRPSXWHU) = COMPUTER

33
• Caesar Cipher is a method in which each letter in
the alphabet is rotated by three letters as shown

• Let us try to encrypt the message


– Attack at Dawn
•CAESAR CIPHER
Example. Encrypt the message
“WE ARE CLOSE TO VICTORY.”

Replace the letters of the message


ZH DUH FORVH WR YLFWRUB
•CAESAR CIPHER
Example. Decrypt the message
PDWKHPDWLFV LV EHDXWLIXO

Replace the letters of the message


MATHEMATICS IS BEAUTIFUL
Lesson 3
Communicating Securely:
Authentication;
Steganography
•STEGANOGRAPHY
The art of writing in cipher, or in characters
which are not intelligible except to persons who have
the key is cryptography. Steganography is the art of
covered, or hidden, writing. The purpose of
steganography is covert communication to hide a
message from a third party.
What is Steganography?

⚫ Origin of the term: steganos: secret – graphy: writing


Cryptograpy & Steganography vs. Watermarking Comparison

• Cryptography is about protecting the content of messages


(their meaning).
• Steganography is about concealing the existence of messages
• Watermarking is about establishing identity of information to
prevent unauthorized use
– They are imperceptible
– They are inseparable from the works they are embedded in
– They remain embedded in the work even during transformation
Steganography
Basics
• The word steganography comes from the Greek steganos , meaning
covered or secret, and graphy , meaning writing or drawing. Therefore,
steganography literally means covered writing.
• Steganography simply takes one piece of information and hides it within
another
– Computer files (images, sounds recordings, even disks) contain unused or
insignificant areas of data
– Steganography takes advantage of these areas, replacing them with information
(encrypted mail, for instance).
– The files can then be exchanged without anyone knowing what really lies inside of
them
– An image of the space shuttle landing might contain a private letter to a friend.
– Rumor has it that terrorists used steganography to transmit messages to one
another. (http://www.wired.com/news/politics/0,1283,41658,00.html)
Reference: http://members.tripod.com/steganography/stego.html
Uses of Steganography

⚫ Governments

⚫ Businesses: Digital Watermarking

⚫ Individuals
Steganography & Cryptography

⚫ Steganography and Cryptography are closely related


⚫ The difference is in their goals...
– Cryptography: although encypted and unreadable, the existence of
data is not hidden
– Steganography: no knowledge of the existence of the data
⚫ Steganography and Cryptography can be used together to
produce better protection
Digital Watermarking

Image “painted” with the watermark: “Invisible Man” © 1997, Neil F. Johnson
Digital Watermarking

⚫ Used primarily for identification


⚫ Embedding a unique piece of information within a medium
(typically an image) without noticeably altering the medium
⚫ Almost impossible to remove without seriously degrading an
image
Digital Steganogaphy & Watermarking

⚫ Digital watermarking hides data in a file, and the act of hiding


data makes it a form or steganography
⚫ The key difference is their goals...
– Steganography: hiding information
– Watermarking: extending the file with extra information
⚫ Steganographic information must never be apparent to a
viewer unaware of its presence.
Network Security and Steganography

⚫ Confidentiality: any unauthorized person does not know that


sensitive data exists
⚫ Survivability: verifying that the data does not get destroyed in the
transmission
⚫ No detection: cannot be easily found out that the data is hidden in a
given file
⚫ Visibility: people cannot see any visible changes to the file in which
the data is hidden
Types of Digital Steganography

⚫ Hiding a Message inside Text


⚫ Hiding a Message inside Images
– Most popular technique
⚫ Hiding a Message inside Audio and Video Files
Hiding a Message inside Text

⚫ Partially effective
randoM capitalosis is a rarE disEase ofTen
contrAcTed by careless inTernet users. tHis sad
illnEss causes the aFfected peRsON To randomly
capitalize letters in a bOdy oF texT. please
do not confuse this disease witH a blatant
attEmpt aT steganogRAPhy.

Reveals: MEET AT THE FRONT OF THE TRAP


Hiding a Message inside Text

⚫ First-letter algorithm
⚫ Every n-th character
⚫ Altering the amount of whitespace
⚫ Using a publicly available cover source
Hiding a Message inside Images

⚫ The most popular medium!

⚫ Least-significant bit (LSB) modifications


– 24-bit vs. 8-bit images
– Tools to implement LSB: EzStego and S-Tools
⚫ Masking and Filtering
⚫ Algorithms and Transformations
Hiding an Image within an Image

⚫ Removing all but the two least significant bits of each color component produces an
almost completely black image. Making that image 85 times brighter produces the
image below

⚫ source: wikipedia.org
Authentication and Encryption
 Authentication and encryption are two intertwined technologies
that help to insure that your data remains secure.
 Authentication is the process of insuring that both ends of the
connection are in fact who they say they are. This applies not only
to the entity trying to access a service (such as an end user) but to
the entity providing the service, as well (such as a file server or
Web site).
 Encryption helps to insure that the information within a session is
not compromised. This includes not only reading the information
within a data stream, but altering it, as well.
 While authentication and encryption each has its own
responsibilities in securing a communication session, maximum
protection can only be achieved when the two are combined. For
this reason, many security protocols contain both authentication
and encryption specifications.
http://technet.microsoft.com/en-us/library/cc750036.aspx
Authentication: Three Types
• · Single factor authentication
• Password
• Easy to remember
• Easy to crack
• People are predictable…passwords are usually a pets name,
• a birth date, etc.

• · Two factor
• Password + token (security device for users to keep in possession)
• Safer and more complex than single factor

• · Three factor
• Password + token + biometric authentication (fingerprint, retinal scan)
• Safer and more complex than single or double factor types; used for high
• security purposes (ex. Government documents)
• A token is a security device for authorized users to keep in possession. Some examples
include:
• SecurID Card, Challenge/response method, and USB token
http vs. https
 HTTP (Hypertext Transfer Protocol) is an application-level protocol for
distributed, collaborative, hypermedia information systems.
 It operates “at the highest layer of the TCP/IP Internet reference
model and network security protocol,” meaning that it works with the
highest capability to meet all protocol standards when it comes to
transferring information over the internet, as well as working to keep
information secure from other users. Its security is not the highest
because it works to “encrypt an HTTP message prior to
transmission and decrypt a message upon arrival.” This allows
anyone to see it.
 HTTPS (Hypertext Transfer Protocol Secure) is a combination of http
and a network security protocol.
 This means that it strengthens security to keep others from
accessing your information. These connections are most likely
going to be used during an online transaction and for “sensitive
transactions in corporate information systems.”

You might also like