SlideShare a Scribd company logo
Edmond Wong Sing Huat B031110038
Khor Yong Jian B031110173
Goh Zong Wei B031110071
Fairus Binti Aziz B031110326
 Abstract Syntax Notation (ASN.1) is an ISO
standard that addresses the issue of
representing, encoding, transmitting, and
decoding data structures. It consists of two
parts:
1. An abstract syntax that describes data structures in
an unambiguous way. Use “ integers”, “character
strings”, and “structures” rather than bits and bytes.
2. A transfer syntax that describes the bit stream
encoding of ASN.1 data objects.
 The main reasons for the success of ASN.1 is that
it is associated with several standardized
encoding rules such as:
◦ Basic Encoding Rules (BER) - X.209
◦ Canonical Encoding Rules (CER)
◦ Distinguished Encoding Rules (DER)
◦ Packed Encoding Rules (PER) and
◦ XER Encoding Rules (XER).
 These encoding rules describe how the values
defined in ASN.1 should be encoded for
transmission, regardless of machine,
programming language, or how it is represented in
an application program.
Example of ASN.1’S abstract syntax:
Student ::= SEQUENCE {
name [0] IMPLICIT OCTET STRING OPTIONAL,
grad [1] IMPLICIT BOOLEAN OPTIONAL DEFAULT
FALSE,
gpa [2] IMPLICIT REAL OPTIONAL,
id [3] IMPLICIT INTEGER,
bday [4] IMPLICIT OCTET STRING OPTIONAL
}
Though initially used for specifying the
email protocol within the Open Systems
Interconnection environment, ASN.1 has
since then been adopted for a wide range
of other applications, as in network
management, secure email, cellular
telephony, air traffic control, and voice and
video over the Internet.
Though initially used for specifying the
email protocol within the Open Systems
Interconnection environment, ASN.1 has
since then been adopted for a wide range
of other applications, as in network
management, secure email, cellular
telephony, air traffic control, and voice and
video over the Internet.
 Sun Microsystems's External Data
Representation (XDR) is much simpler than
ASN.1, but less powerful. For instance:
1. XDR uses implicit typing. Communicating peers
must know the type of any exchanged data. In
contrast, ASN.1 uses explicit typing; it includes
type information as part of the transfer syntax.
2. In XDR, all data is transferred in units of 4 bytes.
Numbers are transferred in network order, most
significant byte first.
4 bytes of XDR message:
3. Strings consist of a 4 byte length, followed by
the data (and perhaps padding in the last byte).
4. Defined types include: integer, enumeration,
Boolean, floating point, fixed length array,
structures, plus others.
One advantage that XDR has over ASN.1
is that current implementations of ASN.1
execute significantly slower than XDR.
" The message “£100 is about !150” could
become
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset=ISO-8859-
15
MIME-Version: 1.0
=A3100 is about =A4150
or
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset=ISO-8859-
15
MIME-Version: 1.0
ozEwMCBpcyBhYm91dCCkMTUwCg=49
Reduces the number of bits contained in
the information.
Sometimes programs need to send more
data in a timely fashion than the bandwidth
of the network supports.
Need to compress the data at the sender
and decompress it at the receiver.
In terms of storage, the capacity of a
storage device can be effectively increased
with methods that compresses a body of
data.
The bandwidth of a digital communication
link can be effectively increased by
compressing data at the sending end and
decompressing data at the receiving end.
Lossless Compression – data is
compressed and can be uncompressed
without loss of information. These are
referred to as bit-preserving or reversible
compression systems.
Lossy Compression – aim to obtain the
best possible fidelity for a given bit-rate or
minimizing the bit-rate to achieve a given
fidelity measure. Most suited to video and
audio compression techniques
Lossless
- Image quality is not reduced.
Use in: artificial images that contain sharp-
edged lines such as technical drawings,
textual graphics, comics, maps or logos.
 Lossy
- reduces image quality. Cannot get the
original image back & lose some
information.
Use in: natural images such as photos of
landscapes
 Lossless - allows one to preserve an exact
copy of one's audio files
Usage: For archival purposes, editing,
audio quality.
 Lossy - irreversible changes , achieves far
greater compression, use psychoacoustics
to recognize that not all data in an audio
stream can be perceived by the human
auditory system.
Usage: distribution of streaming audio, or
interactive applications
• Start by encoding the first frame using a
still image compression method.
• It should then encode each successive
frame by identifying the differences
between the frame and its predecessor,
and encoding these differences. If the
frame is very different from its
predecessor it should be coded
independently of any other frame.
In the video compression literature, a
frame that is coded using its predecessor
is called inter frame (or just inter), while a
frame that is coded independently is called
intra frame (or just intra).
• To carry sensitive information, a system
must be able to assure privacy.
• One way to safeguard data from attacks
is encrypting the data.
• Encryption – sender transform original
information (plaintext) to another form
(ciphertext) by a function that is
parameterized by a key.
• Decryption – reverses the original
process to transform the message
(ciphertext) back to its original form
(plaintext).
Plaintext Plaintext
Ciphertext
Symmetric Keys – use same key to
encrypt and decrypt a message.
Asymmetric Keys -2 keys are needed
(public key and private key); 1 key to
encrypt, another key to decrypt and vice
versa.
Protection Description
Confidentiality Allow only authorized users to access
information.
Authentication Verify who the sender was and trust
the sender is who they claim to be.
Integrity Trust the information has not been
altered
No repudiation Ensure that the sender or receiver
cannot deny that a message was sent
or received.
Access Control Restrict availability to information.

More Related Content

Viewers also liked

11 oct 2014 maharastra crimes
11 oct 2014 maharastra crimes11 oct 2014 maharastra crimes
11 oct 2014 maharastra crimessiraj chaudhary
 
Omnifile slideshare
Omnifile slideshareOmnifile slideshare
Omnifile slideshare
mickokeefe2
 
Phu quoc island 4 days
Phu quoc island 4 daysPhu quoc island 4 days
30 august 2014 maharashtra crimes
30 august 2014 maharashtra crimes30 august 2014 maharashtra crimes
30 august 2014 maharashtra crimessiraj chaudhary
 
Нови 5 мерки од образованието
Нови 5 мерки од образованиетоНови 5 мерки од образованието
Нови 5 мерки од образованиетоSDSMshare
 
Zermatt and the Matterhorn - A Wintery Destination in Switzerland
Zermatt and the Matterhorn - A Wintery Destination in SwitzerlandZermatt and the Matterhorn - A Wintery Destination in Switzerland
Zermatt and the Matterhorn - A Wintery Destination in SwitzerlandTerry Pigott
 
Synergy, Blacked Out
Synergy, Blacked OutSynergy, Blacked Out
Synergy, Blacked Out
BlurredMotionPictures
 
My best vacations
My best vacationsMy best vacations
My best vacationsSandii Al
 
20 sept 2014 maharashtra crimes
20 sept 2014 maharashtra crimes20 sept 2014 maharashtra crimes
20 sept 2014 maharashtra crimessiraj chaudhary
 
Економско-социјална раслоеност на граѓаните
Економско-социјална раслоеност на граѓаните Економско-социјална раслоеност на граѓаните
Економско-социјална раслоеност на граѓаните SDSMshare
 
April
AprilApril
Casting Day Profile Shots
Casting Day Profile Shots Casting Day Profile Shots
Casting Day Profile Shots
BlurredMotionPictures
 
Старая Русса
Старая РуссаСтарая Русса
Старая Русса
darin-t
 
обзор технических решений в области энергосбережения
обзор технических решений в области энергосбереженияобзор технических решений в области энергосбережения
обзор технических решений в области энергосбереженияdarin-t
 

Viewers also liked (17)

11 oct 2014 maharastra crimes
11 oct 2014 maharastra crimes11 oct 2014 maharastra crimes
11 oct 2014 maharastra crimes
 
Omnifile slideshare
Omnifile slideshareOmnifile slideshare
Omnifile slideshare
 
Maharashtra crimes
Maharashtra crimesMaharashtra crimes
Maharashtra crimes
 
Phu quoc island 4 days
Phu quoc island 4 daysPhu quoc island 4 days
Phu quoc island 4 days
 
30 august 2014 maharashtra crimes
30 august 2014 maharashtra crimes30 august 2014 maharashtra crimes
30 august 2014 maharashtra crimes
 
Нови 5 мерки од образованието
Нови 5 мерки од образованиетоНови 5 мерки од образованието
Нови 5 мерки од образованието
 
Zermatt and the Matterhorn - A Wintery Destination in Switzerland
Zermatt and the Matterhorn - A Wintery Destination in SwitzerlandZermatt and the Matterhorn - A Wintery Destination in Switzerland
Zermatt and the Matterhorn - A Wintery Destination in Switzerland
 
Synergy, Blacked Out
Synergy, Blacked OutSynergy, Blacked Out
Synergy, Blacked Out
 
29 march 2013
29 march 201329 march 2013
29 march 2013
 
Maharashtra crimes
Maharashtra crimesMaharashtra crimes
Maharashtra crimes
 
My best vacations
My best vacationsMy best vacations
My best vacations
 
20 sept 2014 maharashtra crimes
20 sept 2014 maharashtra crimes20 sept 2014 maharashtra crimes
20 sept 2014 maharashtra crimes
 
Економско-социјална раслоеност на граѓаните
Економско-социјална раслоеност на граѓаните Економско-социјална раслоеност на граѓаните
Економско-социјална раслоеност на граѓаните
 
April
AprilApril
April
 
Casting Day Profile Shots
Casting Day Profile Shots Casting Day Profile Shots
Casting Day Profile Shots
 
Старая Русса
Старая РуссаСтарая Русса
Старая Русса
 
обзор технических решений в области энергосбережения
обзор технических решений в области энергосбереженияобзор технических решений в области энергосбережения
обзор технических решений в области энергосбережения
 

Similar to Chapter 5

Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
Serious_SamSoul
 
Serialization
SerializationSerialization
Serialization
Sabarinath Gnanasekar
 
Data representation
Data representationData representation
Data representationChingTing
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
Luisa Francisco
 
78247 pp7[1]
78247 pp7[1]78247 pp7[1]
78247 pp7[1]
Arthur Sanchez
 
B03302007012
B03302007012B03302007012
B03302007012
theijes
 
ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VA...
ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VA...ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VA...
ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VA...
IJNSA Journal
 
Analysis and comparison of symmetric key
Analysis and comparison of symmetric keyAnalysis and comparison of symmetric key
Analysis and comparison of symmetric key
IJNSA Journal
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com
 
CS-324-6-2.pdf
CS-324-6-2.pdfCS-324-6-2.pdf
CS-324-6-2.pdf
Rizulthakur2
 
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
IRJET Journal
 
Fundamental of Information Technology
Fundamental of Information TechnologyFundamental of Information Technology
Fundamental of Information Technology
Sundar B N
 
data compression technique
data compression techniquedata compression technique
data compression technique
CHINMOY PAUL
 
Xdr ppt
Xdr pptXdr ppt
Xdr ppt
Nidhi Thakkar
 
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...
csandit
 
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...
csandit
 

Similar to Chapter 5 (20)

Data representation
Data representationData representation
Data representation
 
Data representation
Data representationData representation
Data representation
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Serialization
SerializationSerialization
Serialization
 
Data representation
Data representationData representation
Data representation
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
 
78247 pp7[1]
78247 pp7[1]78247 pp7[1]
78247 pp7[1]
 
B03302007012
B03302007012B03302007012
B03302007012
 
ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VA...
ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VA...ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VA...
ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VA...
 
Analysis and comparison of symmetric key
Analysis and comparison of symmetric keyAnalysis and comparison of symmetric key
Analysis and comparison of symmetric key
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 
CS-324-6-2.pdf
CS-324-6-2.pdfCS-324-6-2.pdf
CS-324-6-2.pdf
 
Ijrdtvlis11 140006
Ijrdtvlis11 140006Ijrdtvlis11 140006
Ijrdtvlis11 140006
 
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
 
Fundamental of Information Technology
Fundamental of Information TechnologyFundamental of Information Technology
Fundamental of Information Technology
 
data compression technique
data compression techniquedata compression technique
data compression technique
 
Xdr ppt
Xdr pptXdr ppt
Xdr ppt
 
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...
 
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Chapter 5

  • 1. Edmond Wong Sing Huat B031110038 Khor Yong Jian B031110173 Goh Zong Wei B031110071 Fairus Binti Aziz B031110326
  • 2.
  • 3.  Abstract Syntax Notation (ASN.1) is an ISO standard that addresses the issue of representing, encoding, transmitting, and decoding data structures. It consists of two parts: 1. An abstract syntax that describes data structures in an unambiguous way. Use “ integers”, “character strings”, and “structures” rather than bits and bytes. 2. A transfer syntax that describes the bit stream encoding of ASN.1 data objects.
  • 4.  The main reasons for the success of ASN.1 is that it is associated with several standardized encoding rules such as: ◦ Basic Encoding Rules (BER) - X.209 ◦ Canonical Encoding Rules (CER) ◦ Distinguished Encoding Rules (DER) ◦ Packed Encoding Rules (PER) and ◦ XER Encoding Rules (XER).  These encoding rules describe how the values defined in ASN.1 should be encoded for transmission, regardless of machine, programming language, or how it is represented in an application program.
  • 5. Example of ASN.1’S abstract syntax: Student ::= SEQUENCE { name [0] IMPLICIT OCTET STRING OPTIONAL, grad [1] IMPLICIT BOOLEAN OPTIONAL DEFAULT FALSE, gpa [2] IMPLICIT REAL OPTIONAL, id [3] IMPLICIT INTEGER, bday [4] IMPLICIT OCTET STRING OPTIONAL }
  • 6. Though initially used for specifying the email protocol within the Open Systems Interconnection environment, ASN.1 has since then been adopted for a wide range of other applications, as in network management, secure email, cellular telephony, air traffic control, and voice and video over the Internet.
  • 7. Though initially used for specifying the email protocol within the Open Systems Interconnection environment, ASN.1 has since then been adopted for a wide range of other applications, as in network management, secure email, cellular telephony, air traffic control, and voice and video over the Internet.
  • 8.  Sun Microsystems's External Data Representation (XDR) is much simpler than ASN.1, but less powerful. For instance: 1. XDR uses implicit typing. Communicating peers must know the type of any exchanged data. In contrast, ASN.1 uses explicit typing; it includes type information as part of the transfer syntax. 2. In XDR, all data is transferred in units of 4 bytes. Numbers are transferred in network order, most significant byte first.
  • 9. 4 bytes of XDR message:
  • 10. 3. Strings consist of a 4 byte length, followed by the data (and perhaps padding in the last byte). 4. Defined types include: integer, enumeration, Boolean, floating point, fixed length array, structures, plus others. One advantage that XDR has over ASN.1 is that current implementations of ASN.1 execute significantly slower than XDR.
  • 11. " The message “£100 is about !150” could become Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=ISO-8859- 15 MIME-Version: 1.0 =A3100 is about =A4150
  • 12. or Content-Transfer-Encoding: base64 Content-Type: text/plain; charset=ISO-8859- 15 MIME-Version: 1.0 ozEwMCBpcyBhYm91dCCkMTUwCg=49
  • 13.
  • 14. Reduces the number of bits contained in the information. Sometimes programs need to send more data in a timely fashion than the bandwidth of the network supports. Need to compress the data at the sender and decompress it at the receiver.
  • 15. In terms of storage, the capacity of a storage device can be effectively increased with methods that compresses a body of data. The bandwidth of a digital communication link can be effectively increased by compressing data at the sending end and decompressing data at the receiving end.
  • 16. Lossless Compression – data is compressed and can be uncompressed without loss of information. These are referred to as bit-preserving or reversible compression systems. Lossy Compression – aim to obtain the best possible fidelity for a given bit-rate or minimizing the bit-rate to achieve a given fidelity measure. Most suited to video and audio compression techniques
  • 17. Lossless - Image quality is not reduced. Use in: artificial images that contain sharp- edged lines such as technical drawings, textual graphics, comics, maps or logos.
  • 18.  Lossy - reduces image quality. Cannot get the original image back & lose some information. Use in: natural images such as photos of landscapes
  • 19.  Lossless - allows one to preserve an exact copy of one's audio files Usage: For archival purposes, editing, audio quality.
  • 20.  Lossy - irreversible changes , achieves far greater compression, use psychoacoustics to recognize that not all data in an audio stream can be perceived by the human auditory system. Usage: distribution of streaming audio, or interactive applications
  • 21. • Start by encoding the first frame using a still image compression method. • It should then encode each successive frame by identifying the differences between the frame and its predecessor, and encoding these differences. If the frame is very different from its predecessor it should be coded independently of any other frame.
  • 22. In the video compression literature, a frame that is coded using its predecessor is called inter frame (or just inter), while a frame that is coded independently is called intra frame (or just intra).
  • 23.
  • 24. • To carry sensitive information, a system must be able to assure privacy. • One way to safeguard data from attacks is encrypting the data.
  • 25. • Encryption – sender transform original information (plaintext) to another form (ciphertext) by a function that is parameterized by a key. • Decryption – reverses the original process to transform the message (ciphertext) back to its original form (plaintext).
  • 27. Symmetric Keys – use same key to encrypt and decrypt a message.
  • 28. Asymmetric Keys -2 keys are needed (public key and private key); 1 key to encrypt, another key to decrypt and vice versa.
  • 29. Protection Description Confidentiality Allow only authorized users to access information. Authentication Verify who the sender was and trust the sender is who they claim to be. Integrity Trust the information has not been altered No repudiation Ensure that the sender or receiver cannot deny that a message was sent or received. Access Control Restrict availability to information.