cryptography its history application and beyond

29
BSZQRPHSBQIZ CRYPTOGRAPHY Presented by Kinle

Upload: kinleay

Post on 02-Nov-2014

12 views

Category:

Technology


2 download

DESCRIPTION

History of Cryptography and Its Application

TRANSCRIPT

Page 1: Cryptography its history application and beyond

BSZQRPHSBQIZ

CRYPTOGRAPHY

Presented by Kinley

Page 2: Cryptography its history application and beyond

2

History of CryptographyIn the beginning: before 2000 BC

Before 2,000 BC

http://www.livius.org/a/turkey/mycale/mycale_map.gif

Page 3: Cryptography its history application and beyond

3

Around 1900 BC : In Egypt [Non-Standard hieroglyphics]

http://www.bible-history.com/maps/maps/israel_and_her_neighbors.jpg

Page 4: Cryptography its history application and beyond

4

Greeks and Spartans used this cipher to communicate during military campaigns

Called Transposition Cipher

487 BC: The Greek used a device called the Scytale

http://flylib.com/books/2/827/1/html/2/images/1004.jpg

Page 5: Cryptography its history application and beyond

5

200–118 BC: Another Greek method was developed by Polybius (now called the "Polybius Square").

I A M A T T A C K E D42 1123 23 44 44 11 31 52 51 41

I A M ATTACKED = 42 1123 23 44 44113152 5141

http://www.sciencephoto.com/image/363640/530wm/V4000161-Polybius_square-SPL.jpg

Page 6: Cryptography its history application and beyond

6

60-50 BC: Caesar Shift Cipher

Encrypt (“BAD”, 3) = “EDG” Decrypt (“EDG”, 3) = “BAD”

Julius Caesar used it to communicate with his generals during his military campaigns.

It is also used to secure secret communications from military leaders, diplomats, spies and religious groups

Called Mono-alphabetic Substitution Ciphers

http://www.secretcodebreaker.com/ciphrdsk.gif

Page 7: Cryptography its history application and beyond

7

The Breaking Caesar Shift Ciphers The algorithm was not particularly strong

Using Frequency Analysis

In English (Source: Beker & Piper)

VIDEO CLIP

Page 8: Cryptography its history application and beyond

15th Century: Leon Battista Alberti

8

http://www.cs.trincoll.edu/~crypto/historical/alberti.jpg

http://upload.wikimedia.org/wikipedia/commons/thumb/7/70/Alberti_cipher_disk.JPG/250px-Alberti_cipher_disk.JPG

Leon Battista Alberti (1404–1472) was an Italian author, artist, architect, poet, priest, linguist, philosopher and general Renaissance polymath. Being an accomplished cryptographer, Hepublished the earliest book on cryptanalysis in western Europe,created the first polyalphabetic cipher (now known as the Alberti cipher) invented the first encryption machine (the Alberti Cipher Disk).

His polyalphabetic cipher was the most significant advance in cryptography since Julius Caesar's time. He is known as “Father of Western Cryptography."

Page 9: Cryptography its history application and beyond

Frequency Analysis:The relative frequency of letters used in the English language. 'E' is the most commonly used letter, followed by 'T', 'A', 'O' and 'I' respectively.

Encryption using single key in Alberti Cipher Disk

Its consisted of two metal discs, one mobile, and one immobile, attached by a common axle so that the inner disc may be rotated

Page 10: Cryptography its history application and beyond

Encryption using Multiple keys in Alberti Cipher Disk

It was known as "unbreakable cipher” based on frequency analysis

http://www.geocaching.com/seek/cache_details.aspx?guid=1b622946-92f8-4fad-a009-ce83b88791f2

Page 11: Cryptography its history application and beyond

America's minister to France The wheel cipher consisted

of a row of cylindrical wooden pieces, each threaded onto an iron spindle.

The letters of the alphabet were inscribed on the edge of each wheel in a random order.

Turning these wheels, words could be scrambled and unscrambled.

11

1790: Thomas Jefferson invented Wheel cipher.

http://www.cryptologicfoundation.org/content/A-Museum-Like-No-Other/images/m94_005.jpgExample:

Page 12: Cryptography its history application and beyond

12

19th Century: Blaise de Vigenère was a French diplomat with Roman and cryptographer

• The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword

• Vigenere’s polyalphabetic cipher generalizes Caesar’s shift cipher and called Vigenere polyalphabetic Cipher

• Known as “The Unbreakable Cipher” until Charles Babage developed the Multiple frequency Analysis and Friedrich Kasiski, the Prussian military officer analyzes repetitions in the ciphertext to determine the exact period and he is credited with breaking the Vigenère cipher in 1863

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A A B C D E F G H I J K L M N O P Q R S T U V W X Y ZB B C D E F G H I J K L M N O P Q R S T U V W X Y Z AC C D E F G H I J K L M N O P Q R S T U V W X Y Z A BD D E F G H I J K L M N O P Q R S T U V W X Y Z A B CE E F G H I J K L M N O P Q R S T U V W X Y Z A B C DF F G H I J K L M N O P Q R S T U V W X Y Z A B C D EG G H I J K L M N O P Q R S T U V W X Y Z A B C D E FH H I J K L M N O P Q R S T U V W X Y Z A B C D E F GI I J K L M N O P Q R S T U V W X Y Z A B C D E F G HJ J K L M N O P Q R S T U V W X Y Z A B C D E F G H IK K L M N O P Q R S T U V W X Y Z A B C D E F G H I JL L M N O P Q R S T U V W X Y Z A B C D E F G H I J KM M N O P Q R S T U V W X Y Z A B C D E F G H I J K LN N O P Q R S T U V W X Y Z A B C D E F G H I J K L MO O P Q R S T U V W X Y Z A B C D E F G H I J K L M NP P Q R S T U V W X Y Z A B C D E F G H I J K L M N OQ Q R S T U V W X Y Z A B C D E F G H I J K L M N O PR R S T U V W X Y Z A B C D E F G H I J K L M N O P SS S T U V W X Y Z A B C D E F G H I J K L M N O P Q RT T U V W X Y Z A B C D E F G H I J K L M N O P Q R SU U V W X Y Z A B C D E F G H I J K L M N O P Q R S TV V W X Y Z A B C D E F G H I J K L M N O P Q R S T UW W X Y Z A B C D E F G H I J K L M N O P Q R S T U VX X Y Z A B C D E F G H I J K L M N O P Q R S T U V WY Y Z A B C D E F G H I J K L M N O P Q R S T U V W XZ Z A B C D E F G H I J K L M N O P Q R S T U V W X Y

http://www.ms-voynich.com/carrevig.gif

Example:

Page 13: Cryptography its history application and beyond

13

1917 Century; Gilbert Vernam was an engineer for The American Telephone and Telegraph Company. He was asked in 1917, during WWI, to develop a teletypewriter that encrypted transatlantic telegraph messages sent by the War Department to United States troop commanders in Europe. Vernam Cipher used a random key to encrypt the message sent by telegraph printer known as Vernam Cipher which was the first example of online encryption.The system, which was modified by the Army Signal Corps, was later proved to be unbreakable by using a different key every time a message was sent. This was called One Time Pad Cipher.

VIDEO CLIP

http://people.rit.edu/japnce/payne/images/vernamcipherdevice1.gif

Page 14: Cryptography its history application and beyond

Enigma Machine

Electro-mechanical cipher machine, simple in design yet powerful in capability

Built in Germany in 1918 at the end of WWI and later adapted for commercial use, and by German military in 1926

Uses rotors settings (the key) to encrypt each letter of a message with a different cipher key

Military added the plugboard to commercial Enigma, greatly increasing cryptologic strength

Strength of Enigma design gave Germans complete confidence in its security, even when faced with evidence of compromise

http://math.arizona.edu/~dsl/images/enigma11.gif

Page 15: Cryptography its history application and beyond

15

1932-1944: The Pole, Marian Rejewski attacked and broke the early German Army Enigma system using theoretical mathematics in 1932. British code breakers designed Bombe to decrypt Enigma cipher machine Using Frequency analysis designed by Alan TuringIt was the greatest breakthrough in cryptanalysis in a thousand years and more http://math.arizona.edu/~dsl/images/enigma11.gif

Page 16: Cryptography its history application and beyond

Data Encryption Standard (DES) 1972: U.S. Government recognized the

need to have a standardized cipher for secret documents (encrypting classified and sensitive information)

NBS developed DES based on an earlier IBM algorithm, Horst Feistel's Lucifer cipher.

DES is a 64-bit block cipher algorithm (64-bit block = 56-bit secret key + 8-bit parity) that uses a key of 56 bits and 16 rounds of transposition and substitution to encrypt each group of 8 (64-bit) plaintext letters.

Horst Feistel was a German-born cryptographer who worked on the design of ciphers at IBM, initiating research that would culminate in the development of the Data Encryption Standard in the 1970s

http://cryptodox.com/images/thumb/d/d5/Feistel.jpg/180px-Feistel.jpg

Analysis of DES was the beginning of modern cryptographic research

Page 17: Cryptography its history application and beyond

Breaking of Data Encryption Standard (DES)

http://www.eff.org/Privacy/Crypto/Crypto_misc/DESCracker/

The key length of DES was too short• If a key is 56 bits long, that means

there are 256 possible keys• “DES Cracker” machines were

designed to simply brute force all possible keys

1977: DES-cracking machine was used Diffie and Hellman to find a DES key in a single day

1993: Wiener used a key-search machine to find a key within 7 hours

DES was further weakened by the discovery of differential cryptanalysis by Biham and Shamir in 1990 which requires 247 chosen plaintexts• Ideally a ciphertext should be completely

random, there should be no connection to its matching plaintext

• Differential analysis exploits the fact that this is never actually the case

• Uses patterns between plaintext and ciphertext to discover the key

There is evidence that IBM knew about differential cryptanalysis back when they were designing DES in 1976

Page 18: Cryptography its history application and beyond

Advanced Encryption Standard

http://www.boiledbeans.net/wp-content/uploads/2008/06/7a813428ed90cb02515fca28991a342c.jpg

The U.S. government approved AES for protecting secret and top secret classified documents.

This is the first time the United States has ever approved use of a commercial algorithm derived outside the government to encrypt classified data.

With DES effectively broken, a new standard was needed

U.S. Government made it an open application/review process this time, and received many submissions

In 2001, after five years, Belgian cryptographers, Joan Daeman and Vincent Rijman’s Rijndael algorithm was selected by NIST become as the Advanced Encryption Standard (AES).

AES is a symmetric block cipher that can… Process data blocks of 128 bits. Uses cipher keys with lengths of 128, 192,

and 256 bits. Variable number of rounds, each round

10, 12, or 14 rounds depending on the key size

Page 19: Cryptography its history application and beyond

Current attacks against AES On AES with 128-bit keys, a brute force attack would require 2128

work Any technique that can decrypt a ciphertext with less than 2128 work is

considered an attack Currently the best attacks on AES use variations of differential

cryptanalysis None of them could actually be completed before the sun burns out None of them work on the full number of rounds

Video Clips

Page 20: Cryptography its history application and beyond

1976: Whitfield Diffie & Martin Hellman published New Directions in Cryptography.

Develop the fundamental ideas of dual-key, or public key, cryptography solving one of the fundamental problems of cryptography, key distribution

We use one key for encryption (the public key), and a different key for decryption (the private key)

http://img.allvoices.com/thumbs/people/135/135/44737066-whitfield-

diffie.jpg

Video Clips

Page 21: Cryptography its history application and beyond

1978: Ronald L. Rivest, Adi Shamir & Leonard M. Adleman (RSA) published RSA Algorithm for Public Key System.

The RSA algorithm was publicly described in 1977 but was never deployed. It was not revealed until 1998 due to its top-secret classification

RSA was based on product of two large prime numbers

Uses this product to create the public and private keys

Sends the product and the public key one, who can use them to encrypt messages

Even if some one knows the product and the public key, he/she can’t figure out the private key unless he/ she can factor the productThere is no known way to do this efficiently

Keys: 1,024 to 4,096 bit typical

http://datanews.levif.be/ict/actualite/apercu/2011/02/17/un-lifetime-achievement-award-pour-les-pionniers-de-rsa/article-1194952831693.htm

Video Clip

Video Clip

Page 22: Cryptography its history application and beyond

Cryptography in Modern Living Secure Communications

-Document / Data / Email Encryption

Identification and Authentication-Smart Cards

Electronic Commerce and Payments –ATMs / Credit Cards–Net Banking / Web Shopping

http://static.ddmcdn.com/gif/credit-card-3.jpg

Page 23: Cryptography its history application and beyond

References Boone, J.V. (2005). A Brief History of Cryptology. Naval Institute Press, USA Damico,Tony M. (2009), A brief history of cryptography. Retrieved June 31, 2012,

http://www.studentpulse.com/articles/41/a-brief-history-of-cryptography Denning, Dorothy E. (1982). Cryptography and Data Security. Addison-Wesley Publishing

Company, Inc. Canada Macgregor, Mary. The Story of Greece [on-line]. Available: http://www.heritage-

history.com/www/heritage-books.php?Dir=books&author=macgregor&book=greece&story=head

Mackenzie, Dana (2003). The Code War. An article was provided by the National Academy of Sciences. NW, Washington

Pell, Oliver ().Cryptology. Retrieved July 18 2012, http://www.ridex.co.uk/cryptology Pfleeger, C.P & Pfleeger, S. L (2007). Security in Computing. Pearson education Inc. NJ,

USA Servos, William (2006). Cryptography. Retrieved July 18 2012,

http://www.cs.trincoll.edu/~crypto/historical/alberti.html Shannon, C. E. Communication Theory of Secrecy Systems. Retrieved 19 July 2012,

http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf Singh, Simon (1999). The Code Book. Doubleday, USA. pp. 279-92 Wardlaw, W.P. The RSA Public key cryptosystem. Mathematics department, U.S naval

academy, Annapolis. Retrieved 19 July 2012, http://www.usna.edu/Users/math/wdj/papers/cryptoday/wardlaw_rsa.pdf

Page 24: Cryptography its history application and beyond

Paremes Laosinchai, Ph.D

Page 25: Cryptography its history application and beyond

Plain Text: "The package is in the drop zone."

Example of Wheel Cipher Encryption

Rotate the individual disks until we spelled out that message as shown.

Encrypted Message: “EVAOSWMNDTKERXSKNKSEYFEEWS”

Page 26: Cryptography its history application and beyond

Example of Vigenère Cipher Plain Text:

ATTACKATDAWN

Key: LEMON

Plain text: ATTACKATDAWN

Key: LEMONLEMONLE

Cipher text: LXFOPVEFRNHR

Page 27: Cryptography its history application and beyond

27

1930-1941: In WWII, German military used Lorenz SZ 40 and SZ 42 cipher machines based on Vernam cipher to encrypt tele-printer messages. To break the enormous amount of encrypted message traffic the code breaker had to build new, automated machines, which lead directly to the development of the first digital computers. This was the first step in the evolution of cryptography towards the new computer age.

1943-1944: British code breakers designed Colossus Mark 1 and Colossus Mark 2 to decrypt Lorenz cipher machine using frequency analysisDesigned by Max Newman & Tommy Flowers

http://blogs.guardian.co.uk/technology/Colossus_back_(800%20x%20600).jpg

Page 28: Cryptography its history application and beyond

28

What is Cryptography?

Secret Writing

Steganography(hidden)

Cryptography(scrambled)

Substitution

Transposition

Code(replace words)

Cipher(replace letters)

CRYPTOLOGY

Breaking of codes and cipher

Cryptanalysis

Page 29: Cryptography its history application and beyond

Cryptographic Algorithm & Operation

Message RecipientMessage Sender

Secret key

Crypto-system

Encryption

Plaintext Ciphertext

Crypto-system

Decryption

PlaintextCiphertext

EK(M) = C DK(C) = M