Académique Documents
Professionnel Documents
Culture Documents
jpg
What is cryptography ?
A Simple Example
Cat
Dbu
Tiger
Ujhfs
hello
???
What is cryptography ?
Hello
Plain Text
Increase each
letter by 3
key
Encryption System /
Cryptosytem
Khoor
Cipher Text
History
World War I
World War II
Source: http://www.ancient-egypt-online.com/images/hieroglyphs.jpg
Classical Cryptography
Examples:
Caesar Cipher
Substitution Cipher
Caesar Cipher
The recipient of this message would then shift the letters back by the
same number and obtain the original message.
Source: http://1.bp.blogspot.com/-1L0BHN4Qr0s/UieG2heAOI/AAAAAAAAAGg/Hop2r1Lg0yo/s1600/caesar.png
Substitution Cipher
ABCDEFGHIJKLMNOPQRSTUVWXYZ
QWERTYUIOPASDFGHJKLZXCVBNM
Attack at dawn
Qzzqea qz rqvf
In this method, the attacker tries to determine the key by attempting all
possible keys.
The English language have certain letters and groups of letters appear in
varying frequencies.
Source: http://crypto.interactive-maths.com/uploads/1/1/3/4/11345755/5749995_orig.jpg
Modern Cryptography
Secrecy is obtained through a secrete key which is used as the seed for
the algorithms.
Source: https://maketecheasier-holisticmedia.netdnassl.com/assets/uploads/2013/09/aboutencryption-asymmetric.png
Source: https://maketecheasier-holisticmedia.netdnassl.com/assets/uploads/2013/09/aboutencryption-asymmetric.png
Anyone that could intercept the message could plainly read the data.
This can include passwords, credit card data, and other sensitive
information
Other Applications
Telecom Companies
ATM
Television Encryption
Online banking
References
1. Ella Deon Lackey, (2012), Encryption and Decryption, https://
developer.mozilla.org/en-US/docs/Archive/Security/Encryption_and_Decryption
2. Ella Deon Lackey, (2012), Introduction to Public-Key Cryptography,
https://developer.mozilla.org/en-US/docs/Archive/Security/Introduction_to_PublicKey_Cryptography
3. Christof Paar and Jan Pelzl, Understanding Cryptography, Springer, 2010 Edition
4. http://www.tutorialspoint.com , Modern Cryptography
5. http://www.tutorialspoint.com , Attacks on Cryptosystems
Any Questions ?