Vous êtes sur la page 1sur 99

Topic 3

DATA EFFICIENCY AND


SECURITY

DEPARTMENT

OF

ELECTRICAL
ENGINEERING

EP601 DATA

COMMUNICATION

TOPIC 3 :
At the end of this learning session, student must be able to;

Define data efficiency.


Describe data efficiency devices:

a. Front End Processor (FEP)

b. Multiplexer

Explain data efficiency techniques:

a. FDM

b. TDM

c. STDM

d. Data Compression: Run length encoding,LZW (Lempel-Ziv_Welch),


Huffman coding.

Define data security.


Explain the importance of data security.
Explain encryption and decryption techniques:

a. Caesar Cipher
b. Mapping
c. Data Encryptions Standard (DES)
d. Rivest-Shamir-Adelman (RSA)
2

Data efficiency will always be the objective of data


communication network that is
to transfer the
highest possible volume of accurate information
through the network with the lowest cost.
We have links with limited bandwidths. But wise use
of available bandwidth would result efficiency.
An efficient system maximizes the utilization of all
resources; bandwidth is the resources.
Efficiency can be achieved by multiplexing.
Multiplexing allows several transmission sources to
share a larger transmission capacity.

What is data efficiency ?


3

Data efficiency
devices
a. Front End Processor (FEP)
b. Multiplexer

Data efficiency devices:


a) Front End Processor (FEP)

A front-end processor (FEP) is a type of computer


used in a network to help the main host computer
manage the other connected computers.

Why use FEP? - to keep the main computer from


having to perform all the processing, which
requires a lot of computer resources.

Purpose - takes over the process of managing the


data transmissions going from the host to the
nodes, back to the host and out to other places
and reports directly to the host.
6

FEP

Is typically a small computer that is closely


coupled to the central computer/host.
FEP is programmed to handle all the polling and
selection procedures, allowing the central
computer to devote its time to the main task of
application processing
Advantage FEP : central processor need to be
involved only when a data message has been
received or is to be sent.
All communication overhead associated
with each message transfer are handled by
FEP, central computer need only initiate the
transfer of each message to and from the FEP.
7

Polling and Selecting

The Polling and Selecting access method is not


very common because it requires the use of a
central controller to execute and monitor the
process

Polling:
Polling refers to the process of a host computer
asking an intelligent terminal if it has any
data to send to the host computer. This task is
typically accomplished by a front-end processor
(FEP),
which
handles
all
the
routine
communications procedures for the host computer.

Selecting:
Selecting occurs when a host computer or a
FEP sends data to a terminal after the terminal
indicates that it is ready to accept data.
8

Incoming
and outgoing
jobs

Job 1

Job 2

Job 3

Main
system

Front-end
processor
Job 4

Communications
link

Multiplexor

Front-end
processor

Host
computer

10

MULTIPLEXING

One of the most widely used devices for improving data


communication efficiency ; minimize the number of
transmission line required.
The aim of multiplexing is to share an expensive resource.
Allows several devices to share single communication
facility.
Multiplexing is the set of techniques that allows the
simultaneously transmission multiple signals across
a single data link and then recovering the separate
signals at the receiving end.
It is an efficient method of employing a single highbandwidth channel to transmit various separate lowbandwidth signals.

11

MULTIPLEXING

cont

Figure above illustrate the multiplexing as an efficiency


devices.
N inputs share the bandwidth of one link.
n inputs to the multiplexer (MUX) is connected by a
single data link to a demultiplexer (DEMUX).
The MUX combines data from the n input lines to a
single stream.
DEMUX accepts the multiplexed data stream, separates
the stream data into multiple output lines.
12

FIGURE : MULTIPLEXING

13

Data efficiency techniques

a. Frequency Division Multiplexing (FDM)


b. Time Division Multiplexing (TDM)
c. Synchronous Time Division Multiplexing
(STDM) & Statistical Time Division
Multiplexing
(STDM)
d. Data Compression: Run length
encoding,
LZW
(Lempel-Ziv_Welch),
Huffman coding.
14

a. Frequency Division Multiplexing (FDM)

FDM is analog multiplexing technique that combine analog


signal
Multiple signals share the common bandwidth of a
single communication channel, each occupying a separate
portion of the bandwidth.
Each signal is allocated a different frequency band.
Modulation equipment is needed to move each signal to the
required frequency band (channel)
Multiple carriers are used, each is called sub-carrier
Multiplexing equipment is needed to combine the modulated
signals

15

a. Frequency Division Multiplexing


(FDM)

16

One of FDM's most common applications is


cable television. Only one cable reaches a
customer's home but the service provider can
send multiple television channels or signals
simultaneously over that cable to all subscribers
without interference. Receivers must tune to the
appropriate frequency (channel) to access the
desired signal

Example of FDM
17

FREQUENCY DIVISION
MULTIPLEXING
18

a. Frequency Division Multiplexing


(FDM) cont

FDM Transmitter

FDM Receiver

19

FDM Multiplexer
Multiple signals are each used to modulate a
separate carrier.
Each carrier is on a different frequency.
The modulated carriers are then added together
to form single complex signal which is
transmitted over the single channel.
This signal is then used to modulate a radio
transmitter.

FDM demultiplexer
The
demultiplexer uses a series of filters to
a.decompose
Frequency
Multiplexing
theDivision
multiplexed
signal into its
component signals.
(FDM)
cont
The individual signals are then passed to the
demodulator that separates them from their
carriers and pass them to the waiting receiver.
20

a. Frequency Division Multiplexing (FDM)


cont
Advantages of FDM
User can be added to the system by simply adding another
pair of transmitter modulator and receiver demodulators.
FDM system support full duplex information flow which is
required by most of application.
Noise problem for analog communication has lesser effect.
Disadvantages of FDM
In FDM system, the initial cost is high. This may include the
cable between the two ends and the associated connectors for
the cable.
In FDM system, a problem for one user can sometimes affect
others.
In FDM system, each user requires a precise carrier
frequency.

21

b. Time Division Multiplexing (TDM)

Digital multiplexing technique for combining several lowrate channels into one high-rate channel.
Each signal occupy the entire bandwidth of the channel.
However, each signal is transmitted for only a brief
period of time.
The multiple signals take turns transmitting over a
single channel.
TDM may be used with both digital and analog signals.
The transmission between nodes must be digital and is
formatted into serial data words.
TDM assigns each terminal a dedicated time slot.

22

b. Time Division Multiplexing (TDM)

Refer to the figure, the same link is used as in FDM,


however the link is shown sectioned by time rather than by
frequency
Signal 1, 2, 3 and 4 occupy the link sequentially
The time domain is divided into several recurrent time
slots of fixed length, one for each sub-channel.
A sample byte or data block of sub-channel 1 is
transmitted during time slot 1, sub-channel 2 during
time slot 2, etc.

23

TDM

(cont..)

Consider an application requiring four terminals at an airport to reach a


central computer. Each terminal communicated at 2400 bit/s, so rather
than acquire four individual circuits to carry such a low-speed
transmission, the airline has installed a pair of multiplexers. A pair of 9600
bit/s modems and one dedicated analog communications circuit from the
24
airport ticket desk back to the airline data center are also installed.

TDM

(cont..)

TDM has two different schemes:


a) Synchronous TDM
Time Slot and Frames
Interleaving
Empty Slots
Data Rate Management
Frame Synchronizing
Digital Signal Service
T Lines
E Lines

b)Statistical TDM
Addressing
Slot Size
No Synchronization Bit
Bandwidth

25

c. Synchronous Time Division Multiplexing


(STDM)

A data transmission technique in which several users make


use of a single channel by means of a system in which time
slots are allotted on a fixed basis, usually in round-robin
fashion.
STDM assign time slot of equal length to all packet
regardless whether or not anything is to be sent by each
station with an assigned time slot
Time slot X means it is assigned to user and cannot be
used by any other user .
In synchronous TDM, the data rate of the link is n times
faster, and the unit duration is n times shorter.
Synchronous TDM is called synchronous as the time slots
are pre-assigned to sources and fixed.
The time slots for each source are transmitted whether or
not the source has data to send.
26

c. STDM

(cont)

Each input unit becomes one output unit and occupies one
output time slot.
However , the duration of output TS is n times shorter than the
duration of input TS.
If input TS is Ts, then the output TS is T/n s. Where n is the
number of connection. (unit in the output connection has a
shorter duration means travel faster)
As in the figure, n is 3 , the rate of the output link must be 3
times the data rate of a connection

27

Statistical TDM (STDM)


In statistical TDM (STDM), time slots are assigned to users
on a first come, first served basis (on-demand basis)
Any user can be assigned to any time slot at any time.
Since time slots are not dedicated to a particular user, then
each time slot must carry an explicit address that
identifies the user for that time slot.
The objective of STDM technology is efficient use of
bandwidth on the shared facility. If there is enough traffic
being generated by users, there will be no empty time slots
on the medium.
In addition, STDM tends to provide bandwidth to those users
who need it most (i.e., those users with a lot of traffic to
send), what is sometimes referred to as bandwidth on
demand.
28

Statistical TDM (STDM) cont


In synchronous TDM many slots are wasted.
Statistical TDM allocates time slots dynamically, on demand

29

Data Compression

Data compression implies sending or storing a smaller


number of bits.
Nowadays almost every multimedia data as audio or video
will be used in a compressed form.
Generally these methods can be divided into two broad
categories: lossless and lossy methods.

30

Data Compression
Lossless methods:
Run length encoding (RLE)
Lempel-Ziv_Welch (LZW )
Huffman coding.

31

Run length encoding (RLE)


Run Length Encoding is one of the oldest
compression methods.
Any sequence of identical symbols will
be replaced by a counter identifying
the number of repetitions and the
particular symbol or one occurrence of
the symbol followed by the number of
occurrences.
For instance, the original contents 'aaaa'
would be coded as '4a'.

32

Example of RLE

Original data : AAAAAAAAAAAAAAA ---15 byte


The compressed data : 15A
--2byte data

Assume that our 15-character string now


contains four different character :
AAAAAAbbbXXXXXt
The compressed data :
6A3b5X1t
----- four 2-byte
packets:
33

More example of RLE


Original Data :
WWWWWWWWWWWWBWWWWWWWWWWWWBBBWWWWWWWWWWWWWWWWWWWWWWWWBWW
WWWWWWWWWWWW

If we apply the run-length encoding (RLE) data


compression to the above data , we get the
following:

12W1B12W3B24W1B14W

Interpreted as twelve Ws, one B, twelve Ws,


three Bs, etc.
The RLE code represents the original 67
characters in only 18
characters.
34

Lempel-Ziv Coding (LZ)


Lempel-Ziv Coding (LZ) is based on the fundamental work of
Abraham Lempel and Jacob Ziv.
Their original algorithms are generally denoted as LZ77 and LZ78.
Four types of LZ coding are :
Lempel-Ziv 77 (LZ77)
Lempel-Ziv- Storer - Szymanski (LZSS)
Lempel-Ziv 78 (LZ78)
Lempel-Ziv-Welch (LZW)

Lempel Ziv (LZ) encoding is an example of a category of algorithms


called dictionary-based encoding.
The idea is to create a dictionary (a table) of strings used during the
communication session.
LZW compression uses a code table, with 4096 as a common choice
for the number of table entries.
35

Lempel- Ziv-Welch (LZW) encoding cont..

The algorithm presented by Terry Welch defines


mechanisms to create the dictionary and to
ensure that it will be identical for both the
encoding and decoding process.

The LZW code is usually of size 12 bits, with 4096


possible codes.

Compression is achieved by using codes 256


through 4095 to represent sequences of bytes.

As the encoding continues, LZW identifies repeated


sequences in the data, and adds them to the
code table.

Decoding is achieved by taking each code from


the compressed file, and translating it through
the code table to find what character or characters
it represents.
36

COMPRESSION USING LZW

Example 1: Compression using LZW


Use the LZW algorithm to compress the string
BABAABAAA

37

38

DECOMPRESSION USING LZW

Example

2: Decompression using LZW

Use LZW to decompress the output sequence


of Example 1:
<66><65><256><257><65><260>

39

40

Example of LZW encoding


Input string is "^WED^WE^WEE^WEB^WET".

A 19-symbol input has been


reduced to 7-symbol plus 5code output.
41

Example of LZW decoding

Input string is
"^WED<256>E<260><261><257>B<260>T".

42

Huffman coding

The Huffman coding is a procedure to generate


a binary code tree.
Huffman coding assigns shorter codes to
symbols that occur more frequently and longer
codes to those that occur less frequently.
It is a variable length code, in which the
encoding depends on the frequency of letters
occurring in the data set.

43

Huffman coding

(cont)

Application

Both the .mp3 and .jpg file formats use Huffman


coding at one stage of the compression.
Alternative method that achieves higher
compression but is slower is patented by IBM,
making Huffman Codes attractive.

44

Huffman coding

(cont)

Step in Huffman encoding :


To each character, associate a binary tree consisting of just
one node. To each tree, assign the characters frequency,
which we call the trees weight.
Look for the two lightest-weight trees. If there were more
than two, choose any two. Merge the two into a single tree
with a new root node whose left and right subtrees are the two
we chose. Assign the sum of the weight of the merged trees
as the weight of the new tree.
Repeat the steps above until just one tree is left.
A characters code is found by starting at the root and
following the branches that lead to that character. The
code itself is the bit value of each branch on the path, taken in
sequence.
45

Huffman coding

(cont)

Example:

Letter Frequency
A

12

We build the tree from the


bottom up.
Start with singleton vertices,
labeled with their frequencies

A
A
4

B
B
4

C
5

D
6

E
12
46

sho/polisas

Huffman coding

(cont)

Find the two smallest frequencies, and


combine them into a new tree.
8
A
4

B
4

C
5

D
6

E
12

47

Huffman coding

(cont)

Now, we consider 8, 5, 6, and 12.


The two smallest are 5 and 6
Combine them as in the first step, yielding new
vertex with frequency label 11

A
4

B
4

11

C
5

D
6

E
12

Repeat
48

Huffman coding

(cont)

Now, we consider 8, 11, and 12.


The two smallest are 8 and 11
Combine them

19

Repeat

A
4

B
4

11
C
5

D
6

E
12
49

Huffman coding

(cont)

Finally, combine the two remaining vertices (12


and 19) to get a single tree.
31
19

11

8
A
4

B
4

C
5

D
6

E
12
50

Huffman coding

(cont)

The final code


0
1

0
A
A
4

1
B
B
4

C
C
5

D
D
6

E
E
12

Left branch is 0
Right branch is 1
Letter Code
A
000
B
001
C
010
D
011
E
1
51

Huffman coding

(cont)

Length of entire encoding of


text.
4 As, 4 Bs, 5 Cs, 6 Ds, and 12 Es
4x3 + 4x3 + 5x3 + 6x3 + 12x1
= 12 + 12 + 15 + 18 + 12
= 69 bits

Compare to fixed length code


5 characters: need 3 bits each
4x3 + 4x3 + 5x3 + 6x3 + 12x3
= 12 + 12 + 15 + 18 + 36
= 93 bits

Letter Code
A

000

001

010

011

A savings of 24 bits.
Longer text would mean more savings
52

Exercise 1:

53

54

55

56

Length of entire encoding of text.

Compare to fixed length code

A savings of bits.

57

Example of Huffman Coding 2nd example

58

Example of Huffman Coding 2nd example

Final tree and code


59

Encoding : refer to code generated in example 2


Let us see how to encode text using the code for our five characters.
Figure a below shows the original and the encoded text.

Figure a: Huffman encoding

60

Huffman Decoding
Figure b below shows how decoding takes place.

Figure b: Huffman decoding

61

Example of Huffman Coding 3rd example

62

WHAT IS DATA SECURITY?


Data Security means protecting a database
from destructive forces and the unwanted
actions of unauthorized users.
Data security is the practice of keeping data
protected from corruption and unauthorized
access. The focus behind data security is to
ensure privacy while protecting personal or
corporate data.

63

THE IMPORTANCE OF DATA


SECURITY
Determining who has access, as well as the
degree of access.
Protecting the data from unauthorized use
and sabotage.
Protecting the data from physical harm or
accident.

64

ENCRYPTION AND
DECRYPTION
Encryption
refers
to
the
coding
of
information in order to keep it secret.
Encryption is a process of converting a
plaintext into enciphered text or ciphertext,
also called cryptogram.
Decryption
is a deciphering process or
reversing the encrypting process to recover
the original information, which is to convert
ciphertext back to its original form of
plaintext.
65

ENCRYPTION AND
DECRYPTION TECHNIQUES
a. Caesar Cipher
b. Mapping
c. Data Encryptions Standard
(DES)
d. Rivest-Shamir-Adelman
(RSA)
66

CAESAR CIPHERS
What is cipher ? - put (a message) into secret
writing or encode the message.
Caesar Ciphers is a substitution cipher, in which
each character in the plaintext is substituted
by another character in the ciphertext.
The Caesar Cipher replaces each letter by the
letter that appears k positions later to the
right in the alphabet. k, is known as a key.
Also known as shift cipher.
Is named after Julius Caesar, who used it in his
private correspondence.
67

CAESAR CIPHERS ---EXAMPLE


In this example, if k=3 (shift 3 space or position
to the right)
The message (plain text) : "RETURN TO ROME
would be encrypted as (ciphertext) :
"UHWXUA WR URPH
In this example, 'R' is shifted to 'U', 'E' is shifted
to 'H', and so on.

68

Use Caesar cipher with key = 15 to encrypt the message


assalamualaikum.
Solution :
Plaintext :

assalamualaikum
mddmwmxfmwmuvfx

Ciphertext :

Plain:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: MNOPQRSTUVWXYZABCDEFGHIJKL
69

DECRYPTING USING CAESAR


CIPHER
To decode the message, the receiver uses the
same key k and recovers the plaintext by
applying the inverse transformation, that is,
by traversing the ciphertext string and
replacing each character by the character k
positions earlier in the alphabet.

70

DECRYPTING USING CAESAR CIPHER

cont

Also known as transposition cipher.


There is no substitution, instead it changes the
location of the symbols.
Mapping cipher will reorders symbols in a block of
symbols.

Figure : Transposition or Mapping Cipher

71

EXAMPLE:
Ali needs to send the message Enemy attacks to
night to Lina.
The key used for encryption and decryption is a key
using a block of five characters :

Solution :
First remove the spaces in the message, then divide
the text into blocks of five characters. Then add a
bogus (palsu) character z at the end of the fourth
block.
enemy attac kston ightz

The result of the encryption is :


eemyn taact tkons hitzg

72

MAPPING CIPHER

cont..

Lets do this exercise ..


Amin needs to send the message
kelas ganti data com ditunda to Fatin.
The key used for encryption and decryption is key
using a block of four characters :

What is the result of encryption and decryption??

73

LETS TAKE A LOOK AT SOME SIMPLE


MODERN CIPHER.
Encryption methods can be SYMMETRIC in
which encryption and decryption keys are
the same, or ASYMMETRIC in which
encryption and decryption keys differ.
The traditional cipher we have studied so
far are character-oriented.
Modern cipher need to be bitorientedwhy?.. The information need to
be encrypted is not just text, it could be
number, graphics, audio and video data.
74

SIMPLE MODERN CIPHER cont


Types of

simple modern cipher :


XOR Cipher
Substitution Cipher, S-box
Transposition Cipher , P-box :
straight permutations
expansion permutation
Compression
permutation
75

Data Encryption Standard (DES)

The Data Encryption Standard (DES) is a


symmetric-key block cipher published by the
National Institute of Standards and Technology
(NIST).
DES is a widely-used method of data encryption
in the world using a private (secret) key ,
developed in the 1970s
DES uses a 56-bit key and uses the block
cipher method, which breaks text into 64-bit
blocks and then encrypts them.

76

Data Encryption Standard (DES)continued

Figure : Encryption and decryption with DES


77

Data Encryption Standard (DES)

cont

The encryption process is made of two permutations (P-boxes),


which we call initial and final permutations, and sixteen Feistel
rounds.

78

Figure : General structure of DES

Data Encryption Standard (DES)

cont

Initial and final permutation


steps in DES

79

Data Encryption Standard (DES)

cont

Initial and final permutation tables

The initial and final permutations are straight P-boxes


that are inverses of each other

80

Data Encryption Standard (DES)

cont

Example :
Find the output of the initial permutation box when the input is
given in hexadecimal as:

0000 0080 0000 0002


Solution : refer to initial & final permutation table
Only bit 25 and bit 63 are 1s; the other bits are 0s. In the initial
permutation, bit 25 becomes bit 37 and bit 63 becomes bit 57.
The result is

0000 0000 0800 0080


81

Data Encryption Standard (DES)

cont

The heart of DES is the DES function. The DES function


applies a 48-bit key to the rightmost 32 bits to produce a
32-bit output.
This function is made up
of four operation: an
XOR, an expansion
permutation, a group of
S-boxes and a straight
permutation.

82

The round-key
generator creates
sixteen 48-bit
keys out of a 56bit cipher key.

83

We choose a random plaintext block and a random key, and


determine what the ciphertext block would be (all in
hexadecimal):

Table 6.15 Trace of data for Example 6.5

84

Example DES Cont .


Table 6.15 Trace of data for Example 6.5 (Conintued

85

RSA (Rivest-Shamir-Adelman)

RSA is a Public-Key Cryptosystem.


Invented in 1977 by MIT professors Ronald L. Rivest,
Adi Shamir and Leonard M. Adleman.
The system is based on several mathematical principles in
number theory.
Public-key (or two-key) cryptography involves the use
of two keys:
1 - A public-key, which may be known by anybody, and
can be used to encrypt messages, and verify
signatures
2 - A private-key, known only to the recipient, used
to decrypt messages, and sign (create) signatures

digital signature is an electronic signature to


authenticate the identity of the sender of a message
86

RSA (Rivest-Shamir-Adelman) cont

87

RSA Algorithm
1.
2.
3.
4.

5.

6.
7.

Select two large prime numbers at random : p and


q
Compute their product (hasil darab), n n is also
called system modulus . n = p x q
Compute z = (p-1)(q-1) , also known as (n) ,
Eulers phi-function
Selecting at random the encryption key e ;
relatively prime to z or (n) . gcd(e, (n)) = 1 ,
e<n
Finally compute d , the decryption key, such that the
product of e and d is congruent (sepadan ) to 1 mod
(n). e*d 1 mod (n) , 0 <= d <= n
Publish their public encryption key: Kpub={e,n}
Keep secret private decryption key: Kpvt={d,n}
88

Encryption with RSA

To encrypt a plaintext message block m,


compute

C=Me mod n

To decrypt the block, compute

M=Cd mod n

Each plaintext block must be smaller than


the value of n.

89

Prime Numbers & Relatively Prime

A prime number, or prime, is a number that


is evenly divisible by only 1 and itself.
For instance 10 is not prime because it is
evenly divisible by 1, 2, 5 and 10. But 11 is
prime, since only 1 and 11 evenly divide it.
The numbers that evenly divide another
number are called factors. The process of
finding the factors of a number is called
factoring.
Relatively Prime : Two numbers are
relatively prime if they share only one
factor, namely 1.
90

Modular Arithmetic
a = b mod (m) means that when a is
divided by m the remainder is b.
Examples
11 = 1 mod (5)
20 = 2 mod (6)

91

RSA Example 1
1.
2.
3.

4.
5.
?

Lets select prime ; p = 3 and q = 11


Then compute the modulus , n = p x q = 33
Compute Eulers phi-function,
(n) = (p-1) X (q -1)
(33) = (2) x (10) = 20
Select e : gcd(e,20)=1; lets choose e = 3
Compute d ; d x e = 1 mod 20 ; d < 20
3d = 1 mod 20 ; d = 7 , why
3 x 7= 1 mod 20
21 = 1 mod 20
( 21divide by 20, the remainder

is 1)
6.
Kpub= {e,n] ={3,33}
7.
Kpvt={d,n} = { 7,33}
C = Ped (mod n)
P = C (mod n)

; cyphertext
; plaintext
92

Try to solve this

What is the encryption and decryption


of M = 2 if Kpub= {3,33} and Kpvt= {
7,33} ?
C = ?? & P = ??

93

RSA Example

94

RSA Example 2
1.
2.
3.
4.
5.

Select primes: p=17 & q=11


Compute n = pq =1711=187
Compute (n)=(p1)(q-1)=1610=160
Select e : gcd(e,160)=1; choose e = 7
Determine d: de=1 mod 160 and d < 160
Value is d=23 since 237=161= 1 mod 160
161divide by 160, the
remainder is 1

6.
7.

Publish public key Kpub={7,187}


Keep secret private key Kpvt={23,187}
95

RSA Example cont...


sample RSA encryption/decryption is:
given message M = 88 (M < n , 88<187)
encryption:

C = 887 mod 187 = 11

decryption:
M = 1123 mod 187 = 88

96

RSA Example 3
1.
2.
3.
4.
5.

Select primes: p=7 & q=11


Compute n = pq =711=77
Compute (n)= (p1)(q-1)= 610 = 60
Select e : gcd(e,60)=1; if choose e = 13
Determine d: de=1 mod 60 and d < 60
Value is d=37 since 3713 =481= 1 mod 60
481divide by 60, the
remainder is 1

6.
7.

Publish public key Kpub= {e,n} ={13,77}


Keep secret private key Kpvt={d,n} =
{37,77}
97

Encrypt and decrypt


EXERCISE:

Upin sends the plaintext 5 to Ipin.


Using the above public and private key in
example 3, what is the cyphertext , C and
plaintext ,P?
Remember ; C = Pe (mod n)
= 513 mod 77
cyphertext

P = C37 mod 77

plaintext

98

REFERENCES:
Main:
Forouzan,
B.A.
(2012).
Data
Communications
and
Networking
(5th
edision). Mc Graw Hill. (ISBN: 978-0-07131586-9)
Additional:
William
Stallings.
(2011).
Data
And
Computer Communication (9th edition).
Prentice Hall. (ISBN-10: 0131392050)
99

Vous aimerez peut-être aussi