0% found this document useful (0 votes)
24 views

Coding Encryption and Hashing

Coding

Uploaded by

Amro A
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Coding Encryption and Hashing

Coding

Uploaded by

Amro A
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

 Coding, Encryption and

Hashing
Differences and Applications

Dr. Ashraf Qsim Al-Sayed 


Adam Ahmed Mohamed Elnour
Amro Abdo abbas Ahmed
Mohammed Samir Al-Haj Mohammed
Mohammed Zakaria Ali Ahmed
 Coding, Encryption and Hashing

Coding
- Frequency Shift Keying (FSK)
- Phase Shift Keying (PSK)
- Quadrature Amplitude Modulation (QAM).
The main goal of wireless communication systems
to transmit the information (voice, text, video, Analog data to analog signal conversion
image, etc.) from source to destination through Analog data in electrical form can be transmitted as
wireless physical channel in correctly form. baseband signals easily and cheaply; this is done with
Coding is the basic method used to optimize the voice transmission over voice-grade lines.
communication system by converts the Examples:
- Amplitude Modulation (AM)
information or add extra bits.
- Frequency Modulation (FM)
Source Coding - Phase Modulation (PM)

Used to improve the transmission system by using the Channel coding


bandwidth more efficiently, this is done by converting
Used to error detection and /or error correction, by
the information in a proper form, such as redundant
adding extra bits, or change the sequence of symbols
bits are removed this process is called compression.
at the transmitter (encoding) and remove them at the
There are different forms of source coding, the actual
receiver (decoding), there are different types of them
form of the encoding is chosen to optimize some
depend on channel types. Our channel can be either
characteristic of the transmission. Such as following:
AWQN channel or fading channel.
Digital data to digital signal conversion
AWQN channel codes
In general, the equipment for encoding digital data
i- Linear Block Codes
into a digital signal is less complex and less expensive
Such as:
than digital-to-analog Modulation equipment.
- Binary Linear Block Codes
Examples:
- Generator Matrix
- Nonreturn-to-Zero-Level (NRZ-L)
- Parity Check Matrix
- Nonreturn to Zero Inverted (NRZ-I)
- Syndrome Testing
- Bipolar-AM1, Pseudoternar
- Cyclic Codes
- Manchester Differential
- Hamming code
- Manchester BIZS, and HDB3.
- Golay code
Analog data to digital signal conversion - Bose-Chadhuri-Hocquenghem (BCH) codes.
ii- Convolutional Codes
Conversion of analog data to digital form permits the iii- Concatenated Codes
use of modern digital transmission and switching iv- Turbo Codes
equipment. v- Low Density Parity Check Codes
Examples:
- Pulse Code Modulation (PCM) Fading channel codes
- Delta Modulation (DM)
In fading channels errors associated with the
Digital data to analog signal conversion demodulator tend to occur in bursts. To improve
performance of coding in fading channels, Block
Some transmission media, such as optical fiber and convolutional, and turbo coding is typically combined
the unguided media, will only propagate analog with interleaving to mitigate the effect of error bursts.
signals.
Examples:
- Amplitude Shift Keying (ASK)

 Page 1
 Coding, Encryption and Hashing

Encryption
public identity key, public session set-up key, and a
batch of public one-time session set-up keys to the
messaging service’s server and retains the
is the process of encoding a message or information corresponding set of private keys.
in such a way that only authorized parties can access
it and those who are not authorized cannot, and it's Virtual Private Network
widely used in almost everywhere and so there are It's a way of creating an Encrypted connection
many types of applications such as computer between a User and a site, VPNs operate by using
applications, software and hardware. They all symmetric cryptography to encrypt packets of data to
integrate encryption to accomplish objectives that be transmitted between central and remote locations,
users value. Here is a list of the most common and then embedding the encrypted packets in “outer”
applications: packets that are routed over the Internet.

Protecting stored files


Here an application that is used to protect a file or
more and that is always done by applying symmetric
encryption to ensure protecting the contents. The
key for the symmetric encryption system may be
entered into the program by the user, derived from a
user supplied password, entered from a hardware
token, protected by an asymmetric encryption system
in which the symmetric encryption key is encrypted
under a public key and decrypted when the
corresponding private key is provided. If data is
encrypted and the key is destroyed, the data becomes
inaccessible as if it were erased.

Device locking
By defaults the data contained by a mobile device is
locked whenever the screen is locked and can be
accessed only by the user, it's a combination of
cryptographic passcode protection and full disk
encryption. The key needed to unlock the phone is a
combination of the user’s passcode and the phone’s
hardware key, so whenever a person tries to unlock
the phone the device gives a several numbers of
attempts before it gets locked by an iCloud or an
Email verification process.

Secure Massaging
Here in this application we use an End-to-End
protocol to prevent any chance of third parties such
as the service provider from getting these messages,
When a user registers for a messaging service, There
is a protocol called signal protocol used in :
WhatsApp, Facebook and even Messenger it sends a

 Page 2
 Coding, Encryption and Hashing

Hashing
Differences between coding, encryption
and hashing
I. Coding and encryption are reversible, while
Is generating a value or values from a string of text
hashing is un-reversible. Encryption is a two-way
using a mathematical function. Hashing is one way to
function; what is encrypted can be decrypted with
enable security during the process of message
the proper key. Hashing, however, is a one-way
transmission when the message is intended for a
function that scrambles plain text to produce a
particular recipient only. A formula generates the
unique message digest. with a properly designed
hash, which helps to protect the security of the
algorithm, there is no way to reverse the hashing
transmission against tampering. Hashing is also a
process to reveal the original password
method of sorting key values in a database table in an
II. Coding is used for improving the data while
efficient manner.
hashing and encryption are used for security
purposes.
How it works?
III. Coding is essential process, while encryption and
A user sends a secure message, a hash of the hashing are optional. Encryption and hashing used
intended message is generated and encrypted, and is to prevent the unauthorized access to data by
sent along with the message. When the message is changing the data and hiding it, while coding
received, the receiver decrypts the hash as well as improve the data transmission without hiding the
the message. Then, the receiver creates another hash original information
from the message. If the two hashes are identical
when compared, then a secure transmission has
occurred. This hashing process ensures that the
message is not altered by an unauthorized end user.
Hashing is used to index and retrieve items in a
References
database because it is easier to find the item using the
shortened hashed key than using the original value. [1] WIRELESS COMMUNICATIONS by Andrea
One of the main types of hashing is MD5...and it's the Goldsmith, Stanford University.
strongest type which can't be reversed even with [2] Data and computer communication by William
strong code generators. Stallings fifth edition
[3] https://www.nap.edu/read/25010/chapter/4#20
[4]
https://www.techopedia.com/definition/14316/hashing
[5] https://www.en.m.wikipedia.org/wiki/Encryption

 Page 3

You might also like