A (Very) Brief History of Pre-Computer Cryptography

Slides:



Advertisements
Similar presentations
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Advertisements

BITS Pilani Crypto Make-Up #1 Regular Session #2.
CRYPTOGRAPHY Lecture 1 3 week summer course. Why we need secure means of communication? Government: diplomacy is sometimes better done quietly. Military:
Previously…  500 BC: A rebellion against Darius in Ionia is supported by the Greek city-state of Athens  492 BC: Darius launches an invasion of Greece.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
The Evolution of Secret Writing 楊子陞 B 李柏勳 B 馬天祥 B 陳孟彙 B
Secure communication Informatics for economists II Jan Přichystal
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA.
Overview of Digital Stenography
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Rayan Ghamri.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
The Golden Age of Athens
The Evolution of Secret Writing 郭謹瑋 b 黃聖德 b 葉人豪 b 謝東頤 b
Greek Historians and The Peloponnesian War The Father of History Herodotus… Herodotus… of Halicarnassus of Halicarnassus.
Information Security Principles (ESGD4222)
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Cryptography  Goal of this art: how do you cipher your message securely?  This is an ancient art: For example, You can conceal the message (e.g. invisible.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
By Timia,Au$tin,Gag ə, Jamez,Alexz,Jeremiah. ☺ What you need!! ☺ 1:Pencil 2:Paper 3:Social Studies Book.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Ancient Greece  Greece lies on a peninsula that reaches out into the Mediterranean Sea east of Italy.
Greek wars.
Warm Up 1) Solve: -2(x + 9) + 13 = -11 2) A triangle has side lengths of 5, 15, and 14. Is the triangle a right triangle? Why or Why not?
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Did You Know?Did You Know?  After conquering Babylon in 539 B.C., Cyrus the Great wrote the Charter of Human Rights, which many historians call the first.
Secure communication Informatics for economists II Jan Přichystal
Success Criteria Aim I can compare the different city states. I can write an account of the Battle of Marathon from the point of view of a key eye witness.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Cryptography – Test Review
Introduction to Steganography
Classical Greece Classical Greece is the name given to the period of Greek history from around 500 B.C. to the conquest of Greece.
1. Take out your Chapter 7 outline 2. Be prepared for stamp check 3
Sparta.
Welcome! 10/26/09 Warm Up Respond to the below prompt: Homework:
Common Core Standards RS 1, 2, 5, 6, 9, WS 1, LSS 1, 2, 3
Greek historians and the Peloponnesian War
Herodotus and Thucydides
Fighting the Persian Wars
Odyssey Notes #2.
Ramya Kuppam Manikyam School of Computing Dr. Todd McDonald Professor
City States of Greece Quiz:
WORLD HISTORY READERS Level 1-⑨ THE PERSIAN EMPIRE.
The Persian Empire 559 B.C. – 330 B.C..
Warm Up Finish up your Persian War Document Analysis worksheet. Once you have completed this, think about the following question and be ready to discuss.
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
The Persian Wars Ancient greece.
Please fill out your planners
The Persian Empire and Persian Wars
DISSERTATION ON CRYPTOGRAPHY.
Fighting the Persian Wars
Note Taking Fun! Mind Map
GREEK HISTORIOGRAPHERS
Battle of Thermopylae.
Basic of Modern Cryptography
GREEK HISTORIOGRAPHERS
Greeks, Persians and Alexander the Great
Unit III: Ancient Greece Saunders
PERSIAN WAR 7-2 continued.
Trojan War.
Get Ready to Read Section Overview Persia Attacks the Greeks
Presentation transcript:

A (Very) Brief History of Pre-Computer Cryptography Richard J. Blech Chief Executive Officer Secure Channels, Inc.

Is there anyone here who cannot parse and explain this equation?

If not, that’s ok.

Why Pre-Computer Cryptography? If you understand pre-computer crypto, you understand crypto! There are only three differences between traditional and computer encryption Virtualization: Computers can mimic a mechanical cipher machine of immense complexity Speed Computers scramble numbers rather than letters Computers deal in binary sequences Before encryption, the message must be converted into bits The rest is all transposition and substitution as it has been for ages

The Evolution of Secret Writing This is Herodotus Herodotus was arguably the first modern “historian.” He lived in the 5th Century His most famous work, The Histories, tells the story of the Greco-Persian Wars

The Evolution of Secret Writing Herodotus tells us about: Demaratus, the Persian Invasion of Greece in 480 BC, and the Wax Tablets One of the earliest forms of steganography was in 480 B.C. In the book Investigator's Guide to Steganography by Gregory Kipper, there is a story taken from a book known as The Histories, written by Greek historian Herodotus. Herodotus recorded that the Persian king, Xerxes, was planning to extend his empire "such that its boundaries will be God's own sky, so the sun will not look down upon any land beyond the boundaries of what is [their] own" (Kipper, 2003, p. 16). The Persians spent roughly 5 years secretly assembling one of the greatest armies in history. However, the Persian military buildup had been witnessed by an exiled-Spartan king, Demaratus. Demaratus had been exiled from Greece and lived in the Persian city of Susa. Although he was exiled, he still felt a sense of loyalty to Greece and wanted to warn the Spartans of the Persian invasion plan. However, Demaratus feared that any message sent to warn the Spartans would be intercepted by the Persian guards. Herodotus wrote: "As the danger of discovery was great, there was only one way in which he could contrive to get the message through: this was by scraping the wax off a pair of wooden folding tablets, writing on the wood underneath what Xerxes intended to do, and then covering the message over with wax again. In this way the tablets, being apparently blank, would cause no trouble with the guards along the road. When the message reached its destination, no one was able to guess the secret, until, as I understand, Cleomenes' daughter Gorgo, who was the wife of Leonides, divined and told the others that if they scraped the wax off, they would find something written on the wood underneath. This was done; the message was revealed and read, and afterwards passed on to the other Greeks." The Greeks were unaware of any Persian attack, so they had not been gathering together an army. As a result of this warning, the Greeks began to arm themselves and were ready for the Persian attack.

The Evolution of Secret Writing Histaiaeus sent a secret message to Aristagoras of Miletus to get him to revolt against the Persians. He sent it secretly by having a slave’s head shaven, the message tattooed on the bald head and waiting for hair to grow in. Upon arrival, the slave’s head was shaved, and the message revealed. That’s Kelly Osbourne, BTW...

The Evolution of Secret Writing - Hiding a Message Wax tablets, shaved heads and hard boiled eggs (Porta, 16th Century) are about hiding the EXISTENCE of a message. The term for hiding a message’s existence is STEGANOGRAPHY. While steganography offers some security, it has a fundamental weakness: If the message is discovered, the contents of the secret message are revealed at once.

Enter Cryptography Derived from the Greek word kryptos, meaning “hidden.” Cryptography’s goal is not to hide the existence of a message but, rather, to hide its MEANING. The process of hiding a message’s meaning is called ENCRYPTION. An encrypted message is Scrambled... ...according to a predetermined protocol ...that has been agreed upon by the sender and recipient With cryptography, unlike steganography, if an enemy intercepts the message, and lacks knowledge of the scrambling protocol, it’s still unreadable!

Cryptography’s Two Branches Transposition Substitution CRYPTOGRAPHY