Encryption: A Brief History Author: Margery Waldron.

Slides:



Advertisements
Similar presentations
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Advertisements

Famous Unsolved Codes & Ciphers By Sohel Saleem. - Dorabella Cipher - Voynich Manuscript - D’Agapeyeff cipher - Beale Ciphers Four popular cipher texts.
Cryptography & Encryption Secret Codes & The Advance of Technology Copyright © 2008 by Helene G. Kershner.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Digital Signatures. Anononymity and the Internet.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Secure communication Informatics for economists II Jan Přichystal
An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA.
A Glimpse of the History of Cryptography
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
Cryptography & Encryption Secret Codes & The Advance of Technology.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Section 3.6: An Introduction to Cryptography
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Cryptography Programming Lab
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
MAT 1000 Mathematics in Today's World Winter 2015.
Alan Turing and Code Breaking
a connection between language and mathematics
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Cryptography By, Anthony Lonigro & Valentine Mbah.
Keeping Secrets with Digital Technology Information Assurance Program Anderson School of Management.
1.History of a remarkable Man Call “Alan Turing”. 2.Study Life. 3.Work life during the world war 2 period. 4.His achievement after the world war. 5.His.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Information Security and Secret Messages. Agenda Information Assurance Program Value of Information Secret Messages –Steganography –Caesar Cypher –Keyword.
Cryptography Dave Feinberg. Suppose I send an from to Who has access to that ? What if I want the.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Famous Unsolved Codes & Ciphers
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
CS 150 – Computing: From Ada to the Web Cryptography.
CSCI-235 Micro-Computers in Science Privacy & Security.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
What does Julius Ceasar have in common with the transmission of modern digital signals?
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Encryption with Keys and Passwords
Digital Signatures.
Encryption.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography & Security
Cryptology in the U.S.—Then and Now
In this lesson we will understand:
History of Cryptography
Encryption with Keys and Passwords
Substitution Codes By Sarah Bonnell.
Encryption with Keys and Passwords
Welcome to semester 2. Midterm Pass-back tomorrow
Presentation transcript:

Encryption: A Brief History Author: Margery Waldron

Encryption l Encryption is the process of converting messages and documents into a secret code to ensure privacy. l Encryption has fascinated people of all ages throughout history l Encryption is used today in many fields including the internet, banking and CIA.

Cryptography l Cryptography is the field of computer science that studies encryption and decryption, which is the process of “breaking the code”. l Code: a “code” uses substitute words, numbers or symbols in place of each word in the secret message. l Cipher: a “cipher” uses numbers or symbols for every letter in the secret message

Polybius Polybius: A Greek historian captured during Roman conquest of Greece in 168 BC who made a cipher to send secret messages Polybius’ secret code was called the Polybius’ Square Key

Polybius’ Square Key To write a message using this code, simply write the two numbers that intersect at the letter you want. For example 51 = U. Using this cipher, figure out the message below: ’ ! A B C D E F G H I J K L M N O P Q R S T U V W X Y/Z

Caesar's Shift Caesar’s Shift Cipher: Roman Emperor Julius Caesar invented this cipher which gives a number to each letter of the alphabet by shifting the alphabet three places to the right: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Using Caesar’s cipher, decode this: ?

Alan Turing Alan Turing: an English math scholar who worked as a code breaker for the Government Code and Cypher School during WWII. He is responsible for breaking the German’s “Enigma code” used to communicate with their submarines which helped turn the war around for the allies. He went on to design one of the first computers called the “turing machine” in He was also an Olympic long distance runner!

Prime numbers & Cryptography Cryptographers use prime numbers to encrypt code because when they are large, they are very hard to locate. In 1977, a group of cryptographers challenged other cryptographers to find the key to their brand-new code. The only way to do it was to find the prime factors of a certain number that was 129 digits long!! At that time, the cryptographers figured it would take about 40 quadrillion (40 x ) years for others to solve the puzzle and crack the code. This problem was solved in the spring in 1994 in a time span of just 8 months by 160 computers working together via the Internet on a solution!!

Beale's Buried Treasure During the 19th century, a young man named Thomas Jefferson Beale appeared in Lynchburg, Virginia. After two years, he left an iron box with a trusted friend before leaving again. Beale told the friend that the box was not to be opened until 10 years had passed without his return. The decade passed with no sign of Beale. The box was opened and inside it were papers that described a spectacular buried treasure and directions on where to find it. However, the directions were nothing but three pages of numbers! (These numbers are printed in their entirety in Paul Hoffman’s book, Archimedes’ Revenge if you want to have a look!) The owner of the box was unable to decipher the code and when he died 41 years later, he left it with another man named James Ward.

Beale's Buried Treasure Years later, Ward was able to decipher one of the pages because he discovered that Thomas Jefferson Beale had used for a cipher key: the Declaration of Independence! By numbering each word of the Declaration of Independence, Ward hit upon the solution and was able to decipher the entire page. However, that page told only that the treasure consisted of thousands of pounds of gold and silver and millions of dollars’ worth of jewels, not where it was buried. Cryptographers have been trying for over 170 years, without success, to decipher the other pages or find the treasure. Even today, using modern computers, the cipher remains a mystery.

Beale's Buried Treasure Declaration of Independence When in the course of human events it becomes necessary for

Ms. Waldron's Secret Message l You are going to be given a file called secretcode.dat that contains a secret message. l You will create a class called Cypher that contains your substitution Cipher. l You will write a java application that uses the Cypher class to decrypt the secret message.

Mrs. Waldron's Buried Treasure The secret message is written using a substitution cipher. That is every letter in the Alphabet has been changed to a different letter. You need to substitute letters of the alphabet with what you guess is the corresponding encoded letter. You can reassign the letter if you change your mind.

Ms. Waldron’s Secret Message The templates for the Cypher Class and Decrypt.java are on our web site. Now we will have a demonstration…