mechanising cryptography

19
Mechanising Cryptography Professor Richard Walton CB

Upload: melvina-hartnett

Post on 31-Dec-2015

26 views

Category:

Documents


0 download

DESCRIPTION

Mechanising Cryptography. Professor Richard Walton CB. Cryptography is concerned with the application of technology to the problem of encrypting and decrypting a message. The Mathematics is subordinate to the technology. 20 th Century Cryptography. Development of Crypt in the 1900s - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Mechanising Cryptography

Mechanising Cryptography

Professor Richard Walton CB

Page 2: Mechanising Cryptography

Cryptography is concerned with the application of technology to the problem of encrypting and decrypting a message.

The Mathematics is subordinate to the technology

Page 3: Mechanising Cryptography

20th Century Cryptography

Development of Crypt in the 1900s Manual Methods

– Slow– Laborious– Error-Prone

Need to mechanise Importance of technology for design Nature of technological constraints

Page 4: Mechanising Cryptography

CRYPTOGRAPHYSecurity

Usability Cost

Page 5: Mechanising Cryptography

Cryptanalysis 1918

Knowledge of language Frequency Analysis Key Re-use (Depth)

Skill Requirement:To solve crossword puzzles

in foreign languages

Page 6: Mechanising Cryptography

Rotor Machines

Page 7: Mechanising Cryptography

Rotors

Page 8: Mechanising Cryptography

Commercial Enigma

Page 9: Mechanising Cryptography

Enigma

Page 10: Mechanising Cryptography

Enigma

Army

Navy

Navy – 4 wheel

Page 11: Mechanising Cryptography
Page 12: Mechanising Cryptography
Page 13: Mechanising Cryptography

Early Machine Cryptography

Limitations of Security Design Balance Security against Cost Usability – Human Factors

Page 14: Mechanising Cryptography

Electronics – 1960-1980

Shift Registers and Simple Logic Gates Linear Algebra Galois Theory Rich Mathematical structure Rigorous Analysis Expensive Components

Page 15: Mechanising Cryptography

Large Scale Integration

Application Specific Integrated Circuits Complex Algorithms Tailored to purpose Standard Cryptographic Primitives Software and Firmware

Page 16: Mechanising Cryptography

Public Key Cryptography

Key Management Non-Secret Encryption

– Ellis, Cocks & Williamson– Beyond 1970’s technology

Widespread after 1985 Search for easier solutions

– Elliptic Curve Cryptography

Page 17: Mechanising Cryptography

Next Challenge

Quantum Computers destroycurrent Public Key algorithms

Find new algorithms to resist Quantum Computer attacks

Page 18: Mechanising Cryptography
Page 19: Mechanising Cryptography

Mechanising Cryptography

Acknowledgement

Illustrations concerning Enigma in this presentation have been taken from the user manual for Enigma – E

by Paul Reuvers & Marc Simons.

For details of Enigma-E, which is available for purchase from Bletchley Park Museum, see www.xat.nl/enigma-e/