Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
 Introduction › What is Cryptology › Confusion and Diffusion › History  Methods › Single Key › Public Key  Cryptanalysis Overview  Ethics.
1 Codes, Ciphers, and Cryptography-Ch 2.1 Michael A. Karls Ball State University.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA.
Classical Cryptography
CRYPTOGRAPHY Lecture 5. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M.
Cryptography & Encryption Secret Codes & The Advance of Technology.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Confederate Cipher Disk
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 7 – Cryptographic Systems.
Cipher Machines: From Antiquity to the Enigma Machine
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Introduction to Information Security Chapter II : Classical Ciphers.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Cis 4930 Introduction to cryptography
a connection between language and mathematics
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Lec. 5 : History of Cryptologic Research II
Encryption: A Brief History Author: Margery Waldron.
CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar.
Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key.
Introduction to Cryptography
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Terminology and classical Cryptology
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Section 2.5 Polyaphabetic Substitutions
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Information Security IBK3IBV01 College 4 Paul J. Cornelisse.
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
Computer Security (CS4800)
Some of these PowerPoint pages were created by my friend Shawna Haider.
Polyalphabetic Ciphers History. Alberti Rennaisance Architect –First fountains of Trevi, Rome –Churches 1467 essay on cryptology –Frequency analysis –Cipher.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOLOGY BY: Chris and Chris. Concepts & Definitions c ryptology- Is the art,or would be science, of designing and braking down secrecy systems c ryptology-
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Cryptography – Test Review
A Summary in Fifteen Minutes mas y menos
A cipher that was secure for 300 years
Cryptology in the U.S.—Then and Now
Computer and Data Security 4th Class
Polyalphabetic Ciphers
Outline Some Basic Terminology Symmetric Encryption
Cryptography and Network Security Sixth Edition by William Stallings.
Cis 4930 Introduction to cryptography
History of Cryptography
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Unit 2: Cryptography & Cryptographic Algorithm
Double Transpositions
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

The Spartans in 400 B.C. used cryptographic system called scytale. It is cylinder shaped with leather wrapped around it with a written message In the 5th century, Greeks used enciphered warnings about planned surprise attacks The Greek historian Polybius introduced the Polybius’ checkerboard. Uses a form of substitution that pairs of numbers substitute letters

Caesar is well-known in two instances of enciphering: first documented cipher for military purposes in the Gallic Wars. Caesar Shift Cipher which replaced each letter with the letter three places further down the alphabet Battista Alberti invented a cipher wheel. It was the first polyalphabetic substitution. pher/

The first cryptanalysts were born among the Arabs around the 8 th century Islam extremists concealed their writings from the orthodox through encipherment The Subh al-a ‘sha is an Arab encyclopedia detailing all Arabic knowledge of cryptology

In Europe during the Renaissance, cryptography was becoming a routine diplomatic tool Cryptanalysis was moving into the West during the 15 th century time By the 18 th century the telegraph was invented. During the Civil War U.S. Military Telegraph Corps used route ciphers. Many cryptanalysists invented different ciphers between the 15 th and 18 th century periods: Giovanni Battista Porta ( ) invented the earliest digraphic cipher. Blaise de Vigenere ( ) invented the first acceptable autokey cipher system. Also the Vigenere Square. Francis Bacon ( ) invented the Bilateral cipher. Thomas Jefferson ( ) invented the wheel cipher. Charles Wheatstone invented the digraphic cipher (playfair cipher).

Notes/lectures/classical.html Notes/lectures/classical.html The code book: the Science of Secrecy from Ancient Egypt to Quantum Cryptography, by Simon Singh, 1999, Anchor Books phy phy Invitation to Cryptology, By Thomas Barr