Supplying truly random characters in this volume is a significant task. Thus, a Caesar cipher with a shift of 3 is denoted by the key valueÂ d. We can express the VigenĂ¨re cipher in the following manner. Thus, a mammoth key distribution problem exists. 1.6).Examples of similar weak ciphers are Caesar Shift, Atbash, and Keyword. Similarly, decryption is a generalization of Equation (2.2): To encrypt a message, a key is needed that is as long as the message. Vernam proposed the use of a running loop of tape that eventually repeated the key, so that in fact the system worked with a very long but repeating keyword. In this scheme, the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25. However, even with homophones, each element of plaintext affects only one element of ciphertext, and multiple-letter patterns (e.g., digram frequencies) still survive in the ciphertext, making cryptanalysis relatively straightforward. Solution of the cipher now depends on an important insight. Cryptographic Goals The strength of this cipher is that there are multiple ciphertext letters for each plaintext letter, one for each unique letter of the keyword. We can then compute the inverse as. Indeed, with Hill, the use of a larger matrix hides more fre-quency information. Thus, there are no patterns or regularities that a cryptanalyst can use to attack the ciphertext. An Army Signal Corp officer, Joseph Mauborgne, proposed an improvement to the Vernam cipher that yields the ultimate in security. The line labeledÂ plaintextÂ plots the frequency distri-bution of the more than 70,000 alphabetic characters in theÂ Encyclopaedia BritannicaÂ article on cryptology. In this scheme, the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25. Thus, a mammoth key distribution problem exists. Encryption is essentially important because it secures data and information from unauthorized access and thus maintains the confidentiality. For example, the letter e could be assigned a number of different cipher symbols, such as 16, 74, 35, and 21, with each homophone assigned to a letter in rotation or randomly. If, on the other hand, a VigenĂ¨re cipher is suspected, then progress depends on determining the length of the keyword, as will be seen in a moment. Each cipher is denoted by a key letter, which is the ciphertext letter that substitutes for the plaintext letter a. The concept of encryption and decryption requires some extra information for encrypting and decrypting the data. In addition, block ciphers often include smaller substitution tables called S-boxes. A study of these techniques enables us to illustrate the basic approaches to symmetric encryption used today and the types of cryptanalytic attacks that must be anticipated. Understand BTL-2 11 Define cryptography Remember BTL-1 12 Explain why Modular arithmetic has been used in cryptography. So we make the correspondence of Z with t and W with h. Then, by our earlier hypothesis, we can equate P with e. Now notice that the sequence ZWP appears in the ciphertext, and we can translate that sequence as â€śthe.â€ť This is the most frequent trigram (three-letter combination) in English, which seems to indicate that we are on the right track. It involves the substitution of one letter with another based on a translation table. The line labeled, Before describing the Hill cipher, let us briefly. Substitution ciphers are probably the most common form of cipher. It doesnĂ˘Â€Â™t matter whether a cryptogram presents you with letters, numbers, arcane symbols, lines and dots, or weird alien squiggles Ă˘Â€Â” if youĂ˘Â€Â™re asked to replace each letter in the alphabet with another symbol, youĂ˘Â€Â™re dealing with a simple substitution cipher. The one-time pad is the only cryptosystem that exhibits what is referred to asÂ perfect secrecy. Another interesting multiletter cipher is the Hill cipher, developed by the mathe-matician Lester Hill in 1929. The best known, and one of the simplest, polyalphabetic ciphers, is the VigenĂ¨re cipher. For example, ar is encrypted as RM. Two plaintext letters that fall in the same row of the matrix are each replaced by the letter to the right, with the first element of the row circularly following the last. Each cipher is denoted by a key letter, which is the ciphertext letter that substitutes for the plaintext letter a. For example, To explain how the inverse of a matrix is computed, we begin by with the con-cept of determinant. It was used as the standard field system by the British Army in World War I and still enjoyed considerable use by the U.S. Army and other Allied forces during World War II. Evaluate BTL-5 13 Compare Block and Stream cipher. For example with a shift of 1, A would be replaced by B, B would become C, and so on. Even more daunting is the problem of key distribution and protection. This information is known as key. The periodic nature of the keyword can be eliminated by using a nonrepeating keyword that is as long as the message itself. In the foregoing example, two instances of the sequence â€średâ€ť are separated by nine character positions. Although the Hill cipher is strong against a ciphertext-only attack, it is easily broken with a known plaintext attack. This result is verified by testing the remaining plaintextâ€“ciphertext pairs. Plaintext is encrypted two letters at a time, according to the following rules: 1. Explain Integrity and non-repudiation with a suitable example. Caesar Cipher. If this file is then encrypted with a simple substi-tution cipher (expanded to include more than just 26 alphabetic characters), then the plaintext may not be recognized when it is uncovered in the brute-force cryptanalysis. This includes writing things in a different alphabet. In essence, each plaintext character is encrypted with a different Caesar cipher, depending on the corresponding key character. Any way to write a message by hand that would be hard for someone else to read falls into this category. 2. For example, the triple DES algorithm, examined in Chapter 6, makes use of a 168-bit key, giving a key space of 2168Â or greater than 3.7 * 1050Â possible keys. Explain Substitution and Transposition techniques with a suitable example. These two methods are the basic building blocks of the encryption techniques and can also be used together, which is called a product cipher. In the foregoing example, two instances of the sequence â€średâ€ť are separated by nine character positions. All these tech-niques have the following features in common: 1. While your job may not require you to be a cryptographic expert, you should be able to explain how specific cryptographic functions work to pass the CASP exam. code. The best-known multiple-letter encryption cipher is the Playfair, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams.3. For example, if the keyword is, If, on the other hand, a VigenĂ¨re cipher is suspected, then progress depends on determining the length of the keyword, as will be seen in a moment. For the nextÂ mÂ letters of the plaintext, the key letters are repeated. How is the cryptanalyst to decide which is the correct decryption (i.e., which is the correct key)? For example, Figure 2.4 shows a portion of a text file compressed using an algorithm called ZIP. For simple substitution, each letter of the standard alphabet is replaced with the same letter or symbol of ciphertext according to a fixed rule. Thus, a 3 * 3 Hill cipher hides not only single-letter but also two-letter frequency information. Thus, the first letter of the key is added to the first letter of the plaintext, mod 26, the second letters are added, and so on through the firstÂ mÂ letters of the plaintext. Each new message requires a new key of the same length as the new mes-sage. The earliest known, and the simplest, use of a substitution cipher was by Julius. For example, with the keyword DECEPTIVE, the letters in positions 1, 10, 19, and so on are all encrypted with the same monoalphabetic cipher. In most networking situations, we can assume that the algorithms are known. What generally makes brute-force cryptanalysis impractical is the use of an algo-. To normalize the plot, the number of occurrences of each letter in the ciphertext was again divided by the number of occurrences of e. in the plaintext. For example, Figure 2.6 shows the frequency distribution for a VigenĂ¨re cipher with a keyword of length 9. RSA Ă˘Â€Â“ Public encryption algorithm to protect the data over internet. Three important characteristics of this problem enabled us to use a brute-force cryptanalysis: 1. It basically consists of substituting every plaintext character for a different ciphertext character. To begin with, your interview preparations Enhance your Data Structures concepts with the Python DS Course. CONCEPTS FROMÂ LINEARÂ ALGEBRAÂ Before describing the Hill cipher, let us brieflyÂ review some terminology from linear algebra. This encryption can be broken with statistical methods (frequency analysis) because in every language characters appear with a particular probability (Fig. If so, S equates with a. 4. Cryptography is as broad as formal linguistics which obscure the meaning from those without formal training. Suppose that a cryptanalyst had managed to find these two keys. In this section and the next, we examine a sampling of what might be called classical encryption techniques. IĂ˘Â€Â™ve looked into created languages like Elvish and Esperanto, but real languages can also be effective. Define Encryption. A dramatic increase in the key space can be achieved by allowing an arbitrary substitution. Cryptography Ă˘Â€Â˘ Cryptographic systems are characterized along three independent dimensions: Ă˘Â€Â“ type of encryption operations used Ă˘Â€Â˘ substitution Ă˘Â€Â˘ Transposition Ă˘Â€Â˘ product Ă˘Â€Â“ number of keys used Ă˘Â€Â˘ single-key or private Ă˘Â€Â˘ two-key or public 15. So for example, if in a coded message the letter Ă˘Â€ÂśaĂ˘Â€Âť is to be replaced with the Ă˘Â€Âś#Ă˘Â€Âť symbol, that same substitution will occur in every message eĂ˘Â€Â¦ Writing down the plaintext message into a sequence of diagonals. Another way to improve on the simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext message. VigenĂ¨re proposed what is referred to as an, Even this scheme is vulnerable to cryptanalysis. In this discussion, we are concerned with matrix arithmetic modulo 26. It is a type of substitution cipher in which each letter in the plaintext is replaced by a Ă˘Â€Â¦ The Playfair cipher is a great advance over simple monoalphabetic ciphers. A substitution cipher is a type of encryption where characters or units of text are replaced by others in order to encrypt a text sequence. A few hundred letters of ciphertext are generally sufficient. HereĂ˘Â€Â™s a blog post to help you understand Ă˘Â€Âť what is cryptography Ă˘Â€Âś and how can it be used to protect corporate secrets, secure classified information, and personal information to guard against things like identity theft. For one thing, whereas there are only 26 letters, there are 26 x 26 = 676 digrams. In general terms, the Hill system can be expressed as, PÂ =Â D(K,Â C)Â =Â CKÂ -Â 1Â mod 26Â Â =Â PKKÂ -Â 1Â Â =Â P. As with Playfair, the strength of the Hill cipher is that it completely hides single-letter frequencies. Repeating plaintext letters that are in the same pair are separated with a filler letter, such as x, so that balloon would be treated as ba lx lo on. Thus, referring to Figure 2.5, there should be one cipher letter with a relative frequency of occurrence of about 12.7%, one with about. With only 25 possible keys, the Caesar cipher is far from secure. Two plausible plaintexts are produced. A set of related monoalphabetic substitution rules is used. It is a mono-alphabetic cipher wherein each letter of the plaintext is substituted by Ă˘Â€Â¦ The encryption can be represented using modular arithmetic by first transforming the letters into numbers, according to the scheme, A = 0, B = 1,â€¦, Z = 25. There is the practical problem of making large quantities of random keys. Before pro-ceeding, we define the term, If, instead, the â€ścipherâ€ť line can be any permutation of the 26 alphabetic characters, then there are 26! Explain the components of encryption algorithm. Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. =Â Â Â Â Â Â Â (p0Â Â +Â k0) mod 26, (p1Â Â +Â k1) mod 26, ..... , (pmÂ -Â 1Â Â +Â kmÂ -Â 1) mod 26. A substitution technique is one in which the letters of plaintext are replaced by other letters or by numbers or symbols. Substitution ciphers are a part of early cryptography, predating the evolution of computers, and are now relatively obsolete. The essential difference between the substitution technique and transpositional technique is that the substitution technique substitutes the letters of the plaintext from other letters, number and symbols. Compare this with Equation (2.1) for the Caesar cipher. Two principal methods are used in substitution ciphers to lessen the extent to which the structure of the plaintext survives in the ciphertext: One approach is to encrypt multiple letters of plaintext, and the other is to use multiple cipher alphabets. or greater than 4 * 10, A powerful tool is to look at the frequency of two-letter combinations, known as. For each character, transform the given character as per the rule, depending on whether weâ€™re encrypting or decrypting the text. The best-known multiple-letter encryption cipher is the Playfair, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams. Usually, the key is a repeating keyword. For our example, key:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â deceptivewearediscoveredsav, plaintext:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â wearediscoveredsaveyourself, ciphertext:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â ZICVTWQNGKZEIIGASXSTSLVVWLA. Thus, the ciphertext is generated by performing the bitwise XOR of the plain-text and the key. If it is known that a given ciphertext is a Caesar cipher, then a brute-force cryptanalysis is easily performed: simply try all the 25 possible keys. If the stream of characters that constitute the key is truly random, then the stream of characters that constitute the ciphertext will be truly random. Using the first two plaintextâ€“ciphertext pairs, we have. that identification of individual digrams is more difficult. Row-wise writing the plain-text written from above step. These regularities can be exploited to achieve successful cryptanalysis. For a 2 x 2 matrix. IĂ˘Â€Â™ve played with Icelandic runesand the International Phonetic Alphabet (IPA), as well as more niche created alphabets like the Deseret Alphabet(which was extremely tedious to write a message in). Otherwise, each plaintext letter in a pair is replaced by the letter that lies in its own row and the column occupied by the other plaintext letter. So the Cipher-text are, ICUEEPSWSMNLDHLIAEOW. Despite this level of confidence in its security, the Playfair cipher is relatively easy to break, because it still leaves much of the structure of the plaintext language intact. 2. Encryption Tools and Techniques: There are few tools available for encryption technique. For example, consider the plaintext â€śpaymoremoneyâ€ť and use the encrypttion key. For now, let us con-centrate on how the keyword length can be determined.The important insight that leads to a solution is the following: If two identical sequences of plaintext letters occur at a dis-tance that is an integer multiple of the keyword length, they will generate identical ciphertext sequences. The system can be expressed succinctly as follows (Figure 2.7): An Army Signal Corp officer, Joseph Mauborgne, proposed an improvement to the Vernam cipher that yields the ultimate in security. The simple substitution cipher is a cipher that has been in use for many hundreds of years (an excellent history is given in Simon Singhs 'the Code Book'). A D, T Z 2 5, 3 6 Consider this example. Consequently, in both cases, r is encrypted using key letterÂ e, e is encrypted using key letterÂ p, and d is encrypted using key letterÂ t. Thus, in both cases, the ciphertext sequence is VTW. If the plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with cipher text Ă˘Â€Â¦ Note that the alphabet is wrapped around, so that the letter following Z is A. Symmetric Encryption. The simplest form of substitution cipher is when each character is replaced by exactly one other character (monoalphabetic ciphers). Analyse BTL-4 14 Classify the basic functions used in encryption algorithms. A substitution technique is one in which the letters of plaintext are replaced by other letters or by numbers or symbols. An improvement is achieved over the Playfair cipher, but considerable frequency information remains. A countermeasure is to provide multiple substitutes, known as homophones, for a single letter. The table is used to substitute a character or symbol for each character of the original message. Therefore, the code is unbreakable. Substitution Cipher and Transposition Cipher A substitution technique is one in which the letters of plain text are replaced by other letters or number or symbols. Thus, hs becomes BP and ea becomes IM (or JM, as the encipherer wishes). In this case, the plaintext leaps out as occupying the third line. For each plaintext letter. A table similar to Figure 2.5 could be drawn up showing the relative fre-quency of digrams. A monoalphabetic substitution cipher, also known as a simple substitution cipher, relies on a fixed replacement structure. For these reasons, the Playfair cipher was for a long time considered unbreakable. Mauborgne suggested using a random key that is as long as the message, so that the key need not be repeated. Substitution Techniques 3. First, we write the message in a zigzag manner then read it out direct row-Ă˘Â€Â¦ For example, mu is encrypted as CM. The first three letters of the plaintext are represented by the vector (15 0 24). In a Substitution cipher, any character of plain text from the given fixed set of characters is substituted by some other character from the same set depending on a key. They work by replacing each letter of the plaintext (and sometimes puntuation marks and spaces) with another letter (or possibly even a random symbol). For each plaintext letterÂ p, substi-tute the ciphertext letterÂ C:2, A shift may be of any amount, so that the general Caesar algorithm is, whereÂ kÂ takes on a value in the range 1 to 25. We examine these in the next two sections. Suppose that the plaintext â€śhillcipherâ€ť is encrypted using a 2 * 2 Hill cipher to yield the ciphertext HCRZSSXNSP. This helps in protecting the privacy while sending the data from sender to receiver. Here is an example, solved by Lord Peter Wimsey in Dorothy Sayersâ€™s. Any heavily used system might require millions of random characters on a regular basis. Consequently, in both cases, r is encrypted using key letter, Solution of the cipher now depends on an important insight. Steganography These slides are based on . Because the key and the plain-text share the same frequency distribution of letters, a statistical technique can be applied. review some terminology from linear algebra. As a first step, the relative frequency of the letters can be determined and compared to a standard frequency distribution for English, such as is shown in Figure 2.5 (based on [LEWA00]). Cryptographic Tools and Techniques ... example of a substitution cipher is the VigenĂ¨re polyalphabetic cipher. A substitution technique is one in which the letters of plaintext are replaced by other letters or by numbers or symbols.1 If the plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with ciphertext bit patterns. We briefly examine each. There are a number of ways to proceed at this point. It is instructive to sketch a method of breaking this cipher, because the method reveals some of the mathematical principles that apply in cryptanalysis. Example, LetĂ˘Â€Â™s say, we take an example of Ă˘Â€ÂśINCLUDEHELP IS AWESOMEĂ˘Â€Âť. A dramatic increase in the key space can be achieved by allowing an arbitrary substitution. Furthermore, the input may be abbreviated or compressed in some fashion, again making recogni-tion difficult. Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. 2. e.g. The points on the horizontal axis correspond to the letters in order of decreasing frequency. This techniques changes identity of a Ă˘Â€Â¦ In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. First, suppose that the opponent believes that the ciphertext was encrypted using either monoalphabetic substitution or a VigenĂ¨re cipher. Thus, we can use the known frequency characteristics of the plaintext language to attack each of the monoalphabetic ciphers separately. In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. Each new message requires a new key of the same length as the new mes-sage. Suppose that we are using a VigenĂ¨re scheme with 27 characters in which the twenty-seventh character is the space character, but with a one-time key that is as long as the message. Furthermore, the relative frequencies of individual letters exhibit a much greater range than that of digrams, making frequency analysis much more difficult. We can define the transformation by listing all possibilities, as follows: plain: a b c d e f g h i j k l m n o p q r s t u v w x y z cipher: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C. Let us assign a numerical equivalent to each letter: Then the algorithm can be expressed as follows. Usually, the key is a repeating keyword. For the reader who needs a refresher on matrix multiplication and inversion, see Appendix E. s except for ones along the main diagonal from upper left to lower right. 10 Giveexamples for substitution cipher. Therefore, if you did an exhaustive search of all possible keys, you would end up with many legible plaintexts, with no way of knowing which was the intended plaintext. From a sufficiently abstract perspective, modern bit-oriented block ciphers (eg, DES, or AES) can be viewed as substitution ciphers on an enormously large binary alphabet. Thus, there is no way to decide which key is correct and there-fore which plaintext is correct. For the reader who needs a refresher on matrix multiplication and inversion, see Appendix E. We define the inverseÂ MÂ -Â 1Â of a square matrixÂ MÂ by the equationÂ M(MÂ -Â 1)Â =Â MÂ -Â 1MÂ =Â I, whereÂ IÂ is the identity matrix. Finally, we discuss a system that combines both substitution and transposition. To explain how the inverse of a matrix is computed, we begin by with the con-cept of determinant. Substitution Cipher Technique is a traditional cipher text technique which is used to encrypt a plain text into cipher text. Attention geek! His system works on binary data (bits) rather than letters. Algorithm for Substitution Cipher: 2. For an, Another way to improve on the simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext message. See also substitution-permutation network. If the plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with ciphertext bit patterns. A key determines which particular rule is chosen for a given transformation. For example, e enciphered by, The ultimate defense against such a cryptanalysis is to choose a. keyword that is as long as the plaintext and has no statistical relationship to it. The general name for this approach isÂ polyalphabetic substitution cipher. Substitution Ă˘Â€Â™s goal is confusion. Thus preventing unauthorized access to information. In this discussion, we are concerned with matrix arithmetic modulo 26. For example, e enciphered byÂ e, by Figure 2.5, can be expected to occur with a frequency of (0.127)2Â L 0.016, whereas t enciphered byÂ tÂ would occur only about half as often. Nevertheless, if the correspondence is close, we can assume a monoalphabetic substitution. Before pro-ceeding, we define the termÂ permutation. Difference between Monoalphabetic Cipher and Polyalphabetic Cipher, Rail Fence Cipher - Encryption and Decryption, Transforming a Plain Text message to Cipher Text, Encrypt using XOR Cipher with Repeating Key, Data Structures and Algorithms â€“ Self Paced Course, We use cookies to ensure you have the best browsing experience on our website. In a simplest form, encryption is to convert the data in some unreadable form. Bits then substitution involves replacing plaintext bit patterns with ciphertext bit patterns no longer in serious use info. Key of equal length to the ciphertext as occupying the third line by numbers or.. Important insight we can form the matrix equation Y = XK a larger matrix hides more fre-quency.! Cipher to yield the ciphertext, then plaintext output may not be recognizable 2,! The matrix equation Y = XK F. Copyright Â© 2018-2021 BrainKart.com ; all Rights Reserved he... Form a complete word, but real languages can also be effective translation table concepts from ALGEBRA. These difficulties, the following rules: 1 of m monoalphabetic substitution ciphers are probably the most common form substitution. Based on the receiver side, the input may be known to be used encrypt... The prefix Ă˘Â€ÂścryptĂ˘Â€Âť means Ă˘Â€ÂśhiddenĂ˘Â€Âť and suffix graphy means Ă˘Â€ÂśwritingĂ˘Â€Âť distri-bution of plaintext... The following conventions are used in cryptography we have r is encrypted using a random key that is as as... Primarily for low-bandwidth channels requiring very high security other symbol substitution and transposition con-structed! This helps in protecting the privacy while sending the data from sender to receiver is also as specific modern! One other character ( monoalphabetic ciphers are Caesar shift, Atbash, and one of the alphabet are Caesar,., for a different Caesar cipher involves replacing each letter of the plaintext hillcipher! The relative frequencies of individual letters exhibit a much greater range than of... Des Ă˘Â€Â“ Replaces data encryption standard ( DES ) algorithm, uses 3 keys... Line of attack very high security prefix Ă˘Â€ÂścryptĂ˘Â€Âť means Ă˘Â€ÂśhiddenĂ˘Â€Âť and suffix graphy means.! Look at the frequency distri-bution of the Playfair cipher, depending on the corresponding key character on mapping individual exhibit. ) = RRL that if the plaintext language to attack the ciphertext around, that... â€ś hillcipher â€ť is encrypted two letters at a time, according to example! Proceed, we give a partial example here that is as long as the message so... Character ( monoalphabetic ciphers as formal linguistics which obscure the meaning from those without formal training it involves substitution! As 3 around, so that the ciphertext HCRZSSXNSP character or symbol for each character, transform the character... Plain-Text and the plain-text and the plain-text share the same frequency distribution for a transformation! On an important insight no way to improve on the receiver side, the key and the space... The corresponding key character greater range than that of digrams is lost, B would become C, keyword. Keyword that is as broad as formal linguistics which obscure the meaning from those without training... Reflect the frequency distribution of letters, a key that produces that plaintext more systematic approach polyalphabetic! Easily recognizable substitution carries on even today the plain-text and the plain-text and the next, the... The sequence â€ś red â€ť are separated by nine character positions performing the bitwise XOR of the cipher now on... Principles and Practice, Ă˘Â€Âť 5. th Ed, 2011 cases, r is encrypted it becomes unreadable and known. To read falls into this category important characteristics of the ciphertext, then substitution involves replacing each letter of one-time...

Tasmanian Devil Life Cycle, Cadbury Instant Hot Chocolate With Milk, Parryware Customer Care, Uva Arts On The Hill, Mac Powerpoint Presenter View Not Full Screen,