History of Cryptography
June 30, 2020
Introductions
Kathleen: TA, Junior, Computer Science and Linguistics, Took CS10 Fall 2017
Murtaza: TA, Junior, Applied Math and Computer Science, Took CS10 Fall 2017, avid lover of theoretical nonsense
Administrivia
The Babington Plot (1586)
Cryptography and Security Basics
Origins of Cryptography
Steganography (hiding the message)
Used for 2000 years
Examples: hard-boiled egg, invisible ink, SHAVED HEAD!
Huge security issues – led to the development of cryptography (hiding the meaning)
Cryptography
Cryptography is the science concerned with secret communication.
Cryptography lets us communicate securely using insecure channels (i.e. the Internet).
Encryption
Encryption is the process of hiding information from everybody except those that have the key.
Think: Encryption is simply a component, or direct application, of Cryptography.
Questions?
Ciphers
Cipher: each letter in a phrase is replaced by another letter, number, or symbol
Plain text: the message
Cipher text: the encrypted message
Transposition: each letter retains its identity but changes its position
Substitution: each letter changes its identity but retains its position
An Analogy
Codemakers : codebreakers : : antibiotic: bacteria
Historical Examples
“Practically since humans began writing, they have been writing in code…”
Arab Cryptanalysis: A Golden Age
Arab scholars invented cryptanalysis, the science of unscrambling a message without knowledge of the key
Frequency Analysis: based on observation that some letters in a document more common than others
-Described by Abu Yusuf Ya’qub ibn Is-Haq ibn as-Sabbah ibn ‘
Imran ibn Ismail al-Kindi
Meanwhile in Europe...
Between 800 and 1200, Europe was stuck in the Dark Ages
Only monks really studied secret writing, in order to discover hidden meanings in the Bible
Some Progress
Monks begin to share their knowledge, and cryptography also began to blossom around the Renaissance
A few major shifts: Monoalphabetic -> polyalphabetic -> Homophonic substitution cipher
Example: Philibert Babou
Cryptographic Advancements
Cryptography becomes more well-known and industrialized
A New Concept
One-Time Pad
Based on the idea of true randomness—generate a key, use it once, then throw it out
If certain conditions are met, this cipher is theoretically unbreakable
Questions?
Modern Cryptography
World War II (Code Talkers)
The Enigma (World War II)
Cracking the Enigma
Alan Turing, Father of Computer Science
Featured in The Imitation Game!
Encryption Methods and Attacks
Symmetric-Key Cryptography
Symmetric-key Cryptography
One-time pad is an example!
Symmetric-Key Cryptography
Public-Key (Asymmetric) Cryptography
Public-key cryptography
Public-Key (Asymmetric) Cryptography
An Example: RSA
RSA Encryption is a public-key cryptographic algorithm.
RSA is based on the fact that finding the factors of an integer is very difficult (a.k.a computationally expensive).
An Example: RSA
N = p * q
Bob’s public key N used to encrypt the message
Bob uses private key, based on p and q, used to decrypt the message
What makes RSA so powerful?
When N is a very large number, it is essentially impossible to factor it and figure out which primes were used to create it
In fact, this lies in a class of problems known as NP. Technically it is in the intersection of NP and co-NP.
What makes RSA so powerful?
When N is a very large number, it is essentially impossible to factor it and figure out which primes were used to create it
In fact, this lies in a class of problems known as NP
Quantum Computing
However, there is one real threat to the security of RSA
Current computers must complete tasks sequentially — each bit must be either a 0 or 1.
Quantum bits, or qubits, can exist in a state of superposition
https://www.theverge.com/2019/10/23/20928294/google-quantum-supremacy-sycamore-computer-qubit-milestone
What does the Future Hold?
History, as you now see, has been a constant battle between cryptographers (the makers) and cryptanalysts (the breakers).
Famous rulers, warriors, and inventors often get the credit for shaping history, but cryptography has played a huge political and social role throughout human existence
What does the Future Hold?
What are the implications of quantum computing?
Certainly a win for the codebreakers, but surprisingly, the biggest win will end up being for the codemakers: a perfect encryption
References
The Code Book by Simon Singh