Cryptography
By:
Dr. Mohammad Shoab
Week 1
History Of Cryptography
Cryptography
Department of Computer Science
Background
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Objectives
Cryptography
Department of Computer Science
Classical Cryptography
Cryptography
Department of Computer Science
Egypt’s Old Kingdom
( 4500+ years ago).
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
A Scytale – an early device for encryption
Cryptography
Department of Computer Science
Scytale
(called a scytale) of exactly the same radius. The sender wound a narrow ribbon of parchment
around his cylinder, then wrote on it lengthwise.
could be read only by a person who had a cylinder of exactly the same circumference.
Cryptography
Department of Computer Science
Scytale encryption example
Encoded Message: ktm ioi lmd lon kri irg noh gwt
Original message: Kill king tomorrow midnight
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Greek and Roman Use Of Cryptography
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Caesar Cipher
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
1.2.5 Cryptography From Muslim History�(Medieval Cryptography)
Cryptography
Department of Computer Science
Abū Yūsuf Yaʻqūb ibn Isḥāq al-Kindī
801–873 CE
Cryptography
Department of Computer Science
The first page of al-Kindi's manuscript On Deciphering Cryptographic Messages,
containing the oldest known description of cryptanalysis by frequency analysis
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Relative frequencies of letters in the English language
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Cryptography In The Renaissance Period
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Cryptography from 1800 to World War II
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
World War II Cryptography
Cryptography
Department of Computer Science
The Enigma machine was widely used by Nazi Germany; its cryptanalysis
by the Allies provided vital intelligence.
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
SIGABA is described in U.S. Patent 6,175,625, filed in 1944 but not issued until 2001.
Cryptography
Department of Computer Science
Modern Cryptography
Cryptography
Department of Computer Science
Shannon
Claude Elwood Shannon (1916-2001)
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
The First Encryption Standard
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Cryptography
Department of Computer Science
Public key
Cryptography
Department of Computer Science
The End
46
Cryptography
Department of Computer Science
Exercise
Q1. Explain Scytale.
Q2. Explain Caesar cipher with diagram.
Q3. Explain modern cryptography and write about Shannon.
Q4. Explain the first encryption standard.
47
Cryptography
Department of Computer Science
Q5. IPSec would be used to send and Recv data over.
Q6. The earliest known use of cryptography is found in non-standard.
Q7. The scytale was first mentioned by the.
Cryptography
Department of Computer Science
Q8. The Atbash cipher is a very specific case of a.
Q9. Which cryptanalysis machine was widely used by German Nazi’s?
Cryptography
Department of Computer Science