Shanna R. Simpson-Singleton Professor Kenneth Shiskowski, Ph.D. Mathematics Department.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Cryptography Ch-1 prepared by: Diwan.
COSC 4P03 Week 91 Public Key Cryptography Slides courtesy of Professor Sheridan Houghten.
Public Key Encryption Algorithm
CRYPTOGRAPHY Modern techniques. Computers and Cryptography Computers allow more sophisticated enciphering than mechanical devices Computers are faster.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
RSA Encryption William Lu. RSA Background  Basic technique first discovered in 1973 by Clifford Cocks of CESG (part of British GCHQ)  Invented in 1977.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Public Key Cryptography Bryan Pearsaul. Outline What is Cryptology? Symmetric Ciphers Asymmetric Ciphers Diffie-Hellman RSA (Rivest/Shamir/Adleman) Moral.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
RSA Numbers by: Brandon Hacay & Conrad Allen. History of RSA Numbers The letters in “RSA” are simply the initials of the people who are credited as having.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Prime Numbers Prime numbers only have divisors of 1 and self
History of Cryptography Adam Goodbar Clemson University April, 2007.
Introduction to Information Security Chapter II : Classical Ciphers.
RSA Encryption System.
RSA Ramki Thurimella.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
BY CLAYTON PETTY Leonard Max Adleman. Background Born Dec. 31, 1945 in California Attended UC Berkeley  BA in Mathematics in 1968  Ph.D. in EECS in.
Lec. 5 : History of Cryptologic Research II
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Computer and Internet Security. Introduction Both individuals and companies are vulnerable to data theft and hacker attacks that can compromise data,
NUMBER THEORY Chapter 5: Cryptology. Era of Electronic Electronic communication Electronic Banking.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Public Key (RSA) Day 27. Objective Students will be able to… …understand how RSA is used for encryption and decryption. …understand some of the challenges.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Information Security CS 526
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
James C. Bradas, Ph.D. Engineering & Analysis Operation 18 June 2009 Public Key Encryption.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
David Evans CS551: Security and Privacy University of Virginia Computer Science Lecture 6: Key Exchange The era of “electronic.
Computer Security (CS4800)
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Cryptography – Test Review
Public Key Cryptosystem
Privacy & Security.
Public Key Encryption and Digital Signatures
Public-Key Cryptography and RSA
Cryptography CS Principles January 19, 2017.
Appendix 5: Cryptography p
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
Unit 2: Cryptography & Cryptographic Algorithm
Presentation transcript:

Shanna R. Simpson-Singleton Professor Kenneth Shiskowski, Ph.D. Mathematics Department

An ancient civilization (approx B.C.E – 1800 B.C.E.) that populated Mesopotamia, an area between the Tigris and Euphrates Valley. They are often referred to as the cradle of civilization. Credited for the creation of the written language as a form cryptography. Used the substitution method of cryptography to encrypt cuneiform messages on stone tablets. Sources: and Photo from:

A very religious and ritualistic ancient civilization (3100 B.C.E. – 330 B.C.E,). Known best for its architecture of temple, monuments, and tombs. Used the substitution method of cryptology to amuse travelers and created a dramatic affect with ancient religious texts. Sources: ms/l97/bfnmusic/Freedom%20Pa pers/Stewart%20Synopsis/Ancient EgyptianFamily.jpg and (Pinock, p. 12) ms/l97/bfnmusic/Freedom%20Pa pers/Stewart%20Synopsis/Ancient EgyptianFamily.jpg Photo from: 20Papers/Stewart%20Synopsis/AncientEgyptianFamily.jpg 20Papers/Stewart%20Synopsis/AncientEgyptianFamily.jpg

A Roman emperor that is credited for building the Great Roman Empire. Used the Caesar cipher, an affine transformation cipher, to secretly communicate with his generals. Sources: lbums/l97/bfnmusic/Freedo m%20Papers/Stewart%20Syn opsis/AncientEgyptianFamily. jpg and (Pinock, p. 12) lbums/l97/bfnmusic/Freedo m%20Papers/Stewart%20Syn opsis/AncientEgyptianFamily. jpg Photo from:

A French diplomat and cryptographer ( ). The Vigenère cipher is named after him, although it was later discovered that he may not have created this cipher. (maybe Giovan Battista Bellaso created the cipher). Later created the autokey cipher. Sources: %C3%A8re_cipher and _de_Vigen%C3%A8re %C3%A8re_cipher _de_Vigen%C3%A8re Photo from: magdeburg.de/bs/lehre/wise0102/progb/vortraege/mzoellner/ vigenere.jpghttp://www-ivs.cs.uni- magdeburg.de/bs/lehre/wise0102/progb/vortraege/mzoellner/ vigenere.jpg

An AT&T Bell Labs engineer ( ). Credited for creating the stream cipher and the Vernam cipher for telecommunications. Also co- created the one-time pad cipher with Joseph Mauborgne. Source: Gilbert_Vernam Gilbert_Vernam Photo from:

Major General of the US Army ( ). Co-created the one-time pad cipher with Gilbert Vernam. Source: ki/Joseph_Mauborgne ki/Joseph_Mauborgne Photo from: Joseph_Mauborgne.jpghttp://upload.wikimedia.org/wikipedia/commons/thumb/c/c0/Joseph_Mauborgne.jpg/180px- Joseph_Mauborgne.jpg

Created the Hill Cipher in Patented a machine for his cipher which is pictured on the left of this text. Source: ki/Hill_cipher ki/Hill_cipher Photo from:

Co-published the exponentiation cipher with Martin Hellman. It is said that the algorithm was first discovered by Roland Silver, but Pohlig and Martin published their independent research first. Source: Hellman_algorithmhttp://en.wikipedia.org/wiki/Pohlig- Hellman_algorithm

Previous Stanford professor (born 1945). Co-created/published the exponentiation cipher, the Knapsack cipher, and the Diffie-Hellman key exchange system. Source: ki/Martin_Hellman ki/Martin_Hellman Photo from: cs-exhibitions.uni- klu.ac.at/uploads/pics/Martin-Hellman.jpghttp:// cs-exhibitions.uni- klu.ac.at/uploads/pics/Martin-Hellman.jpg

Engineer and Mathematician that worked for the GCHQ (Government Communications Headquarters for the British Intelligence Agency) ( ). Co-created what is now known as the public-key cryptosystem with Clifford Cocks and Michael Williamson. Although these gentlemen created the public-key cryptosystem in addition to many other cryptosystems and key generators first, they were forced to keep the information classified. It was not announced/published until after Ellis died in Source:

Mathematician and cryptographer that worked for the GCHQ (Government Communications Headquarters for the British Intelligence Agency) (born December 28, 1950). Co-created the public-key cryptosystem with James H. Ellis and Malcolm Williamson. Source: ford_Cocks ford_Cocks Photo from :

Mathematician that worked for the GCHQ (Government Communications Headquarters for the British Intelligence Agency). Co-created the public-key cryptosystem with James H. Ellis and Clifford Cocks. Source: Malcolm_Williamson_(crypto grapher) Malcolm_Williamson_(crypto grapher) Photo from:

Professor at Georgia Tech. University (born February 2, 1952). Co-creator of the Knapsack cipher along with Martin Hellman. Source: ki/Ralph_Merkle ki/Ralph_Merkle Photo from: merkle.jpghttp:// merkle.jpg

Professor at MIT Massachusetts Institute of Technology (born 1947) Co-created the RSA cryptosystem along with Adi Shamir and Leonard Adleman. Source: ki/Ronald_Rivest ki/Ronald_Rivest Photo from:

Cryptographer and cryptanalyst (born July 6, 1952). Co-created the RSA cryptosystem along with Ronald Rivest and Leonard Adleman. Source: ki/Adi_Shamir ki/Adi_Shamir Photo from:

Professor at the University of Southern California and a theoretical computer scientist (born December 31, 1945). Co-creator of the RSA cryptosystem along with Ronald Rivest and Adi Shamir. Source: Leonard_Adleman Leonard_Adleman Photo from:

Professor at Harvard University and Hebrew University (born September 1, 1931). Creator of the Rabin system and various other cryptosystems. Source: ki/Michael_Rabin ki/Michael_Rabin Photo from:

Chief Security Officer and Vice President of Sun Microsystems Laboratories(born June 5, 1944). Co-creator of the Diffie- Hellman Key Exchange System along with Martin Hellman. Source: Whitfield_Diffie Whitfield_Diffie Photo from:

Retired professor (born 1934). Co-created the Massey- Omura Cryptosystem along with Jim K. Omura. Source: ki/James_Massey ki/James_Massey Photo from:

Technology strategist and security advisor. Co-created the Massey- Omura Cryptosystem along with James Massey. Source: /pages/about/awards/bios/ 2005bell.html /pages/about/awards/bios/ 2005bell.html Photo from:

Chief technical officer and Co-Chair of the Board of Directors at Securify (born August 18, 1955). Creator of the Elgamal cryptosystem. Source: ki/Taher_Elgamal ki/Taher_Elgamal Photo from: