Coding Encryption and Hashing
Coding Encryption and Hashing
Coding Encryption and Hashing
Hashing
Differences and Applications
Coding
- Phase Shift Keying (PSK)
- Quadrature Amplitude Modulation (QAM).
The main goal of wireless communication Analog data to analog signal conversion
systems to transmit the information (voice, text, Analog data in electrical form can be transmitted as
video, image, etc.) from source to destination baseband signals easily and cheaply; this is done with
through wireless physical channel in correctly voice transmission over voice-grade lines.
form. Coding is the basic method used to Examples:
optimize the communication system by converts - Amplitude Modulation (AM)
- Frequency Modulation (FM)
the information or add extra bits.
- Phase Modulation (PM)
Source Coding
Channel coding
Used to improve the transmission system by using the
Used to error detection and /or error correction, by
bandwidth more efficiently, this is done by converting
adding extra bits, or change the sequence of symbols
the information in a proper form, such as redundant
at the transmitter (encoding) and remove them at the
bits are removed this process is called compression.
receiver (decoding), there are different types of them
There are different forms of source coding, the actual
depend on channel types. Our channel can be either
form of the encoding is chosen to optimize some
AWQN channel or fading channel.
characteristic of the transmission. Such as following:
AWQN channel codes
Digital data to digital signal conversion
i- Linear Block Codes
In general, the equipment for encoding digital data
Such as:
into a digital signal is less complex and less expensive
- Binary Linear Block Codes
than digital-to-analog Modulation equipment.
- Generator Matrix
Examples:
- Parity Check Matrix
- Nonreturn-to-Zero-Level (NRZ-L)
- Syndrome Testing
- Nonreturn to Zero Inverted (NRZ-I)
- Cyclic Codes
- Bipolar-AM1, Pseudoternar
- Hamming code
- Manchester Differential
- Golay code
- Manchester BIZS, and HDB3.
- Bose-Chadhuri-Hocquenghem (BCH) codes.
Analog data to digital signal conversion ii- Convolutional Codes
iii- Concatenated Codes
Conversion of analog data to digital form permits the iv- Turbo Codes
use of modern digital transmission and switching v- Low Density Parity Check Codes
equipment.
Examples: Fading channel codes
- Pulse Code Modulation (PCM)
In fading channels errors associated with the
- Delta Modulation (DM)
demodulator tend to occur in bursts. To improve
Digital data to analog signal conversion performance of coding in fading channels, Block
convolutional, and turbo coding is typically combined
Some transmission media, such as optical fiber and with interleaving to mitigate the effect of error bursts.
the unguided media, will only propagate analog
signals.
Examples:
- Amplitude Shift Keying (ASK)
- Frequency Shift Keying (FSK)
Page 2
Coding, Encryption and Hashing
Encryption
batch of public one-time session set-up keys to the
messaging service’s server and retains the
corresponding set of private keys.
is the process of encoding a message or information in
such a way that only authorized parties can access it Virtual Private Network
and those who are not authorized cannot, and it's It's a way of creating an Encrypted connection
widely used in almost everywhere and so there are between a User and a site, VPNs operate by using
many types of applications such as computer symmetric cryptography to encrypt packets of data to
applications, software and hardware. They all be transmitted between central and remote locations,
integrate encryption to accomplish objectives that and then embedding the encrypted packets in “outer”
users value. Here is a list of the most common packets that are routed over the Internet.
applications:
Device locking
By defaults the data contained by a mobile device is
locked whenever the screen is locked and can be
accessed only by the user, it's a combination of
cryptographic passcode protection and full disk
encryption. The key needed to unlock the phone is a
combination of the user’s passcode and the phone’s
hardware key, so whenever a person tries to unlock
the phone the device gives a several numbers of
attempts before it gets locked by an iCloud or an
Email verification process.
Secure Massaging
Here in this application we use an End-to-End
protocol to prevent any chance of third parties such as
the service provider from getting these messages,
When a user registers for a messaging service, There
is a protocol called signal protocol used in :
WhatsApp, Facebook and even Messenger it sends a
public identity key, public session set-up key, and a
Page 3
Coding, Encryption and Hashing
Hashing
I. Coding and encryption are reversible, while
hashing is un-reversible. Encryption is a two-way
function; what is encrypted can be decrypted with
Is generating a value or values from a string of text the proper key. Hashing, however, is a one-way
using a mathematical function. Hashing is one way to function that scrambles plain text to produce a
enable security during the process of message unique message digest. with a properly designed
transmission when the message is intended for a algorithm, there is no way to reverse the hashing
particular recipient only. A formula generates the process to reveal the original password
hash, which helps to protect the security of the II. Coding is used for improving the data while
transmission against tampering. Hashing is also a hashing and encryption are used for security
method of sorting key values in a database table in an purposes.
efficient manner. III. Coding is essential process, while encryption and
hashing are optional. Encryption and hashing used
How it works? to prevent the unauthorized access to data by
changing the data and hiding it, while coding
A user sends a secure message, a hash of the intended
improve the data transmission without hiding the
message is generated and encrypted, and is sent along
original information
with the message. When the message is received, the
receiver decrypts the hash as well as the message.
Then, the receiver creates another hash from the
message. If the two hashes are identical when
compared, then a secure transmission has occurred.
This hashing process ensures that the message is not References
altered by an unauthorized end user. Hashing is used
[1] WIRELESS COMMUNICATIONS by Andrea
to index and retrieve items in a database because it is
Goldsmith, Stanford University.
easier to find the item using the shortened hashed key
[2] Data and computer communication by William
than using the original value. One of the main types of
Stallings fifth edition
hashing is MD5...and it's the strongest type which
[3] https://www.nap.edu/read/25010/chapter/4#20
can't be reversed even with strong code generators.
[4]
https://www.techopedia.com/definition/14316/hashing
[5] https://www.en.m.wikipedia.org/wiki/Encryption
Page 4