The document discusses source coding, cryptography, and their applications. It explains that source coding maps information sources to sequences of symbols like bits while minimizing data and redundancy. Cryptography ensures secure communication by encrypting messages so only the intended recipient can read them. Popular programming languages for cryptography include Python, C++, and Ruby. Cryptographic algorithms are mainly symmetric-key, hash functions, or asymmetric-key. Applications include encrypting emails, files, ATM withdrawals, and more. Overall the document provides an overview of source coding, cryptography concepts, related programming, and real-world uses.
2. Source coding
Source coding represents a mapping from the
symbols deriving information source for the
sequence of the symbols of alphabet, generally
bits where source symbols could be recovered
from binary bits or taken from distortion.
3. Target of Source Coding
The target is to show
data in an accurate
way with some bits for
redundancy from
a source which will
be wiped out.
4. Sequence of C Programming
Statements
As the programmer creates the sequence in
statements of C programming language in the
Notepad of Windows, for instance, preserving the
sequence in the form of text file, having source
code. The object code and Source code indicate
"after" and "before" versions in the combined
program of computer.
5. Object Code
Source
code represents a
number of human-
readable instructions
where the
programmer had been
writing in program at
the time of program
development.
The source code will
be carried out via
compiler to change
them into
6. Outcome of Leakage of Source Code
When the competitor obtains the source code,
they will find out and take away the ideas. When
there is leak in source code, it is disastrous. As
the disaster becomes big, this will limit or resist
that company from creating further games.
7. Consequence of Stealing Source
Code
It is really bad if the
source code is stolen.
The reason is that the
owner had lost control
and spending
significant money and
time creating. The
game should be
updated by spending
time and money. This
will prevent those
using the
leaked source
code and they will not
be able to cheat.
8. Coding Theory and Cryptography
The Coding theory includes the training on
compression codes and it will assist us in sending
messages in a cheap way. There is error in
rectifying codes and it is important to guarantee
that the messages will be legible due to the
errors. The Cryptography ensures messages are
not readable other than intended recipient.
9. Application of Cryptography
Cryptography offers
communication
security for third-
parties who are
malicious. They are
identified in the form
of adversaries. The
encryption utilizes the
algorithm along with
the secret to change
the input in the form
of plaintext into the
output in encrypted
form also known as
ciphertext.
10. Cryptography in Our Life
The cryptography includes number of situations
and there is an application of
cryptography helping provision for guaranteed
service. There is withdrawal of cash from ATM,
email, Pay TV, and storage of file with the help of
freeware named Pretty Good Privacy, web
browsing with security, and application of GSM
mobile phone.
11. Cryptography Programming
Language
There are a number of
programming
languages in carrying
out cryptography.
These languages
are Golang , Python
, C++ and Ruby . You
will be able to
understand the
languages of
programming for the
cryptography.
12. Cryptographic Algorithms: Three
Major Forms
We have three classes of cryptographic
algorithms, and the criteria of cryptographic keys
utilized are as follows:
Symmetric-key algorithms
Hash functions
Asymmetric-key algorithms
Hash Functions
13. Application of Cryptography in
Python
The way of applying
cryptography in Python
are as follows:
Importing Fernet.
Creating an
encryption key utilized in
decryption and encryption.
Conversion of string to
byte string, and they are
going to be encrypted.
Instance of Fernet class
having an encryption key.
Finally, encrypt a
particular string having
Fernet instance.