Enigma, Cyphers and Encryption

Slides:



Advertisements
Similar presentations
Digital Signatures. Anononymity and the Internet.
Advertisements

Data encryption with big prime numbers
What is Elliptic Curve Cryptography?
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
RSA Encryption Caitlin O’Dwyer. What is an RSA Number? An RSA number n is a number s.t. n=pq Where p and q are distinct, large, prime integers.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Keeping Secrets with Digital Technology Information Assurance Program Anderson School of Management.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Cryptography Dave Feinberg. Suppose I send an from to Who has access to that ? What if I want the.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
Encryption CS110: Computer Science and the Internet.
CS 150 – Computing: From Ada to the Web Cryptography.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
Secure communication Informatics for economists II Jan Přichystal
Encryption with Keys and Passwords
Digital Signatures.
Lesson 2-18 AP Computer Science Principles
Lecture 4 Encryption and Network Protocols
CIT 380: Securing Computer Systems
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Cryptography & Security
RSA Preliminaries.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
A Wireless LAN Security Protocol
Cryptography CS Principles January 19, 2017.
Taehyung Kim HPC Lab. POSTECH
Internet Safety By Ruby.
A Parent Guide to creating a student (under 13) Apple ID
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
Who was Alan Turing? Alan Turing played a role in deciphering the messages encrypted by the German Enigma machine. He took the lead in a team that designed.
Wireless Fidelity (15881A0515).
BP5 – encryption - Fun gym
In this lesson we will understand:
COMPUTER PRIVACY.
STOP. THINK. CONNECT. Online Safety Quiz.
M3: Encryption r By Andrew Stringer.
Keys Campbell R. Harvey Duke University, NBER and
Campbell R. Harvey Duke University and NBER
Cryptography Survey.
User access levels, Passwords, Encryption, Cipher, Key
Campbell R. Harvey Duke University and NBER
BP5 – encryption - Fun gym
Cryptography Survey.
Cryptography “The Secret Code Language”
Cryptography Cryptography is derived from the Green word ‘kryptos’
Crypto #4 Encryption and Network Protocols
Cryptography a Presentation Prepared by Vytautas Kondratas.
Lesson 7: Simple Encryption
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Public-Key, Digital Signatures, Management, Security
2.8.2 Being Online Being smart online
Slide design: Dr. Mark L. Hornick
Public – Private Key Cryptography
WORLD OF WONDERS : THE ENIGMA MACHINE
2.8.2 Being Online Being smart online
Modern Cryptography.
2.8.2 Being Online Being smart online
Being smart online I can discuss what I do online.
Secure Diffie-Hellman Algorithm
Presentation transcript:

Enigma, Cyphers and Encryption How do computers communicate securely and secretly?

Caesar Cypher h e l o a b c d e f g h i j k l m n o p q r s t u v w x z h e l o   Key a to h

How could we improve on this?

Caesar Cypher h e l o   https://www.tes.com/teaching-resource/operation-ultra-gchq-codebreaking-project-6340594 Secret key a to h

How could we improve on this?

Caesar Cypher – plus 1 h e l o o l r u +1 Move inside rotor once clockwise at the beginning of each move h e l o  o l  r  u  +1 Secret key a to h Move 1

How could we improve on this?

More rotors

The Prinigma machine https://slp.somerset.org.uk/sites/edtech/New%20Wessex/Year%206/Y6%20Programming%20UP%20Prinigma%20Machine.pdf http://wiki.franklinheath.co.uk/index.php/Enigma/Paper_Enigma

Prinigma “ By making our own prinigma machine it was easy to understand something that was so hard to invent in the first place.” Y6 St George’s

Prinigma Three rotors h e l o “It was fun to build my own machine and the videos were interesting, especially seeing the original machines. I wish I had had more time to crack codes.” Y6 St George’s h e l o   Secret key Reflector B Q, E, V, A

How could we improve on this?

Prinigma Three wheels Move right rotor once each time at the start h e   Three wheels Move right rotor once each time at the start “It was really cool to see how the enigma machine worked and how it was used. It was fun that we could upcycle something to make our own technology.” Y6 St George’s Secret key Q, E, V, A Move 1

How could we improve on this?

Cypher and Encryption https://www.youtube.com/watch?v=ZghMPWGXexs

Where do we see encryption? Connections with learning

Common letters Do different languages have different frequent letters? English - e t a o i n s h r d l u Polish - https://en.wikipedia.org/wiki/Letter_frequency#Relative_frequencies_of_letters_in_other_languages

Public and Private keys? A tells you where there is place you can safely put your information – PUBLIC KEY B posts his code – PRIVATE KEY Only A can open box and find the PRIVATE KEY for B

In reality – AES (Advanced Encryption Standard) algorithm Bob chooses two very large (distinct) prime numbers p and q; n=pq , m= lcm {p−1 , q−1 } (lcm is the least common multiple ); Bob chooses r , where r>1 and r is coprime with m (i.e. r and m have no factors in common); Bob then finds the unique s such that rs≡1(mod m) Bob now tells everyone what n and r are, but does NOT say what p, q or s are. Alice wants to send the message M (a single number) where M and n are coprime and 0<M<n. Alice finds Mc , where Mc≡Mr(mod n) , and sends the message Mc to Bob. Bob receives the message Mc from Alice and decodes it. Now Bob knows p, q, m, n, r, s , and he uses these to decode the message Mc from Alice so as to find M . To do this Bob uses the theorem that (Mc)s≡M(mod n)

Playing with primes What is the largest prime under 100? What is the largest prime under 1000? What is the largest prime under 10000? What is the largest prime under 1000000000000000000? Can you write an algorithm to find these? Can you program this?

Playing with Factors Think of the factors of: 12 120 1200 12000 120000 1200000 12000000 1200000000000000000000000000000000000000000

Websites https://www.amazon.co.uk/

Wireless connections WPA2 – Wi-Fi Protected Access 2 AES – Advanced Encryption Standard Do your children know how to set up a secure link?

WhatsApp Provides encrypted communication https://www.techadvisor.co.uk/feature/internet/how-secure-is-whatsapp-whatsapp-security-encryption-explained-3637780/

Internet of Things How far are we going to allow the ease of use to question our privacy or state intervention? Smart speakers? Self driving cars?