Presentation is loading. Please wait.

Presentation is loading. Please wait.

AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%

Similar presentations


Presentation on theme: "AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%"— Presentation transcript:

1 AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10% Quantum crypto & Coding Theory—20%

2 Introduction to Cryptography Cryptography is the study of message secrecy. Cryptography is the study of message secrecy. Effective cryptography is an essential tool for the protection of privacy & confidential information. Effective cryptography is an essential tool for the protection of privacy & confidential information. In this course, we will study the development of this secret art from the ancient times to the modern era, learn some classical ciphers, a modern cryptosystem, and certain aspects of Coding Theory. In this course, we will study the development of this secret art from the ancient times to the modern era, learn some classical ciphers, a modern cryptosystem, and certain aspects of Coding Theory.

3 Basic Definitions Cryptography—the art of creating & writing secret codes. Cryptography—the art of creating & writing secret codes. Cryptanalysis—the art of codebreaking. Cryptanalysis—the art of codebreaking. Cryptology—cryptography + cryptanalysis Cryptology—cryptography + cryptanalysis Encryption—process of converting readable information (plaintext) into unreadable gibberish (ciphertext) Encryption—process of converting readable information (plaintext) into unreadable gibberish (ciphertext) Decryption—reverse of encryption Decryption—reverse of encryption Cipher—the method used in encryption & decryption. Cipher—the method used in encryption & decryption.

4 Typing in Secret Message Plaintext Receiving Secret Message Plaintext Transmitting Secret Message Ciphertext Encryption Decryption Stealing Secret Message Ciphertext Figure 1: Illustration of processes in Cryptography Hacker (Doing Cryptoanalysis)

5 Development of Cryptography (Group Work) Research on the development of cryptography from 1900 BC to the 21 st century and fill up the timeline of cryptography with the major events that took place or ciphers that were invented. Read up on the ciphers you come across in your research and other classical ciphers.

6 Your group score will determine the order in which you get to choose the topic for your project, i.e. the group with the highest score gets to choose first.

7 How does the Atbash cipher work? Ans: The first letter of the alphabet is replaced with the last, the second with the second last, and so on.

8 Explain how the Scytale cipher works. Ans: The sender and receiver make two round pieces of wood exactly alike in length and thickness. These pieces of wood are called scytales. When a message needs to be sent, the sender winds a scroll of long and narrow parchment around his scytale, leaving no vacant space thereon. The message is then written, the parchment taken off and sent. To read the message, the receiver needs to rewind the parchment around his own scytale.

9 In which country was the first Black Chamber formed? Ans: France!

10 Who is the author of the world’s first printed book on cryptography? Ans: Johannes Trimethius, a German-born abbott

11 The first telegraph line was built in 1844, and stretched a distance of nearly 40 miles between Baltimore, Maryland and Washington, D.C. Messages sent using the telegraph were encrypted using the _________________ (name the cipher)? Ans: Morse code

12 Name the person who invented the first Enigma machine. Ans: Dr Arthur Scherbius

13 The ADFGX cipher was used by Germany in World War I. What is the name of the French cryptographer who managed to crack the cipher? Ans: Georges-Jean Painvin

14 During the Second World War, Japan started to encode high-level diplomatic messages using a machine known as the 97-shiki oobun Inji-ki, which was also called the ___________. Ans: Purple machine

15 Do research on one of the following classical ciphers and prepare a 10-15 min presentation on Do research on one of the following classical ciphers and prepare a 10-15 min presentation on - the history and development of the cipher - how to use the cipher - pros and cons of the cipher

16 Classical ciphers are classified into transposition and substitution ciphers. Choose one of the following ciphers to work on. Rail Fence Cipher (Group 2) Rail Fence Cipher (Group 2) Caeser Cipher (Group 3) Caeser Cipher (Group 3) Playfair Cipher (Group 4) Playfair Cipher (Group 4) Pigpen Cipher (Group 1) Pigpen Cipher (Group 1)


Download ppt "AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%"

Similar presentations


Ads by Google