engr cs 101 cs session lecture 1
play

ENGR/CS 101 CS Session Lecture 1 Introduction sheet Course and - PowerPoint PPT Presentation

ENGR/CS 101 CS Session Lecture 1 Introduction sheet Course and session webpages http://csserver.evansville.edu/~hwang/f10-courses/engrcs101.html http://csserver.evansville.edu/~hwang/f10-courses/engrcs101/cs.html Lecture 1


  1. ENGR/CS 101 CS Session Lecture 1  Introduction sheet  Course and session webpages http://csserver.evansville.edu/~hwang/f10-courses/engrcs101.html  http://csserver.evansville.edu/~hwang/f10-courses/engrcs101/cs.html  Lecture 1 ENGR/CS 101 Computer Science Session 1

  2. Outline  Software life cycle  Problem: How to send a secret message?  Codes and ciphers  Substitution ciphers Lecture 1 ENGR/CS 101 Computer Science Session 2

  3. Software Life Cycle  Specification of the problem/task  Design of a solution  Implementation (coding) of the solution  Analysis of the solution  Testing and debugging  Maintenance and evolution of the system  Obsolescence Lecture 1 ENGR/CS 101 Computer Science Session 3

  4. Problem: How to send a secret message?  Steganography ("concealed writing"): science of sending concealed messages. Includes physical concealment like invisible ink, microdots...  Cryptography ("hidden writing"): how to obscure message so it cannot be read even if intercepted. Use codes and ciphers. Lecture 1 ENGR/CS 101 Computer Science Session 4

  5. Codes and Ciphers  Code : whole words or phrases replaced by a word, letter, or a number. Like an alien language; uses translation code book.  Cipher : individual letters are replaced by other letters or symbols.  Plaintext : message in normal language  Ciphertext : message in secret form Lecture 1 ENGR/CS 101 Computer Science Session 5

  6. Ciphers  Transposition cipher: rearrange letters of message.  Scytale: strip of writing material wrapped around a dowel; write message across dowel.  Block: arrange message into a block, rewrite vertical lines  Substitution cipher: replace letters with other letters Lecture 1 ENGR/CS 101 Computer Science Session 6

  7. Cipher = Algorithm + Key  Algorithm : a series of well-defined steps that can be followed as a procedure.  Key : auxiliary information used by an algorithm. Different keys produce different ciphers using the same algorithm. Lecture 1 ENGR/CS 101 Computer Science Session 7

  8. Caesar Shift Cipher  Algorithm: substitute a letter with the letter n places to the right  Key: number of letter to shift. E.g. 8 (A -> I) gives: A B C D E F G H I J K L M I J K L M N O P Q R S T U N O P Q R S T U V W X Y Z V W X Y Z A B C D E F G H Lecture 1 ENGR/CS 101 Computer Science Session 8

  9. In-class Exercise  Practice enciphering and deciphering using Caesar shift cipher Lecture 1 ENGR/CS 101 Computer Science Session 9

  10. What if the key is unknown?  How many possible keys are there for the Caesar Shift Cipher?  25 . Small enough that we could try each one in a short amount of time.  Suppose we allow any letter to be substituted by any other letter? How many possible keys are there for this cipher?  26! = 403 291 461 126 605 635 484 000 000 . Over 400 million billion billion. Lecture 1 ENGR/CS 101 Computer Science Session 10

  11. 400 million billion billion  Just how big is this number?  6.5 billion people on Earth; 31 million seconds in a year. If everyone on Earth checked one key per second, ...  It still would take around 2 billion years to check them all! Lecture 1 ENGR/CS 101 Computer Science Session 11

  12. A better way to decipher  English letter frequency: E, T, A, O, ...  Common words: "the", "and", ...  Single/double letter words: "I", "a", "to", "of", ...  Repeated letters  Context Lecture 1 ENGR/CS 101 Computer Science Session 12

  13. Polyalphabetic Ciphers  Make cipher harder to break by using multiple substitution alphabets  Vigenere cipher: key is a "word", algorithm is to use key letters to change Caesar cipher shift key for each letter of plaintext. E.g. key = "LION", encipher first letter with key A->L, encipher second letter with key A->I, etc. Lecture 1 ENGR/CS 101 Computer Science Session 13

  14. Enigma Machine  Random cipher represented using a code wheel. Originally 3 code wheels, later 5 wheels  Instead of always starting with same letter on wheel as A, just encipher the current letter of plaintext with the next letter on wheel  Add a plugboard to further randomize. Lecture 1 ENGR/CS 101 Computer Science Session 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend