Cryptography By, Anthony Lonigro & Valentine Mbah
Introduction Cryptography is the enciphering and deciphering of messages in secret code. As time moves on cryptography is required to evolve and with the existence of computers, cryptography has become a key feature in the lifeline of all developed countries.
Enigma Machine Electrical pathways Custom Rotors Polyalphabetic substitution and One-time pads It’s breech was a momentous occasion in WWII
Importance of Cryptography Almost all communications of sensitive data are done by software programs with file encryption capabilities. Without it, countries would fall. Used in digital signatures and credit card transactions over the internet.
Importance Continued… Companies could not have online interfaces without it. Imagine if every sensitive piece of information you entered to the internet was easily accessible by hackers.
With Cryptography
Hacker!!
With Cryptography Hacker!!
With Cryptography Hacker!!
With Cryptography Hacker!!
With Cryptography Hacker!!
With Cryptography Hacker!!
With Cryptography Hacker!!
With Cryptography Hacker!!
With Cryptography Hacker!!
With Cryptography Hacker!!
With Cryptography Hacker!!
With Cryptography Hacker!!
With Cryptography Hacker!! Information safe!
Without Cryptography
Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker!
Without Cryptography Hacker! Hello World! Information Compromised!
Example Plaintext = hello Encoded = ifmmp Every letter is transformed into the letter preceding it.
Ciphers The mathematical algorithm used to encrypt a message is called a cipher. Types: Symmetric Key Cipher & Asymmetric Key Cipher.
Symmetric Key Cipher One Key Encryption key = Decryption key
Asymmetric Key Cipher Two Keys Encryption Key != Decryption Key
Modern Cryptography Quantum Cryptography Unlike other cryptography methods which rely on computational security, quantum cryptography uses every single particle of light, which is called a photon, to transmit data.
Modern Cryptography Cont.. In old methods a couple photons could be intercepted and the users would not know. In Quantum Cryptography, if any photon is intercepted the data is transformed and the users are informed.
Parallel Programming With parallel programming a hacker can use multiple key cracking algorithms. This makes it easier to crack keys that have lower encryption bits. With most of the encryptions today, a key can be broken in O(2^n) time.
Hackers Even with a 56 bit encryption key, parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Hackers Even with a 56 bit encryption key parallel programming helps to crack the key. With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm. 1 Computer Many computers with parallel programming
Questions