Early Crypto Historical Events A snap shot over time.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography Ch-1 prepared by: Diwan.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Conventional Encryption: Algorithms
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
The Hardware Security Module. Agenda MAHOhard members To give background Project details Design and implementation.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
The Evolution of Secret Writing 楊子陞 B 李柏勳 B 馬天祥 B 陳孟彙 B
Secure communication Informatics for economists II Jan Přichystal
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Dan Boneh Introduction History Online Cryptography Course Dan Boneh.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Introduction to Information Security Chapter II : Classical Ciphers.
Cis 4930 Introduction to cryptography
Computer Science 101 Cryptography Part I. Notes based on S. Singh, The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
a connection between language and mathematics
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Feistel Model Last Updated: Aug 27, Feistel Cipher Structure Described by Horst Feistel (IBM) in 1973 Many symmetric encryption algorithms use this.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Introduction to cryptography by konrad. Introduction to cryptography Cryptography is the process of encrypting/decrypting data streams using some E(M)/D(M)
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Terminology and classical Cryptology
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Chapter 2 Symmetric Encryption.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (2) Information Security.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
COMENIUS 8th APRIL TRASFORMATION + SECRECY Encryption Grafien = writing Cryptos = hidden, secret.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
LAB#3 CLASSICAL ENCRYPTION CPIT 425. This diagram is taken from Dr.Omaima slides.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Secure communication Informatics for economists II Jan Přichystal
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
NET 311D Information Security
برگرفته از اسلایدهای © University of Glamorgan
Simple Encryption- Lesson 5
Unit 2: Cryptography & Cryptographic Algorithm
Double Transpositions
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Early Crypto Historical Events A snap shot over time

Agenda Short Intro on Crypto Start Video (2 hours) Lunch is provided End Video Discussion

Demaratus King of Sparta GO WEST Steganography (Hidden writing) Greece vs Persia 480 BC GO WEST Others: silk and wax, eggs and alum, etc.

Spartan Scytale (wood staff) 404 BC TRANSPOSITION CIPHER SEND THE MATERIAL NOW S E N D T H E M A T E R I A L N O W SEIEMANALDTNTEOHRW.

Substitution Cipher Karma-Sutra 4 AD “The art of understanding writing in cypher, and the writing of words in a peculiar way.” Alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZ Substitution: DEFGHIJKLMNOPQRSTUVWXYZABC “ROME SWEET ROME” “URPH VZHHW URPH” CAESAR CIPHER (FIRST MILITARY USE OF SUBSTITUTION CIPHER)

The Vigenère Cipher codeword: MONTREALMONTREALMO plaintext: SENDTHEMATERIALNOW ciphertext: ESAWKLEXMHRKZELYAK M S 1523 to 1596.

Baddington Plot A life hung on a cipher Queen Elizabeth I Protestant Mary Queen of Scots Catholic

Walsingham Mary Queen of Scots Conspirators Code Breaker Thomas Phillipes Cipher Clear Text Evidence

Warning Do not rely on weak crypto February 8th, Executed

Enigma (1917) Museum Trip Automatically combines substitution and transposition

Crypto System a pair of data transformations: –one encrypts –the other decrypts Encrypt plain text Decrypt cipher text plain text key

Symmetric Key Crypto System same key is used for both transformations Encrypt plain text Decrypt ciphertext plain text Key=1 IBM HAL

Symmetric Algorithms Rijndael - AES RC6 Twofish Casear RC4 CAST DES Triple DES Rijndael

Video Please turn off cell-phones Dispose of all material