Cryptography The Art & Science of Secret-Writing.

Slides:



Advertisements
Similar presentations
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Advertisements

Kyle Johnson. Cryptology Comprised of both Cryptography and Cryptanalysis Cryptography - which is the practice and study of techniques for secure communication.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Presentation Title Your company information. Cryptography2 Syllabus Course Syllabus –أخلاقيات استخدام الانترنت والقوانين المتعلقة بها –مقدمة في أمن المعلومات.
Secure communication Informatics for economists II Jan Přichystal
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
6/11/2015 1:55 AMCryptography1 ciphertext encrypt plaintext.
Numerical Algorithms Chapter 10
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
Numerical Algorithms Chapter 10
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
8. Cryptography1 ISA 562 Information Security Theory & Practice Introduction to Cryptography.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Classical Encryption Techniques
Numerical Alg. & Cryptography
Cipher Machines: From Antiquity to the Enigma Machine
Cryptography & Cryptanalysis
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Introduction to Information Security Chapter II : Classical Ciphers.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.

Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Symmetric-Key Cryptography
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Cryptography1 Syrian Virtual University MWS/MWT Internet & Web Security S2 Dr. Moutasem Shafa’amry
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Section 2.5 Polyaphabetic Substitutions
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Section 2.3: Substitution Ciphers
Encryption CS110: Computer Science and the Internet.
Intro to Cryptography Lesson Introduction
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Brief Incursion into Cryptography 1 20 th May 2008 Brief Incursion into Cryptography 20 th May 2008.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Chapter 2 Basic Encryption and Decryption
Numerical Algorithms x x-1 Numerical Algorithms
Section 2.7 The Friedman and Kasiski Tests
Cryptography and Network Security
Computer and Data Security 4th Class
Outline Some Basic Terminology Symmetric Encryption
Cryptography Computations
Cryptography Survey.
Cryptography II Jagdish S. Gangolly School of Business
Cryptography Survey.
Cryptography: Cesar Cipher
Traditional Symmetric-Key Ciphers
Unit 2: Cryptography & Cryptographic Algorithm
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Cryptography The Art & Science of Secret-Writing

Monoalphabetic Substitution Ciphers  Caesar Shift  Keyword with Caesar Shift  Shuffling letters

Invention of Cryptanalysis  Arab mathematicians  Adab al-Kuttāb (The Secretaries’ Manual)  Requires sophisticated knowledge of three different disciplines:  Mathematics  Statistics  Linguistics

First Records of Cryptanalysis  9 th Century  Abū Yūsūf Ya’qūb ibn Is-hāq ibn as-Sabbāh ibn ‘omrān ibn Ismaīl al-Kindī  Author of 290 books on medicine, astronomy, mathematics, linguistics and music  Greatest treatise: A Manuscript on Deciphering Cryptographic Messages

Frequency Analysis

Tables of Relative Frequencies

Variations  No text will have these exact frequencies in letter distribution—the tables are based on averages.  Shorter texts will have more variation than longer ones.

Cryptanalyzing a Ciphertext PCQ VMJYPD LBYK LYSO KBXBJXWXV BXV ZCJPO EYPD KBXBJYUXJ LBJOO KCPK. CP LBO LBCMKXPV XPV IYJKL PYDBL, QBOP KBO BXV OPVOV LBO LXRO CI SX’XJMI, KBO JCKO XPV EYKKOV LBO DJCMPV ZOICJO BYS, KXUYPD: “DJOXL EYPD, ICJ X LBCMKXPV XPV CPO PYDBLK Y BXNO ZOOP JOACMPLYPD LC UCM LBO IXZROK CI FXKL XDOK XPV LBO RODOPVK CI XPAYOPL EYPDK. SXU Y SXEO KC ZCRV XK LC AJXNO X IXNCMJ CI UCMJ SXGOKLU?” OFYRCDMO, LXROK IJCS LBO LBCMKXPV XPV CPO PYDBLK

Frequency of Scrabble Letters  What are the frequency of the letter tiles in Scrabble?  Are they the “correct” ones?  Are the points appropriately assigned? Write a memo to Hasbro Co. explaining your recommendations for changes to the Scrabble game—with a rationale as to why these changes make sense. If you feel no changes are needed, write to Hasbro explaining what about their design you approve of (and why).