the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics,

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Cryptography Ch-1 prepared by: Diwan.
Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography Made Easy Stuart Reges Principal Lecturer University of Washington.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptography The science of writing in secret code.
Secure communication Informatics for economists II Jan Přichystal
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
An Introduction to Cryptology and Coding Theory Discrete Math 2006.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Systems of Equations as Matrices and Hill Cipher.
E-learning Tool For Education in Cryptography Supervisor: Assist. Prof. Vasilis Katos SCHOOL OF SCIENCE & TECHNOLOGY Panagiotis Paraschos MSc in ICT Systems.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Midterm Review Cryptography & Network Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
MAT 1000 Mathematics in Today's World Winter 2015.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Intro to Cryptography Lesson Introduction
Cryptology aka Cryptography Tim Cahill Ryan Church.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
CSCI-235 Micro-Computers in Science Privacy & Security.
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Anthology of Encryption Davon Dunajski. In the Beginning Rudimentary Code One Time Pads Enigma Machine Tasks – Authentication – Integrity – Nonrepudiation.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
Secure communication Informatics for economists II Jan Přichystal
Cryptography Dr. X.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Identity Theft uses of Cryptography
Cryptology in the U.S.—Then and Now
Public-Key Cryptography and RSA
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSCI-235 Micro-Computer Applications
Cryptography “The Secret Code Language”
Simple Encryption- Lesson 5
Cryptography a Presentation Prepared by Vytautas Kondratas.
Secure Diffie-Hellman Algorithm
Introduction to Cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics, computer science, and electrical engineering the word “cryptography” originates from two Greek words: “hidden/secret” and “writing”

serpent cipher systems a cipher is the algorithm that transforms information symmetric vs. asymmetric

the olden days cryptography was basically encryption information -> nonsense -> information whoever wrote the message provided the recipient with the decoding key

exhaustive key search on a Caesar Cipher code = XMZVH

modular arithmetic in a Caesar Cipher, a shift of 26 is the same as a shift of 0. for example: 37 = 11(mod 26)

we want a large number of keys (but having lots of keys is no guarantee of a strong system) number of potential keys = number of ways 26 letters can be arranged 26! = 403,291,461,126,605,635,584,00 0,000

Mary, Queen of Scots German Armed Forces, WWII Enigma Machine a large number of keys does not guarantee that a cipher is unbreakable

Diffie-Hellman Key Exchange

asymmetric cipher systems and more modular arithmetic

the primitive root of 17 is a number that has no factors in common (3)