Free Essay

Hill Cipher

In:

Submitted By isaac07
Words 2648
Pages 11
CioheWednesday, April 13, 2016

University of Botswana

ISS 334 LAB 2 ASSIGNMENT
Ndlovu.I 200902852
Ndlovu.I

ISS 334 Lab 2 Assignment

Page 1 of 27

Wednesday, April 13, 2016

Contents
1.

Hill Cipher Description .......................................................................................................................... 3

2.

Question ................................................................................................................................................ 3

3.

Implementation .................................................................................................................................... 3
3.1.

Hill Cipher Encryption and Decryption.......................................................................................... 4

3.1.1.

Part 1 ..................................................................................................................................... 5

3.1.2.

Part 2 ..................................................................................................................................... 7

3.1.3.

Part 3 ..................................................................................................................................... 9

3.1.4.

Part 4 ................................................................................................................................... 11

3.1.5.

Part 5 ................................................................................................................................... 12

3.2.

Known plain text attack using simultaneous linear equations ................................................... 14

3.2.1.

Part 1 ................................................................................................................................... 15

3.2.2.

Part 2 ................................................................................................................................... 16

3.2.3.

Part 3 ................................................................................................................................... 18

3.3.

Known plain text attack using matrix multiplication .................................................................. 19

3.3.1.

Part 1 ................................................................................................................................... 20

3.3.2.

Part 2 ................................................................................................................................... 22

3.3.3.

Part 3 ................................................................................................................................... 24

3.3.4.

Part 4 ................................................................................................................................... 25

3.3.5.

Part 5 ................................................................................................................................... 25

3.4.

Ndlovu.I

Known plain text attack using matrix reduction ......................................................................... 26

ISS 334 Lab 2 Assignment

Page 2 of 27

Wednesday, April 13, 2016

1. Hill Cipher Description
The hill cipher is a polygraphic substitution cipher based on linear algebra modular mathematics. It also uses matrices and matrix multiplication to form a ciphertext from a plain text and vice versa. It was invented by Lester S. Hill in 1929.

2. Question
Write a program that reads two strings - ciphertext and the partial plaintext and finds the key matrix and the complete plaintext using the known plaintext cryptanalysis technique that we learned in class.

3. Implementation
The approach used to answer has 3 steps.
Step 1 is a program that is used to encrypt and decrypt a message using the Hill Cipher.
Step 2 is a program that uses the “known plain text attack” to find the key which was used to encrypt the message; this is achieved by using simultaneous linear equations.
Step 3 is the same as Step 2 but using a different matrix multiplication to find the key. All the programs have written in java using Dr. Java.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 3 of 27

Wednesday, April 13, 2016

3.1. Hill Cipher Encryption and Decryption

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 4 of 27

Wednesday, April 13, 2016

3.1.1. Part 1
Class Basic the class has the indexOfChar and indexAtChar method.
The first method matches characters of a string to the alphabet and returns a numeric value, the second method is used to return a char which is located at the position int pos.
Class Hill has an object basic of the class basic so as to access the methods from the basic class, this is done later on in the program.
Class Hill also contains method Hill, this ensures that the matrix we are using is a 2X2 matrix, that’s why the variable block=2.
The method reads the key matrix. The user will enter in the first number and press “enter” and do this until the fourth number is entered. The assumption is that we are using a 2x2 matrix as the key size.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 5 of 27

Wednesday, April 13, 2016

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 6 of 27

Wednesday, April 13, 2016

3.1.2. Part 2
The method KeyInverse also reads 4 integers which are stored to the double array Key[][] and uses them for the decryption key.
The method encryptBlock is the encryption method.
Plain.toUpperCase converts the text that is read to upper text.
The CipherMatrix stores the encrypted values of the plain text.
A for loop is used to iterate through the entered in plain text such that the method indexOfChar that converts a character to a numerical value occurs for each character of the plaintext. This is so that the matrix CipherMatrix is filled with intergers not cahracters, also note that CipherMatrix[][] is a double array variable.
Then follows a series of the for loops which are used for the most important part of the encryption, that’s the matrix multiplication. This is where the 2x2 key is multiplied by the 2x2 plain text matrix. The result is stored to the ciphertext matrix. The loops are executed in the order of the inner loop first then then middle loop then the outer loop last. This ensures that the cipher text matrix is filled in sequential order. Also note that the in the inner for loop [0][0] of the key is multiplied by row [0][0] of the plain text but [0][1] of the key is multiplied by [1][0] of the plain text matrix, this is done so that the mathematical rules of matrix mutilation are followed, also note that sum variable adds the sum of two [0][0]x[0][0] +
[0][1]X[1][0] of the key and plaint text matrices respectively.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 7 of 27

Wednesday, April 13, 2016

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 8 of 27

Wednesday, April 13, 2016

3.1.3. Part 3
The charAtIndex is the method which was mentioned in part 1 that is used to convert the cipher numerical values to text, this is after the matrix multiplication has taken place.
Therefore the return cipher returns a string as the result of the encryptBlock method.
Then follows the string encrypt method

The string ciphertext is initialized to an empty string
Method keyInsert receives the input for the plain text
While(len%block!=0) this is used to ensures that the plaintext is an even number as the matrix of a 2x2 two matrix is an even number
Plaintext+=”X” adds a character to the plaintext if it’s length is an odd number
The for loop is used to fill the string ciphertext with the values of plaintext that have been encrypted using the encryptBlock method.
The ciphertext is returned as the result of the encrypt method
The decryptBlock method takes takes in the ciphertext and changes all the characters to upper case.
Then a[][] and plainMatix [][] arrays are created to be used in part 4
String plain is initialized to an empty string

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 9 of 27

Wednesday, April 13, 2016

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 10 of 27

Wednesday, April 13, 2016

3.1.4. Part 4
Since this is the decryptBlock method, the a[][] array is filled with the ciphertext characters using a single for loop
Then matrix multiplication occurs to multiply the inverse key[][] by a[][] which is the array of ciphertext which has just been filled
Three is done using a nested for loop of three. The procedure is similar to when performing a matrix multiplication when encrypting mentioned in part 2.
In this case plainMatrix is populated with the numerical values that correspond to the plaintext.
The following single for loop converts the integers (the numerical values) to characters using the charAtIndex method which was created and defined in part 1.
The plaintext is returned.
The string decrypt method is the one which actuallys takes in the user input of the ciphertext to be deciphered, ciphertext is defined as an input parameter within the braces of the decrypt() method.
The length of the ciphertext entered in is determined and converted o uppercase. The method then continues to part 5.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 11 of 27

Wednesday, April 13, 2016

3.1.5.

Part 5

The decryptBlock is called which actually does the calculation of matrix multiplication using the inverse and cipherext just entered in the assigns the deciphered text to plaintext.
Plaintext is returned as the result.
Public class HillCipher contains the main method, the method responsible for running the entire program. Basically here the user is prompted with entering the plaintext which is then read to the scanner. Note the same scanner is used for reading all inputs.
The user is then prompted to enter the matrix size, which is expected to be a 2 the program is written to calculate a 2x2 matrix.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 12 of 27

Wednesday, April 13, 2016
The encrypt method is called from the Hill class and plaintext is converted to ciphertext.
The ouput is printed to the screen.
The decrypt method is called from the Hill class so that decryption is performed and the decrypted text is printed to the screen.
And the main method is closed followed by the HillCipher class being closed.
End of program.

Above are quick values the user can input into the program to test if It’s working.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 13 of 27

Wednesday, April 13, 2016

3.2. Known plain text attack using simultaneous linear equations

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 14 of 27

Wednesday, April 13, 2016

3.2.1. Part 1
The method solveForUnknown is the method used to find the value of a, b,c, d which is unkown in an equation. The comments I put in help to show how the equations would have looked on paper.
Step 1 is cross multiplication so as to get rid of a common varaible and be left to figure out the remaing variable. Step 2 is the subtraction of the equations so that we remain with one equation.

The multiplicative inverse is found using the getInverse methd which is explained in 3.3.4
The last part of the equation is multiping the constant by the multiliplicative inverse because when this is done on the other side of the equation, the unkown variable becomes a 1.
Hence we find the variable that we were looking for an return it.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 15 of 27

Wednesday, April 13, 2016

3.2.2. Part 2
The getA, getB, getC and getD methods all work similarly. They just manipulate the linear equations by inputting different values for the coefficients so as to work out the different values of the unknown variables. The get method takes in the two arrays P[] and C[] which are plaintext and ciphertext respectively.
The solveForUnkown method is called which takes in the 6 coefficients to make up two linear equations each consisting of 3 coefficients. The value of the desired unknown variable is the returned.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 16 of 27

Wednesday, April 13, 2016

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 17 of 27

Wednesday, April 13, 2016

3.2.3. Part 3
The string allCHar takes in the 26 characters of the alphabet.
The inner for loop iterates through each character of the alphabet to match it to plaintext or ciphertext.
The for loop loops from the first character of the text to the last.
In the main method the user is asked to enter In plaintext which is then read and also asked to enter in ciphertext which is read.
The matrices of the cipher and plaintext are printed to the screen in the form of matrices containing integers so that the user has a graphical representation of how the matrices look.
The get methods are called for eeach variable, a,b,c and d.
The key matrix that is found is then printed to the screen.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 18 of 27

Wednesday, April 13, 2016

3.3. Known plain text attack using matrix multiplication

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 19 of 27

Wednesday, April 13, 2016

3.3.1. Part 1
The readInput method uses the scanner to read the line of string that is keyed in.
This is then converted to uppercase.
A two dimensional array is created read[][]. And the alphabet is created.
The function of the four separate for loops is to convert keyed in string to integers.
The main method begins by reading user input of the plaintext and ciphertext. Then the readInput method is called, which is explained above.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 20 of 27

Wednesday, April 13, 2016

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 21 of 27

Wednesday, April 13, 2016

3.3.2. Part 2
Step 2 finds the determinant of the plaintext P[] using the ad-bc formula.
The getInverse method is called which is to be explained in 3.3.4
The adjudicate is formed using the method {d,-b,-c,a} in the matrix.
The inverse of the plaintext P_i[][] is found by multiplying the inverse of the determninant into each matric quadrant of the adjudicate matrix Pa[].
The multiply matrix is called which takes in the paramneters inverse of plaintext matrix to be multiplied by the ciphertext matrix. The method is explained in 3.3.5
A for loop is used to print out the plaintext matrix to the user so they see how it looks.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 22 of 27

Wednesday, April 13, 2016

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 23 of 27

Wednesday, April 13, 2016

3.3.3. Part 3
A for loop is used to print out the ciphertext matrix also to the user so they see how it looks. As well as the determiniant, inverse matrix, adjudicate matrix which were all used to calculate the key matrix.
Finally the key matrix is printed out to the user.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 24 of 27

Wednesday, April 13, 2016

3.3.4. Part 4
The mod26 method which starts at the bottom of 3.3.3 is used to calculate mod, this is done as simply using %26 in java has the possibility of returning a – negative, but since we are using the alphabet, we want our results to be between positive 1 to 26.
The getInverse method uses the switch statement to create a table of all the multiplicative inverses available in modular 26. If a match is found then the answer is returned else an error message will be printed to the screen notifying the user that a multiplicative inverse cannot be found.
In the case that the user has an alternative pair of 2 plaintext characters that match 2 ciphertext characters, these can be used in place of the pair that causes an error.
The multiply method is explained in the following part 3.3.5

3.3.5. Part 5
The multiply method takes in the parameters of the matrices that it is to multiply. That is the inverse of the plaintext by the ciphertext.
The rows and column sizes of the matrices are declared, to be used in the subsequent for loops.
The first for loops initializes that K [][] array which will hold the values of the key matrix.

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 25 of 27

Wednesday, April 13, 2016
After that follows the nested for loop of three. Working inwards out. The inner for loop executes twice then breaks out to the middle for loop then the inner for loop executes twice again then finally breaks out to the outer for loop and executes… this happens until it has executed a total number of 8 times since this is a 2x2 matrix where the results of multiplication are grouped in 2’s where they summed so as to form four results which fill the four quadrant matrix of the key.

3.4. Known plain text attack using matrix reduction
This method I have only explored mathematically and have not implemented on java. Here is an example of it using question 3 from ISS 334 test 2.

Continue to next page…

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 26 of 27

Wednesday, April 13, 2016

Ndlovu.I

ISS 334 Lab 2 Assignment

Page 27 of 27

Similar Documents

Free Essay

Encryption

...ALGORITHMS OF ENCRYPTION This method will used two different type faces slightly differing in weight (boldness). it will broke up the ciphertext into 5 character groups, each of which would represent one character in his plaintext. Depending on which characters of the group were bold, one could determine the plaintext character using the following table (* stands for a plain character and B for a bold character). A=***** G=**BB* M=*BB** S=B**B* Y=BB*** B=****B H=**BBB N=*BB*B T=B**BB Z=BB**B C=***B* I=*B*** O=*BBB* U=B*B** D=***BB J=*B**B P=*BBBB V=B*B*B E=**B** K=*B*B* Q=B**** W=B*BB* F=**B*B L=*B*BB R=B***B X=B*BBB For example, our some secret message as above : To be or not to be that is the question. Whether ‘tis nobler in the mind to suffer the slings and arrows of outrageous fortune or to take arms against a sea of troubles and by opposing end them? To decipher, we just break the characters into groups of 5 and use the key above to find the plaintext message. M E E T M E B E tobeo rnott obeth atist heque stion Wheth ertis H I N D T H E G noble rinth emind tosuf ferth eslin gsand arrow Y M A F T E R S sofou trage ousfo rtune ortot akear msaga insta C H O ...

Words: 274 - Pages: 2

Premium Essay

Computer Science

...ICT-457 Network Security Sum-2013 HW-9 1. Provide the name of a link to 2 publicly available encryption software tools. http://export.stanford.edu/encrypt_ear.html https://www.cryptanium.com/?gclid=CLbz5Z7KlbgCFcU5QgodrC0APg 2. Explain the difference between symmetric and asymmetric key cryptography. Provide an example where each is used. Pg. 282/283. Those that use the same key to encrypt and decrypt are private (symmetric) key ciphers. Those that use different keys to encrypt and decrypt are public (asymmetric) key ciphers. Symmetric key cryptography cannot secure correspondence until after the two parties exchange keys. Asymmetric key cryptography uses a cipher with two separate keys. One is for encryption and one for decryption. Correspondents do not first have to exchange secret information to communicate securely. With asymmetric key cryptography, an opponent can intercept everything and still not be able to decipher the message. 3. Explain why having an entity’s public key alone does not allow someone to decrypt a message. Pg. 288. Because it is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. 4. Does a hash function ensure integrity or privacy? Explain your answer. Pg.309/310. Hash functions help to detect forgeries. They compute a checksum of a message and then combine it with a cryptographic function so that the result...

Words: 363 - Pages: 2

Free Essay

Information Assurance

...Encryption Standards for Web Browsers Joaquin Javier Brown American Military University For every operating system connected to the internet, there must be a web browser to navigate it. Given the amount of risks posed by viruses and other threats on the internet, measures must be taken to secure one’s computer against these threats. From the standpoint of a user many types of software can be implemented to prevent intrusions and detect them once they’ve occurred. In spite of this there is still an element of risk. To combat this from the side of the programmer, there has been a type of encryption that controls data flow from work stations to the internet. The level of this is encryption across most internet surfing tools is set at 128 bits of encryption. 128 bits of encryption is extremely difficult to crack. It works by utilizing 128 character comprised of ones and zeros. The reason this standard is chosen is that it strikes a balance between complexity and efficiency. It would take longer than the average human lifespan to crack, which essentially means the cracker stumbled upon the correct key within the span of half the possible combinations (Bradford). Though there are stronger types of encryption such as the one time pad, it bears to reason that having to replace the key after every single web page is loaded is inefficient. Though 128 bit encryption is indeed powerful, there are other encryption types available to the public which are even stronger. Advanced Encryption...

Words: 533 - Pages: 3

Free Essay

Zimmerman Telegram

...differently. Even though the Choctaw Codetalkers and Enigma Encryption Device were direct results of the failure of Zimmerman Telegram, the latter was used by the United States during the same period of World War 1. It is important to note here that there was already an encryption method which must have been ignored by the Germans. The One-Time Pad was already in use before the start of World War 1. This encryption method according to Nicholas G. McDonald in his Research Review explained that the one-time pad encryption algorithm was invented in the early 1900's, and has since been proven as unbreakable. The one time algorithm is derived from a previous cipher called Vernam Cipher, named after Gilbert Vernam. The Vernam Cipher was a cipher that combined a message with a key read from a paper tape or pad. The Vernam Cipher was not unbreakable until Joseph Mauborgne recognized that if the key was completely random the cryptanalytic difficultly would be equal to attempting every possible key. Another point worthy of mention is the mistake of sending the entire message in one transaction. As an Intelligence Officer I would have broken the message in shorter telegrams. The chances of intercepting all of the messages would have been very slim. McDonald, N. 2009 Past, Present, and Future Methods of Cryptography and Data Encryption: A Research Review University of...

Words: 276 - Pages: 2

Premium Essay

Network Security

...Commercial IT security solutions / products 1. Executive overview Three commercial IT security products are evaluated to solve the issue of cloud computing service security; including SmartCryptor, Trend Micro SecureCloud, and CloudPassage Halo. These three products were selected because they contain the similar features to protect the hacker or data lose on the cloud network. The features of their products are compared and contrasted to identify the most benefits to the users. I set the selection criteria including cost, features, how to use, security level, and company-fit. The CloudPassage Halo products shows the most powerful products, however, I found many features are duplicated to the network security features that may implemented together with the servers. The cost is considered high. I recommended the Trend Micro SecureCloud with powerful encryption algorithm (AES –standard) and be controlled by policy –driven KEY that can self-adjust to any organisation. The price is reasonable with their features. Moreover, in small company who uses the third-party cloud service, SmartCryptor is chosen as very budget (just $6/months), the use can add another level of security in file encryption and do not worry that others will access your file. To sum up, every products has their own advantage and disadvantage, the way of product selection should consider what we really need, the product feature is solve the problem, and the price should be reasonable. 2. Introduction Cloud...

Words: 2036 - Pages: 9

Premium Essay

Nt1310 Unit 1 Use Case Diagram

...Use Case Diagram: In this use case diagram we are used 2 actors and 5 use cases. Here the data owner and data consumer are the actors. And the remaining are use cases(upload files, attribute based key generation, secret key, master key, access data). How it works means, when the data owner wants to upload a file based on attributes in the form of encrypted data. Then only the file will be uploaded in the outsourced . and data consumer wants to access an outsourced file. The data consumer access some access policies then only he downloads the cipher text and it converts into a plaintext. Class diagram In the class diagram first the data owner wants to upload the file into the outsource decryption. The attributes of data owner are filename, file size, public key, secret key, master key the only the file will be uploaded in the cloud server. And the data owner consists of methods file upload(), file size(), key gen(),...

Words: 613 - Pages: 3

Premium Essay

Nt1330 Unit 3

... Hashing values over single Encryption of a value When it comes to the common username and password verification, the most widely used mechanism for encryption is public and private key. While this level of encryption is good enough for protecting a password it does have a few downsides. 1. The Private key has to be kept confidential at all times if leaked all information is now accessible from any source. 2. A common username and password are contained in the payload of a packet that is encrypted. 3. Once the packet is decrypted, the server will store the credentials or compare them to previous credentials. 4. If a digital certificate is offered, is this a valid certificate or has it been tampered with in any way? With these four downsides identified it could be time to adopt what has been learned by FIDO. The main characteristics of FIDO are that your personal information is never exposed to a server. This is where FIDO has the edge over common login credentials, everyone is kept anonymous. The next stage is to develop a hybrid approach where the user has control of the information that is going to be used for login credentials. This could be done by saving the user’s first name, second name, age, address, country and email into a secure chip that can only be accessed using biometrics. When these values are hashed using SHA-256, the device will save the hashed string in place of the original value submitted. When each of the strings is converted...

Words: 1229 - Pages: 5

Free Essay

It460

...1. At a company, you are responsible for securing a network server utilized primarily for data storage and internal application sharing as well as for securing numerous desktop computers connected to the network. Describe the access control that you would put in place for each and explain why. The more valuable your data, the more effort you should put into securing your firm's network servers. The following areas will help to maintain a server on the network. Firewall: It's important to ensure your server's built-in firewall is running and that you are also using at least one level of network firewall. This may be something as simple as a firewall on the router attached to the server. Placing a server on a network without a firewall is like leaving the front door wide open. Once the firewall is running, the next step is to turn off every port you don't need. If you are not using the port, you don't need it open on the firewall. Hardening: Getting the firewall running is only a start. A critical step is "hardening" the system. This is the process of trimming the machine of every piece of software it doesn't need to complete its assigned task. Every single piece of software is going to have an exploit. You want to reduce the machine down to the necessities to increase the security. This means removing software from the server box. If, for example, the machine is an e-mail server, then delete all office productivity applications, the Web browser, even games and...

Words: 1826 - Pages: 8

Premium Essay

Data Encryption

...1. Which one of the following statements is most correct about data encryption as a method of protecting data? D. It requires careful key Management 2. Explanation (one paragraph with citations). When protecting data with encryption methods, it is essential to properly manage all encryption keys. “Unless the creation, secure storage, handling and deletion of encryption keys is carefully monitored, unauthorized parties can gain access to them and render them worthless”, “ And if a key is lost, the data it protects becomes impossible to retrieve” (securing enterprise, 2010). Therefore, it is mandatory to have the correct security precautions in place to protect encryption keys. It is important to make backups of any encryption keys, and also of any changes that are made, in case originals are lost or data needs to be restored (Magalhaes, 2007). “Ensure that the backups are recoverable and an effective disaster recovery plan that details the recovery of the keys from backup is in place” (Magalhaes, 2007). Also, “storing the decryption keys with the encrypted data is bad practice, for this reason the keys should not be stored on the tapes that contain the encrypted achieved data” (Magalhaes, 2007). Making sure that the encryption keys are only available to approved users, and are kept in well-guarded areas, will help secure them significantly (Magalhaes, 2007). Make sure to Escrow the keys with a trusted third party (Magalhaes, 2007). “Ensure that you have a way of...

Words: 381 - Pages: 2

Premium Essay

Compsec

...Source Address | Destination | Payload | Week 3 The Network Intrusion Detection Engine Network based IDS engines process a stream of time sequential TCP/IP packets to determine a sequence of patterns. Patterns are also known as signatures. Most network signatures are based on the contents of the packets (Packet Content Signature = Payload of a packet). Patterns are also detectable in the header and flow of the traffic, relieving the need for looking into packets. Operational Concept Two primary operational modes 1. Tip off - Look for something new, something not previously classified. 2. Surveillance - Look for patterns from "targets" Forensic work bench * Same tool as in surveillance * Monitor online transactions * track network growth - PCs; mobile devices * System services usage * Identify unexpected changes in the network Benefits of a Network IDS 1. Outsider Deterrence - Make life hard for the hackers 2. Detection - Deterministic; Stochastic 3. Automated Response and Notification - Notifications(email, SNMP, pager, onscreen, audible) Response: Reconfigure router/firewalls; Doing a counter attack is not smart; Lose the connection. Challenges for network based technologies 1. Packet reassembly - Broken packets might not be enough detection. Pattern broken into different packets. 2. High Speed Networks - Flooding and dropping of packets 3. Anti Sniff (Sniffer Detection) - Designed by hackers to detect IDS. Find...

Words: 360 - Pages: 2

Premium Essay

Crypt

...them to unreadable format. 2. Which should be transmitted across the network—the plaintext or the ciphertext? Why or Why not? Cipher text should be transmitted across the network to send the information from point A to point B due to confidentiality. Just in case if it get intercepted so they can’t understand the message. 3. What is a cipher? A cipher is a specific mathematical process used in encryption and decryption. 4. What is a key? It’s a random string of bits and it’s also the other thing that encryption and decryption requires. 5. What must be kept secret in encryption for confidentiality? A key must be kept secret in encryption for confidentiality. As long as the key is secret both parties still have their confidentiality. 6. What is a cryptanalyst? It’s someone who cracks encryption and it could be done by brute force key cracking. But as long as key is longer brute force key cracking will take longer time. 7. Complete the enciphering in Figure 3-2 of your textbook. Cipher text: r w l y p j k n f c s d 8. Which leaves letters unchanged—transposition or substitution ciphers? Transposition ciphers because it moves letter around the messages but letters itself doesn’t change. 9. Which leaves letters in their original positions—transposition or substitution ciphers? Substitution Cipher because in this one character is substituted with other character but order of character doesn’t...

Words: 256 - Pages: 2

Premium Essay

Week 1

...Executive Summary: Patton Fuller community hospital uses the clinical system, which is an integrated suite of healthcare applications that support various patient care like registration and scheduling; clinical orders, chart entries and reviews for physicians, nurses, emergency department personnel, and other care providers; systems for lab technicians, pharmacists, and radiologists; billing systems and insurers; and outpatient systems for the hospital’s outpatient clinics.System is built on a two-tier, client-server architecture, where the client is responsible for the presentation logic and application logic, and the server responsible for the data access logic and data storage. It allows multiple users across the network to share the server’s resources. Since the Hospital has to follow HIPPA compliance and regulation law, Patton-Fuller Community Hospital will need to make sure encryption rules are applied to their system and data is protected. Below is the symmetric and asymmetric encryption method to be used. 1) Public Key 2) Private Key 3) IPsec Public Key (Asymmetric): This encryption method will give pair of keys Message is encrypted using the public key and can only be decrypted by private key. Example RSA, Advanced Encryption Standard (AES) * RSA – It is a public key encryption method * It is a standard encryption method especially used for transmitting data over internet. * It is cost effective solution with hardware based encryption method...

Words: 295 - Pages: 2

Premium Essay

Nt1310 Unit 2 Assignment

...data integrity is guaranteed. Both answers are impeccably worthy. b) “Confidentiality” means that messages are not readable to outcasts. Then again, the attacker can simply modify bits and so forth and hence alter the messages. The receiver can't see this in the general case as ‘data integrity’ is not gave. Note: you could contend that obvious modifications can be recognized by a receiver, e.g. in the event that the approaching plain content is clearly babble. Nonetheless, this obliges that the collector has some former "thought" of what the plain content should resemble. This is surely not the situation for a general transmission of information in binary. A further point in the event that will be that rearranging a solitary bit in the “cipher” may influence numerous bits in the decoded plaintext. Subsequently, the recipient would really need to have an exceptionally exact idea and identification of wrong values in the plaintext. c) The possible ways to detect delays are: - Timestamps: Add timestamps to messages. The timekeepers of sender and beneficiary must be synchronized and the beneficiary needs to have an exceptionally solid thought of system defer between him and the sender. This methodology needs ‘data integrity’. - Sequence numbers and receiver specifically ACKing messages: this can help if the sender does the real location. This methodology needs ‘data integrity’. - Rotating keys: this to some degree complex methodology includes changing the encryption key each few...

Words: 739 - Pages: 3

Premium Essay

Nt1330 Unit 1 Assignment

...Encryption Hierarchy: - A hierarchical encryption is key management infrastructure. Each layer encrypts the layer below it by using a combination of certificates, asymmetric keys, and symmetric keys. Asymmetric keys and symmetric keys can be stored outside of SQL Server in an Extensible Key Management (EKM) module. The following illustration shows that each layer of the encryption hierarchy encrypts the layer beneath it, and displays the most en configurations. The access to the start of the hierarchy is usually protected by a password. Symmetric encryption policy: - There are several ways to include hidden content in a message. In the beginning of cryptology, using invisible ink was a common method. That style of actually hiding is still in use today and called steganography. However, the term encryption today usually refers to the use of an algorithm that is transforming a readable message into an unreadable one. To decrypt that unreadable message you need to know two things. The algorithm used to scramble the message and the key. While there are algorithms that do not require a key, they are not considered secure anymore and their use should be avoided. In fact, any cryptographic algorithm that requires keeping the algorithm itself secret is considered weak and should not be used. The best way to identify a strong cryptographic algorithm is to take a published algorithm and look at how many cryptologists have tried to break it unsuccessfully. If the algorithm itself is known...

Words: 656 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1

...whether they are transformed in the same way (e.g., add or remove a randomly generated vector) or shuffled with the same order. To achieve this goal, we introduce a novel Blind Vector Transformation technique, under which each participant con- tributes a part of the vector transformation while any single one of the parties cannot recover the original vectors from the final transformation result. Therefore, with blind vector transformation, we could enable a party to match its interests with another's profile but, at the same time, to keep the interests as well as the profiles private.Matching protocol is based on paillier’s homomorphic encryption. Homomorphic encryption is a form of encryption that allows computations to be carried out on cipher text, thus generating an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. This is sometimes a desirable feature in modern communication system architectures. Homomorphic encryption would allow the chaining together of different services without exposing the data to each of those services. Homomorphic encryption schemes are malleable by design. This enables their use in cloud computing environment for ensuring the confidentiality of processed data. In addition the homomorphic property of various cryptosystems can be used to create many other secure systems, for example secure voting systems, collision-resistant hash functions, private information retrieval schemes, and many more. There...

Words: 1138 - Pages: 5