[go: up one dir, main page]

0% found this document useful (0 votes)
27 views18 pages

AIS2 Week16 Encryption

Cryptography is the process of writing or solving messages using a secret code, primarily for confidentiality protection through methods like encryption. The document discusses the history of cryptography, including ancient techniques and notable examples like the Enigma machine and the Navajo Codetalkers. It also differentiates between symmetric and asymmetric cryptography, explaining their applications and the components involved in symmetric encryption.

Uploaded by

RANDOM DOINGS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views18 pages

AIS2 Week16 Encryption

Cryptography is the process of writing or solving messages using a secret code, primarily for confidentiality protection through methods like encryption. The document discusses the history of cryptography, including ancient techniques and notable examples like the Enigma machine and the Navajo Codetalkers. It also differentiates between symmetric and asymmetric cryptography, explaining their applications and the components involved in symmetric encryption.

Uploaded by

RANDOM DOINGS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

CRYPTOGRAPHY

INFORMATION ASSURANCE AND SECURITY 2


Objective: Define Cryptography
At the end of the lesson, Discuss cryptography facts and concepts.
the students are expected Discuss different methods in cryptography.
to: Differentiate symmetric and asymmetric
cryptography.
Demonstrate how a cryptology works.
What is Cryptography?
 Cryptography is defined as the process of writing or solving
messages using a secret code.
ENCRYPTION

INFORMATION ASSURANCE AND SECURITY 2


What is ENCRYPTION?
 The method by which information is converted into secret
code that hides the information's true meaning.
 A security control used primarily to provide confidentiality
protection for data.
 The process of encoding information.
HISTORY ANCIENT EGYPT GREECE

Preserve the secrecy of Transposition cipher. -


the religious rituals changing the positions
Political move to of the letters
promote their religion Skytale - consisted of
Hieroglyphics – first
a thin piece of
form of cryptography
papyrus

ROMAN (JULIUS CAESAR) AMERICA BRITISH

Substitution cipher - Jefferson’s Wheel Cipher: Zimmerman Telegram


shifted the letters in the Used 26 wheels each with the
alphabet by three. letters of the alphabet
The first use of arranged randomly around
encryption for military them
purposes.
HISTORY US - Choctaw Codetalkers FRENCH

utilized the complex Trench Codes


language of the “carnet de chiffre”
Choctaw Indians - Any word that might give
away troops positions or
plans of an attack were in a
notebook along with its code
word.
GERMANS POLAND JAPAN

Enigma: built in a small Turing Bombe: the PURPLE : used the


wooded box that is foundation for the modern stepping of telephone
small enough to be computer switches
carried by a single
soldier
ROTORS
HISTORY US - SIGABA Navajo Codetalkers

fifteen rotors instead of Navajo language is an unwritten


three in the Engima language with no alphabet or
symbols

National Institute of Standards of


National Security Agency
Technology
the crypto logic organization of
the United States Government Lucifer
Charged with analyzing foreign
transmissions and gaining
intelligence and protecting
United States information
systems
Applications:

Asymmetric ciphers
-referred to as public-key encryption
- uses prime numbers to develop keys
Applications:

Symmetric ciphers
-referred to as secret key encryption
- depends on a single key to encrypt
the data
Convention
al
Encryption
Conventional encryption is a
cryptographic system that uses
the same key used by the sender
to encrypt the message and by
the receiver to decrypt the
message .
Symmetric ciphers
-referred to as secret key encryption
- depends on a single key to encrypt
the data
5 ingredients of a symmetric encryption

Plain text

Encryption Algorithm

Secret Key

Ciphertext

Decryption Algorithm
Do you have any
questions?
Thank you! I hope you learned something new.

You might also like