Professional Documents
Culture Documents
Module 5
Module 5
1,475,268
Bi nar y
A numbering systems that only uses two
digits. 0 and 1.
Rather than a base ten that we are all
familiar with.
Computers use binary to store
information in a digital format.
▪ Represented by KB
▪ Slang “Kilo”
▪ Is equal to 1024 bytes
▪ 210
Base 10 to Binary
192
What is the value?
1 1 0 0 0 0 0 0
thatare either ON or
Off
255
What is the value?
1 1 1 1 1 1 1 1
128 64 32 16 8 4 2 1
thatare either ON or
Off
Deci mal t o Bi nar y
The sequence of remainders going up gives the answer. Starting from 1*,
we have 1100010.
Therefore, 98 in decimals is 1100010 in binary
Ex ampl e 2: Conv er t 21 i nt o
bi nar y
Division Remainder, R
21/2 =10 R=1
10/2 =5 R=0
5/2 =2 R=1
2/2 =1 R=0
1/2 =0 R=1
Cryptography
The field of study related to encoded information (comes from Greek
word for "secret writing")
Encryption
The process of converting plaintext into ciphertext
Decryption
The process of converting ciphertext into plaintext
27
Cryptography
Encryption
plaintext ciphertext
message message
Decryption
Cipher
An algorithm used to encrypt and decrypt text; a method for
encrypting messages
Key
The set of parameters that guide a cipher
Neither is any good without the other
29
Encryption And Decryption
To ensure the privacy of messages sent over a
network between a source and destination, the text
can be encrypted.
◼ Cryptography - study of methods to encrypt text.
◼ Cryptanalysis - study of how to decode an encypted text.
30
Why is it important?
Encryption used to be a word that people linked with
government and secret operations, however with the use
of computers becoming more and more common, it is
necessary for data to be disguised to help protect the
user.
It keeps outsiders from viewing important company
documents
It keeps information from being shared between users on
the same server or network
It can be used to make “keys” to where only certain
people can view or access a document
•CAESAR CIPHER
Substitute the letters in the second row for the letters in the top row to encrypt a
message
Encrypt(COMPUTER) gives FRPSXWHU
Substitute the letters in the first row for the letters in the second row to decrypt a
message
Decrypt(Encrypt(COMPUTER))
= Decrypt(FRPSXWHU) = COMPUTER
33
• Caesar Cipher is a method in which each letter in
the alphabet is rotated by three letters as shown
⚫ Governments
⚫ Individuals
Steganography & Cryptography
Image “painted” with the watermark: “Invisible Man” © 1997, Neil F. Johnson
Digital Watermarking
⚫ Partially effective
randoM capitalosis is a rarE disEase ofTen
contrAcTed by careless inTernet users. tHis sad
illnEss causes the aFfected peRsON To randomly
capitalize letters in a bOdy oF texT. please
do not confuse this disease witH a blatant
attEmpt aT steganogRAPhy.
⚫ First-letter algorithm
⚫ Every n-th character
⚫ Altering the amount of whitespace
⚫ Using a publicly available cover source
Hiding a Message inside Images
⚫ Removing all but the two least significant bits of each color component produces an
almost completely black image. Making that image 85 times brighter produces the
image below
⚫ source: wikipedia.org
Authentication and Encryption
Authentication and encryption are two intertwined technologies
that help to insure that your data remains secure.
Authentication is the process of insuring that both ends of the
connection are in fact who they say they are. This applies not only
to the entity trying to access a service (such as an end user) but to
the entity providing the service, as well (such as a file server or
Web site).
Encryption helps to insure that the information within a session is
not compromised. This includes not only reading the information
within a data stream, but altering it, as well.
While authentication and encryption each has its own
responsibilities in securing a communication session, maximum
protection can only be achieved when the two are combined. For
this reason, many security protocols contain both authentication
and encryption specifications.
http://technet.microsoft.com/en-us/library/cc750036.aspx
Authentication: Three Types
• · Single factor authentication
• Password
• Easy to remember
• Easy to crack
• People are predictable…passwords are usually a pets name,
• a birth date, etc.
• · Two factor
• Password + token (security device for users to keep in possession)
• Safer and more complex than single factor
• · Three factor
• Password + token + biometric authentication (fingerprint, retinal scan)
• Safer and more complex than single or double factor types; used for high
• security purposes (ex. Government documents)
• A token is a security device for authorized users to keep in possession. Some examples
include:
• SecurID Card, Challenge/response method, and USB token
http vs. https
HTTP (Hypertext Transfer Protocol) is an application-level protocol for
distributed, collaborative, hypermedia information systems.
It operates “at the highest layer of the TCP/IP Internet reference
model and network security protocol,” meaning that it works with the
highest capability to meet all protocol standards when it comes to
transferring information over the internet, as well as working to keep
information secure from other users. Its security is not the highest
because it works to “encrypt an HTTP message prior to
transmission and decrypt a message upon arrival.” This allows
anyone to see it.
HTTPS (Hypertext Transfer Protocol Secure) is a combination of http
and a network security protocol.
This means that it strengthens security to keep others from
accessing your information. These connections are most likely
going to be used during an online transaction and for “sensitive
transactions in corporate information systems.”