Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Evolution of Secret Writing 楊子陞 B9209010 李柏勳 B9209024 馬天祥 B9209002 陳孟彙 B9209049.

Similar presentations


Presentation on theme: "The Evolution of Secret Writing 楊子陞 B9209010 李柏勳 B9209024 馬天祥 B9209002 陳孟彙 B9209049."— Presentation transcript:

1 The Evolution of Secret Writing 楊子陞 B9209010 李柏勳 B9209024 馬天祥 B9209002 陳孟彙 B9209049

2 What is Steganography ? Derived from the Greek words stegano, meaning “covered,” and graphcin, meaning “to write.”

3 Various forms of Steganography The ancient Chinese wrote messages on fine silk, which was then scrunched into a tiny ball and covered in wax. The Italian scientist Giovanni Porta described how to conceal a message within a hard-boiled egg.

4 Various forms of Steganography The thithymallus plant could be used as an invisible ink. Many organic fluids behave in a similar way, because they are rich in carbon and therefore char easily. Modern spies who have run out of standard issue invisible ink to improvise by using their own urine.

5 How can secret writing affect history ? secret writing saved Greece from being conquered. Be used in the war

6 What is Cryptography Greek word “kryptos” “hidden” Not to hide the message

7 Two kinds of cryptography: Transposition the letters of the message are simply rearranged Substitution give each alphabet which we know a new meaning

8 Transposition A word is rearranged randomly by us. For example, a word “are” which has 6 different way to be rearranged, e.g., are, aer, rea, rae, ear, era. The drawback of this way is that too many different ways we can’t understand it’s meaning immediately.

9 Another way is using the “rail fence” transposition For example: Life science is the main trend of the world L f s i n e s h m i t e d f h w r d i e c e c I t e a n r n o t e o l our cipher Lfsineshmitedfhwrdiececiteanrnote ol

10 Picture the scytale is a wooden staff around which a strip of leather or parchment is wound.

11 Substitution To pair letters of the alphabet at random, and then substitute each letter in the original massage with its partner. If we apply the principle to the roman alphabet, we can pair letters as follows: A D H I K M O R S U W Y Z V X B G J C Q L N E F P T

12 Another form of substitution is often called the Caesar shift cipher. Plain alphabet: a b c d e f g h I j k l m n o p q r s t u v w x y z Cipher alphabet: DEFGZJKLMNOPQRSTUVWXYZABC The drawback of Caesar shift cipher is that someone only try 25times can find its cipher

13 Another way is rearrange alphabets randomly, and then there are 400,000,000,000,000,000,000,000, 000 kinds of differences.

14 The other way is using a keyword or keyphrase to process, and the left alphabets are processing in turn as normal. Plain alphabet: a b c d e f g h I j k l m n o p q r s t u v w x y z Cipher alphabet: J U L I S CAERTVWXYZBDFGHKMNOPQ L I FESCNOPQRSTUVWXYZABDGHJK

15 Sender receive Key key algorithm ciphertext algorithm Plaintext plaintext

16 THANKS FOR YOUR ATTENTION


Download ppt "The Evolution of Secret Writing 楊子陞 B9209010 李柏勳 B9209024 馬天祥 B9209002 陳孟彙 B9209049."

Similar presentations


Ads by Google