The Evolution of Secret Writing 楊子陞 B9209010 李柏勳 B9209024 馬天祥 B9209002 陳孟彙 B9209049.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
1 Codes, Ciphers, and Cryptography-Ch 1 Michael A. Karls Ball State University.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
BITS Pilani Crypto Make-Up #1 Regular Session #2.
CRYPTOGRAPHY Lecture 1 3 week summer course. Why we need secure means of communication? Government: diplomacy is sometimes better done quietly. Military:
Secure communication Informatics for economists II Jan Přichystal
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CRYPTOGRAPHY Lecture 1 3 week summer course. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
1 The Mathematics of Star Trek Lecture 9: Cryptography.
Classical Encryption Techniques
Cryptography. Secret (crypto) Writing (graphy) –[Greek word] Practice and study of hiding information Concerned with developing algorithms for: –Conceal.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
The Evolution of Secret Writing 郭謹瑋 b 黃聖德 b 葉人豪 b 謝東頤 b
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Fall 2006CS 395 Computer Security1 Cryptography Well, a gentle intro to cryptography.
Cryptography & Cryptanalysis
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 Classical Encryption Techniques. Symmetric Encryption n conventional / private-key / single-key n sender and recipient share a common key n.
Cis 4930 Introduction to cryptography
Computer Science 101 Cryptography Part I. Notes based on S. Singh, The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography.
a connection between language and mathematics
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Lec. 5 : History of Cryptologic Research II
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Early Crypto Historical Events A snap shot over time.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Cryptography  Goal of this art: how do you cipher your message securely?  This is an ancient art: For example, You can conceal the message (e.g. invisible.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Information Security and Secret Messages. Agenda Information Assurance Program Value of Information Secret Messages –Steganography –Caesar Cypher –Keyword.
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (2) Information Security.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Computer Security (CS4800)
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
COMENIUS 8th APRIL TRASFORMATION + SECRECY Encryption Grafien = writing Cryptos = hidden, secret.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Secure communication Informatics for economists II Jan Přichystal
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
A (Very) Brief History of Pre-Computer Cryptography
Encryption
Outline Some Basic Terminology Symmetric Encryption
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Simple Encryption- Lesson 5
Cryptographic Algorithms and Protocols
DISSERTATION ON CRYPTOGRAPHY.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

The Evolution of Secret Writing 楊子陞 B 李柏勳 B 馬天祥 B 陳孟彙 B

What is Steganography ? Derived from the Greek words stegano, meaning “covered,” and graphcin, meaning “to write.”

Various forms of Steganography The ancient Chinese wrote messages on fine silk, which was then scrunched into a tiny ball and covered in wax. The Italian scientist Giovanni Porta described how to conceal a message within a hard-boiled egg.

Various forms of Steganography The thithymallus plant could be used as an invisible ink. Many organic fluids behave in a similar way, because they are rich in carbon and therefore char easily. Modern spies who have run out of standard issue invisible ink to improvise by using their own urine.

How can secret writing affect history ? secret writing saved Greece from being conquered. Be used in the war

What is Cryptography Greek word “kryptos” “hidden” Not to hide the message

Two kinds of cryptography: Transposition the letters of the message are simply rearranged Substitution give each alphabet which we know a new meaning

Transposition A word is rearranged randomly by us. For example, a word “are” which has 6 different way to be rearranged, e.g., are, aer, rea, rae, ear, era. The drawback of this way is that too many different ways we can’t understand it’s meaning immediately.

Another way is using the “rail fence” transposition For example: Life science is the main trend of the world L f s i n e s h m i t e d f h w r d i e c e c I t e a n r n o t e o l our cipher Lfsineshmitedfhwrdiececiteanrnote ol

Picture the scytale is a wooden staff around which a strip of leather or parchment is wound.

Substitution To pair letters of the alphabet at random, and then substitute each letter in the original massage with its partner. If we apply the principle to the roman alphabet, we can pair letters as follows: A D H I K M O R S U W Y Z V X B G J C Q L N E F P T

Another form of substitution is often called the Caesar shift cipher. Plain alphabet: a b c d e f g h I j k l m n o p q r s t u v w x y z Cipher alphabet: DEFGZJKLMNOPQRSTUVWXYZABC The drawback of Caesar shift cipher is that someone only try 25times can find its cipher

Another way is rearrange alphabets randomly, and then there are 400,000,000,000,000,000,000,000, 000 kinds of differences.

The other way is using a keyword or keyphrase to process, and the left alphabets are processing in turn as normal. Plain alphabet: a b c d e f g h I j k l m n o p q r s t u v w x y z Cipher alphabet: J U L I S CAERTVWXYZBDFGHKMNOPQ L I FESCNOPQRSTUVWXYZABDGHJK

Sender receive Key key algorithm ciphertext algorithm Plaintext plaintext

THANKS FOR YOUR ATTENTION