encryption jo cromwell cornelia bradford. history of encryption encryption has been around since...
TRANSCRIPT
![Page 1: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/1.jpg)
ENCRYPTION
Jo Cromwell
Cornelia Bradford
![Page 2: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/2.jpg)
History of Encryption
Encryption has been around since antiquity
Cryptography began around 2,000 B.C in Egypt (Hieroglyphics)
The Spartans developed a transposition cipher
Greeks provided 1st recorded ciphers using numerical substitutions – 5th Century B.C.
Arabian 1st to document cryptanalytic methods - 1412
![Page 3: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/3.jpg)
The Polybius Square
1 2 3 4 5
1 A B C D E
2 F G H I J
3 K L M N O
4 P Q R S T
5 U V W X Y/Z
![Page 4: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/4.jpg)
Telegraph
1835-- Samuel Morse invented the Morse Code
1843-- Construction of experimental telegraph line from Washington to Baltimore (40 miles)
![Page 5: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/5.jpg)
Radio
1895 – Changed Cryptology—
Communications were open for anyone’s inspection
![Page 6: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/6.jpg)
Electromechanical Cryptography
The rotor – a thick disk with two faces, 26 brass contacts, plaintext input face,and output (ciphertext) face
Americans used rotors to break Japanese codes
Germany used similar machines to the rotor
Polish cryptanalysts broke Enigma early in WW2
First computers were used for decoding Enigma ciphers
![Page 7: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/7.jpg)
The Enigma Machine
Like a typewriter, combining substitution and rotation ciphers in such a manner that the resulting overall cipher was difficult to break, unlike the constituent ciphers. The machine could decode as well as encoding messages.
The Enigma is configured by selecting several rotors from a larger set, placing them in a particular order and a particular start position. Received messages are decoded by setting the Enigma to the same state as the encoding Enigma X instead of and processing the message again. The result is clear text with the letter spaces.
![Page 8: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/8.jpg)
Enigma Machine
![Page 9: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/9.jpg)
Enigma Machine
![Page 10: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/10.jpg)
Enigma Machine
![Page 11: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/11.jpg)
Encryption
The conversion of data into ciphertext, that cannot be easily understood by unauthorized people.
![Page 12: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/12.jpg)
Decryption
The process of converting encrypted data back into its original form so that it can be understood.
![Page 13: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/13.jpg)
Computer Encryption
Text: Human, readable sequences of characters and words that are formed that can be encoded into computer readable format such as ASCII
Plaintext: What you have before encryption
Ciphertext: Encrypted test
Cipher: Usually refers to the method of encryption
![Page 14: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/14.jpg)
Computer Encryption
ASCII: American Standard Code for Information Exchange
Most common format for text files in computers and on Internet
Unix & DOS-based systems use ASCII
Windows NT & 2000 use the newer Unicode
IBM uses an 8-bit code, EBCDIC
![Page 15: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/15.jpg)
Computer Encryption
Symmetric Key Encryption
*Each computer has Secret Key
*Code provides key to decoding message
Public-key Encryption
*Combination of Private Key and
Public Key
*Pretty Good Policy
![Page 16: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/16.jpg)
Authentication
Verifies that information comes from a trusted source
Works hand-in-hand with Encryption to create Secure Environment
![Page 17: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/17.jpg)
How Do You Authenticate?
PasswordPass CardsDigital SignaturesBiometrics– Fingerprint Scan– Retina Scan– Face Scan– Voice Identification
![Page 18: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/18.jpg)
![Page 19: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/19.jpg)
JOYS
End danger of information interception
Keeps business information secure
Even if Info/Password is intercepted
– Can’t Read!
![Page 20: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/20.jpg)
Government Standards
National Institute of Standards and Technology (NIST) adopted Advanced Encryption Standard (AES)
Banking industry will probably follow
One B-I-G Algorithm Party!
![Page 21: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/21.jpg)
![Page 22: ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt](https://reader035.vdocuments.mx/reader035/viewer/2022070323/56649d965503460f94a7f686/html5/thumbnails/22.jpg)
References
www.howstuffworks.com
www.donet.com
http://whatis.techtarget.com
www.all.net/books
www.cescomm.com