Download presentation
Presentation is loading. Please wait.
Published byAnthony Haynes Modified over 8 years ago
1
Cryptography By, Anthony Lonigro & Valentine Mbah
2
Introduction Cryptography is the enciphering and deciphering of messages in secret code. As time moves on cryptography is required to evolve and with the existence of computers, cryptography has become a key feature in the lifeline of all developed countries.
3
Enigma Machine Electrical pathways Custom Rotors Polyalphabetic substitution and One-time pads It’s breech was a momentous occasion in WWII
6
Importance of Cryptography Almost all communications of sensitive data are done by software programs with file encryption capabilities. Without it, countries would fall. Used in digital signatures and credit card transactions over the internet.
7
Importance Continued… Companies could not have online interfaces without it. Imagine if every sensitive piece of information you entered to the internet was easily accessible by hackers.
8
With Cryptography
46
Hacker!!
47
With Cryptography Hacker!!
48
With Cryptography Hacker!!
49
With Cryptography Hacker!!
50
With Cryptography Hacker!!
51
With Cryptography Hacker!!
52
With Cryptography Hacker!!
53
With Cryptography Hacker!!
54
With Cryptography Hacker!!
55
With Cryptography Hacker!!
56
With Cryptography Hacker!!
57
With Cryptography Hacker!!
58
With Cryptography Hacker!! Information safe!
59
Without Cryptography
66
Hacker!
67
Without Cryptography Hacker!
68
Without Cryptography Hacker!
69
Without Cryptography Hacker!
70
Without Cryptography Hacker!
71
Without Cryptography Hacker!
72
Without Cryptography Hacker!
73
Without Cryptography Hacker!
74
Without Cryptography Hacker!
75
Without Cryptography Hacker!
76
Without Cryptography Hacker!
77
Without Cryptography Hacker!
78
Without Cryptography Hacker!
79
Without Cryptography Hacker!
80
Without Cryptography Hacker!
81
Without Cryptography Hacker!
82
Without Cryptography Hacker!
83
Without Cryptography Hacker!
84
Without Cryptography Hacker!
85
Without Cryptography Hacker!
86
Without Cryptography Hacker!
87
Without Cryptography Hacker!
88
Without Cryptography Hacker!
89
Without Cryptography Hacker!
90
Without Cryptography Hacker!
91
Without Cryptography Hacker! Hello World! Information Compromised!
92
Example Plaintext = hello Encoded = ifmmp Every letter is transformed into the letter preceding it.
93
Ciphers The mathematical algorithm used to encrypt a message is called a cipher. Types: Symmetric Key Cipher & Asymmetric Key Cipher.
94
Symmetric Key Cipher One Key Encryption key = Decryption key
96
Asymmetric Key Cipher Two Keys Encryption Key != Decryption Key
98
Modern Cryptography Quantum Cryptography Unlike other cryptography methods which rely on computational security, quantum cryptography uses every single particle of light, which is called a photon, to transmit data.
99
Modern Cryptography Cont.. In old methods a couple photons could be intercepted and the users would not know. In Quantum Cryptography, if any photon is intercepted the data is transformed and the users are informed.
101
Parallel Programming With parallel programming a hacker can use multiple key cracking algorithms. This makes it easier to crack keys that have lower encryption bits. With most of the encryptions today, a key can be broken in O(2^n) time.
102
Hackers Even with a 56 bit encryption key, parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
103
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
104
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
105
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
106
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
107
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
108
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
109
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
110
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
111
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
112
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
113
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
114
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
115
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
116
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
117
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
118
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
119
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
120
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
121
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
122
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
123
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
124
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
125
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
126
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
127
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
128
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
129
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
130
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
131
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
132
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
133
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
134
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
135
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
136
Questions
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.