Cryptology

Information about Cryptology

Published on December 31, 2007

Author: Beverly_Hunk

Source: authorstream.com

Content

Cryptology :  Cryptology By Greg Buss Pat Shields Barry Burke What is Cryptology?:  What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies of computer science and mathematics for the purpose of encoding information to ensure that data is secure. Slide3:  Cryptography – from the Greek words kryptos, meaning “hidden”, and graphein, meaning “to write”. Literally secret writing. Key terms Cryptanalysis – also referred to as code breaking, the process of undoing Cryptography Encryption – converts “plaintext” into an encoded text or a “ciphertext” Decryption – the reverse of Encryption Cipher – algorithms used to encrypt and decrypt text Key – an unknown parameter needed to operate a particular cipher’s algorithms The History :  The History Devices used throughout history: Scytale (fr. Gr. skytale). Spartan message in (transposition) cipher. Originally it described a rod or baton carried as a badge of office. It is still used by military officers today. Used as an early enciphering device, a parchment was wrapped spirally around it, and the text was written-in lengthwise. A similar rod at the receiving end permitted correct decipherment. The word scytale is now used for the message as well as the media. Slide5:  cipher disk: an enciphering and deciphering tool developed in the 15th century by Leon Battista Alberti. Rather than constructing a table with the regular and cipher alphabets on it, he created two circular scales, one smaller and on a disk that he mounted concentric to the larger circle. This enabled him to move the two alphabet scales relative to each other. Slide6:  Enigma: a portable cipher machine used to encrypt and decrypt secret messages. The German military model, the Wehrmacht Enigma, is the version most commonly discussed. The machine has gained notoriety because Allied cryptologists were able to decrypt a large number of messages that had been enciphered on the machine. Although the Enigma cipher has cryptographic weaknesses, it was, in practice, only their combination with other significant factors which allowed code breakers to read messages: mistakes by operators, procedural flaws, and the occasional captured machine or codebook. Basic Letter Substitution Program:  Basic Letter Substitution Program Modern Applications:  Modern Applications Slide9:  Symmetric-Key Cryptology Also known as single-key, private-key, one-key and secret-key Method of encoding where both the sender and receiver of a message hold the same key which is needed to decode the message, and involving the use of block ciphers and stream ciphers. Encoding through Block Ciphers – Uses a fixed-length groups of bits, known as a block. Will take a plaintext as an input and using a secret key encode the text, and output ciphertext of the same bit size as the input Encoding through Stream Ciphers - plaintext digits are encrypted one at a time, with the transformation of successive digits varying during the encryption Slide10:  Public-key Cryptology Uses a widely distributed public key used for encoding the message, and a different key, related mathematically to the former, used for decoding which is kept secret More secure than Symmetric-Key Cryptology because the receivers private decoding key is never made known reducing the chance that it may be copied in transit The Future of Cryptology:  The Future of Cryptology Quantum mechanics has now provided the foundation to a new approach to cryptology – quantum cryptology. It has been claimed that quantum cryptology, with the use of quantum computers, can solve many problems that are impossible from the perspective of conventional cryptology. A quantum computer can instantaneously decipher any code written by today’s standards. However, with the introduction of a working quantum computer, the enciphered codes will also become impossible to decode without a key, even by another quantum computer.

Related presentations


Other presentations created by Beverly_Hunk

Festival Sponsor Package 06
10. 12. 2007
0 views

Festival Sponsor Package 06

Foundations Review
21. 03. 2008
0 views

Foundations Review

Industry Trends 5 31 07
28. 09. 2007
0 views

Industry Trends 5 31 07

Comprehension
10. 10. 2007
0 views

Comprehension

The Impact of Stress
03. 12. 2007
0 views

The Impact of Stress

McMullen PRAGMA I
14. 11. 2007
0 views

McMullen PRAGMA I

Threats Women s Health
20. 11. 2007
0 views

Threats Women s Health

drainage
06. 12. 2007
0 views

drainage

Just Checking
22. 08. 2007
0 views

Just Checking

Predation
30. 12. 2007
0 views

Predation

plan de lectie
29. 12. 2007
0 views

plan de lectie

1 09 ISMD31
15. 11. 2007
0 views

1 09 ISMD31

TDV Pres APNOMS 2001
11. 10. 2007
0 views

TDV Pres APNOMS 2001

nelson
24. 12. 2007
0 views

nelson

AALSdiscrimsys5
07. 01. 2008
0 views

AALSdiscrimsys5

OSCON Data ObjectDriver
05. 12. 2007
0 views

OSCON Data ObjectDriver

ccssymposium
10. 03. 2008
0 views

ccssymposium

Mr Jagdip Ahluwalia Presentation
26. 03. 2008
0 views

Mr Jagdip Ahluwalia Presentation

ig fedorov
27. 03. 2008
0 views

ig fedorov

SPC0551
03. 10. 2007
0 views

SPC0551

SOAR
23. 11. 2007
0 views

SOAR

chapter 56 powerpoint l
07. 04. 2008
0 views

chapter 56 powerpoint l

Forum A4 Kelly
30. 03. 2008
0 views

Forum A4 Kelly

ajayi1
09. 04. 2008
0 views

ajayi1

NAFTA
10. 04. 2008
0 views

NAFTA

P 4
13. 04. 2008
0 views

P 4

price analysis
18. 04. 2008
0 views

price analysis

newzealand katestrange06
19. 02. 2008
0 views

newzealand katestrange06

Teaching Session6
17. 12. 2007
0 views

Teaching Session6

ScolloSummaryEcoSFpo liciesHosp
12. 03. 2008
0 views

ScolloSummaryEcoSFpo liciesHosp

Microsoft and SAP Interop es
21. 11. 2007
0 views

Microsoft and SAP Interop es

Apres Grupo I CECE
28. 12. 2007
0 views

Apres Grupo I CECE

2003 TCMeetings Durban
28. 11. 2007
0 views

2003 TCMeetings Durban

Farewell Durham 06
03. 10. 2007
0 views

Farewell Durham 06

wsu symposium nov2004
19. 12. 2007
0 views

wsu symposium nov2004

3 Pogled i slika
01. 10. 2007
0 views

3 Pogled i slika