What does Julius Ceasar have in common with the transmission of modern digital signals?

Slides:



Advertisements
Similar presentations
the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics,
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Making “Good” Encryption Algorithms
Cryptography Made Easy Stuart Reges Principal Lecturer University of Washington.
Cryptography & Encryption Secret Codes & The Advance of Technology Copyright © 2008 by Helene G. Kershner.
The Secret in Cipher   張 瀞尹   林 秋君.
22C:19 Discrete Structures Integers and Modular Arithmetic
GSM BURSTS.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Secure communication Informatics for economists II Jan Přichystal
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography & Encryption Secret Codes & The Advance of Technology.
Chapter 2 Basic Encryption and Decryption (part B)
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Chapter 17: Information Science Lesson Plan Binary Codes Encoding with Parity-Check Sums Cryptography Web Searches and Mathematical Logic 1 Mathematical.
Section 3.6: An Introduction to Cryptography
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Chapter 17: Information Science Lesson Plan
The NORTH More Technological Advances
MAT 1000 Mathematics in Today's World Winter 2015.
Cis 4930 Introduction to cryptography
Copyright © Cengage Learning. All rights reserved.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
a connection between language and mathematics
Chapters 16 & 17 Sarah Cameron 18 March  Review of Modular Arithmetic  Identification Numbers ZIP Codes Bar Codes  Binary Codes  Encryption.
Encryption: A Brief History Author: Margery Waldron.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Secret Codes.  A code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or store.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
 Morse code is a method of communication that relies on the transmitting of an alphabet constructed from dots and dashes.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Terminology and classical Cryptology
The personal computer, both small and powerful is invented.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
How communication Changed over the Years. Back before they had phones or internet they had letters. People would write letters and send them horseback.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
Cryptography : from substitution cipher to RSA Alex Karassev.
By: D’Kihya Cooper.  The first messages are sent.
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
Functional Skills Code Breaking LO: Use logic and frequency analysis to read and write in code.
Chapter 5 - The Once And Future Digital Network Introduction The World Was Once Digital A Telegraph Is Digital [The telegraph is a digital technology because.
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
The Internet Book Chapter 5 3 The World Was Once Digital 150 years ago, telegraph messages were sent from one town to another. –Using audible clicks.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Forensic Science Questioned Documents: Part 3
Communicating through dots and dashes
Objective of the lesson
LO: Use logic and frequency analysis to read and write in code.
Cryptography Cryptography is derived from the Green word ‘kryptos’
Intro to Cryptography Hanqiu Peng.
Chapter 17: Information Science Lesson Plan
Cryptography: from substitution cipher to RSA
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

What does Julius Ceasar have in common with the transmission of modern digital signals?

CODES AND CODING

-two important things when making codes: - accuracy - secrecy

Error detection and correction Morse code invented in 19th century by Samuel Morse used for sending the messages over the telegraph consists of two symbols: dash – and dot ● wasn’t good in error detection and correction

coding system consisting only of 1 and 0 1 = “invade” 0 = “do not invade” incorrect transmission = disaster

improvement by using code words of length two or three 00 = “do not invade”, 11 = “invade” 000 = “do not invade”, 111 = “invade” it makes it easier to detect error and correct it

autocorrect mode: “animul”  “animal” “lomp” “lamp” “limp” “lump”

Making messages secret Julius Ceasar – changing around the letters of his message according to a key that only he and his generals knew Mary Queen of Scots – codes based on substitutions, but ones whose key could be uncovered by analysing the frequency of letters and symbols used German Enigma

Public key encryption discovered in the 1970s the secret key could be broadcasted to all and yet message could remain entirely safe the method depends on a 200 year old theorem in a branch of mathematics glorified for being the most useless of all

John Sender “J” Dr Reciever Dr Reciever 247, 5 J – = 74*74*74*74*74 = = *

John Sender “J” 120 Dr Reciever p=13 q=19 5*a ≡ 1 modulo (p-1)(q-1) a = 173 x ≡ (modulo 247) x = 74 – “J” is back in town

Can you break this code? YAOROVSEUEETHNCS

This type of code is known as a Caesar Box (Julius Caesar was the first to write codes this way.) To decipher the message, simply divide the code into four groups of four, and rearrange them vertically like this... YAOR OVSE UE..

And now this one: WEDHAEJEECHUCROASIEDVTPDE

Thank you for your time! Rebeka Čordaš