Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cryptography By, Anthony Lonigro & Valentine Mbah.

Similar presentations


Presentation on theme: "Cryptography By, Anthony Lonigro & Valentine Mbah."— Presentation transcript:

1 Cryptography By, Anthony Lonigro & Valentine Mbah

2 Introduction Cryptography is the enciphering and deciphering of messages in secret code. As time moves on cryptography is required to evolve and with the existence of computers, cryptography has become a key feature in the lifeline of all developed countries.

3 Enigma Machine Electrical pathways Custom Rotors Polyalphabetic substitution and One-time pads It’s breech was a momentous occasion in WWII

4

5

6 Importance of Cryptography Almost all communications of sensitive data are done by software programs with file encryption capabilities. Without it, countries would fall. Used in digital signatures and credit card transactions over the internet.

7 Importance Continued… Companies could not have online interfaces without it. Imagine if every sensitive piece of information you entered to the internet was easily accessible by hackers.

8 With Cryptography

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46 Hacker!!

47 With Cryptography Hacker!!

48 With Cryptography Hacker!!

49 With Cryptography Hacker!!

50 With Cryptography Hacker!!

51 With Cryptography Hacker!!

52 With Cryptography Hacker!!

53 With Cryptography Hacker!!

54 With Cryptography Hacker!!

55 With Cryptography Hacker!!

56 With Cryptography Hacker!!

57 With Cryptography Hacker!!

58 With Cryptography Hacker!! Information safe!

59 Without Cryptography

60

61

62

63

64

65

66 Hacker!

67 Without Cryptography Hacker!

68 Without Cryptography Hacker!

69 Without Cryptography Hacker!

70 Without Cryptography Hacker!

71 Without Cryptography Hacker!

72 Without Cryptography Hacker!

73 Without Cryptography Hacker!

74 Without Cryptography Hacker!

75 Without Cryptography Hacker!

76 Without Cryptography Hacker!

77 Without Cryptography Hacker!

78 Without Cryptography Hacker!

79 Without Cryptography Hacker!

80 Without Cryptography Hacker!

81 Without Cryptography Hacker!

82 Without Cryptography Hacker!

83 Without Cryptography Hacker!

84 Without Cryptography Hacker!

85 Without Cryptography Hacker!

86 Without Cryptography Hacker!

87 Without Cryptography Hacker!

88 Without Cryptography Hacker!

89 Without Cryptography Hacker!

90 Without Cryptography Hacker!

91 Without Cryptography Hacker! Hello World! Information Compromised!

92 Example Plaintext = hello Encoded = ifmmp Every letter is transformed into the letter preceding it.

93 Ciphers The mathematical algorithm used to encrypt a message is called a cipher. Types: Symmetric Key Cipher & Asymmetric Key Cipher.

94 Symmetric Key Cipher One Key Encryption key = Decryption key

95

96 Asymmetric Key Cipher Two Keys Encryption Key != Decryption Key

97

98 Modern Cryptography Quantum Cryptography Unlike other cryptography methods which rely on computational security, quantum cryptography uses every single particle of light, which is called a photon, to transmit data.

99 Modern Cryptography Cont.. In old methods a couple photons could be intercepted and the users would not know. In Quantum Cryptography, if any photon is intercepted the data is transformed and the users are informed.

100

101 Parallel Programming With parallel programming a hacker can use multiple key cracking algorithms. This makes it easier to crack keys that have lower encryption bits. With most of the encryptions today, a key can be broken in O(2^n) time.

102 Hackers Even with a 56 bit encryption key, parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

103 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

104 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

105 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

106 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

107 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

108 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

109 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

110 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

111 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

112 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

113 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

114 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

115 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

116 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

117 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

118 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

119 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

120 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

121 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

122 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

123 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

124 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

125 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

126 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

127 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

128 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

129 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

130 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

131 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

132 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

133 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

134 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

135 Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming

136 Questions


Download ppt "Cryptography By, Anthony Lonigro & Valentine Mbah."

Similar presentations


Ads by Google