By Sean O’Mahoney from the Computing Society at Futures Friday

Slides:



Advertisements
Similar presentations
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Advertisements

A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Security & Encryption Thomas Fenske & Joseph Minter.
Cryptography The science of writing in secret code.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Cryptography & Encryption Secret Codes & The Advance of Technology.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Information Security IBK3IBV01 College 4 Paul J. Cornelisse.
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
CS 150 – Computing: From Ada to the Web Cryptography.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Warm Up 1) Solve: -2(x + 9) + 13 = -11 2) A triangle has side lengths of 5, 15, and 14. Is the triangle a right triangle? Why or Why not?
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Encryption with Keys and Passwords
The Secure Sockets Layer (SSL) Protocol
Cryptography – Test Review
Security, Social and Legal Issues Regarding Software and Internet
Basic Encryption: methods and tools
CIT 380: Securing Computer Systems
CSc 8320 Advanced Operating Systems Barnali Chakrabarty
Applied Cryptography Main goal
Crypto in information security
Cryptography Why Cryptography Symmetric Encryption
Identity Theft uses of Cryptography
Cryptography CS Principles January 19, 2017.
Cryptography.
Networks Encryption.
Topic 1: Data, information, knowledge and processing
Topic 3: Data Encryption.
Cryptography Survey.
History of Cryptography
Rotor Ciphers.
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Pooja programmer,cse department
Chapter 3:Cryptography (16M)
Security in Network Communications
Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Cryptography and Network Security
Simple Encryption- Lesson 5
Cryptography a Presentation Prepared by Vytautas Kondratas.
Lesson 7: Simple Encryption
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Digital Communications
Unit 2: Cryptography & Cryptographic Algorithm
Unit 8 Network Security.
WORLD OF WONDERS : THE ENIGMA MACHINE
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
Symmetric Encryption or conventional / private-key / single-key
Chapter Goals Define cryptography
Introduction to Cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

By Sean O’Mahoney from the Computing Society at Futures Friday Intro to Cryptography By Sean O’Mahoney from the Computing Society at Futures Friday

What? “Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.” – The Economic Times

Why & History The first known evidence of the use of cryptography (in some form) was found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in Egypt Fast forwarding to around 100 BC, Julius Caesar was known to use a form of encryption to convey secret messages to his army generals posted in the war front (the Caesar Cipher) During the 16th century, Vigenere designed a cipher that was supposedly the first cipher which used an encryption key. During the 18th the Freemasons used a cipher called Pigpen to keep their records private At the start of the 19th century when everything became electric, Hebern designed an electro-mechanical contraption which was called the Hebern rotor machine. It uses a single rotor, in which the secret key is embedded in a rotating disc. The Engima machine was invented by German engineer Arthur Scherbius at the end of World War I, and was heavily used by the German forces during the Second World War. https://access.redhat.com/blogs/766093/posts/1976023

Modern Day “Encryption makes the modern world go round. Every time you make a mobile phone call, buy something with a credit card in a shop or on the web, or even get cash from an ATM, encryption bestows upon that transaction the confidentiality and security to make it possible.” - BBC https://www.bbc.co.uk/news/technology-24667834

PGP (Pretty Good Protection) – HTTPS You have a public key (to lock/encrypt the message) and a private key (to unlock/decrypt the message). You would send the public key to all your friends so that they can encrypt sensitive messages that they want to send to you. Once you receive an encrypted message, you use your private key to decrypt it. https://medium.freecodecamp.org/how-does-pretty-good-privacy-work-3f5f75ecea97

Challenge – Caesar Cipher Ubcrshyyl lbh pna qrpbqr guvf

Challenge – Atbash Rg'h ivozgrevob vzhb gl wvxlwv The Atbash cipher is a very common, simple cipher. It was for the Hebrew alphabet, but modified here to work with the English alphabet. Basically, when encoded, an "A" becomes a "Z", "B" turns into "Y", etc. Rg'h ivozgrevob vzhb gl wvxlwv

Challenge - Pigpen https://v2.cryptii.com/text/pigpen