Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Cryptology Making & Breaking Codes & Ciphers. AJ 1152 Cryptology Cryptography –Science of creating codes or ciphers Cryptanalysis –Science of breaking.
Making “Good” Encryption Algorithms
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography The science of writing in secret code.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
CIS 5371 Cryptography Introduction.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Introduction to Information Security Chapter II : Classical Ciphers.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
a connection between language and mathematics
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Systems of Equations as Matrices and Hill Cipher.
Lec. 5 : History of Cryptologic Research II
Encryption: A Brief History Author: Margery Waldron.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Cryptography  Goal of this art: how do you cipher your message securely?  This is an ancient art: For example, You can conceal the message (e.g. invisible.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Terminology and classical Cryptology
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Computer Security (CS4800)
Some of these PowerPoint pages were created by my friend Shawna Haider.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Chapter-2 Classical Encryption Techniques.
CSCI-235 Micro-Computer Applications
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Cryptography and Cryptanalysis
Computer Security Chapter Two
Basics Of Symmetric Encryption
Presentation transcript:

Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University

Overview What is cryptology? Why should we care about it? Some cryptology basics How can we incorporate it into the curriculum?

What is cryptology? CRYPTOLOGY The study of enciphering and deciphering messages CRYPTOGRAPHY The making of a cipher system (enciphering of a message) CRYPTANALYSIS The breaking of a cipher system (deciphering of a message) STEGANOGRAPHY=Hiding the actual existence of the message (invisible ink, hiding messages in art, etc.)

Why should we care about cryptology? Natural curiosity about secrets We encounter its use every day ATM Credit cards E-commerce Movies, books Exciting, interdisciplinary topic

Some cryptology basics: Terms Plaintext= readable message Cipher =method of hiding the message Key= shared information that allows the message to be encyrpted or enciphered Ciphertext= encoded message Cryptanalysis Cryptography

Some cryptology basics: Example=A cipher that is monalphabetic, substitution and shift Plaintext= CRYPTOLOGY Cipher =SHIFT EACH LETTER A CERTAIN NUMBER OF SPACES Key= 3 SPACES FORWARD Ciphertext= FUBSWRORJB Cryptanalysis Cryptography

Incorporating cryptology into the K-12 curriculum Two methods: Interdisciplinary projects/units/adventures Benefits: Connections between disciplines Applications to real life Fun and motivating Lessons/activities within a single discipline to teach or reinforce concepts Benefits: Applications to real life Can help to make concepts easier to remember Fun and motivating

Incorporating cryptology into the K-12 curriculum: Social Studies History: have students research the historical uses of cryptography Sparta, 500 B.C. Caesar cipher, 50 B.C. Jefferson’s wheel cipher, 1790 Revolutionary war Slave quilts, early and mid-1800s Decryption of Zimmermann Telegram and WWI Capturing rumrunners WWII (Japanese “Purple”, German “Enigma”, Navajo code talkers) Cuban Missle crisis Korean and Vietnam wars Civics and government: have students investigate the legal, governmental, and ethical issues surrounding cryptography

Incorporating cryptology into the K-12 curriculum: English Have students write research papers about the past and present uses of cryptography Incorporate vocabulary words into cryptography activities Use cryptography to explore the development of linguistics and communication in different cultures and times Have students write about a encryption or decryption technique that they created or discovered

Incorporating cryptology into the K-12 curriculum: Science Explore the make-up of invisible ink used in steganography and have students make their own invisible ink Have students use and document their use of a systematic scientific method for decrypting a message

Incorporating cryptology into the K-12 curriculum: Mathematics Encourage the use of problem solving skills by having students encrypt and decrypt messages Teach students about frequency distributions by investigating a simple substitution cipher Introduce or reinforce the concept of a function and of function notation and inverses of functions by investigating a shift cipher Introduce or reinforce the concept of a permutation by investigating a transposition cipher Introduce or reinforce many other concepts including: probability, matrix operations, modular arithmetic, cyclic groups, factorization and prime numbers, graph theory, number theory

Questions? Thank you! Teri Schmidt (765) Matt Rose (765)

Now it’s your turn!