Group 1 Group 4 Net Ad Reports
Group 1 Group 4 Net Ad Reports
SUMMARY
• Cellphone addiction is one of a major issue nowadays, with 80% of children checking their
phones every five minutes. It is estimated that 1.5 billion people in China, 24 million of them
are suspected to be addicted to technology, and parents are putting their children to detoxify
them of technology. The main reason for this addiction is social media, mobile games etc. The
most important details in this text are, people are spending more time on their devices than
talking to the people in front of them. Additionally, people are using their devices for alarm
clocks or sleep apps to help them get sleep, and that affects the release of melatonin in the
brain, leading to high energy before bed hopping that is why we get lack of sleep sometimes.
Your phone beside your bed has side effects like digital eye strains, increase illnesses and
even car accidents due to lack of sleeps.
CONVENTIONAL
ENCRYPTION
MODEL
Group 1
AGENDA
In this reporting we should be able to
know the definition of conventional
encryption model. The difference of
encryption and decryption and its
algorithms.
5
CONVENTIONAL
ENCRYPTION
Plaintext K1 K2 K3
Ciphertex
t
All 3 Keys are the same = 56-bit
2 keys are the same, the other one is different = 112
-bit
All 3 keys are different = 168-bit
ADVANCED ENCRYPTION STANDARD (AES)
Substitute R
bytes O Substitute R
U O
Shift Row bytes
N U
Shift Row N
Mix Columns D
# D
Add Round Key
Add Round Key 1 #
K10 – [W40, W41, W42, 10
K1 – [W4, W5, W6, W7] W43]
The process will repeat
until Round 10 Ciphertex
t
Conventional encryption is a
very common way to protect
data. It is used in a variety of
applications, including:
• Email
• File encryption
• Network Security
22
SUMMARY
The conventional encryption model is a secure way to
protect data from unauthorized access. However, it is
important to note that the secret key must be kept
secure. If the secret key is compromised, then an
attacker can decrypt the ciphertext and access the
plaintext.
CRYPTOGRAPHY
24
CRYPTOGRAPHY
is the practice and study of techniques for
secure communication in the presence of third
parties or the public. Cryptography
encompasses two main areas: encryption and
decryption. Encryption is the process of
converting plaintext into ciphertext, which is a
scrambled form of the original message that
cannot be read by anyone who does not have
the key to decrypt it. Decryption is the process of
converting ciphertext back into plaintext.
25
CRYPTOGRAPHY
Cryptography is used in a wide variety of
applications, including:
CRYPTOGRAPHY
Digital signatures: Cryptography is used to
create digital signatures, which are used to
verify the authenticity of a message or
document.
Non-repudiation: Cryptography is used to
provide non-repudiation, which is a guarantee
that the sender of a message cannot deny
having sent it.
27
CRYPTOGRAPHY
Cryptography is a complex and ever-evolving field.
New techniques are constantly being developed to
improve the security of cryptographic systems.
However, no cryptographic system is completely
unbreakable. As new techniques are developed,
attackers also develop new techniques to break
them. This is why it is important to keep up with the
latest security developments and to use strong
cryptographic algorithms.
28
SUMMARY
Cryptography is a powerful tool that can be used to
protect data from unauthorized access. However, using
cryptography correctly and keeping up with the latest
security developments is important. By following these
guidelines, you can help to ensure that your data is
protected.
STEGANOGRAPHY
32
STEGANOGRAPHY
is the practice of hiding secret messages within
other messages or objects. The hidden
message is called the stegotext, and the carrier
of the hidden message is called the stegocarrier.
Steganography is often used to send
confidential information over insecure channels,
such as the internet.
33
• Analog steganography
34
DIGITAL STEGANOGRAPHY
DIGITAL STEGANOGRAPHY
36
ANALOG STEGANOGRAPHY
- steganography is used to hide secret messages
within analog media, such as paper, photographs,
and audio recordings.
37
STEGANOGRAPHY
Steganography is a complex and ever-evolving
field. New techniques are constantly being
developed to improve the security of
steganographic systems. However, no
steganographic system is completely
unbreakable. As new techniques are developed,
attackers also develop new techniques to break
them. This is why it is important to keep up with
the latest security developments and to use
strong steganographic algorithms.
38
COMMON TYPES
OF STEGANOGRAPHY
• Watermarking
39
WATERMARK
- is a type of steganography that is used to mark ownership
of digital media. A watermark is a small, invisible mark that
is embedded in the digital media.
-- The watermark can be used to identify the owner of
the digital media and to prevent copyright infringement.
41
42
SUMMARY
Steganography is a powerful tool that can
be used to hide confidential information.
However, it is important to use
steganography correctly and to keep up
with the latest security developments. By
following these guidelines, you can help
to ensure that your information is
protected.
Carrie Green
Programming your
mind for success
Classical Encryption
Techniques
Encryption
Caesar Cipher
Plaintext : Hello
Shift/Key : +3
Cipher text: Khoor
Examples of Classical
Encryption Techniques
Caesar Cipher
Plaintext : Yellow
Shift/Key : +8
Cipher text: Gmttwe
Examples of Classical
Encryption Techniques
Caesar Cipher
Plaintext : Banana
Shift/Key : -2
Cipher text: Zylyly
Examples of Classical
Encryption Techniques
Caesar Cipher
Plaintext : Lemon
Shift/Key : -5
Cipher text: Gzhji
ROT13 cipher
(“rotate by 13 places”)
ATBASH Cipher
ATBASH (Aleph-Taw-Bet-Shin) is a monoalphabetic
substitution cipher originally used to encrypt the
hebrew alphabet it can be modified for use by any
known writing system with a standard collating order.
ATBASH Cipher
ATBASH cipher is a particular type of monoalphabetic
cipher formed by taking the alphabet and mapping it
to its reverse, so that the first letter becomes the last
letter, the second letter becomes the second to the
last letter, and so on
ATBASH Cipher
Due to the fact that there is only one way to perform
this, the Atbash cipher provides no communications
security, as it lacks any sort of key. If multiple
collating orders are available, which one was used in
encryption can be used as a key, but this does not
provide significantly more security, considering that
only a few letters can give away which one was used.
ATBASH Cipher
was made in Israel.
The original: Aleph-Taw-Bet-Shin
Different variant of ATBASH cipher:
BATGASH Aleph-Taw-Gimel-Shin
ASHBAR Aleph-Taw-Bet-Reish
ATBASH Cipher
Here is the example of ATBASH cipher:
Encryption: Decryption:
plain text: Divine Fury Cipher: WRERMV UFIB
Cipher: WRERMV UFIB plain text: Divine Fury
Polyalphabetic
Ciphers
Polyalphabetic ciphers are more secure
than monoalphabetic ciphers because they
use multiple substitution alphabets during
the encryption process. This makes it more
difficult for attackers to break the cipher by
using frequency analysis or other
cryptographic attacks.
Examples of Classical
Encryption Techniques
Vigenère cipher
First described by Giovan Battista Bellaso in 1553 but
was misattributed to Blaise de Vigenère, the cipher is
easy to understand and implement, but it resisted all
attempts to break it until 1863, This earned it the
description le chiffrage indéchiffrable (French for 'the
indecipherable cipher').
Examples of Classical
Encryption Techniques
Vigenère cipher
The Vigenère cipher is a method of encrypting
alphabetic text where each letter of the plaintext is
encoded with a different Caesar cipher, whose
increment is determined by the corresponding letter
of another text, the key.
Vigenère cipher
In order to encrypt and decrypt using Vigenere Cipher,
there are two important things to do this.
First one, we must be given a "key" which is a word that
would be used as basis for the increment encryption and
decryption.
Second, knowledge on the Caesar cipher mod 26.
Vigenère cipher
Encryption process:
Ciphertext = (Plaintext + key) Using mod 26(0-25 caesar cipher)
Also, in order to fill in the missing letters, we repeat the "key" which is
cab until it has the same amount of letters as saveme.
so saveme 18(s) + 2(c) = 20(U)
+ cabcab 0(a)+0(a)=0(a) we end with
21(v)+1(b) = 22(w) uawgmf
4(e)+ 2(c)= (G)
12(m)+ 0(a) = 12(m)
4(e) + 1(b) = 5(f)
Vigenère cipher
Decryption Process:
Plaintext = (Ciphertext - Key) Using mod 26(0-25 caesar cipher)
Example:
Plaintext: BALLOON
Key: ALMOST
Ciphertext: TLMWMSAR
Playfair Cipher
Applying the rules of encryption: Playfair Cipher
1. Split the plaintext into digraph
BA LL OO N
2. If a pair contains repeated letters, we can use a filler letter
such as x.
BA LX LO ON
Playfair Cipher
The first digraph is BA. The pair is visible in
several rows and columns. BA is encrypted
into TL using the Rule #5.
Transposition cipher
Character become scrambled after
the paper is removed from the rod
R C I P H E R
C A E S A
FEAT U R E S
01. SUBSTITURION CIPHER
Caesar cipher is a type of monoalphabetic
substitution cipher, where each letter in the
plaintext is replaced by a letter some fixed number
of positions down the alphabet.
03. SYMMETRIC
ENCRYPTION
Caesar cipher is a symmetric encryption technique,
meaning that the same key is used for both
encryption and decryption.
04. LIMITED KEYSPACE
Has a very limited keyspace of only 26 possible
keys, as there are only 26 letters in the English
alphabet.
N→ 13 E = (13 + 3) mod 26 16 →Q
E → 04 E = (04 + 3) mod 26 7→H
T → 19 E = (19 + 3) mod 26 22 → W
A → 00 E = (00 + 3) mod 26 03 → D
D → 03 E = (03 + 3) mod 26 06 → G
NETAD QHW DG
DECRYPTION
Start with the encrypted message.
In this case, it's "QHW DG".
W → 22 D = (22 - 3) mod 26 19 → T
G → 06 D = (06 - 3) mod 26 03 → D
QHW DG NETAD
EXAMPLE
E(x) = (x + k) mod 26
D(x) = (x - k) mod 26
PLAINTEXT ALPHABET
A, B, C, D, E, F, G, H, I, J,
K, L, M, N, O, P, Q, R, S, T,
U, V, W, X, Y, Z
Plaintext Encryption Formula Ciphertext
D → 03 E = (03 + 9) mod 26 12 → M
N → 13 E = (13 + 9) mod 26 22 → w
E → 04 E = (04 + 9) mod 26 13 → N
S → 18 E = (18 + 9) mod 26 1→ B
S → 18 E = (18 + 9) mod 26 1→ B
SADNESS BJMWNBB
Ciphertext Decryption Formula Plaintext
M → 12 E = (12 - 9) mod 26 03 → D
W → 22 E = (22 - 9) mod 26 13 → N
N → 13 E = (13 - 9) mod 26 04 → E
B →1 E = (1 - 9) mod 26 18 → S
B →1 E = (1 - 9) mod 26 18 → S
BJMWNBB SADNESS
EXAMPLE
E(x) = (x + k) mod 26
PLAINTEXT ALPHABET
A, B, C, D, E, F, G, H, I, J,
K, L, M, N, O, P, Q, R, S, T,
U, V, W, X, Y, Z
Plaintext Encryption Formula Ciphertext
H→ 07 E = (7 - 6) mod 26 1→B
G → 06 E = (6- 6) mod 26 00 → A
J → 09 E = (9 - 6) mod 26 03 → D
T → 19 E = (19 - 6) mod 26 13 → N
Q → 16 E = (16 - 6) mod 26 10 → K
G → 09 E = (6 - 6) mod 26 0→A
HGJOTM QG BADING KA
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Blaise de Vigenère
April 5, 1523 - February 19, 1596
•
•
PLAINTEXT
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
KEY
M M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
PLAINTEXT
A B C D E F G H I J K L M N O P Q R
A A B C D E F G H I J K L M N O P Q R
B B C D E F G H I J K L M N O P Q R S
C C D E F G H I J K L M N O P Q R S T
D D E F G H I J K L M N O P Q R S T U
E E F G H I J K L M N O P Q R S T U V
F F G H I J K L M N O P Q R S T U V W
G G H I J K L M N O P Q R S T U V W X
H H I J K L M N O P Q R S T U V W X Y
I I J K L M N O P Q R S T U V W X Y Z
J J K L M N O P Q R S T U V W X Y Z A
K K L M N O P Q R S T U V W X Y Z A B
K L L M N O P Q R S T U V W X Y Z A B C
E
Y M M N O P Q R S T U V W X Y Z A B C D
N N O P Q R S T U V W X Y Z A B C D E
O O P Q R S T U V W X Y Z A B C D E F
P P Q R S T U V W X Y Z A B C D E F G
Q Q R S T U V W X Y Z A B C D E F G H
R R S T U V W X Y Z A B C D E F G H I
PLAINTEXT
A B C D E F G H I J K L M N O P Q R
A A B C D E F G H I J K L M N O P Q R
B B C D E F G H I J K L M N O P Q R S
C C D E F G H I J K L M N O P Q R S T
D D E F G H I J K L M N O P Q R S T U
E E F G H I J K L M N O P Q R S T U V
F F G H I J K L M N O P Q R S T U V W
G G H I J K L M N O P Q R S T U V W X
H H I J K L M N O P Q R S T U V W X Y
I I J K L M N O P Q R S T U V W X Y Z
J J K L M N O P Q R S T U V W X Y Z A
K K L M N O P Q R S T U V W X Y Z A B
K L L M N O P Q R S T U V W X Y Z A B C
E
Y M M N O P Q R S T U V W X Y Z A B C D
N N O P Q R S T U V W X Y Z A B C D E
O O P Q R S T U V W X Y Z A B C D E F
N P Q R S T U V W X Y Z A B C D E F G
Q Q R S T U V W X Y Z A B C D E F G H
R R S T U V W X Y Z A B C D E F G H I
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•