CRYPTOGRAPHY
INFORMATION ASSURANCE AND SECURITY 2
Objective: Define Cryptography
At the end of the lesson, Discuss cryptography facts and concepts.
the students are expected Discuss different methods in cryptography.
to: Differentiate symmetric and asymmetric
cryptography.
Demonstrate how a cryptology works.
What is Cryptography?
Cryptography is defined as the process of writing or solving
messages using a secret code.
ENCRYPTION
INFORMATION ASSURANCE AND SECURITY 2
What is ENCRYPTION?
The method by which information is converted into secret
code that hides the information's true meaning.
A security control used primarily to provide confidentiality
protection for data.
The process of encoding information.
HISTORY ANCIENT EGYPT GREECE
Preserve the secrecy of Transposition cipher. -
the religious rituals changing the positions
Political move to of the letters
promote their religion Skytale - consisted of
Hieroglyphics – first
a thin piece of
form of cryptography
papyrus
ROMAN (JULIUS CAESAR) AMERICA BRITISH
Substitution cipher - Jefferson’s Wheel Cipher: Zimmerman Telegram
shifted the letters in the Used 26 wheels each with the
alphabet by three. letters of the alphabet
The first use of arranged randomly around
encryption for military them
purposes.
HISTORY US - Choctaw Codetalkers FRENCH
utilized the complex Trench Codes
language of the “carnet de chiffre”
Choctaw Indians - Any word that might give
away troops positions or
plans of an attack were in a
notebook along with its code
word.
GERMANS POLAND JAPAN
Enigma: built in a small Turing Bombe: the PURPLE : used the
wooded box that is foundation for the modern stepping of telephone
small enough to be computer switches
carried by a single
soldier
ROTORS
HISTORY US - SIGABA Navajo Codetalkers
fifteen rotors instead of Navajo language is an unwritten
three in the Engima language with no alphabet or
symbols
National Institute of Standards of
National Security Agency
Technology
the crypto logic organization of
the United States Government Lucifer
Charged with analyzing foreign
transmissions and gaining
intelligence and protecting
United States information
systems
Applications:
Asymmetric ciphers
-referred to as public-key encryption
- uses prime numbers to develop keys
Applications:
Symmetric ciphers
-referred to as secret key encryption
- depends on a single key to encrypt
the data
Convention
al
Encryption
Conventional encryption is a
cryptographic system that uses
the same key used by the sender
to encrypt the message and by
the receiver to decrypt the
message .
Symmetric ciphers
-referred to as secret key encryption
- depends on a single key to encrypt
the data
5 ingredients of a symmetric encryption
Plain text
Encryption Algorithm
Secret Key
Ciphertext
Decryption Algorithm
Do you have any
questions?
Thank you! I hope you learned something new.