History of Cryptography

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography Made Easy Stuart Reges Principal Lecturer University of Washington.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
A Glimpse of the History of Cryptography
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
Dan Boneh Introduction History Online Cryptography Course Dan Boneh.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Introduction to Information Security Chapter II : Classical Ciphers.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Famous Firsts in Computation MSE 2400 Evolution & Learning
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Lec. 5 : History of Cryptologic Research II
Cryptography By, Anthony Lonigro & Valentine Mbah.
Keeping Secrets with Digital Technology Information Assurance Program Anderson School of Management.
Introduction to Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
CSCI 5857: Encoding and Encryption
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Section 2.5 Polyaphabetic Substitutions
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
By, Amanda Rydzynski O’Brien Computer Skills
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Polyalphabetic Ciphers History. Alberti Rennaisance Architect –First fountains of Trevi, Rome –Churches 1467 essay on cryptology –Frequency analysis –Cipher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
@Yuan Xue Quick Review.
Secret Key Cryptography
Cryptography – Test Review
A Summary in Fifteen Minutes mas y menos
CIT 380: Securing Computer Systems
Chapter 2 Basic Encryption and Decryption
Cryptography Why Cryptography Symmetric Encryption
Cryptography & Security
Outline Desirable characteristics of ciphers Uses of cryptography
Symmetric Algorithm of Cryptography
Communication Security
Cryptography CS Principles January 19, 2017.
Outline Desirable characteristics of ciphers Uses of cryptography
Computer and Network Security
In this lesson we will understand:
M3: Encryption r By Andrew Stringer.
Campbell R. Harvey Duke University and NBER
Enigma Machine.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
PART VII Security.
Rotors and Secret-Key Encryption
Intro to Cryptography Hanqiu Peng.
Cryptography a Presentation Prepared by Vytautas Kondratas.
Cryptography : Introduction
Digital Communications
Traditional Symmetric-Key Ciphers
By Sean O’Mahoney from the Computing Society at Futures Friday
WORLD OF WONDERS : THE ENIGMA MACHINE
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

History of Cryptography Amir Boumezbeur Saeed Osman

What is Cryptography? Cryptography is the practice and study of techniques for secure communication. Historically, cryptography has been used to convey secret messages. Nowadays, cryptography is the driving force behind digital security and privacy.

Early Cryptography First known evidence of cryptography was on an inscription in an Ancient Egyptian tomb in 1900 BC. Early cryptography largely consisted of substitution ciphers. Atbash cipher was a monoalphabetic cipher used by Hebrew scholars in 500 BC Caesar Cipher was used by Julius Caesar in Ancient Rome.

Birth of Cryptanalysis Cryptanalysis is the study of analysing and decrypting codes Al-Kindi first to describe frequency analysis in the 9th century Letters occur in varying frequencies Take advantage of known frequency patterns Effective in deciphering basic substitution ciphers Sample size to be taken into consideration

Polyalphabetic substitution First known polyalphabetic substitution cipher made by a mane named Leon Battista Alberti Polyalphabetic substitution ciphers use multiple substitution alphabets. Effective in combating frequency analysis Most well known example is the Vigenere cipher, invented in 1500s Strongest cipher for centuries Cracked by Charles Babbage and Friedrich Kasiski independently in mid 1800s.

Black Chambers With the propagation of the use of ciphers in Europe, it became a political necessity to intercept and break secret messages. Existed in nearly every European nation beginning in the 1500s Dedicated government departments that were tasked with creating and breaking cryptograms of foreign nations These secretariats existed all the way up to the 20th century.

Cipher Devices After WWI, nations needed new ways to encrypt and ‘hide’ messages from enemies. Four men from four nations created their own variations of electromechanical cipher devices and they all used typewriters and rotors. Boris Hagelin modified Koch’s machine by adding wheels and pins to represent an alphabet and made it pocket-sized called the C-36. On 1950, he manufactured 140,000 devices for the US Army and became the first cryptographic millionaire.

The Enigma Machine On 1926, the German Army and Navy took Dr.Arthur Scherbius’ original Enigma device and altered it to a ‘Military’ version. A large self inverse plugboard machine that takes 6 to 10 pairs of letters and encrypts them, the pair of letters can be upto 150 trillion different combinations. The British, French and Polish, all tried and failed to decode the machine On 1939, Alan Turing joined the GCCS and built the bombe, elinimates as many wrong combinations as possible and was the biggest step towards the British successfully breaking the Enigma.

Lucifer Cipher and DES On 1968, Dr.Horst Fesital joined IBM and created an 128 bit block cipher algorithm called Lucifer. On 1973, the NBS and NSA adopted Lucifer and used it to implement the DES. It uses one key to encrypt and decrypt 64-bit data. Main innovation and started a new era of the cryptography market. Spawned variations such as; IDEA, RC4, RC5, RC and the AES. Building blocks of the ATM and micro-transactions between bank accounts.

RSA Algorithm First Public-key cryptosystem, used to secure data transmission Asymmetric encryption system that generates two keys, public(for encryption) and private(for decryption). Most commonly used in E-commerce and online business. Nowadays, used to pass encrypted keys and used in bulk encryptions. Built and used on the basics of humanity: Trust.