SlideShare une entreprise Scribd logo
1  sur  4
Basic Security Issues
• Mechanism
• Services
• Attack
3 Aspect of Information Security
• Security Mechanism
• Security Services
• Security Attack
Ceaser Cipher
Cease Cipher Manipulate the Character with 3 positions (for example: if we Cipher “A” into Ceaser technique then it should be
“D”)
Formula
C= E(P)
C= (P+3) mod26
C= (P+K) mod26
C= Answer
Where C= Cipher
P= Plain Text
E= Encryption
K= Key
Example
P = 81529
0 1 2 3 4 5 6 7 8 9
1 2 3 4 5 6 7 8 9 10
C=E(P)
C = (P+K) mod10
C = (P+3)mod10
C = (8+3)mod10 = 1
C = (1+3)mod10 = 4
C = (5+3)mod10 = 8
C = (2+3)mod10 = 5
C = (9+3)mod10 = 2
E = 14852
P= MUSTARD
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
E= PXVWDUG
Transportation Technique
In Transportation technique we assign fixed range of column, and in that column all the text is entered and encrypt the text with
respect to the column of the row
Example
We are taking 10 Column for the text
P= COMPUTER GRAPHIC MAY BE SLOW BUT ITS EXPENSIVE
1 2 3 4 5 6 7 8 9 10
C O M P U T E R G R
A P H I C M A Y B E
S L O W B U T I T S
E X P E N S I V E Z
E= CAESE OPS MHLE PIOX UCWP T BE EMUN RATS GYII RBTV
Time required at 1 Encryption/ U sec
2^31 U sec = 35.8 min
Key size Number of
Alternative Keys
Time required for 1
encryption
Time required at 10^6
Decryption
32 2^31 = 4.3 x 10^9 2^31usec=35.8 2.15 millisecond
56 2^55 = 7.2 x 10^16 2^55usec=10 hours 10 hours
128 2^127 = 3.4 x 10^38 2^127usec= 5.4x10^18 years
168 2^167 = 3.7 x 10^50 2^167usec= 5.9x 10^30 years
Where
Time Required for 1 encryption for 56 Key size formulated as
2^55
________________
3600 x 10^6 x 10^6
and Time Required for 1 Encryption for 168 keys are formulated as
2^167
____________________
3600 x 10^6 x 10^6 x 365 x 24
Play Fair Cipher
In play fair cipher technique we draw a 5 x 5 matrix and in that matrix the word in encrypted, IN THE REMAINING
COLUMN we add the remaining alphabets
Example
Keyword: Monarchy
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
AR = (A Converted to the next one that is R and “R” Converted to the next one that is “M”)
AR = RM
MU = (Now Mu belongs to the same column, so “M” will be converted to the next one that is “C” and “U” will be
converted into the next one that is “M”)
MU = CM
HS = ( “H” and “S” belongs to two different column, now we first draw line to “H” row as the Line Intercepts the “B” so
“H” will be converted into B and for “S” we again draw a line as we drew for “H”, As blue line Intercepts on “P” so )
HS = BP
Substitution Technique
DES Algorithm
Des algorithm work on behf of Hexa Decimal Nubers
Plain text= 675a69675e5a6b5a
1st
step
Convert the above number into binary
1234 5678 9-12 13-16 17-20 21-24 25-28 29-32 33-36 37-40 41-44 45-48 49-52 53-56 57-60 61-64
0110 | 0111 | 0101 | 1010 | 0110 | 1001 | 0110 | 0111 | 0101 | 1110 | 0101 | 1010 | 0110 | 1011| 0101 | 1010
2nd
Step (IP Initial Permutation)
We will consider Table
58 50 42 34 26 18 10 2
60 52 44 36 28 20 12 4
62 54 46 38 30 22 14 6
64 56 48 40 32 24 16 8
57 49 41 33 25 17 9 1
59 51 43 35 27 19 11 3
61 53 45 37 29 21 13 5
63 65 47 39 31 23 15 7
1 1 1 1 1 1 1 1
1 0 1 1 0 0 1 0
0 0 0 1 1 0 0 1
0 1 0 0 1 1 0 1
0 0 0 0 0 0 0 0
0 1 0 0 1 1 0 1
1 1 1 1 0 1 1 0
1 1 1 1 1 0 1 1
3rd
Step
3rd
step is to convert the above binary numbers into Hexa decimal
Note: convert only 4 Block of Number
1 1 1 1 = F + 1 1 1 1 = F
Converted Hexa String = FF B2 19 4D 00 4D F6 FB
4th
Step
Taking the inverse permutation
1 1 1 1 1 1 1 1
1 0 1 1 0 0 1 0
0 0 0 1 1 0 0 1
0 1 0 0 1 1 0 1
0 0 0 0 0 0 0 0
0 1 0 0 1 1 0 1
1 1 1 1 0 1 1 0
1 1 1 1 1 0 1 1
Here
Inverse these strings
1111 1111 1011 0010 0001 1001 0100 1101 0000 0000 0100 1101 1111 0110 1111 1011

Contenu connexe

Tendances

Lecture 15 data structures and algorithms
Lecture 15 data structures and algorithmsLecture 15 data structures and algorithms
Lecture 15 data structures and algorithms
Aakash deep Singhal
 
Assignment3 solution 3rd_edition
Assignment3 solution 3rd_editionAssignment3 solution 3rd_edition
Assignment3 solution 3rd_edition
Mysore
 
10 mathfinal2011review
10 mathfinal2011review10 mathfinal2011review
10 mathfinal2011review
Joshua Gerrard
 
Needs memorising of last digits of squares from 1
Needs memorising of last digits of squares from 1Needs memorising of last digits of squares from 1
Needs memorising of last digits of squares from 1
megha115
 
Derivatives and slope 2.1 update day1
Derivatives and slope 2.1 update day1Derivatives and slope 2.1 update day1
Derivatives and slope 2.1 update day1
Lorie Blickhan
 

Tendances (18)

Paging group 2 g
Paging group 2 gPaging group 2 g
Paging group 2 g
 
Lecture 15 data structures and algorithms
Lecture 15 data structures and algorithmsLecture 15 data structures and algorithms
Lecture 15 data structures and algorithms
 
Edited Per4 Analytic Geometry
Edited Per4 Analytic GeometryEdited Per4 Analytic Geometry
Edited Per4 Analytic Geometry
 
1.6 all notes
1.6 all notes1.6 all notes
1.6 all notes
 
Slides to RSA Presentation
Slides to RSA PresentationSlides to RSA Presentation
Slides to RSA Presentation
 
Bellman Ford Routing Algorithm-Computer Networks
Bellman Ford Routing Algorithm-Computer NetworksBellman Ford Routing Algorithm-Computer Networks
Bellman Ford Routing Algorithm-Computer Networks
 
Latihan Power Point
Latihan Power PointLatihan Power Point
Latihan Power Point
 
Jawaban 1
Jawaban 1Jawaban 1
Jawaban 1
 
Jawaban
JawabanJawaban
Jawaban
 
3XRC4
3XRC43XRC4
3XRC4
 
Sol71
Sol71Sol71
Sol71
 
Assignment3 solution 3rd_edition
Assignment3 solution 3rd_editionAssignment3 solution 3rd_edition
Assignment3 solution 3rd_edition
 
Integers
IntegersIntegers
Integers
 
10 mathfinal2011review
10 mathfinal2011review10 mathfinal2011review
10 mathfinal2011review
 
Bicubic interpolation codes
Bicubic interpolation codesBicubic interpolation codes
Bicubic interpolation codes
 
Needs memorising of last digits of squares from 1
Needs memorising of last digits of squares from 1Needs memorising of last digits of squares from 1
Needs memorising of last digits of squares from 1
 
Part 1 Revision Simplifying Algebraic expression
Part 1  Revision Simplifying Algebraic expressionPart 1  Revision Simplifying Algebraic expression
Part 1 Revision Simplifying Algebraic expression
 
Derivatives and slope 2.1 update day1
Derivatives and slope 2.1 update day1Derivatives and slope 2.1 update day1
Derivatives and slope 2.1 update day1
 

Similaire à Syed Ubaid Ali Jafri - Cryptography Techniques

Yr7-RoundingApproximation.pptx
Yr7-RoundingApproximation.pptxYr7-RoundingApproximation.pptx
Yr7-RoundingApproximation.pptx
EidTahir
 
ch3a-binary-numbers.ppt
ch3a-binary-numbers.pptch3a-binary-numbers.ppt
ch3a-binary-numbers.ppt
ssuser52a19e
 
Review on Number Systems: Decimal, Binary, and Hexadecimal
Review on Number Systems: Decimal, Binary, and HexadecimalReview on Number Systems: Decimal, Binary, and Hexadecimal
Review on Number Systems: Decimal, Binary, and Hexadecimal
UtkirjonUbaydullaev1
 
Carry save addition
Carry save additionCarry save addition
Carry save addition
MICKYJINDAL
 
Mock cat solutions paper no 1
Mock cat solutions paper no 1Mock cat solutions paper no 1
Mock cat solutions paper no 1
Vandan Kashyap
 

Similaire à Syed Ubaid Ali Jafri - Cryptography Techniques (20)

Chapter 1 standard form
Chapter 1 standard formChapter 1 standard form
Chapter 1 standard form
 
PEA 305.pdf
PEA 305.pdfPEA 305.pdf
PEA 305.pdf
 
ch3a-binary-numbers.ppt
ch3a-binary-numbers.pptch3a-binary-numbers.ppt
ch3a-binary-numbers.ppt
 
Yr7-RoundingApproximation.pptx
Yr7-RoundingApproximation.pptxYr7-RoundingApproximation.pptx
Yr7-RoundingApproximation.pptx
 
ch3a-binary-numbers.ppt
ch3a-binary-numbers.pptch3a-binary-numbers.ppt
ch3a-binary-numbers.ppt
 
ch3a-binary-numbers.ppt
ch3a-binary-numbers.pptch3a-binary-numbers.ppt
ch3a-binary-numbers.ppt
 
binary-numbers.ppt
binary-numbers.pptbinary-numbers.ppt
binary-numbers.ppt
 
Review on Number Systems: Decimal, Binary, and Hexadecimal
Review on Number Systems: Decimal, Binary, and HexadecimalReview on Number Systems: Decimal, Binary, and Hexadecimal
Review on Number Systems: Decimal, Binary, and Hexadecimal
 
ch3a-binary-numbers.ppt
ch3a-binary-numbers.pptch3a-binary-numbers.ppt
ch3a-binary-numbers.ppt
 
Carry save addition
Carry save additionCarry save addition
Carry save addition
 
Lecture-10.pptx
Lecture-10.pptxLecture-10.pptx
Lecture-10.pptx
 
ch3a-binary-numbers.ppt
ch3a-binary-numbers.pptch3a-binary-numbers.ppt
ch3a-binary-numbers.ppt
 
dld 01-introduction
dld 01-introductiondld 01-introduction
dld 01-introduction
 
Basic arithmetic, instruction execution and program
Basic arithmetic, instruction execution and programBasic arithmetic, instruction execution and program
Basic arithmetic, instruction execution and program
 
Set 1 mawar
Set 1 mawarSet 1 mawar
Set 1 mawar
 
PST SC015 Chapter 2 Computer System 2017/2018
PST SC015 Chapter 2 Computer System 2017/2018PST SC015 Chapter 2 Computer System 2017/2018
PST SC015 Chapter 2 Computer System 2017/2018
 
Data representation
Data representationData representation
Data representation
 
Solutions Manual for Friendly Introduction To Numerical Analysis 1st Edition ...
Solutions Manual for Friendly Introduction To Numerical Analysis 1st Edition ...Solutions Manual for Friendly Introduction To Numerical Analysis 1st Edition ...
Solutions Manual for Friendly Introduction To Numerical Analysis 1st Edition ...
 
Mock cat solutions paper no 1
Mock cat solutions paper no 1Mock cat solutions paper no 1
Mock cat solutions paper no 1
 
RS Agarwal Quantitative Aptitude - 2 chap
RS Agarwal Quantitative Aptitude - 2 chapRS Agarwal Quantitative Aptitude - 2 chap
RS Agarwal Quantitative Aptitude - 2 chap
 

Plus de Syed Ubaid Ali Jafri

Plus de Syed Ubaid Ali Jafri (18)

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
OSI Layered based attacks
OSI Layered based attacksOSI Layered based attacks
OSI Layered based attacks
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
Data calling from web to C#
Data calling from web to C#Data calling from web to C#
Data calling from web to C#
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography)
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
IP Security over VPN
IP Security over VPNIP Security over VPN
IP Security over VPN
 
Network security over ethernet
Network security over ethernetNetwork security over ethernet
Network security over ethernet
 
LAN Security
LAN Security LAN Security
LAN Security
 

Dernier

Dernier (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 

Syed Ubaid Ali Jafri - Cryptography Techniques

  • 1. Basic Security Issues • Mechanism • Services • Attack 3 Aspect of Information Security • Security Mechanism • Security Services • Security Attack Ceaser Cipher Cease Cipher Manipulate the Character with 3 positions (for example: if we Cipher “A” into Ceaser technique then it should be “D”) Formula C= E(P) C= (P+3) mod26 C= (P+K) mod26 C= Answer Where C= Cipher P= Plain Text E= Encryption K= Key Example P = 81529 0 1 2 3 4 5 6 7 8 9 1 2 3 4 5 6 7 8 9 10 C=E(P) C = (P+K) mod10 C = (P+3)mod10 C = (8+3)mod10 = 1 C = (1+3)mod10 = 4 C = (5+3)mod10 = 8 C = (2+3)mod10 = 5 C = (9+3)mod10 = 2 E = 14852 P= MUSTARD A B C D E F G H I J K L M N O P Q R S T U V W X Y Z E= PXVWDUG
  • 2. Transportation Technique In Transportation technique we assign fixed range of column, and in that column all the text is entered and encrypt the text with respect to the column of the row Example We are taking 10 Column for the text P= COMPUTER GRAPHIC MAY BE SLOW BUT ITS EXPENSIVE 1 2 3 4 5 6 7 8 9 10 C O M P U T E R G R A P H I C M A Y B E S L O W B U T I T S E X P E N S I V E Z E= CAESE OPS MHLE PIOX UCWP T BE EMUN RATS GYII RBTV Time required at 1 Encryption/ U sec 2^31 U sec = 35.8 min Key size Number of Alternative Keys Time required for 1 encryption Time required at 10^6 Decryption 32 2^31 = 4.3 x 10^9 2^31usec=35.8 2.15 millisecond 56 2^55 = 7.2 x 10^16 2^55usec=10 hours 10 hours 128 2^127 = 3.4 x 10^38 2^127usec= 5.4x10^18 years 168 2^167 = 3.7 x 10^50 2^167usec= 5.9x 10^30 years Where Time Required for 1 encryption for 56 Key size formulated as 2^55 ________________ 3600 x 10^6 x 10^6 and Time Required for 1 Encryption for 168 keys are formulated as 2^167 ____________________ 3600 x 10^6 x 10^6 x 365 x 24 Play Fair Cipher In play fair cipher technique we draw a 5 x 5 matrix and in that matrix the word in encrypted, IN THE REMAINING COLUMN we add the remaining alphabets
  • 3. Example Keyword: Monarchy M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z AR = (A Converted to the next one that is R and “R” Converted to the next one that is “M”) AR = RM MU = (Now Mu belongs to the same column, so “M” will be converted to the next one that is “C” and “U” will be converted into the next one that is “M”) MU = CM HS = ( “H” and “S” belongs to two different column, now we first draw line to “H” row as the Line Intercepts the “B” so “H” will be converted into B and for “S” we again draw a line as we drew for “H”, As blue line Intercepts on “P” so ) HS = BP Substitution Technique DES Algorithm Des algorithm work on behf of Hexa Decimal Nubers Plain text= 675a69675e5a6b5a 1st step Convert the above number into binary 1234 5678 9-12 13-16 17-20 21-24 25-28 29-32 33-36 37-40 41-44 45-48 49-52 53-56 57-60 61-64 0110 | 0111 | 0101 | 1010 | 0110 | 1001 | 0110 | 0111 | 0101 | 1110 | 0101 | 1010 | 0110 | 1011| 0101 | 1010
  • 4. 2nd Step (IP Initial Permutation) We will consider Table 58 50 42 34 26 18 10 2 60 52 44 36 28 20 12 4 62 54 46 38 30 22 14 6 64 56 48 40 32 24 16 8 57 49 41 33 25 17 9 1 59 51 43 35 27 19 11 3 61 53 45 37 29 21 13 5 63 65 47 39 31 23 15 7 1 1 1 1 1 1 1 1 1 0 1 1 0 0 1 0 0 0 0 1 1 0 0 1 0 1 0 0 1 1 0 1 0 0 0 0 0 0 0 0 0 1 0 0 1 1 0 1 1 1 1 1 0 1 1 0 1 1 1 1 1 0 1 1 3rd Step 3rd step is to convert the above binary numbers into Hexa decimal Note: convert only 4 Block of Number 1 1 1 1 = F + 1 1 1 1 = F Converted Hexa String = FF B2 19 4D 00 4D F6 FB 4th Step Taking the inverse permutation 1 1 1 1 1 1 1 1 1 0 1 1 0 0 1 0 0 0 0 1 1 0 0 1 0 1 0 0 1 1 0 1 0 0 0 0 0 0 0 0 0 1 0 0 1 1 0 1 1 1 1 1 0 1 1 0 1 1 1 1 1 0 1 1 Here Inverse these strings 1111 1111 1011 0010 0001 1001 0100 1101 0000 0000 0100 1101 1111 0110 1111 1011