You are on page 1of 7

Data representation: The way that binary codes are used to represent different types of data, for example

numbers and letters.

For example:

176 - 10110000 250 - 11111010 73 - 1001001 17 - 10001 42 - 101010


A - 1000001 K -01001011 T - 01010100 u - 01110101 z - 01111010

Binary: All computers process data in digital form. This means that the processor inside a computer works by manipulating zeros
and ones, known as binary code. The term data representation refers to the way that binary codes are used to represent
different types of data.

As well as working with numbers, computers also have to handle text, graphics, sounds and films. The computer can only deal
with all these different types of information if they are in binary form. This means that there has to be a method for converting
all this information into binary code, into zeros and ones.

ASCII: ASCII (pronounces as-kee) stands for the American Standard Code for Information Interchange and is a system developed
in the 1960s for transferring data electronically. The original version was a 7-bit code, although more modern versions use more
bits. ASCII has a binary code for all of the characters in the English language as well as special characters.

For Example:

G - 071 H - 072 L - 076 Z - 090 B - 066


b - 098 c - 099 e - 101 o - 111 q - 113

Other character coding systems:

Coding Number Number of Year Invented by Description


system of bits Possible Invented
characters
Baudot 5 32 1870 mile Baudot Each character in the alphabet is represented
by a series of five bits, sent over a
communication channel such as a telegraph
wire or a radio signal. The symbol
rate measurement is known as baud, and is
derived from the same name.
EBCDIC 8 256 Early, Used in IBM is an eight-bit character encoding used mainly
( Extended 1960 mainframe on IBM Mainframe and IBM midrange
Binary Coded computers computer operating
Decimal systems. EBCDIC descended from the code
Interchange used with punched cards and the
Code ) corresponding six bit binary-coded
decimal code used with most of IBM's computer
peripherals. It is also supported on various non-
IBM platforms such as Fujitsu-Siemens' , MSP-
EX, and Unisys VS/9 and MCP.
Unicode 16 65536 1889 Universal Is a more modern code and is one of the main
Coded standards used today for converting binary into text.
Character Set The codes we have looked at so far use 5, 7 or 8 bits
and can therefore only represent a relatively small
number of characters. Unicode uses 16 bits, which
means that it can represent many more characters.
ASCII 7 128 October Developed ASCII codes represent text in
6, 1960 from telegraph computers, telecommunications equipment, and
code other devices. Most modern character-encoding
schemes are based on ASCII, although they
support many additional characters.

Cypher: An algorithm to encrypt and decrypt data.

Encryption: Encryption is the conversion of electronic data into another form, called cipher text, which cannot be easily
understood by anyone except authorized parties.
The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or

transmitted via the Internet or other computer networks. Modern encryption algorithms play a vital role in the security

assurance of IT systems and communications as they can provide not only confidentiality, but also the following key

elements of security:

Authentication: the origin of a message can be verified.


Integrity: proof that the contents of a message have not been changed since it was sent.
Non-repudiation: the sender of a message cannot deny sending the message.
Decryption is the process of taking encoded or encrypted text or other data and converting it back
into text that you or the computer can read and understand. This term
could be used to describe a method of un-encrypting the data manually
or with un-encrypting the data using the proper codes or keys.
Data may be encrypted to make it difficult for someone to steal the
information. Some companies also encrypt data for general protection
of company data and trade secrets. If this data needs to be viewable, it
may require decryption. If a decryption passcode or key is not
available, special software may be needed to decrypt the data using
algorithms to crack the decryption and make the data readable.

What is encryption and why is it important?


Encryption, is the process of changing information in such a way as to make it unreadable by anyone
except those possessing special knowledge (usually referred to as a "key") that allows them to change
the information back to its original, readable form.
Encryption is important because it allows you to securely protect data that you don't want anyone
else to have access to. Businesses use it to protect corporate secrets, governments use it to secure
classified information, and many individuals use it to protect personal information to guard against
things like identity theft.
Uses encryption to securely protect folder contents, which could contain emails, chat histories, tax
information, credit card numbers, or any other sensitive information. This way, even if your comptuer
is stolen that data is safe.
Enigma machines

The Enigma machines were a series of electro-mechanical rotor cipher machines developed and used in the early- to
mid-twentieth century to protect commercial, diplomatic and military communication. Enigma was invented by
the German engineer Arthur Scherbius at the end of World War I.[1] Early models were used commercially from the
early 1920s, and adopted by military and government services of several countries, most notably Nazi
Germany before and during World War II.[2] Several different Enigma models were produced, but the German
military models, having a plugboard, were the most complex. Japanese and Italian models were also in use.

Breaking Code:

The Enigma code was first broken by the polish cipher Bureau in 1932. Three Polish Cryptologists Marian Rejewski,
Jerzy Rozycki and Henryk Zygalski worked it out suing mathematics and information supplied by French military
intelligence.

The cypher is the algorithm used to encrypt and decrypt a message. We know the cypher used and how the
encryption was performed but, without the key to decrypt the cyphertext, we cannot turn it into plain text.

Year Invented by: Instrument:


742 BC Ancient Greeks Scytale Messages are written on strips of
paper
About 50BC Julius Caesar Cypher System Is a type of substitution cypher, and
the basic method is still used today.
1467 Alberti Cypher Two rotating disk Used nearly 500 years, later during
the Second World War.
1586 Mary Queen of Scots Use coded letters in a plot to
assassinate Elizabeth I.
1605 Francis Bacon Steganography Converting letters into 5 bit codes
long before the binary system.
1900 BC Ancient Egypt Carved into monuments and they
carved for fun.
800 600 BC Ancient Greeks Polybius Square Use cyphers to send messages about
military matters. This method of
sending signals using smoke or
torches.
AD 800 900 Arabic First to write down the theories of
Mathematicians Cryptography.
1938 1945 Alan Turing Creating and breaking codes is critical
to success in both world wars.
1961 Massachusetts First ever computer password to
Institute of prevent students from wasting
Technology (MIT) precious computer time
1995 Hackers become a popular way of
describing someone who tries to
break into a computer system
illegally.
1797 Thomas Jefferson Wooden Cylinder Letters of the alphabet are printed on
each wheel and each wheel has to be
in the correct position for the
message to be read
1789 1815 Napoleon Bonaparte Develops own Cylinder To Transmit sensitive military
information during the French
Revolution and the Napoleonic Wars.
Present Modern Cryptography is used on a
very wide range of personal and
public applications.
Common methods for Encrypting data:

There are several common methods for encrypting data:

1. The Reverse Cypher:

The reverse cipher encrypts a message by printing it in reverse order. So Hello world! encrypts to !dlrow
olleH. To decrypt, you simply reverse the reversed message to get the original message. The encryption
and decryption steps are the same.

The reverse cipher is a very weak cipher. Just by looking at its cyphertext you can figure out it is just in
reverse order.

For example:

.syas ti tahw tuo erugif llits ylbaborp nac uoy ,detpyrcne si siht hguoht neve ,elpmaxe roF

For Example, even thought this is encrypted, you can probably still figure out what it says.

2. Substitution Cypher/ Caesar Cypher:

The Caesar cipher, also known as a shift cipher, is one of the simplest forms of encryption. It is a
substitution cipher where each letter in the original message (called the plaintext) is replaced with a
letter corresponding to a certain number of letters up or down in the alphabet.

In this way, a message that initially was quite readable, ends up in a


form that can not be understood at a simple glance.

For example, here's the Caesar Cipher encryption of a message,


using a right shift of 3.

Plaintext:

THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG

Ciphertext:

QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD

The ciphertext alphabet is sometimes different from the plaintext alphabet; for example, in the pigpen cipher, the
ciphertext consists of a set of symbols derived from a grid. For example:
Such features make little difference to the security of a scheme, however at the very least, any set of strange
symbols can be transcribed back into an A-Z alphabet and dealt with as normal.
In lists and catalogues for salespeople, a very simple encryption is sometimes used to replace numeric digits by
letters.
Plaintext digits: 1234567890

Ciphertext alphabets: MAKEPROFIT

Example: MAT would be used to represent 120.


3. Modulo 2 encoding:
During the Second World War, a German Engineering Company called Lorenz developed a system for
sending secret messages. In Simple terms, the code used a method called Modulo 2 addition, which was
a way of creating a Substitution cypher.
Every letter is given a 5-bit binary code. Then the binary codes are added together using Modulo 2
addition, to create a new binary code, which in turn represents a new letter. The key is added to plaintext
to create the cyphertext.
4. Transposition Cyphers:
In cryptography, a transposition cipher is a method of encryption by which the positions held by units
of plaintext (which are commonly characters or groups of characters) are shifted according to a regular
system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is
changed (the plaintext is reordered). Mathematically a bijective function is used on the characters'
positions to encrypt and an inverse function to decrypt.
The message is then read off in rows. For example, using three "rails" and a message of 'WE ARE
DISCOVERED. FLEE AT ONCE', the cipherer writes out:

W . . . E . . . C . . . R . . . L . . . T . . . E
. E . R . D . S . O . E . E . F . E . A . O . C .
. . A . . . I . . . V . . . D . . . E . . . N . .

Then reads off:

WECRL TEERD SOEEF EAOCA IVDEN


Functions for Binary coding:

1. DEC2BIN

=DEC2BIN(NUMBER)

Converts a decimal number to binary.

For Example:

=DEC2BIN(89) 1011001

2. BIN2DEC
=BIN2DEC(NUMBER)
Converts a binary number to decimal.

For Example:

=BIN2DEC(101100) 44

3. CHAR
=CHAR(NUMBER)
Returns the character specified by the code number from the character set for your computer.

For Example:

=CHAR(35) #

Functions for Conditional Statements:


1. VLOOKUP:
=VLOOKUP(Value you want to look up, range where you want to lookup the value, the
column number in the range containing the return value, Exact Match or Approximate Match
indicated as 0/FALSE or 1/TRUE).

2. IF:

The IF function is one of the most popular functions in Excel, and it allows you to make logical
comparisons between a value and what you expect. In its simplest form, the IF function says:

IF(Something is True, then do something, otherwise do something else)

So an IF statement can have two results. The first result is if your comparison is True, the second if
your comparison is False.
3. Modulo:

Returns the remainder after number is divided by divisor. The result has the same sign as divisor.

Syntax

MOD(number, divisor)

The MOD function syntax has the following arguments:

Number Required. The number for which you want to find the remainder.

Divisor Required. The number by which you want to divide number.

You might also like