Cryptography & Encryption Secret Codes & The Advance of Technology Copyright © 2008 by Helene G. Kershner.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Security & Encryption Thomas Fenske & Joseph Minter.
Cryptography The science of writing in secret code.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Secure communication Informatics for economists II Jan Přichystal
An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy.
Principles of Information Security, 2nd edition1 Cryptography.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Cryptography & Encryption Secret Codes & The Advance of Technology.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Presentation Layer Network Format Local Format Information Transformation “few standards, but a lot of ideas”
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
Encryption Methods By: Michael A. Scott
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
Section 3.6: An Introduction to Cryptography
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Introduction to Information Security Chapter II : Classical Ciphers.
Cis 4930 Introduction to cryptography
CS110: Computers and the Internet Encryption and Certificates.
a connection between language and mathematics
Encryption Encryption is the process of obscuring information to make it unreadable without special knowledge. information
Encryption: A Brief History Author: Margery Waldron.
Keeping Secrets with Digital Technology Information Assurance Program Anderson School of Management.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
Secret Codes.  A code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or store.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Terminology and classical Cryptology
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Cryptology aka Cryptography Tim Cahill Ryan Church.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
CSCI-235 Micro-Computers in Science Privacy & Security.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
Some of these PowerPoint pages were created by my friend Shawna Haider.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
Introduction to Cryptography and Secure Communications  What is cryptography?  Encryption  Decryption.
Code Making/Breaking. What methods have you seen for encoding secret messages?
Week 3. Day 1 – Meet the Word Part “Divide and Conquer” Day 1.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
CIT 380: Securing Computer Systems
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptology in the U.S.—Then and Now
Cryptography CS Principles January 19, 2017.
Cryptography.
CSCI-235 Micro-Computer Applications
History of Cryptography
User access levels, Passwords, Encryption, Cipher, Key
Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.
Cryptography “The Secret Code Language”
Cryptography Cryptography is derived from the Green word ‘kryptos’
DISSERTATION ON CRYPTOGRAPHY.
Chapter Goals Define cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography & Encryption Secret Codes & The Advance of Technology Copyright © 2008 by Helene G. Kershner

Cryptography & Encryption Since the dawn of written language people have used codes. Secret CODE: “a system used for brevity or secrecy of communication, in which arbitrarily chosen words, letters, or symbols are assigned definite meanings.” “Codes and ciphers are forms of secret communication. A code replaces words, phrases, or sentences with groups of letters or numbers A cipher rearranges letters or uses substitutes to disguise the message.” A cipher is an algorithm for performing coding (encryption) and decoding (decryption) character. Copyright © 2008 by Helene G. Kershner

Cryptography & Encryption Who uses secret codes? Governments, military, businesses Doctors, computer uses, almost everyone Why bother? To keep information private To protect information To protect ourselves or to initiate action "One if by land; two if by sea" in “Paul Rever’s Ride” in Longfellow’s poem. The BBC broadcast “personal” messages such as: “The princess wears red shoes” & “Mimi's cat is asleep under the table” to direct actions by the French resistance during WW II. Copyright © 2008 by Helene G. Kershner

Cryptography & Encryption Long and mysterious history Codes used by ancient Hebrews, Babylonians, Egyptions, Greeks and Arabs. Caesar cipher – a code developed by Julius Caesar that substituted each letter of the Roman alphabet for a letter 3- positions down the list. President Jefferson and Lewis & Clark communicated in code when planning for their expedition. The Morse Code is a set of dots and dashes that represents words. Used heavily in both World Wars British built one of the first computers called Colossus to defeat the German coding system called Enigma. Navajo “code talkers” served with the Marines in the Pacific Copyright © 2008 by Helene G. Kershner

Cryptography & Encryption How might they work? The Apple is Red A b c d e f g h i j k l m n o p q r s t u v w x y z Using the Caesar cipher substitute for letters 3-down the alphabet THE APPLE is Red = WKH DSSOH …. Copyright © 2008 by Helene G. Kershner

Cryptography & Encryption Taken on new importance in the Computer Age “Encryption is the process of obscuring information to make it unreadable without special knowledge. To be sure a message is secret we need to know that : the communication is secure the communication is secure it is received by the right “people” it is received by the right “people” it can be decrypted (or decipher) it can be decrypted (or decipher) In other words, we must verify the integrity and authenticity of a message. In other words, we must verify the integrity and authenticity of a message. Copyright © 2008 by Helene G. Kershner

Cryptography & Encryption The Government’s Need to Know Vs The Right to Privacy Are these two ideas necessarily at odds? Which should have higher priority? Copyright © 2008 by Helene G. Kershner

Cryptography & Encryption In the mid-1970s, strong encryption went from government agencies to the public domain. WHY? Copyright © 2008 by Helene G. Kershner

Cryptography & Encryption Where is it used if not by the government? Encryption is now widely-used anywhere where there are computers. Password access to Internet sites Internet shopping, e-commerce Internet shopping, e-commerce Cellular messages Cellular messages Online banking and ATMs Online banking and ATMs Code Makers & Code Breakers (3) The Enigma -- History Channel Code Makers & Code Breakers (3) The Enigma -- History Channel Code Makers & Code Breakers (4) - American Cryptology -- History Channel Code Makers & Code Breakers (4) - American Cryptology -- History Channel Copyright © 2008 by Helene G. Kershner