Cryptography “The Secret Code Language”

Slides:



Advertisements
Similar presentations
the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics,
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography The science of writing in secret code.
Cryptography & Encryption Secret Codes & The Advance of Technology.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Section 3.6: An Introduction to Cryptography
MAT 1000 Mathematics in Today's World Winter 2015.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Cryptography is the process of encryption and decryption a message or data. Examples: Banking to keep peoples money safe Schools so we can keep students.
Cryptography Cryptography is derived from the Green word ‘kryptos’
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
How the internet works Cryptography. LO: Define the terms encryption and decryption Construct a secure message using encryption LO: Define the terms encryption.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
Introduction to Cryptography and Secure Communications  What is cryptography?  Encryption  Decryption.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Secret Key Cryptography
Encryption with Keys and Passwords
Cryptography – Test Review
(Principles of Informatioan security)
Lesson 2-18 AP Computer Science Principles
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Basic Encryption: methods and tools
CIT 380: Securing Computer Systems
Cracking Encrypted Systems
Key words: Cryptography | Binary | Cipher
Cryptography Dr. X.
Encryption.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Identity Theft uses of Cryptography
Cryptology in the U.S.—Then and Now
Basic Encryption Methods
Taehyung Kim HPC Lab. POSTECH
Encryption
CSCI-235 Micro-Computer Applications
Networks Encryption.
Lesson 5: Simple Encryption
Intro to Computer Science CS1510
User access levels, Passwords, Encryption, Cipher, Key
Chapter 3:Cryptography (16M)
Unit 1.6 Systems security Lesson 4
PART VII Security.
NET 311D Information Security
Applications of Inverse Matrices
NET 311D Information Security
Simple Encryption- Lesson 5
Substitution Codes By Sarah Bonnell.
Cryptography Cryptography is derived from the Green word ‘kryptos’
Enigma, Cyphers and Encryption
Cryptography a Presentation Prepared by Vytautas Kondratas.
Lesson 7: Simple Encryption
Communication.
Cryptography: Cesar Cipher
Digital Communications
Traditional Symmetric-Key Ciphers
Unit 2: Cryptography & Cryptographic Algorithm
WORLD OF WONDERS : THE ENIGMA MACHINE
GCSE COMPUTER SCIENCE Topic 3 - Data 3.10 Encryption.
Cryptology.
Introduction to Cryptography
NET 311D Information Security
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography “The Secret Code Language” Moderated by: A. Lawson

What is Cryptography?

What is your definition of cryptography? krɪpˈtɒɡrəfi/ noun the art of writing or solving codes. What is your definition of cryptography? Cryptography Definition:  is the practice and study of techniques for secure communication in the presence of third parties called adversaries. Cryptography is derived from the Greek word ‘kryptos’ which means hidden or secret

Cryptography Cryptography is thought to date back to the Egyptians and their use of hieroglyphics.

Cryptography Hieroglyphics were complex pictograms. At the time, the meaning of the hieroglyphics were known by only a few.

Cryptography What does this hieroglyphic message say? Write your answer below: (refer to website hieroglyphics code sheet)

Cryptography You can only understand this message if you have the code or the key to ‘unlock’ or decipher it.

Cryptography Now you have the ‘key’, see if you can decipher the message.

Julius Caesar developed the first modern cipher. Cryptography Julius Caesar developed the first modern cipher. It is known as the ‘Caesar cipher’

Cryptography Each character in the message is replaced by the character three positions ahead of it in the alphabet

Cryptography A D B E G ? Z ?

Caesar Cipher Cryptography A D B E C F G H I J K L M N O P Q R S T U V W X Y Z Caesar Cipher

Decode the following message: FURVV WKH ULYHU WRQLJKW Cryptography A D B E C F G H I J K L M N O P Q R S T U V W X Y Z Decode the following message: FURVV WKH ULYHU WRQLJKW

CROSS THE RIVER TONIGHT Cryptography A D B E C F G H I J K L M N O P Q R S T U V W X Y Z The message said: CROSS THE RIVER TONIGHT

Why might Julius Caesar encrypt his messages? Cryptography Why might Julius Caesar encrypt his messages? Think of two disadvantages of using the Caesar Cypher

Cryptography Why might Julius Caesar encrypt his messages? - So that he could safely send messages to his troops. Even if the messanger was caught, his enemies wouldn’t understand the message

Cryptography Think of two disadvantages of using the Caesar Cypher -The person receiving the message would have to understand how to decrypt it Caesar ciphers are easy to break It doesn’t allow for numbers or symbols

Cryptography Plenary Explain the following terms to your partner: Cryptography Decrypt Caesar Cypher