Cryptography involves secret writing and encrypting messages so that only authorized parties can read them. It uses algorithms and keys to encrypt plaintext into ciphertext. Cryptanalysis involves breaking ciphers, while cryptography is designing ciphers. Cryptology encompasses both cryptography and cryptanalysis. Common encryption models involve plaintext being encrypted into ciphertext using a key, which is then transmitted and decrypted by the intended receiver using the same key.
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
Block ciphers like DES encrypt data in blocks and are based on the Feistel cipher structure. DES encrypts 64-bit blocks using a 56-bit key and 16 rounds of encryption. Modern cryptanalysis techniques like differential and linear cryptanalysis use statistical analysis to reveal weaknesses in block ciphers, though DES remains relatively secure against these attacks. Careful design of block ciphers, including aspects like non-linear substitution boxes and complex key scheduling, aims to provide security against cryptanalysis.
DES was developed as a standard for communications and data protection by an IBM research team in response to a request from the National Bureau of Standards (now called NIST). DES uses the techniques of confusion and diffusion achieved through numerous permutations and the XOR operation. The basic DES process encrypts a 64-bit block using a 56-bit key over 16 complex rounds consisting of permutations and key-dependent calculations. Triple DES was developed as a more secure version of DES.
This document provides an overview of cryptography. It defines cryptography as the science of secret writing and discusses its use in applications like ATM cards and passwords. It describes the basic components of cryptography including plaintext, ciphertext, ciphers, keys, and algorithms. It differentiates between symmetric and asymmetric key cryptography. It provides examples of traditional and modern ciphers, including DES, AES, and RSA algorithms. In conclusion, it states that cryptography techniques help maintain data security, privacy, and integrity.
Today in modern era of internet we share some sensitive data to information transmission. but need to ensure security. So we focus on Cryptography modern technique for secure transmission of information over network.
This document provides an overview of number theory and attacks on the RSA cryptosystem. It begins with an introduction to modular arithmetic and congruence relations. It then discusses the Euclidean algorithm, modular inverses, and operations in modular arithmetic. The document explains Diffie-Hellman key exchange, RSA, and the mathematics behind RSA such as Euler's totient function and Fermat's little theorem. It concludes by discussing some attacks on RSA, including factorizing the RSA modulus n to recover the private key.
Cryptography involves secret writing and encrypting messages so that only authorized parties can read them. It uses algorithms and keys to encrypt plaintext into ciphertext. Cryptanalysis involves breaking ciphers, while cryptography is designing ciphers. Cryptology encompasses both cryptography and cryptanalysis. Common encryption models involve plaintext being encrypted into ciphertext using a key, which is then transmitted and decrypted by the intended receiver using the same key.
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
Block ciphers like DES encrypt data in blocks and are based on the Feistel cipher structure. DES encrypts 64-bit blocks using a 56-bit key and 16 rounds of encryption. Modern cryptanalysis techniques like differential and linear cryptanalysis use statistical analysis to reveal weaknesses in block ciphers, though DES remains relatively secure against these attacks. Careful design of block ciphers, including aspects like non-linear substitution boxes and complex key scheduling, aims to provide security against cryptanalysis.
DES was developed as a standard for communications and data protection by an IBM research team in response to a request from the National Bureau of Standards (now called NIST). DES uses the techniques of confusion and diffusion achieved through numerous permutations and the XOR operation. The basic DES process encrypts a 64-bit block using a 56-bit key over 16 complex rounds consisting of permutations and key-dependent calculations. Triple DES was developed as a more secure version of DES.
This document provides an overview of cryptography. It defines cryptography as the science of secret writing and discusses its use in applications like ATM cards and passwords. It describes the basic components of cryptography including plaintext, ciphertext, ciphers, keys, and algorithms. It differentiates between symmetric and asymmetric key cryptography. It provides examples of traditional and modern ciphers, including DES, AES, and RSA algorithms. In conclusion, it states that cryptography techniques help maintain data security, privacy, and integrity.
Today in modern era of internet we share some sensitive data to information transmission. but need to ensure security. So we focus on Cryptography modern technique for secure transmission of information over network.
This document provides an overview of number theory and attacks on the RSA cryptosystem. It begins with an introduction to modular arithmetic and congruence relations. It then discusses the Euclidean algorithm, modular inverses, and operations in modular arithmetic. The document explains Diffie-Hellman key exchange, RSA, and the mathematics behind RSA such as Euler's totient function and Fermat's little theorem. It concludes by discussing some attacks on RSA, including factorizing the RSA modulus n to recover the private key.
This document summarizes symmetric and asymmetric cryptography. Symmetric cryptography involves both parties agreeing on an encryption algorithm and key beforehand to encrypt and decrypt messages. Asymmetric cryptography uses public and private key pairs, where the public key encrypts messages and the private key decrypts them, allowing encryption without pre-sharing keys. It also discusses digital signatures, where messages are signed with a private key and verified with the corresponding public key. Common attacks on public-key cryptography like man-in-the-middle attacks are addressed. The document is intended for a computer science course on cryptography fundamentals and security mechanisms.
- DES (Data Encryption Standard) is a symmetric block cipher algorithm that encrypts data in 64-bit blocks using a 56-bit key. It was the first encryption standard adopted by the U.S. government for protecting sensitive unclassified federal government information.
- DES works by performing 16 rounds of complex substitutions and permutations on each data block, encrypting it using the key. It has various modes of operation like ECB, CBC, CFB, OFB, and CTR that specify how it operates on data.
- In 1998, DES was broken using a brute force attack by the Electronic Frontier Foundation in just 3 days, showing the need for stronger algorithms like AES which replaced DES as the encryption standard
This document provides an overview of cryptography. It begins with basic definitions related to cryptography and a brief history of its use from ancient times to modern ciphers. It then describes different types of ciphers like stream ciphers, block ciphers, and public key cryptosystems. It also covers cryptography methods like symmetric and asymmetric algorithms. Common types of attacks on cryptosystems like brute force, chosen ciphertext, and frequency analysis are also discussed.
This document provides an overview of the Advanced Encryption Standard (AES). It discusses how AES was created through an encryption algorithm competition organized by the National Institute of Standards and Technology to replace the aging Triple DES standard. AES is a symmetric block cipher that encrypts 128-bit blocks using 128, 192, or 256-bit keys and 10, 12, or 14 rounds respectively. The AES encryption process takes the plaintext through several stages - substitution, shifting rows, mixing columns, and adding the round key - with the inverse being applied for decryption. Some potential security attacks on AES are also mentioned, such as related-key and XSL attacks, but it remains secure if implemented correctly.
This document provides an overview of cryptography and its applications. It discusses the history of cryptography beginning in ancient Egypt. It defines basic cryptography terminology like plaintext, ciphertext, cipher, key, encryption, decryption, cryptography, and cryptanalysis. It describes classical ciphers like the Caesar cipher and substitution ciphers. It also discusses cryptanalysis techniques, transposition ciphers, modern symmetric ciphers, public key cryptography including RSA, key distribution methods, and hybrid encryption.
This document discusses message authentication techniques including message encryption, message authentication codes (MACs), and hash functions. It describes how each technique can be used to authenticate messages and protect against various security threats. It also covers how symmetric and asymmetric encryption can provide authentication when used with MACs or digital signatures. Specific MAC and hash functions are examined like HMAC, SHA-1, and SHA-2. X.509 is introduced as a standard for digital certificates.
One-Time Pad (OTP) encryption uses truly random keys that are only used once to encrypt plaintext. If the keys are random, only used once, and securely transferred and destroyed, then OTP provides perfect secrecy since the ciphertext reveals no information about the plaintext. However, achieving these strict conditions is difficult in practice, requiring solutions for secure key generation, transfer, storage and destruction. While OTP provides unbreakable encryption theoretically, more practical algorithms are needed to address its limitations.
This Presentation Elliptical Curve Cryptography give a brief explain about this topic, it will use to enrich your knowledge on this topic. Use this ppt for your reference purpose and if you have any queries you'll ask questions.
HASH FUNCTIONS AND DIGITAL SIGNATURES
Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC –MD5 – SHA – HMAC – CMAC – Digital signature and authentication protocols – DSS – EI Gamal – Schnorr.
This document provides an overview of cryptography concepts including symmetric and asymmetric key algorithms, cryptographic hashes, and tools for cryptanalysis. It defines common terminology like plaintext, ciphertext, encryption, and decryption. Symmetric algorithms discussed include the Vernam cipher, A5/1, DES, AES, and RC4. Asymmetric algorithms covered are RSA and Diffie-Hellman key exchange. Cryptographic hashes like MD5 and SHA-1 are also summarized along with resources for cryptanalysis.
This document provides an overview of cryptography concepts including encryption, decryption, symmetric and asymmetric cryptosystems. It discusses X.509 certificates, self-signed certificates, and why certificates need to be signed by a Certificate Authority. It also covers RSA and AES cryptosystems, OpenSSL functions for X509, EVP and RSA, and hybrid cryptosystems.
3. The Data Encryption Standard (DES) and AlternativesSam Bowne
A lecture for a college course -- CNIT 140: Cryptography for Computer Networks at City College San Francisco
Based on "Understanding Cryptography: A Textbook for Students and Practitioners" by Christof Paar, Jan Pelzl, and Bart Preneel, ISBN: 3642041000
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_F17.shtml
Cryptanalysis is the study of encrypted messages to understand encryption systems and find weaknesses. Cryptanalysts aim to decrypt messages without knowing the encryption key or algorithm. Their research helps cryptographers strengthen algorithms. Cryptanalysts uncover design flaws that can reduce the number of keys tested on a message. Their work is used by governments and companies to test security products.
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherMona Rajput
The document provides information on various historical cryptosystems and ciphers, beginning with a brief overview of symmetric and asymmetric key encryption. It then discusses several manual ciphers such as the Caesar cipher, simple substitution cipher, Playfair cipher, and Vigenere cipher. The Caesar cipher performs monoalphabetic substitution by shifting letters of the alphabet. The simple substitution cipher and Playfair cipher improve security by using permutation or paired letter substitution instead of just shifting. The Vigenere cipher further enhances security by applying multiple Caesar shifts using a keyword. The document also covers the one-time pad cipher and its information theoretic security if the pad is truly random and never reused.
Block ciphers & public key cryptographyRAMPRAKASHT1
This document provides an overview of block ciphers and public key cryptography. It discusses the principles of block ciphers, including block cipher modes of operation. Popular block ciphers like DES, AES, Triple DES and Blowfish are described. The document also covers public key cryptography principles and algorithms like RSA and Diffie-Hellman key exchange. It provides details on elliptic curve cryptography and the arithmetic behind it.
This document discusses data encryption methods. It defines encryption as hiding information so it can only be accessed by those with the key. There are two main types: symmetric encryption uses one key, while asymmetric encryption uses two different but related keys. Encryption works by scrambling data using techniques like transposition, which rearranges the order, and substitution, which replaces parts with other values. The document specifically describes the Data Encryption Standard (DES) algorithm and the public key cryptosystem, which introduced the innovative approach of using different keys for encryption and decryption.
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
(1) Cryptography and network security are important topics that involve terminology like plaintext, ciphertext, encryption, decryption, and cryptanalysis. (2) The document discusses principles of security like confidentiality, integrity, authentication, non-repudiation, and availability and how attacks can compromise them. (3) It also covers security services, mechanisms, and models in the OSI standard to enhance security and counter different types of security attacks.
The document discusses the Advanced Encryption Standard (AES). It describes AES as a symmetric block cipher selected by the U.S. National Institute of Standards and Technology (NIST) in 2001 to replace the Data Encryption Standard (DES). AES uses a variable block size of 128 bits and a key size of 128, 192, or 256 bits. The cipher operates on a 4x4 column-byte state and has 10, 12, or 14 rounds depending on the key size. Each round consists of byte substitution, shift rows, mix columns, and add round key transformations.
1. The document discusses the Advanced Encryption Standard (AES) cipher, which was selected from the Rijndael algorithm in 2000 to replace the Data Encryption Standard (DES).
2. AES has a block size of 128 bits, with key sizes of 128, 192, or 256 bits. It operates on a 4x4 column-byte state and consists of 10-14 rounds depending on the key size.
3. Each round performs byte substitution, shifting rows of the state, mixing columns using matrix multiplication, and adding the round key using XOR. The key is expanded using XOR and S-boxes to generate round keys.
This document summarizes symmetric and asymmetric cryptography. Symmetric cryptography involves both parties agreeing on an encryption algorithm and key beforehand to encrypt and decrypt messages. Asymmetric cryptography uses public and private key pairs, where the public key encrypts messages and the private key decrypts them, allowing encryption without pre-sharing keys. It also discusses digital signatures, where messages are signed with a private key and verified with the corresponding public key. Common attacks on public-key cryptography like man-in-the-middle attacks are addressed. The document is intended for a computer science course on cryptography fundamentals and security mechanisms.
- DES (Data Encryption Standard) is a symmetric block cipher algorithm that encrypts data in 64-bit blocks using a 56-bit key. It was the first encryption standard adopted by the U.S. government for protecting sensitive unclassified federal government information.
- DES works by performing 16 rounds of complex substitutions and permutations on each data block, encrypting it using the key. It has various modes of operation like ECB, CBC, CFB, OFB, and CTR that specify how it operates on data.
- In 1998, DES was broken using a brute force attack by the Electronic Frontier Foundation in just 3 days, showing the need for stronger algorithms like AES which replaced DES as the encryption standard
This document provides an overview of cryptography. It begins with basic definitions related to cryptography and a brief history of its use from ancient times to modern ciphers. It then describes different types of ciphers like stream ciphers, block ciphers, and public key cryptosystems. It also covers cryptography methods like symmetric and asymmetric algorithms. Common types of attacks on cryptosystems like brute force, chosen ciphertext, and frequency analysis are also discussed.
This document provides an overview of the Advanced Encryption Standard (AES). It discusses how AES was created through an encryption algorithm competition organized by the National Institute of Standards and Technology to replace the aging Triple DES standard. AES is a symmetric block cipher that encrypts 128-bit blocks using 128, 192, or 256-bit keys and 10, 12, or 14 rounds respectively. The AES encryption process takes the plaintext through several stages - substitution, shifting rows, mixing columns, and adding the round key - with the inverse being applied for decryption. Some potential security attacks on AES are also mentioned, such as related-key and XSL attacks, but it remains secure if implemented correctly.
This document provides an overview of cryptography and its applications. It discusses the history of cryptography beginning in ancient Egypt. It defines basic cryptography terminology like plaintext, ciphertext, cipher, key, encryption, decryption, cryptography, and cryptanalysis. It describes classical ciphers like the Caesar cipher and substitution ciphers. It also discusses cryptanalysis techniques, transposition ciphers, modern symmetric ciphers, public key cryptography including RSA, key distribution methods, and hybrid encryption.
This document discusses message authentication techniques including message encryption, message authentication codes (MACs), and hash functions. It describes how each technique can be used to authenticate messages and protect against various security threats. It also covers how symmetric and asymmetric encryption can provide authentication when used with MACs or digital signatures. Specific MAC and hash functions are examined like HMAC, SHA-1, and SHA-2. X.509 is introduced as a standard for digital certificates.
One-Time Pad (OTP) encryption uses truly random keys that are only used once to encrypt plaintext. If the keys are random, only used once, and securely transferred and destroyed, then OTP provides perfect secrecy since the ciphertext reveals no information about the plaintext. However, achieving these strict conditions is difficult in practice, requiring solutions for secure key generation, transfer, storage and destruction. While OTP provides unbreakable encryption theoretically, more practical algorithms are needed to address its limitations.
This Presentation Elliptical Curve Cryptography give a brief explain about this topic, it will use to enrich your knowledge on this topic. Use this ppt for your reference purpose and if you have any queries you'll ask questions.
HASH FUNCTIONS AND DIGITAL SIGNATURES
Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC –MD5 – SHA – HMAC – CMAC – Digital signature and authentication protocols – DSS – EI Gamal – Schnorr.
This document provides an overview of cryptography concepts including symmetric and asymmetric key algorithms, cryptographic hashes, and tools for cryptanalysis. It defines common terminology like plaintext, ciphertext, encryption, and decryption. Symmetric algorithms discussed include the Vernam cipher, A5/1, DES, AES, and RC4. Asymmetric algorithms covered are RSA and Diffie-Hellman key exchange. Cryptographic hashes like MD5 and SHA-1 are also summarized along with resources for cryptanalysis.
This document provides an overview of cryptography concepts including encryption, decryption, symmetric and asymmetric cryptosystems. It discusses X.509 certificates, self-signed certificates, and why certificates need to be signed by a Certificate Authority. It also covers RSA and AES cryptosystems, OpenSSL functions for X509, EVP and RSA, and hybrid cryptosystems.
3. The Data Encryption Standard (DES) and AlternativesSam Bowne
A lecture for a college course -- CNIT 140: Cryptography for Computer Networks at City College San Francisco
Based on "Understanding Cryptography: A Textbook for Students and Practitioners" by Christof Paar, Jan Pelzl, and Bart Preneel, ISBN: 3642041000
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_F17.shtml
Cryptanalysis is the study of encrypted messages to understand encryption systems and find weaknesses. Cryptanalysts aim to decrypt messages without knowing the encryption key or algorithm. Their research helps cryptographers strengthen algorithms. Cryptanalysts uncover design flaws that can reduce the number of keys tested on a message. Their work is used by governments and companies to test security products.
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherMona Rajput
The document provides information on various historical cryptosystems and ciphers, beginning with a brief overview of symmetric and asymmetric key encryption. It then discusses several manual ciphers such as the Caesar cipher, simple substitution cipher, Playfair cipher, and Vigenere cipher. The Caesar cipher performs monoalphabetic substitution by shifting letters of the alphabet. The simple substitution cipher and Playfair cipher improve security by using permutation or paired letter substitution instead of just shifting. The Vigenere cipher further enhances security by applying multiple Caesar shifts using a keyword. The document also covers the one-time pad cipher and its information theoretic security if the pad is truly random and never reused.
Block ciphers & public key cryptographyRAMPRAKASHT1
This document provides an overview of block ciphers and public key cryptography. It discusses the principles of block ciphers, including block cipher modes of operation. Popular block ciphers like DES, AES, Triple DES and Blowfish are described. The document also covers public key cryptography principles and algorithms like RSA and Diffie-Hellman key exchange. It provides details on elliptic curve cryptography and the arithmetic behind it.
This document discusses data encryption methods. It defines encryption as hiding information so it can only be accessed by those with the key. There are two main types: symmetric encryption uses one key, while asymmetric encryption uses two different but related keys. Encryption works by scrambling data using techniques like transposition, which rearranges the order, and substitution, which replaces parts with other values. The document specifically describes the Data Encryption Standard (DES) algorithm and the public key cryptosystem, which introduced the innovative approach of using different keys for encryption and decryption.
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
(1) Cryptography and network security are important topics that involve terminology like plaintext, ciphertext, encryption, decryption, and cryptanalysis. (2) The document discusses principles of security like confidentiality, integrity, authentication, non-repudiation, and availability and how attacks can compromise them. (3) It also covers security services, mechanisms, and models in the OSI standard to enhance security and counter different types of security attacks.
The document discusses the Advanced Encryption Standard (AES). It describes AES as a symmetric block cipher selected by the U.S. National Institute of Standards and Technology (NIST) in 2001 to replace the Data Encryption Standard (DES). AES uses a variable block size of 128 bits and a key size of 128, 192, or 256 bits. The cipher operates on a 4x4 column-byte state and has 10, 12, or 14 rounds depending on the key size. Each round consists of byte substitution, shift rows, mix columns, and add round key transformations.
1. The document discusses the Advanced Encryption Standard (AES) cipher, which was selected from the Rijndael algorithm in 2000 to replace the Data Encryption Standard (DES).
2. AES has a block size of 128 bits, with key sizes of 128, 192, or 256 bits. It operates on a 4x4 column-byte state and consists of 10-14 rounds depending on the key size.
3. Each round performs byte substitution, shifting rows of the state, mixing columns using matrix multiplication, and adding the round key using XOR. The key is expanded using XOR and S-boxes to generate round keys.
The document provides information about the Advanced Encryption Standard (AES) encryption algorithm. It describes AES as a symmetric block cipher chosen by the U.S. government to protect classified information. The document outlines the development and selection process for AES, describing how it was intended to replace the aging Data Encryption Standard (DES). It also provides details about the AES algorithm, including that it uses 128, 192, or 256-bit keys and encryption is performed through 10-14 rounds of processing involving byte substitution, shifting rows of data, mixing columns, and combining with the encryption key.
The document discusses the Advanced Encryption Standard (AES) cipher. It describes the AES selection process, including the requirements for candidates and criteria for evaluation. Rijndael, designed by Rijmen and Daemen, was selected as the AES cipher. The summary describes the key components of Rijndael, including its round structure of byte substitution, shift rows, mix columns, and add round key steps. It also covers the AES key expansion process and efficient implementation approaches.
Information and network security 24 advanced encryption standard aesVaibhav Khanna
The Advanced Encryption Standard, also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology in 2001
The document discusses the Advanced Encryption Standard (AES) which was selected by the U.S. government to encrypt sensitive data. It describes the requirements for AES, the evaluation criteria used in selecting it, and the five algorithm finalists. Rijndael, designed by Belgian cryptographers, was ultimately chosen as the AES cipher due to its security, performance, and simplicity. The summary provides an overview of the AES selection process and key aspects of the Rijndael cipher, including its round structure and efficient software implementations.
- The document discusses the Advanced Encryption Standard (AES) and its selection as a replacement for the Data Encryption Standard (DES). It describes the selection process conducted by the National Institute of Standards and Technology (NIST).
- Rijndael, designed by Vincent Rijmen and Joan Daemen, was selected as the AES after evaluation of 15 candidate algorithms. It uses 128/192/256-bit keys and 128-bit blocks.
- The AES cipher, based on Rijndael, consists of 10-14 rounds depending on key size. Each round performs byte substitution, shift rows, mix columns, and adds a round key. It can be efficiently implemented in both software and hardware.
The document summarizes the Advanced Encryption Standard (AES) cipher. It describes AES as an iterative block cipher based on Rijndael that was selected through a competition in 2000 to replace the aging Data Encryption Standard (DES). The AES cipher uses 10 rounds of processing for 128-bit keys consisting of byte substitution, shifting rows of the internal block representation, mixing columns, and XORing with a round key. Keys are expanded using a key schedule to generate round keys.
Information and network security 26 aes decryption and implementational issuesVaibhav Khanna
To review the overall structure of AES and to focus particularly on the four steps used in each round of AES: (1) byte substitution, (2) shift rows, (3) mix columns, and (4) add round key
The document discusses the Advanced Encryption Standard (AES), which was selected by the U.S. National Institute of Standards and Technology in 2000 to replace the older Data Encryption Standard (DES). It describes the origins and development of AES, including the evaluation process where Rijndael was selected as the winning algorithm. The summary also provides a high-level overview of how AES works, including its conceptual scheme, encryption rounds, key scheduling, and security against known attacks.
Symmetric encryption uses the same key for both encryption and decryption. Common symmetric algorithms include DES, Triple DES, and AES. DES encrypts data in 64-bit blocks using a 56-bit key. Triple DES applies DES three times with three different keys to strengthen it against attacks. AES has a variable block size of 128 bits and key size of 128, 192, or 256 bits. It performs multiple rounds of substitution and permutation functions to encrypt the data securely.
Modified aes algorithm using multiple s boxeschuxuantinh
The document proposes a modified AES algorithm using multiple substitution boxes (S-Boxes) to improve performance. It describes the standard AES algorithm and then proposes modifications. Specifically, it suggests using two S-Boxes - the original Rijndael S-Box along with a new S-Box constructed by XORing each value of the original S-Box with 7F and applying an affine transformation. Evaluation results showed that the modified algorithm with two S-Boxes improved speed performance compared to standard AES, while slightly weakening security. The modified algorithm is also more efficient to implement using low-cost processors and minimal memory.
modified aes algorithm using multiple s-boxeschutinhha
The document proposes a modified AES algorithm using multiple substitution boxes (S-Boxes) to improve performance. It describes the standard AES algorithm and then proposes modifications. Specifically, it suggests using two S-Boxes - the original Rijndael S-Box along with a new S-Box constructed by XORing each value of the original S-Box with 7F and applying an affine transformation. The evaluation results show that the modified algorithm with two S-Boxes increases speed compared to standard AES while slightly decreasing security. It is concluded that the modified algorithm is more efficient to implement with low memory requirements on simple processors.
1. AES was developed as a replacement for DES and published by NIST in 2001 to be more secure against attacks.
2. AES uses a block size of 128 bits and a key size of 128, 192, or 256 bits. Each round consists of four functions: byte substitution, shifting rows, mixing columns, and adding the round key.
3. The Rijndael cipher was selected as the basis for AES due to its resistance to attacks, efficient implementation on CPUs, and simple design.
The document summarizes the Advanced Encryption Standard (AES) cipher. It describes AES's origins as a replacement for DES, outlines the structure and steps of AES including substitution bytes, shift rows, mix columns, and add round key. It also covers AES's key expansion process and notes AES can be efficiently implemented using table lookups and byte operations.
The document summarizes the Advanced Encryption Standard (AES) cipher. It describes AES's origins as a replacement for DES, outlines the structure and steps of AES including substitution bytes, shift rows, mix columns, and add round key. It also covers AES's key expansion process and notes AES can be efficiently implemented using table lookups and operations on 32-bit words.
Advanced Encryption Standard, Multiple Encryption and Triple DES, Block Cipher Modes of
operation, Stream Ciphers and RC4, Confidentiality using Symmetric Encryption, Introduction
to Number Theory: Prime Numbers, Fermat’s and Euler’s Theorems, Testing for Primality, The
Chinese Remainder Theorem, Discrete Logarithms, Public-Key Cryptography and RSA
The document summarizes the Advanced Encryption Standard (AES). It describes how AES was selected by NIST as a replacement for DES. AES (Rijndael cipher) uses a block size of 128 bits, with key sizes of 128, 192, or 256 bits. It operates on data in rounds that include byte substitution, shifting rows, mixing columns, and adding the round key. The key is expanded into an array of words used for each round.
The document discusses iris recognition as a biometric identification method that uses pattern recognition techniques to identify individuals based on the unique patterns in their irises. It provides an overview of the history and development of iris recognition, describes the components of an iris recognition system including image acquisition, segmentation, normalization, and feature encoding, and discusses applications of iris recognition including uses for border control, computer login authentication, and other security purposes.
Multimedia multimedia over wireless and mobile networksMazin Alwaaly
This document discusses multimedia over wireless and mobile networks. It begins by outlining the characteristics of wireless channels, including that they are more error-prone than wired channels. It then discusses various wireless networking technologies, including cellular networks from 1G to 4G, wireless local area networks, and Bluetooth. It concludes by discussing challenges for transmitting multimedia over wireless channels and techniques for error detection, error correction, and error concealment to address those challenges.
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
The document discusses various network services and protocols for multimedia communications. It covers protocol layers, local area networks and access network technologies, Internet technologies and protocols, quality of service for multimedia, and protocols for multimedia transmission and interaction. Specifically, it describes the OSI reference model layers, common LAN standards and technologies like Ethernet, Token Ring, FDDI, and digital subscriber line access networks. It also discusses the TCP/IP protocol suite and key protocols like IP, TCP, and UDP.
Multimedia content based retrieval in digital librariesMazin Alwaaly
This document provides an overview of content-based image retrieval (CBIR) systems. It discusses early CBIR systems and provides a case study of C-BIRD, a CBIR system that uses features like color histograms, color layout, texture analysis, and object models to perform image searches. It also covers quantifying search results, key technologies in current CBIR systems such as robust image features, relevance feedback, and visual concept search, and the role of users in interactive CBIR systems.
This document discusses various lossless compression algorithms including run-length coding, Shannon-Fano algorithm, Huffman coding, extended Huffman coding, dictionary-based coding like LZW, and arithmetic coding. It provides details on the basic principles of run-length coding, an example of extended Huffman coding for a source with symbols A, B, and C, and outlines the structure of the document.
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDSSérgio Sacani
The pathway(s) to seeding the massive black holes (MBHs) that exist at the heart of galaxies in the present and distant Universe remains an unsolved problem. Here we categorise, describe and quantitatively discuss the formation pathways of both light and heavy seeds. We emphasise that the most recent computational models suggest that rather than a bimodal-like mass spectrum between light and heavy seeds with light at one end and heavy at the other that instead a continuum exists. Light seeds being more ubiquitous and the heavier seeds becoming less and less abundant due the rarer environmental conditions required for their formation. We therefore examine the different mechanisms that give rise to different seed mass spectrums. We show how and why the mechanisms that produce the heaviest seeds are also among the rarest events in the Universe and are hence extremely unlikely to be the seeds for the vast majority of the MBH population. We quantify, within the limits of the current large uncertainties in the seeding processes, the expected number densities of the seed mass spectrum. We argue that light seeds must be at least 103 to 105 times more numerous than heavy seeds to explain the MBH population as a whole. Based on our current understanding of the seed population this makes heavy seeds (Mseed > 103 M⊙) a significantly more likely pathway given that heavy seeds have an abundance pattern than is close to and likely in excess of 10−4 compared to light seeds. Finally, we examine the current state-of-the-art in numerical calculations and recent observations and plot a path forward for near-future advances in both domains.
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdfSelcen Ozturkcan
Ozturkcan, S., Berndt, A., & Angelakis, A. (2024). Mending clothing to support sustainable fashion. Presented at the 31st Annual Conference by the Consortium for International Marketing Research (CIMaR), 10-13 Jun 2024, University of Gävle, Sweden.
Discovery of An Apparent Red, High-Velocity Type Ia Supernova at 𝐳 = 2.9 wi...Sérgio Sacani
We present the JWST discovery of SN 2023adsy, a transient object located in a host galaxy JADES-GS
+
53.13485
−
27.82088
with a host spectroscopic redshift of
2.903
±
0.007
. The transient was identified in deep James Webb Space Telescope (JWST)/NIRCam imaging from the JWST Advanced Deep Extragalactic Survey (JADES) program. Photometric and spectroscopic followup with NIRCam and NIRSpec, respectively, confirm the redshift and yield UV-NIR light-curve, NIR color, and spectroscopic information all consistent with a Type Ia classification. Despite its classification as a likely SN Ia, SN 2023adsy is both fairly red (
�
(
�
−
�
)
∼
0.9
) despite a host galaxy with low-extinction and has a high Ca II velocity (
19
,
000
±
2
,
000
km/s) compared to the general population of SNe Ia. While these characteristics are consistent with some Ca-rich SNe Ia, particularly SN 2016hnk, SN 2023adsy is intrinsically brighter than the low-
�
Ca-rich population. Although such an object is too red for any low-
�
cosmological sample, we apply a fiducial standardization approach to SN 2023adsy and find that the SN 2023adsy luminosity distance measurement is in excellent agreement (
≲
1
�
) with
Λ
CDM. Therefore unlike low-
�
Ca-rich SNe Ia, SN 2023adsy is standardizable and gives no indication that SN Ia standardized luminosities change significantly with redshift. A larger sample of distant SNe Ia is required to determine if SN Ia population characteristics at high-
�
truly diverge from their low-
�
counterparts, and to confirm that standardized luminosities nevertheless remain constant with redshift.
PPT on Direct Seeded Rice presented at the three-day 'Training and Validation Workshop on Modules of Climate Smart Agriculture (CSA) Technologies in South Asia' workshop on April 22, 2024.
Mechanisms and Applications of Antiviral Neutralizing Antibodies - Creative B...Creative-Biolabs
Neutralizing antibodies, pivotal in immune defense, specifically bind and inhibit viral pathogens, thereby playing a crucial role in protecting against and mitigating infectious diseases. In this slide, we will introduce what antibodies and neutralizing antibodies are, the production and regulation of neutralizing antibodies, their mechanisms of action, classification and applications, as well as the challenges they face.
Embracing Deep Variability For Reproducibility and Replicability
Abstract: Reproducibility (aka determinism in some cases) constitutes a fundamental aspect in various fields of computer science, such as floating-point computations in numerical analysis and simulation, concurrency models in parallelism, reproducible builds for third parties integration and packaging, and containerization for execution environments. These concepts, while pervasive across diverse concerns, often exhibit intricate inter-dependencies, making it challenging to achieve a comprehensive understanding. In this short and vision paper we delve into the application of software engineering techniques, specifically variability management, to systematically identify and explicit points of variability that may give rise to reproducibility issues (eg language, libraries, compiler, virtual machine, OS, environment variables, etc). The primary objectives are: i) gaining insights into the variability layers and their possible interactions, ii) capturing and documenting configurations for the sake of reproducibility, and iii) exploring diverse configurations to replicate, and hence validate and ensure the robustness of results. By adopting these methodologies, we aim to address the complexities associated with reproducibility and replicability in modern software systems and environments, facilitating a more comprehensive and nuanced perspective on these critical aspects.
https://hal.science/hal-04582287
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆Sérgio Sacani
Context. The early-type galaxy SDSS J133519.91+072807.4 (hereafter SDSS1335+0728), which had exhibited no prior optical variations during the preceding two decades, began showing significant nuclear variability in the Zwicky Transient Facility (ZTF) alert stream from December 2019 (as ZTF19acnskyy). This variability behaviour, coupled with the host-galaxy properties, suggests that SDSS1335+0728 hosts a ∼ 106M⊙ black hole (BH) that is currently in the process of ‘turning on’. Aims. We present a multi-wavelength photometric analysis and spectroscopic follow-up performed with the aim of better understanding the origin of the nuclear variations detected in SDSS1335+0728. Methods. We used archival photometry (from WISE, 2MASS, SDSS, GALEX, eROSITA) and spectroscopic data (from SDSS and LAMOST) to study the state of SDSS1335+0728 prior to December 2019, and new observations from Swift, SOAR/Goodman, VLT/X-shooter, and Keck/LRIS taken after its turn-on to characterise its current state. We analysed the variability of SDSS1335+0728 in the X-ray/UV/optical/mid-infrared range, modelled its spectral energy distribution prior to and after December 2019, and studied the evolution of its UV/optical spectra. Results. From our multi-wavelength photometric analysis, we find that: (a) since 2021, the UV flux (from Swift/UVOT observations) is four times brighter than the flux reported by GALEX in 2004; (b) since June 2022, the mid-infrared flux has risen more than two times, and the W1−W2 WISE colour has become redder; and (c) since February 2024, the source has begun showing X-ray emission. From our spectroscopic follow-up, we see that (i) the narrow emission line ratios are now consistent with a more energetic ionising continuum; (ii) broad emission lines are not detected; and (iii) the [OIII] line increased its flux ∼ 3.6 years after the first ZTF alert, which implies a relatively compact narrow-line-emitting region. Conclusions. We conclude that the variations observed in SDSS1335+0728 could be either explained by a ∼ 106M⊙ AGN that is just turning on or by an exotic tidal disruption event (TDE). If the former is true, SDSS1335+0728 is one of the strongest cases of an AGNobserved in the process of activating. If the latter were found to be the case, it would correspond to the longest and faintest TDE ever observed (or another class of still unknown nuclear transient). Future observations of SDSS1335+0728 are crucial to further understand its behaviour. Key words. galaxies: active– accretion, accretion discs– galaxies: individual: SDSS J133519.91+072807.4
TOPIC OF DISCUSSION: CENTRIFUGATION SLIDESHARE.pptxshubhijain836
Centrifugation is a powerful technique used in laboratories to separate components of a heterogeneous mixture based on their density. This process utilizes centrifugal force to rapidly spin samples, causing denser particles to migrate outward more quickly than lighter ones. As a result, distinct layers form within the sample tube, allowing for easy isolation and purification of target substances.
PPT on Sustainable Land Management presented at the three-day 'Training and Validation Workshop on Modules of Climate Smart Agriculture (CSA) Technologies in South Asia' workshop on April 22, 2024.
Information and data security advanced encryption standard (aes)
1.
2. Origins
• The Advanced Encryption Standard (AES) is the
block cipher algorithm chosen by the National
Institute of Standards and Technology
(NIST) It supersedes the Data Encryption
Standard (DES).
• Rijndael is an iterated block cipher. Therefore, the
encryption or decryption of a block of data is
accomplished by the iteration.
3. Cont. Origins
• Rijndael was evaluated based on its security, its
cost and its algorithm and implementation
characteristics. The primary focus of the analysis
was on the cipher's security, but the choice of
Rijndael was based on its simple algorithm and
implementation characteristics. There were
several candidate algorithms but Rijndael was
selected because based on the analyses, it had the
best combination of security, performance,
efficiency, ease of implementation and flexibility.
4. The AES Cipher - Rijndael
• designed by Belgium academics Dr.Joan
Daemen and Dr.Vincent Rijmen.
• designed to be:
• resistant against known attacks
• speed and code compactness on many CPUs
• design simplicity
• AES is block cipher with ablock length of 128
bits.
• AES allows for three different key lengths:
128 , 192 ,or 256 bits.
V. Rijmen
J. Daemen
6. AES Structure
• data block of 4 columns of 4 bytes is state
• key length: 10 rounds for a 16-byte key, 12 rounds for a
24-byte key, and 14 rounds for a 32-byte key.
• state undergoes:
• byte substitution (S-box used on every byte).
• shift rows (permute bytes between groups/columns).
• mix columns (subs using matrix multiply of groups).
• add round key (XOR state with key material).
9. Some Comments on AES
1. an iterative rather than feistel cipher.
2. key expanded into array of 32-bit words.
3. 4 different stages are used.
4. has a simple structure.
5. only AddRoundKey uses key.
6. AddRoundKey a form of Vernam cipher.
7. each stage is easily reversible.
8. decryption uses keys in reverse order.
9. decryption does recover plaintext.
10.final round has only 3 stages
10. Substitute Bytes
• a simple substitution of each byte.
• uses one table of 16x16 bytes called an s-box.
• each byte of state is replaced by byte indexed by
row (left 4-bits) & column (right 4-bits).
• eg. byte {95} is replaced by byte in row 9 column 5.
• which has value {2A}.
• S-box constructed using defined transformation
of values in GF(28).
• designed to be resistant to all known attacks.
14. Shift Rows
• a circular byte shift in each row
• 1st row is unchanged
• 2nd row does 1 byte circular shift to left
• 3rd row does 2 byte circular shift to left
• 4th row does 3 byte circular shift to left
• decrypt does shifts to right
• this step permutes bytes between the
columns
16. Mix Columns
• each column is processed separately
• each byte is replaced by a value dependent
on all 4 bytes in the column
Constant matrix Old matrix New matrix
19. AES Arithmetic
• uses arithmetic in the finite field GF(28)
• with irreducible polynomial
m(x) = 𝑥8+ 𝑥4 + 𝑥3 + 𝑥 + 1
which is (100011011) or {11b}
• e.g.
{02} • {87}=
(1 0000 1110) xor (1 0001 1011) = (0001 0101)
20. Add Round Key
• The strength of this algorithm at this stage.
• XOR state with 128-bits of the round key.
• inverse for decryption identical.
• designed to be as simple as possible.
• requires other stages for complexity / security.
21. AES Key Expansion
• takes 128-bit (16-byte) key and expands into
array of 44, 32-bit words.
• start by copying key into first 4 words.
• then loop creating words that depend on values
in previous & 4 places back.
• in 3 of 4 cases just XOR these together.
• 1st word in 4 has rotate + S-box + XOR round constant on previous,
before XOR 4th back.
24. Key Expansion Rationale
• designed to resist known attacks
• design criteria included:
• knowing part key insufficient to find many more.
• invertible transformation.
• fast on wide range of processor.
• use round constants to eliminate symmetries.
• diffuse key bits into round keys.
• enough non-linearity to hinder analysis.
• simplicity of description.
25. AES Decryption
• AES decryption is not identical to encryption
since steps done in reverse.
• but can define an equivalent inverse cipher with
steps as for encryption.
• but using inverses of each step.
• with a different key schedule.
• works since result is unchanged when:
• swap byte substitution & shift rows.
• swap mix columns & add round key.
27. Uses AES
Since AES is an encryption algorithm therefore has many
uses , which includes protecting the user via the Internet for
up to protect and ensure the data in the banks and
laboratories as that for -AES uses in the military , that is
within the AES useful in all these applications is the lack of a
way effective for breaking it , as some months programs and
protocols based on AES resistance to electronic attacks ,
including :
• AES is used in programs (WINZIP) in the event that the user request
evidence after encryption compressed.
• used in the TLS protocol , a protocol to establish a secure connection.
• him as well as use in the IPsec protocol , a protocol to ensure safety in
connections that are powered by IP via the Internet.