The Evolution of Secret Writing 郭謹瑋 b9202053 黃聖德 b9202074 葉人豪 b9202078 謝東頤 b9202095.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
BITS Pilani Crypto Make-Up #1 Regular Session #2.
CRYPTOGRAPHY Lecture 1 3 week summer course. Why we need secure means of communication? Government: diplomacy is sometimes better done quietly. Military:
Persian Empire Persian Empire.
Conflicts of Ancient Greece  Persian Wars: Empire of Persia against the Greeks ○ Marathon ○ Thermopylae  Peloponnesian War Series of Wars within the.
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
The Evolution of Secret Writing 楊子陞 B 李柏勳 B 馬天祥 B 陳孟彙 B
Secure communication Informatics for economists II Jan Přichystal
An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA.
Overview of Digital Stenography
Steganography Rayan Ghamri.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CRYPTOGRAPHY Lecture 1 3 week summer course. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Introduction to Cryptography
Cryptography Week-6.
Section 3.6: An Introduction to Cryptography
Steganography Ben Lee III Long Truong ECE Spring 2002.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Cryptography & Cryptanalysis
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
a connection between language and mathematics
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Lec. 5 : History of Cryptologic Research II
CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar.
Early Crypto Historical Events A snap shot over time.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Cryptography  Goal of this art: how do you cipher your message securely?  This is an ancient art: For example, You can conceal the message (e.g. invisible.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
The Challenge of the Persians Greek History. Athens Upsets Persia Greeks Spread east and comes in contact with Persian Empire Ionian Greeks conquered.
Means of communication
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Greece & Persia.  Originally, Persians were an unorganized, nomadic group of people.  Leaders such as Cyrus the Great and Darius I united them and created.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
COMENIUS 8th APRIL TRASFORMATION + SECRECY Encryption Grafien = writing Cryptos = hidden, secret.
FOOTPRINTING STEGANOGRAPHY.
T215B Communication and information technologies (II) Session 3 Block 4 Protecting and prying Arab Open University - Fall
Secure communication Informatics for economists II Jan Přichystal
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Cryptography – Test Review
Substitution Ciphers.
TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plain text is changed with one another
A (Very) Brief History of Pre-Computer Cryptography
The Persian Wars.
Simple Encryption- Lesson 5
Digital Communications
Double Transpositions
Presentation transcript:

The Evolution of Secret Writing 郭謹瑋 b 黃聖德 b 葉人豪 b 謝東頤 b

流程 Introduction & earliest history : barrydog Steganography & cryptography : VOYAGE Transposition : abchoas Substitution : bush

Speaking of code … movie : Mercury Rising 、 Infernal affairs ( MORSE code ) novel : Sherlock Holmes cartoon : Conan The communication during war or between lovers etc…. Maybe now you would like to know: the evolution of secret writing

The earliest history According to the father of history : Herodotus The conflicts between Greece and Persia The art of secret writing saved Greece from being conquered by Xerxes, king of kings, leader of Persians. This is what happened during the time of Xerxes, the Xerxes who ruled over 127 provinces stretching from India to Cush ( Esther 1:1,From Bible )

The earliest history Demaratus (Who wanted to notify Sparta and Athen Xerxes intended to invade Greece ) : 1.scraping the wax off a pair of wooden folding tablets 2.writing on the wood 3.covering the message over with wax again.

Another example : Histaiaeus He wanted to encourage Aristagoras of Miletus to revolt against the Persian king. Way of secret writing : 1.shave the head of a messenger 2.The message on his scalp

One day, if you are a “CIA Agent”

First: Hide your message steganography it means that use many ways to make your enemy can not find your message It is derived from Greek words steganos, meaning ”covered,” and graphein, meaning ”to write.”

For example 1.The chinese wrote messages on fine silk, which was scrunched into a tiny ball and covered in wax. Then the messenger would swallow the ball of the wax Writing in the invisible ink for example: milk, organic fruit because they all are rich in carbon and therefore char easisy.

But …… If the message is still found by your enemy, they will know everything…… So we need to find other way to hide not only the existence of the message but its meaning

Second: hide the meaning Cryptography It means use many kind of ways to make the meaning of your message hidden. It is derived from the Greek word kryptos, meaning “hidden”

How to The message is scrambled according to a particular protocol which is agreed beforehand between the sender and the intended recipient Thus the recipient can reverse the scrambling protocol and make the message comprehensible

What Is Transposition ? Rearranged letters (Anagram) Ex. “Now” & “Eat” Security v.s Difficult Random Transposition “Tea” v.s “I saw my doctor this morning. ” → There are 23! distinct arrangements. Now → Won, Onw, Wno ; Eat→Tea

Unscrambling System(1) Rail fence : THY SECRET IS THY PRISONER; IF THOU LET IT GO, THOU ART A PRISONER TO IT ↓ T Y E R T S H P I O E T O L T T O H U R A R S N R O T H S C E I T Y R S N R F H U E I G T O A T P I O E T I ↓ TYERTSHPIOEITOLTTOHURARSNRQTHSCEITYRSNRFHUEIGTOATPIOETI

Unscrambling System(2)

Cryptography--Substitution Caesar Code In transposition each letter retains its identity but changes its position, whereas in substitution each letter changes its identity but retains its position.

When we substitute on character for another to conceal the original, we are using a substitution cipher. The oldest is one used by Julius Caesar, who added 3 to each of his letter numbers to conceal the real message. For example : Using the Caesar cipher, from "Hello", we get: "khoor"

Caesar ’ s Cipher with a Keyword Because it is difficult to remember an incoherent string of 26 letters, cipher alphabets are often based on a single word that is easy to memorize. The simplest method is to write out the keyword, omitting any repeated letters, then to follow it with the remaining letters of the alphabet in order. Here is a Substitution Cipher with zebra lips as the keyword.

To sum up ……