Cryptography Cryptography is derived from the Green word ‘kryptos’

Slides:



Advertisements
Similar presentations
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Advertisements

 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Cryptography The science of writing in secret code.
An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy.
Cryptography & Encryption Secret Codes & The Advance of Technology.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Section 3.6: An Introduction to Cryptography
MAT 1000 Mathematics in Today's World Winter 2015.
Writing and decoding your own hieroglyphic words and messages!
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Cryptography is the process of encryption and decryption a message or data. Examples: Banking to keep peoples money safe Schools so we can keep students.
Cryptography Cryptography is derived from the Green word ‘kryptos’
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
How the internet works Cryptography. LO: Define the terms encryption and decryption Construct a secure message using encryption LO: Define the terms encryption.
Introduction to Cryptography and Secure Communications  What is cryptography?  Encryption  Decryption.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Secret Key Cryptography
Encryption with Keys and Passwords
Lesson 2-18 AP Computer Science Principles
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Basic Encryption: methods and tools
Cracking Encrypted Systems
Encryption.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptology in the U.S.—Then and Now
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Basic Encryption Methods
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Taehyung Kim HPC Lab. POSTECH
CSCI-235 Micro-Computer Applications
Networks Encryption.
Who was Alan Turing? Alan Turing played a role in deciphering the messages encrypted by the German Enigma machine. He took the lead in a team that designed.
Topic 3: Data Encryption.
Lesson 5: Simple Encryption
Public Key Cryptography
Intro to Computer Science CS1510
User access levels, Passwords, Encryption, Cipher, Key
Chapter 3:Cryptography (16M)
Unit 1.6 Systems security Lesson 4
PART VII Security.
Applications of Inverse Matrices
NET 311D Information Security
Cryptography Hands on Learning Lab Activity (HOLLA) K-12 Partner School Initiative School of Computing.
Cryptography “The Secret Code Language”
Cryptography and Network Security
Simple Encryption- Lesson 5
Substitution Codes By Sarah Bonnell.
Intro to Cryptography Hanqiu Peng.
Cryptography a Presentation Prepared by Vytautas Kondratas.
Fun with Cryptography The Science of Secrecy.
Lesson 7: Simple Encryption
Cryptography: Cesar Cipher
Welcome to semester 2. Midterm Pass-back tomorrow
Slide design: Dr. Mark L. Hornick
Digital Communications
Traditional Symmetric-Key Ciphers
Unit 2: Cryptography & Cryptographic Algorithm
Introduction to Cryptography I
GCSE COMPUTER SCIENCE Topic 3 - Data 3.10 Encryption.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Double Transpositions
Symmetric Encryption or conventional / private-key / single-key
Encryption & Steganography: Amazing Things To Do with Bits
NET 311D Information Security
Presentation transcript:

Cryptography Cryptography is derived from the Green word ‘kryptos’ which means hidden or secret

Cryptography Cryptography is thought to date back to the Egyptians and their use of hieroglyphics.

Cryptography Hieroglyphics were complex pictograms. At the time, the meaning of the hieroglyphics were known by only a few.

What does this hieroglyphic message say? Cryptography What does this hieroglyphic message say?

Cryptography You can only understand this message if you have the code or the key to ‘unlock’ or decipher it.

Now you have the ‘key’, see if you can decipher the message. Cryptography Now you have the ‘key’, see if you can decipher the message.

Julius Caesar developed the first modern cipher. Cryptography Julius Caesar developed the first modern cipher. It is known as the ‘Caesar cipher’

Cryptography Each character in the message is replaced by the character three positions ahead of it in the alphabet

Cryptography A D B E G ? Z ?

Caesar Cipher Cryptography A D B E C F G H I J K L M N O P Q R S T U V W X Y Z Caesar Cipher

Decode the following message: FURVV WKH ULYHU WRQLHKW Cryptography A D B E C F G H I J K L M N O P Q R S T U V W X Y Z Decode the following message: FURVV WKH ULYHU WRQLHKW

CROSS THE RIVER TONIGHT Cryptography A D B E C F G H I J K L M N O P Q R S T U V W X Y Z The message said: CROSS THE RIVER TONIGHT

Why might Julius Caesar encrypt his messages? Cryptography Why might Julius Caesar encrypt his messages? Think of two disadvantages of using the Caesar Cypher

Cryptography Why might Julius Caesar encrypt messages his messages? - So that he could safely send messages to his troops. Even if the messanger was caught, his enemies wouldn’t understand the message

Cryptography Think of two disadvantages of using the Caesar Cypher -The person receiving the message would have to understand how to decrypt it Caesar ciphers are easy to break It doesn’t allow for numbers or symbols

Cryptography Plenary Explain the following terms to your partner: Cryptography Decrypt Caesar Cypher