History of Cryptography - Engineering

History of Cryptography - Engineering

History of Cryptography Amir Boumezbeur Saeed Osman What is Cryptography? - Cryptography is the practice and study of techniques for secure communication. - Historically, cryptography has been used to convey secret messages. - Nowadays, cryptography is the driving force behind

digital security and privacy. Early Cryptography - First known evidence of cryptography was on an inscription in an Ancient Egyptian tomb in 1900 BC. - Early cryptography largely consisted of substitution ciphers. - Atbash cipher was a monoalphabetic cipher used by Hebrew scholars in 500 BC

- Caesar Cipher was used by Julius Caesar in Ancient Rome. Birth of Cryptanalysis - Cryptanalysis is the study of analysing and decrypting codes - Al-Kindi first to describe frequency analysis in the 9th century - -

Letters occur in varying frequencies - Take advantage of known frequency patterns - Effective in deciphering basic substitution ciphers Sample size to be taken into consideration Polyalphabetic substitution - First known polyalphabetic substitution cipher made by a mane named Leon Battista Alberti

- Polyalphabetic substitution ciphers use multiple substitution alphabets. - Effective in combating frequency analysis - Most well known example is the Vigenere cipher, invented in 1500s - Strongest cipher for centuries -

Cracked by Charles Babbage and Friedrich Kasiski independently in mid 1800s. Black Chambers - With the propagation of the use of ciphers in Europe, it became a political necessity to intercept and break secret messages. - Existed in nearly every European nation beginning in the 1500s - Dedicated government departments that were tasked with creating and breaking cryptograms of foreign

nations - These secretariats existed all the way up to the 20th century. Cipher Devices - - - After WWI, nations needed new ways to encrypt and hide messages from enemies. Four men from four nations created their own variations of electromechanical cipher devices and they all used typewriters and rotors.

Boris Hagelin modified Kochs machine by adding wheels and pins to represent an alphabet and made it pocket-sized called the C-36. On 1950, he manufactured 140,000 devices for the US Army and became the first cryptographic millionaire. The Enigma Machine - - On 1926, the German Army and Navy took Dr.Arthur Scherbius original Enigma device and altered it to a Military version. A large self inverse plugboard machine that takes 6 to 10 pairs of letters and encrypts them, the pair of letters can be upto 150 trillion different combinations. The British, French and Polish, all tried and failed to decode the machine On 1939, Alan Turing joined the GCCS and built the bombe,

elinimates as many wrong combinations as possible and was the biggest step towards the British successfully breaking the Enigma. Lucifer Cipher and DES - - - On 1968, Dr.Horst Fesital joined IBM and created an 128 bit block cipher algorithm called Lucifer. On 1973, the NBS and NSA adopted Lucifer and used it to implement the DES. It uses one key to encrypt and decrypt 64bit data. Main innovation and started a new era of the cryptography market. Spawned variations such as; IDEA, RC4, RC5, RC and the AES. Building blocks of the ATM and micro-transactions between

bank accounts. RSA Algorithm - First Public-key cryptosystem, used to secure data transmission Asymmetric encryption system that generates two keys, public(for encryption) and private(for decryption). Most commonly used in E-commerce and online business. Nowadays, used to pass encrypted keys and used in bulk encryptions. Built and used on the basics of humanity: Trust.

Recently Viewed Presentations

  • What About Food During Ramadan? Ramadan in the

    What About Food During Ramadan? Ramadan in the

    Last time we learnt Ramadan (in Arabic: رمضان, Ramadān) is the ninth month in the Islamic calendar. During the whole month, observers of Islam fast from sunrise to sunset. During the fast, no food or drink is consumed, and thoughts...
  • What were the differences between the lives of the rich and ...

    What were the differences between the lives of the rich and ...

    What jobs do you think most people did in Tudor times? How was life in Tudor times different from life today? Homework: Try to find some information about Tudor houses. What were the differences between the lives of the rich...
  • 1937 - 1939 President: M .D. Steer

    1937 - 1939 President: M .D. Steer

    (Lisa Murray) Appointed a task force to address guidelines for SLP paraprofessionals Professional Standards Board (IPSB) begins revising teacher licensing rules/standards 1995 Convention held in Indianapolis Added Clinical Potpourri sessions in the evening First time for handout binders (cost $15...
  • Procurement Card Program Overview Certification training is required

    Procurement Card Program Overview Certification training is required

    All PCards have a specified dollar limit. All PCard purchases must be over $20.00 All PCards have controlled vendor access. PCard mis-use could lead to COPH's loss of PCard privileges. Security Your PCard is the property of the University of...
  • Palm Coast City Council STRATEGIC ACTION PLAN 2012

    Palm Coast City Council STRATEGIC ACTION PLAN 2012

    Palm Coast City Council 2012 STRATEGIC ACTION PLAN. RESTATED STRATEGIC . GOALS. PRESENTED AT CITY COUNCIL INTERVIEW. CURRENT GOALS. PRESENTED AT CITY COUNCIL WORKSHOP. Manage growth for a quality, sustainable community. Develop long-term sustainable water supply. To anticipate the need...
  • Compare Two Short Stories NOW!  1. Topic Sentence:

    Compare Two Short Stories NOW! 1. Topic Sentence:

    Compare Two Short Stories NOW! 1. Topic Sentence: Identify one major point of comparison. 2. Point that is found in both texts Evidence and explanation from 1st text
  • Congenital lesions of larynx - The Medical Post

    Congenital lesions of larynx - The Medical Post

    Redundant bulky arytenoids prolapse anteriorly & medially on inspiration. Shortening + medial collapse of aryepiglottic folds. Expiration results in expulsion of these structures with free flow of air. Rigid bronchoscopy GA: exclude other anomaly
  • INF526: Secure Systems Administration Configuration Management Prof. Clifford

    INF526: Secure Systems Administration Configuration Management Prof. Clifford

    Class Presentation Schedule. 3/29 Mariam Fahad Bubeshait - Configuration Management ... gost. crc32. haval. Tripwire ... is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any ...