Sunday, July 29, 2012

Encryption

Message decryption(Attack)
The following is an example of me decrypting a Caser Cipher;
First, I looked at the order the letter r and j were by themselves, using frequency analysis attack (this is when you look at the order and spacing of cipher text). So I used the brute force attack (this is considering all possibilities) guessing that one of them is a "a" and the other is a "I". If  R is I then the key could be the following; 17 or -9 when it is -9  j is a, so this is likely to be correct; I will proceed to decrypt (find plain text) the cipher text (text with hidden message) and if the plain text (a message at its purest ) if revealed the key is correct or not. After substitution ciphering (testing a possible key) the text I got was; "I meft my snul io a deep" my estimation was incorrect, but when analysing, some words are whole, so there must be some connection to -9 as a key. Frequency analysis; there are three two letter words starting with R as well as it being by itself, I believe, I could find a the plain text for "R" if I use the brute force attack and guess letters until one fits; Common two letter word, in at to is be by it, if none of the letters can start with I because -9 doesn't work. After this I prompted the encrypt-er to cheek his work and it turned out my inital frequency analysis attack was actually a successful decipher method to find the key.

i left my soul in a deep dark hole and then I followed it in - kenny rogers
r unoc vh bxdu rw j mnny mjat qxun jwm cqnw r oxuuxfnm rc rw - tnwwh axpnab


Encryption importance
Encryption is a necessary process in the technological world we live in today; information isn't always safe to transport in the form of plain text. Like with online credit card use, websites have to encrypt your details so hackers can't intercept and steal from customers, so without encryption online shopping wouldn't exist. An other example of the importance of encryption is the police and governments use, police can't use databases containing undercover investigations if there is a chance that it could be intercepted by criminals themselves, in this case encryption saves lives.   


Wednesday, July 25, 2012

ASCII
This is a representation system for all characters in the English language with 128 individual possibilities; containing all the letters including the capital versions ECT. Each character is stored using seven bits. ASCII isn't compatible with any other languages. For example, a device only capable of reading ASCII can't read other languages, but a device using the more universal data type uni code, can read ASCII

Uni code
This is a representation system for all characters in all languages. This uses 8 bit for each character and uses two bytes. This system can represent up to 65536 characters. Unicode is backwards compatible with the ASCII system, the first 256 of the characters are the same. 

Monday, July 23, 2012

Number storage 
My device displays an available storage value, with the possible value size of 0-6400(MB). This is under the assumption my device has the capability of displaying the available storage, even if there is no storage left, also that the SDHC storage technology is limited to 64gb(specifically) for my device. This number is displayed when navigating through the system settings. It is likely that this number is stored in the binary format within my device, because of its vast range of possible values (6401); this would need 13 bits to store the identification of the four digits, this would use up to 2bytes of storage in the devices random access memory; because that is the maximum amount of bytes that the number would ever need. It is likely that my device only temporarily stores the value, because it would have to be recalculated every time its viewed. An example of the binary representation could be 1100100000000 for 6400. 

Sunday, July 22, 2012

ASCII code
7or 8bits
2^7=128
2^8=256(128 extra)


pros
internationally recognized
little storage space required
data can transfer across devices and is recognizable
cons   
limited number of characters( not many bits to use)
not compatible with other languages
would need to software for separate languages

ASCII represents characters by assigning each character with a unique binary code of 7 bits
for example "Shaun Tocher" is repersented in ascii (binary) as the following;

0100100 1101000 1100001 1110101 1101110 1010100 1101111 1100011 1101000 1100101 1110010

but not all languages can fit within this system
Egyptian hieroglyphics has 700-800 characters 


English           Chinese             uni                                                  Binary 
Bannana        香蕉             香蕉of(香蕉 )      1001100110011001 1000010101001001



http://wiki.answers.com/Q/How_many_hieroglyphic_characters_are_there  
http://translate.google.com/#auto|zh-TW|Banana
http://software.ellerton.net/txt2bin/
http://www.chinese-tools.com/tools/converter-unicode.html
Number can store                  Example           Bits       Digits    No of byts                    largest possible No#
Available storage                   12.50GB          13            4              2                                      6400   
Time                                      10:21               11            4              2                                      1200
Battery use percentage             81                   7             2              1                                         99
Screen Timeout                        15 seconds    12             2             2                             30 00(unit changes)
lock password       9075679912121234        54            16            6                         9999999999999999


                    Lenovo K1 Ideapad

NVIDIA® Tegra 2.0 T20 1.0GHz processor
Google Android 3.1 operating system
10.1” HD (1280x800) display
Up to 1GB DDR2 memory, up to 64GB SSD storage
Integrated front (2M) & back (5M) mounted webcam