SlideShare uma empresa Scribd logo
1 de 22
The history and art of cryptography
22.01.2013
• What is encryption?

• Why would you use encryption?

• How long has encryption been around?
Steganography
Simple Steganography
Plainly visible encrypted messages—no matter
how unbreakable—will arouse suspicion
Examples of Steganography
  – Wax tablets
  – Shaving Heads
  – Microdots
  – Any other suggestions (WWII)?
Transposition
Moving plaintext characters to new locations in
the text:
Simple Examples Transposition
 • Break into Teams – Try and Break/Crack This
                     Message:
Railfence Technique:

             BNOCDROOADNOEDJ
Subsititution
Replacing plaintext characters with
substitutes:
The Caeser Cypher
In a Caeser cypher each letter of the alphabet is
shifted along some number of places;
Our message code is:
This code was invented by Julius Caeser
Move each letter on by three places of the
alphabet: e.g.
                      A→D
                        B→
                        C→
                       M→
Caeser Cipher
Split up into teams and try and identify the shift!

         BPQA PIA JMMV APQNBML JG MQOPB

              Speed up the decryption process:
Plain     A     B    C   D    E   F    G   H     …
Cipher
Caeser Cypher Cont’d
• If the cipher alphabet can be any
   rearrangement of the plain alphabet then
   there are
 - 400,000,000,000,000,000,000,000,000
combinations
Caeser Cipher
• How to crack the Caeser cypher

• Who plays Hangman?

• Advantage codebreakers
Advantage Codemakers
• The Vigenère cipher (1586) is a method of
  encrypting alphabetic text by using a series of
  different Caesar ciphers based on the letters
  of a keyword.
• Key Difference is the use of a Keyword
• Lets use the keyword ‘CAR’ and the paintext to
  be encrypted: ‘Its cold’
Vignere Cipher
Vignere Cipher
•   Break into teams
•   Select a key and write the message:
•   ‘Its not cold its freezing’
•   Babbage versus Vignere:
    – Pattern analysis using variation of differing length
      in keywords
Summary so far:
• A cipher (or cypher) is an algorithm for
  performing encryption and decryption — a
  series of well-defined steps that can be
  followed as a procedure.
• In most cases, that procedure is varied
  depending on a key which changes the
  detailed operation of the algorithm.
• The original information is known as
  plaintext, and the encrypted form as
  ciphertext.
The same techniques applied
The Age of the Machine and
             Mathematicians
• DVD
Where we are today:
• In the mid-1970s, strong encryption emerged from
  the sole preserve of secretive government agencies
  into the public domain, and is now used in
  protecting widely-used systems, such as Internet e-
  commerce, mobile telephone networks and bank
  automatic teller machines.
• Encryption can be used to ensure secrecy, but other
  techniques are still needed to make
  communications secure, particularly to verify the
  integrity and authenticity of a message; for
  example, a message authentication code (MAC) or
  digital signatures.
SSL/TLS
• The TLS protocol(s) allow applications to
  communicate across a network in a way designed
  to prevent eavesdropping, tampering, and
  message forgery. TLS provides endpoint
  authentication and communications privacy over
  a network using cryptography. Typically, only the
  server is authenticated (i.e., its identity is
  ensured) while the client remains
  unauthenticated; this means that the end user
  (whether an individual or an application, such as
  a Web browser) can be sure with whom they are
  communicating.
PKI
• The next level of security - in which both ends of the
  "conversation" are sure with whom they are communicating -
  is known as mutual authentication. Mutual authentication
  requires public key infrastructure (PKI) deployment to clients.
• Public key cryptography, also known as asymmetric
  cryptography, is a form of cryptography in which a user has a
  pair of cryptographic keys - a public key and a private key. The
  private key is kept secret, while the public key may be widely
  distributed. The keys are related mathematically, but the
  private key cannot be practically derived from the public key.
  A message encrypted with the public key can be decrypted
  only with the corresponding private key. The digital signature
  of the signer is verified using the public key. This verification
  process confirms that the message was not altered after the
  digital signature.
PKI
Types of Encryption

Mais conteúdo relacionado

Mais procurados

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

Mais procurados (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography
CryptographyCryptography
Cryptography
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Cryptography
CryptographyCryptography
Cryptography
 
Criptography
CriptographyCriptography
Criptography
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography (raza hassan)
Cryptography (raza hassan)Cryptography (raza hassan)
Cryptography (raza hassan)
 

Destaque

Destaque (10)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography its history application and beyond
Cryptography its history application and beyondCryptography its history application and beyond
Cryptography its history application and beyond
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
A Brief History of Cryptography
A Brief History of CryptographyA Brief History of Cryptography
A Brief History of Cryptography
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Old english summary
Old english  summaryOld english  summary
Old english summary
 

Semelhante a Cryptography

Overview of Cryptography in pantanagr .pdf
Overview of Cryptography in pantanagr .pdfOverview of Cryptography in pantanagr .pdf
Overview of Cryptography in pantanagr .pdf
thukralyash256
 
Chapter# 3 modified.pptx
Chapter# 3 modified.pptxChapter# 3 modified.pptx
Chapter# 3 modified.pptx
Maryam522887
 
detailed presentation on cryptography analysis
detailed presentation on cryptography analysisdetailed presentation on cryptography analysis
detailed presentation on cryptography analysis
BARATH800940
 
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff
maninthemirrorrror
 

Semelhante a Cryptography (20)

Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Unit – III.pptx
Unit – III.pptxUnit – III.pptx
Unit – III.pptx
 
Cryptography - Overview
Cryptography - OverviewCryptography - Overview
Cryptography - Overview
 
Overview of Cryptography in pantanagr .pdf
Overview of Cryptography in pantanagr .pdfOverview of Cryptography in pantanagr .pdf
Overview of Cryptography in pantanagr .pdf
 
Chapter# 3 modified.pptx
Chapter# 3 modified.pptxChapter# 3 modified.pptx
Chapter# 3 modified.pptx
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
RSA.ppt
RSA.pptRSA.ppt
RSA.ppt
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.ppt
 
7 cryptography
7 cryptography7 cryptography
7 cryptography
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
 
Best book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptBest book for the cryptography doctor.ppt
Best book for the cryptography doctor.ppt
 
detailed presentation on cryptography analysis
detailed presentation on cryptography analysisdetailed presentation on cryptography analysis
detailed presentation on cryptography analysis
 
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
cryptography.ppt
cryptography.pptcryptography.ppt
cryptography.ppt
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Cryptography

  • 1. The history and art of cryptography 22.01.2013
  • 2. • What is encryption? • Why would you use encryption? • How long has encryption been around?
  • 4. Simple Steganography Plainly visible encrypted messages—no matter how unbreakable—will arouse suspicion Examples of Steganography – Wax tablets – Shaving Heads – Microdots – Any other suggestions (WWII)?
  • 5. Transposition Moving plaintext characters to new locations in the text:
  • 6. Simple Examples Transposition • Break into Teams – Try and Break/Crack This Message: Railfence Technique: BNOCDROOADNOEDJ
  • 8. The Caeser Cypher In a Caeser cypher each letter of the alphabet is shifted along some number of places; Our message code is: This code was invented by Julius Caeser Move each letter on by three places of the alphabet: e.g. A→D B→ C→ M→
  • 9. Caeser Cipher Split up into teams and try and identify the shift! BPQA PIA JMMV APQNBML JG MQOPB Speed up the decryption process: Plain A B C D E F G H … Cipher
  • 10. Caeser Cypher Cont’d • If the cipher alphabet can be any rearrangement of the plain alphabet then there are - 400,000,000,000,000,000,000,000,000 combinations
  • 11. Caeser Cipher • How to crack the Caeser cypher • Who plays Hangman? • Advantage codebreakers
  • 12. Advantage Codemakers • The Vigenère cipher (1586) is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. • Key Difference is the use of a Keyword • Lets use the keyword ‘CAR’ and the paintext to be encrypted: ‘Its cold’
  • 14. Vignere Cipher • Break into teams • Select a key and write the message: • ‘Its not cold its freezing’ • Babbage versus Vignere: – Pattern analysis using variation of differing length in keywords
  • 15. Summary so far: • A cipher (or cypher) is an algorithm for performing encryption and decryption — a series of well-defined steps that can be followed as a procedure. • In most cases, that procedure is varied depending on a key which changes the detailed operation of the algorithm. • The original information is known as plaintext, and the encrypted form as ciphertext.
  • 17. The Age of the Machine and Mathematicians • DVD
  • 18. Where we are today: • In the mid-1970s, strong encryption emerged from the sole preserve of secretive government agencies into the public domain, and is now used in protecting widely-used systems, such as Internet e- commerce, mobile telephone networks and bank automatic teller machines. • Encryption can be used to ensure secrecy, but other techniques are still needed to make communications secure, particularly to verify the integrity and authenticity of a message; for example, a message authentication code (MAC) or digital signatures.
  • 19. SSL/TLS • The TLS protocol(s) allow applications to communicate across a network in a way designed to prevent eavesdropping, tampering, and message forgery. TLS provides endpoint authentication and communications privacy over a network using cryptography. Typically, only the server is authenticated (i.e., its identity is ensured) while the client remains unauthenticated; this means that the end user (whether an individual or an application, such as a Web browser) can be sure with whom they are communicating.
  • 20. PKI • The next level of security - in which both ends of the "conversation" are sure with whom they are communicating - is known as mutual authentication. Mutual authentication requires public key infrastructure (PKI) deployment to clients. • Public key cryptography, also known as asymmetric cryptography, is a form of cryptography in which a user has a pair of cryptographic keys - a public key and a private key. The private key is kept secret, while the public key may be widely distributed. The keys are related mathematically, but the private key cannot be practically derived from the public key. A message encrypted with the public key can be decrypted only with the corresponding private key. The digital signature of the signer is verified using the public key. This verification process confirms that the message was not altered after the digital signature.
  • 21. PKI

Notas do Editor

  1. Greeks RomansMary Scots Geneva – Sorting Offices renaissance –