Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 

Similar presentations


Presentation on theme: " Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems "— Presentation transcript:

1  Cryptography Melissa Pollis

2 What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems  Important security countermeasure  Used by corporations, businesses, or any organization that wants to secure it’s information  Use of mathematical operations to protect messages traveling between parties or stored on a computer

3 Roots of Cryptography  2000 BC  Egyptian practice of hieroglyphics  first known use of a modern cipher was by Julius Caesar (100 BC- 44 BC)  Did not trust messengers communicating with governors  “Caesar Cipher” – shifted each letter four places through the alphabet

4 Roots of Cryptography  Ancient Chinese – used ideographic nature of their language to hide the meaning of certain words  India – government had secret codes to communicate with network of spies throughout their country  Polybius – invented 5 x 5 Polybius square, which is widely used in many cryptographic systems

5 Polybius Square http://www.geocaching.com/geocache/GC1XZB8_the-nihilist- cipher

6 Roots of Cryptography  During World War Two, machines were invented that made the ciphers more complicated and difficult to break, and today, computers have made them even stronger still  Evolved from simple ciphers to corporations possibly looking towards new ways to secure their data, because of cracking abilities

7 Roots of Cryptography  Started as basic transposition ciphers, which assign each letter of the alphabet a particular value  Example is to assign each letter a progressively higher number, where A=1, B=2, and so forth. Using this formula for example, the word "wiseGEEK", once encrypted, would read "23 9 19 5 7 5 5 11”  Similar to Polybius Square ciphers

8 Basic Vocabulary  Terminology:  Plaintext:  This refers to the original unencrypted message  The term was coined in the early days when encryption was mostly text-based  Today, plaintext messages can be:  Images,  Sounds,  Videos, or  A combination of several data formats.

9 Basic Vocabulary  Encryption and Ciphertext:  Encryption is a cryptographic process that turns plaintext into seemingly random streams of bits called ciphertext  The sender sends this ciphertext to the receiver  Eavesdroppers will not be able to make sense of the ciphertext if they do intercept it  However, the receiver will be able to decrypt the ciphertext, turning it back into the original plaintext

10 Encryption and Decryption  Encryption and decryption require two things  The first is cipher  Cipher:  This is a specific mathematical process used in encryption and decryption.  there are many ciphers, they all operate differently.  Both sides must have the same cipher for the receiver to be able to decrypt the message.  The second requirement is the key

11 The Key  The Key:  The key is a random string of 40 to 4,000 bits (ones and zeros)  Longer keys are harder to guess and provide stronger confidentiality  For a given cipher, different keys will generate different cipher texts from the same plaintext

12 Key Length  If there is a key of length N bits, then there are 2 N possible keys  On average, the cryptographer will have to try half of all keys before succeeding  Each additional bit in the key doubles the time it will take to crack it  Some countries have restricted symmetric key lengths in exported products to 40 bits  This is to preserve the ability of govt. agencies to crack the key when they need to

13 The Simple Cipher  The Simple Cipher:  This cipher works on letters of the alphabet  There are three columns  The first has the text:  Nowisthetime. (Capitals & spaces removed for simplicity)  The second has the key  The key is a series of numbers between 1 and 26  The third column is the ciphertext to be transmitted

14 Cryptography  The Simple Cipher: PlaintextKeyCiphertext N4R O8W W15L I16… S23… T16… H3… E9… T12… I20… M6… E25…

15 Cryptography  The simple Cipher:  In this cipher, the plaintext letter is changed to the letter N places later in the alphabet, where N is the number in the key for that letter  So if a plaintext letter is B and the key value is 2, the ciphertext symbol will be D  When you get to the end of the alphabet and have not exhausted N, you continue with A to get the N count  Note: the most common letter in the English alphabet is E. This letter occurs twice in this example but it has different key values each time.  Using a random key each time makes it impossible to analyze the text by letter frequency

16 Symmetric Key Encryption  Symmetric Key Encryption Ciphers:  Symmetric key encryption uses many specific ciphers that work in the same general way but function very differently in their details  Communication partners must choose a specific symmetric key encryption cipher in order to communicate securely  Only a few common symmetric key encryption ciphers have been well tested, and it is important to select from these few:  RC4, DES, 3DES, and AES

17 Data Encryption Standard  DES: The Data Encryption Standard.  Created by the National Bureau of Standards in 1977, now called the National Institute of Standards and Technology (NIST)  It quickly became the most widely used symmetric key encryption method  It is still widely used because:  It has survived everything except brute-force exhaustive search attacks  It is widely available, and because  It is supported by hardware accelerators.

18 Why Use Cryptography?  Original purpose was encryption for confidentiality  Take legible, readable data, and transforming it into unreadable data for the purpose of secure transmission  Use a key to transform it back into readable data once it reaches final destination

19 Modern Cryptography  Cryptography concerns itself with four main objectives (cryptosystems):  Confidentiality  Integrity  Non-repudiation  Authentication

20 Modern Cryptography  Confidentiality: information cannot be understood by anyone unintended to see  Integrity: information cannot be altered without detection  Non-repudiation: creator cannot deny at later state his/her intentions  Authentication: sender/receiver can confirm each other’s identity

21 Government and Cryptography  Battleground of some of the world's best mathematicians and computer scientists  Do not want certain entities in and out of their countries  Do not want other companies to have access to receive and send hidden information  Threat to national interests

22 Issues of Cryptography  Sender/receiver can fail to keep the key secret  Eavesdropper may learn the key and read the messages  Only works if company enforces organizational processes that do not compromise the technical strengths of cryptography  Poor communication discipline  Example- Japanese Navy in WWII sent messages when there was little need, giving allied cryptologists a large base of messages to examine

23 References  Pearson Custom Business Resources. N.p.: Pearson Learning Solutions, 2010. Print.  "Brief History of Cryptography." Crypto Challenge. Thwate, Inc., 2013. Web. 12 Nov. 2013..  "What is Cryptography?" wiseGeek. Conjecture Corporation, 2013. Web. 12 Nov. 2013..  In-class notes


Download ppt " Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems "

Similar presentations


Ads by Google