A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA.

Slides:



Advertisements
Similar presentations
Chapter 12 The Roman Empire 50-BC to AD 150
Advertisements

Cryptography & Encryption Secret Codes & The Advance of Technology Copyright © 2008 by Helene G. Kershner.
BITS Pilani Crypto Make-Up #1 Regular Session #2.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Mrs. French English II.   Written in 1599  Setting: Rome’s transition from a Republic to an Empire  From 509 BC for four and a half centuries, Rome.
Cryptography The science of writing in secret code.
The Evolution of Secret Writing 楊子陞 B 李柏勳 B 馬天祥 B 陳孟彙 B
Secure communication Informatics for economists II Jan Přichystal
A Glimpse of the History of Cryptography
Cryptography & Encryption Secret Codes & The Advance of Technology.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
The Evolution of Secret Writing 郭謹瑋 b 黃聖德 b 葉人豪 b 謝東頤 b
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Classical History Review/Preview 1.When used in a time reference, the initials “BC” designate ________. A. “British Columbia” B. “Before Christ” C. “Before.
William Shakespeare Background on William Shakespeare Shakespeare was born on April 23, 1564 in Stratford-upon-Avon in England..
a connection between language and mathematics

Egyptian Empire Period One.
Encryption: A Brief History Author: Margery Waldron.
CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar.
Early Crypto Historical Events A snap shot over time.
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
Starting Julius Caesar, pt. 2 English 112. Last time… We talked about universal themes We talked about the painful nature of change We went over a brief.
ANCIENT ROME JEOPARDY. ANCIENT ROME JEOPARDY Ancient Rome Jeopardy Roman Christianity By the Numbers Name Game Emperors $200 $200 $200 $200 $400 $400.
Shakespeare’s Julius Caesar Introduction. Shakespeare’s Culture Elizabethan England –“Age of Exploration” –Influenced by change and adventure –Consumed.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Terminology and classical Cryptology
Julius Caesar Facts
E. Napp Moving Toward Empire In this lesson, students will be able to identify various factors which led to the demise of the Roman Republic and the rise.
Key Terms Punic Wars Empire Pax Romana Coach Smith.
Roman Empire Roman Empire 27BC-476AD. The Punic Wars Rome’s expansion began with a series of wars against. In the First Punic War, Rome conquered the.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
ANCIENT GREECE Chapter 8 Lesson 4. The Greek Empire  In 359 B.C. Philip of Macedonia planned to overtake the city-states of Greece. He did this by invading.
A Guide to English Speaking Countries Week 2: England and the Industrial Revolution.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Chapter 9 Sec 1 Classical Europe. The Golden Age of Greece Western civilization grew out of the accomplishments of classical Greece. This is where democracy.
What did the Romans discover about life in Britain? SAMPLE SLIDE Random Slides From This PowerPoint Show.
Elizabeth I Mary Queen of Scots Mr C. A. McGuinness
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
Elizabeth I Test Number 2 Mary Queen of Scots. 1. What was the name and number of Mary, Queen of Scots’ father? James V 3.How old was Mary Queen of Scots.
Key Question: What causes Rome to change from a Republic to an Empire?
(1533 – 1603). Queen Elizabeth I, the last of the Tudor monarchs, ruled over England and Ireland from 1558 to She was the daughter of Henry VIII.
Chapter 13 Lesson 3: The Renaissance Spreads The Merode Altarpiece ~ Robert Campin 1428.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Julius Caesar By: Brandon Walker. Julius Caesar’s Youth Born into a family which was part of the Julius dynasty Julius Caesar’s father died when he was.
Some Roman emperors ruled wisely. Some Roman emperors were corrupt. And some Roman emperors were insane!
Code- and cipher-breaking have been in operation for centuries. However, cryptanalysis – the art of deciphering encoded messages – took on a new importance.
 Starter activity Celebrated beauty Was married to French King Protestant Jealous, quick- tempered Elizabeth’s closest relative. Catholic Had a son -
Julius Caesar Facts, Context, Plot, and Parallels: Concepts You Should Know.
Timeline Look at the following events and put them by the correct date on the timeline sheet. You only have two minutes!
The Roman Empire. Julius Caesar Rome plunged into a series of Civil Wars Out of the chaos emerged Julius Caesar He had many victories and added to Rome’s.
So What Happens Next???. New Kingdom 1540 – 1070 BCE (18 th – 20 th Dynasty) Ahmose took back control from the Hyksos and begins the 18 th Dynasty Time.
COMENIUS 8th APRIL TRASFORMATION + SECRECY Encryption Grafien = writing Cryptos = hidden, secret.
Unit 3 Vocabulary Ancient Greece & Rome Socrates: The first great Athenian Philosopher. He profoundly affected Western philosophy through his influence.
Vocabulary for Semester One. _______ is a time period in Europe when there was a “rebirth” of ancient Greek and Roman ideas, art, and architecture. __________.
Historical figures Leaders Презентация по английскому языку Starlight-6, Module 3b Учитель Масолова О.В.
Brief Incursion into Cryptography 1 20 th May 2008 Brief Incursion into Cryptography 20 th May 2008.
Secure communication Informatics for economists II Jan Přichystal
Forensic Science Questioned Documents: Part 3
Historical figures Leaders
A (Very) Brief History of Pre-Computer Cryptography
Was Walsingham’s spy network successful?
History of Cryptography
Enigma Machine.
Applications of Inverse Matrices
Unit11: Ancient Rome **Read page 179
THE ELIZABETHAN COURT MURDER SECRETS SPIES FIRST SLIDE.
By: Sarah Vermillion, Kiana Padash and Emma Dunne
Presentation transcript:

A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA

Part I: Manual Ciphers

When Codes Were Used Codes and ciphers are methods for encrypting data and messages. Codes and ciphers have been used since ancient times (c B.C.) The word CRYPTOGRAPHY, meaning the science of codes, comes from the Greek words kryptos (secret) and graphos (writing).

Historical Example 1 In 405 BC the Greek general LYSANDER OF SPARTA was sent a coded message written on the inside of a servant's belt.

Historical Example 1 When Lysander wound the belt around a wooden baton the message was revealed. The message warned Lysander that Persia was about to go to war against him. He immediately set sail and defeated the Persians.

Historical Example 2 The Greeks also invented a code which changed letters into numbers. A is written as 11, B is 12, and so on. So WAR would read A form of this code was still being used two thousand years later during the First World War.

Historical Example 3 The Roman Emperor JULIUS CAESAR invented his own simple code. He moved each letter of the alphabet along three places, so that A became D, B became E and so on. His famous phrase VENI, VIDI, VICI ("I came, I saw, I conquered") would have read YHQL YLGL YLFL.

Cryptograms on Gold Bars from China (about 1930’s)

Cryptanalysis After the fall of the Roman Empire codes were not used much until the sixteenth century. Then Italian and French scholars began to make up very complicated codes. The science of code-breaking - CRYPTANALYSIS - had begun.

Cryptanalysis: Example 1 In Elizabethan England MARY QUEEN OF SCOTS sent coded messages to her supporters who were plotting to murder Queen Elizabeth I.

Cryptanalysis: Example 1 The messages were intercepted by the head of Elizabeth's secret service, Sir Francis Walsingham. He deciphered them and discovered the plot. Mary was executed for treason in 1587.