Download presentation
Presentation is loading. Please wait.
Published byHubert Wells Modified over 9 years ago
1
Early Crypto Historical Events A snap shot over time
2
Agenda Short Intro on Crypto Start Video (2 hours) Lunch is provided End Video Discussion
3
Demaratus King of Sparta GO WEST Steganography (Hidden writing) Greece vs Persia 480 BC GO WEST Others: silk and wax, eggs and alum, etc.
4
Spartan Scytale (wood staff) 404 BC TRANSPOSITION CIPHER SEND THE MATERIAL NOW S E N D T H E M A T E R I A L N O W SEIEMANALDTNTEOHRW.
5
Substitution Cipher Karma-Sutra 4 AD “The art of understanding writing in cypher, and the writing of words in a peculiar way.” Alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZ Substitution: DEFGHIJKLMNOPQRSTUVWXYZABC “ROME SWEET ROME” “URPH VZHHW URPH” CAESAR CIPHER (FIRST MILITARY USE OF SUBSTITUTION CIPHER)
6
The Vigenère Cipher codeword: MONTREALMONTREALMO plaintext: SENDTHEMATERIALNOW ciphertext: ESAWKLEXMHRKZELYAK M S 1523 to 1596.
7
Baddington Plot A life hung on a cipher Queen Elizabeth I 1533-1603 Protestant Mary Queen of Scots 1542-1587 Catholic
8
Walsingham Mary Queen of Scots Conspirators Code Breaker Thomas Phillipes Cipher Clear Text Evidence
9
Warning Do not rely on weak crypto 1587 - February 8th, Executed
10
Enigma (1917) Museum Trip Automatically combines substitution and transposition
11
Crypto System a pair of data transformations: –one encrypts –the other decrypts Encrypt plain text Decrypt cipher text plain text key
12
Symmetric Key Crypto System same key is used for both transformations Encrypt plain text Decrypt ciphertext plain text Key=1 IBM HAL
13
Symmetric Algorithms Rijndael - AES RC6 Twofish Casear RC4 CAST DES Triple DES Rijndael
14
Video Please turn off cell-phones Dispose of all material
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.