SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
A Brief History of
 Cryptography
   ______________

   Florian Deckert
       23.03.2007
Encyclopedia Britannica:
   “Cryptography: Practice of the enciphering and
  deciphering of messages in secret code in order
 to render them unintelligible to all but the intended
                     receiver.”




23.03.2007             Florian Deckert               2
Early Cryptography
• 3500 BC: Sumerians
     – Cuneiform writings




23.03.2007                  Florian Deckert   3
Early Cryptography
• 1900 BC: Egypt
     – First known use of cryptography




23.03.2007                Florian Deckert   4
Early Cryptography
                            • 500 – 600 BC:
                              ATBASH Cipher
                                     – Used by Hebrew
                                       scribes
                                     – Substitution cipher
                                       (reversed alphabet)




23.03.2007         Florian Deckert                           5
Early Cryptography
• 486 BC: Greece
     – σκυτάλη – skytale




23.03.2007                 Florian Deckert   6
Early Cryptography
• 60 – 50 BC: Julius Caesar
     – substitution cipher
     – Shift letters by X positions:
             • E.g. X = 3: A   D, B      E,
               C    F, ...
     – Weakness?
             • Frequency analysis (1000 AD)
     – 1466: Leon Albertini: cipher
       disk
             • Used until 16th century


23.03.2007                         Florian Deckert   7
Medieval Cryptography
• 1587: Vigenère Cipher
     – Polyalphabetic: one to
       many relationship
     – Example
             • Encrypt: lamp
             • Keyword: ubc
             • Ciphertext: fboj
• Apart from that...



23.03.2007                        Florian Deckert   8
Modern Cryptography
• 1845: Morse Code
     – Represention by code
       signal
     – States (on and off)
       composed into 5
       symbols




23.03.2007               Florian Deckert   9
Modern Cryptography
• 1863: Kasiski breaks Vigenere:
     – Find length of keyword
     – Divide message into substitution cryptograms
     – Use frequency analysis to solve these




23.03.2007             Florian Deckert            10
Modern Cryptography
• 1918: ADFGVX Cipher
     – Used in the German army in WWI

              A        D              F   G   X
              B        T              A   L   P
     A
              D        H              O   Z   K
     D
              Q        F              V   S   N
     F
              G        J              C   U   X
     G
              M        R              E   W   Y
     X
23.03.2007              Florian Deckert           11
Modern Cryptography
• 1918: The Enigma
     – Arthur Scherbius
     – Business: confidential
       docs
     – No codebooks
     – Rotors     multi
       substitution
     – Wireing changes as-you-
       type
     – German forces in WWII
     – Room 40

23.03.2007               Florian Deckert   12
Modern Cryptography
• 1937 – 1945: Navajo Code Talkers




23.03.2007          Florian Deckert   13
Modern Cryptography
• 1949: Shannon:
     – Communication
       Theory of Secret
       Systems
     – Proved: One time pad
       unbreakable




23.03.2007               Florian Deckert   14
Modern Cryptography
• Until mid 70‘s




23.03.2007          Florian Deckert   15
Modern Cryptography
• 1976: Diffie – Hellman Key Exchange
     – Whitfield Diffie and Martin Hellman
     – Discrete logarithm problem:
             • G: finite cyclic group with n elements
             • Modulo n multiplication
             • b: generator of G: every element g of G can be
               written as g = bk for some integer k
             • Goal: find k given g and b and n!
             • Very hard problem

23.03.2007                     Florian Deckert                  16
Modern Cryptography
• So how does it work?
• Exploits?
     – Man in the middle
     – Fix: additional authentication




23.03.2007              Florian Deckert   17
Modern Cryptography
• Public Key Crypto
     – Key exchange problem
     – Asymmetric key algorithm
     – E.g: RSA, MIT, 1977




23.03.2007               Florian Deckert   18
Modern Cryptography
• 1991: PGP Pretty Good Privacy
     – Protocol, uses RSA
     – Encryption & decryption
     – Digital signatures
             • How does that work?
     – Web of Trust
             • Third party signs (public) key to attest association
               between person and key
     – Other Possibility: Hierarchical, CA based
             • E.g.: X.509 Certificates in SSL
23.03.2007                      Florian Deckert                       19
Thank You!

Let’s go to Koerner’s.

Más contenido relacionado

La actualidad más candente

6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptographyFarah Shaikh
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101rahat ali
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Digital signature
Digital signatureDigital signature
Digital signaturePraseela R
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 

La actualidad más candente (20)

6. cryptography
6. cryptography6. cryptography
6. cryptography
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptanalysis 101
Cryptanalysis 101Cryptanalysis 101
Cryptanalysis 101
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 

Destacado

Cryptography its history application and beyond
Cryptography its history application and beyondCryptography its history application and beyond
Cryptography its history application and beyondkinleay
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYHimanshu Shekhar
 
Bruce Lee Guide to Strategic Content (Remix)
Bruce Lee Guide to Strategic Content (Remix)Bruce Lee Guide to Strategic Content (Remix)
Bruce Lee Guide to Strategic Content (Remix)Steve Floyd
 
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladiumNed Hayes
 
Week 2 reality tv institutions
Week 2 reality tv institutionsWeek 2 reality tv institutions
Week 2 reality tv institutionslatymermedia
 
A2 media studies reality tv
A2 media studies reality tvA2 media studies reality tv
A2 media studies reality tvannabrindle28
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 

Destacado (19)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography its history application and beyond
Cryptography its history application and beyondCryptography its history application and beyond
Cryptography its history application and beyond
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Bruce Lee Guide to Strategic Content (Remix)
Bruce Lee Guide to Strategic Content (Remix)Bruce Lee Guide to Strategic Content (Remix)
Bruce Lee Guide to Strategic Content (Remix)
 
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladium
 
Week 2 reality tv institutions
Week 2 reality tv institutionsWeek 2 reality tv institutions
Week 2 reality tv institutions
 
palladium
palladiumpalladium
palladium
 
A2 media studies reality tv
A2 media studies reality tvA2 media studies reality tv
A2 media studies reality tv
 
Cryptography
CryptographyCryptography
Cryptography
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 

Más de guest9006ab

Proportional-Derivative-Integral (PID) Control
Proportional-Derivative-Integral (PID) ControlProportional-Derivative-Integral (PID) Control
Proportional-Derivative-Integral (PID) Controlguest9006ab
 
Eigenvalues in a Nutshell
Eigenvalues in a NutshellEigenvalues in a Nutshell
Eigenvalues in a Nutshellguest9006ab
 
SMART Goals and Feedback (Project Management)
SMART Goals and Feedback (Project Management)SMART Goals and Feedback (Project Management)
SMART Goals and Feedback (Project Management)guest9006ab
 
C Code and the Art of Obfuscation
C Code and the Art of ObfuscationC Code and the Art of Obfuscation
C Code and the Art of Obfuscationguest9006ab
 
Top Super-models of Computer Graphics
Top Super-models of Computer GraphicsTop Super-models of Computer Graphics
Top Super-models of Computer Graphicsguest9006ab
 
Human Nature and its Consequences
Human Nature and its ConsequencesHuman Nature and its Consequences
Human Nature and its Consequencesguest9006ab
 
Slipping the Surly Bonds
Slipping the Surly BondsSlipping the Surly Bonds
Slipping the Surly Bondsguest9006ab
 
Communication with Extraterrestrial Intelligence
Communication with Extraterrestrial IntelligenceCommunication with Extraterrestrial Intelligence
Communication with Extraterrestrial Intelligenceguest9006ab
 
Canada vs. Germany: Une réflection
Canada vs. Germany: Une réflectionCanada vs. Germany: Une réflection
Canada vs. Germany: Une réflectionguest9006ab
 
Signal Compression and JPEG
Signal Compression and JPEGSignal Compression and JPEG
Signal Compression and JPEGguest9006ab
 
Brain-Computer Interfaces
Brain-Computer InterfacesBrain-Computer Interfaces
Brain-Computer Interfacesguest9006ab
 
The ABC's of the Bible
The ABC's of the BibleThe ABC's of the Bible
The ABC's of the Bibleguest9006ab
 

Más de guest9006ab (14)

Proportional-Derivative-Integral (PID) Control
Proportional-Derivative-Integral (PID) ControlProportional-Derivative-Integral (PID) Control
Proportional-Derivative-Integral (PID) Control
 
Eigenvalues in a Nutshell
Eigenvalues in a NutshellEigenvalues in a Nutshell
Eigenvalues in a Nutshell
 
SMART Goals and Feedback (Project Management)
SMART Goals and Feedback (Project Management)SMART Goals and Feedback (Project Management)
SMART Goals and Feedback (Project Management)
 
C Code and the Art of Obfuscation
C Code and the Art of ObfuscationC Code and the Art of Obfuscation
C Code and the Art of Obfuscation
 
OS Mélange
OS MélangeOS Mélange
OS Mélange
 
Top Super-models of Computer Graphics
Top Super-models of Computer GraphicsTop Super-models of Computer Graphics
Top Super-models of Computer Graphics
 
Human Nature and its Consequences
Human Nature and its ConsequencesHuman Nature and its Consequences
Human Nature and its Consequences
 
Slipping the Surly Bonds
Slipping the Surly BondsSlipping the Surly Bonds
Slipping the Surly Bonds
 
Communication with Extraterrestrial Intelligence
Communication with Extraterrestrial IntelligenceCommunication with Extraterrestrial Intelligence
Communication with Extraterrestrial Intelligence
 
Canada vs. Germany: Une réflection
Canada vs. Germany: Une réflectionCanada vs. Germany: Une réflection
Canada vs. Germany: Une réflection
 
Signal Compression and JPEG
Signal Compression and JPEGSignal Compression and JPEG
Signal Compression and JPEG
 
Clouds
CloudsClouds
Clouds
 
Brain-Computer Interfaces
Brain-Computer InterfacesBrain-Computer Interfaces
Brain-Computer Interfaces
 
The ABC's of the Bible
The ABC's of the BibleThe ABC's of the Bible
The ABC's of the Bible
 

Último

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 

Último (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 

A Brief History of Cryptography

  • 1. A Brief History of Cryptography ______________ Florian Deckert 23.03.2007
  • 2. Encyclopedia Britannica: “Cryptography: Practice of the enciphering and deciphering of messages in secret code in order to render them unintelligible to all but the intended receiver.” 23.03.2007 Florian Deckert 2
  • 3. Early Cryptography • 3500 BC: Sumerians – Cuneiform writings 23.03.2007 Florian Deckert 3
  • 4. Early Cryptography • 1900 BC: Egypt – First known use of cryptography 23.03.2007 Florian Deckert 4
  • 5. Early Cryptography • 500 – 600 BC: ATBASH Cipher – Used by Hebrew scribes – Substitution cipher (reversed alphabet) 23.03.2007 Florian Deckert 5
  • 6. Early Cryptography • 486 BC: Greece – σκυτάλη – skytale 23.03.2007 Florian Deckert 6
  • 7. Early Cryptography • 60 – 50 BC: Julius Caesar – substitution cipher – Shift letters by X positions: • E.g. X = 3: A D, B E, C F, ... – Weakness? • Frequency analysis (1000 AD) – 1466: Leon Albertini: cipher disk • Used until 16th century 23.03.2007 Florian Deckert 7
  • 8. Medieval Cryptography • 1587: Vigenère Cipher – Polyalphabetic: one to many relationship – Example • Encrypt: lamp • Keyword: ubc • Ciphertext: fboj • Apart from that... 23.03.2007 Florian Deckert 8
  • 9. Modern Cryptography • 1845: Morse Code – Represention by code signal – States (on and off) composed into 5 symbols 23.03.2007 Florian Deckert 9
  • 10. Modern Cryptography • 1863: Kasiski breaks Vigenere: – Find length of keyword – Divide message into substitution cryptograms – Use frequency analysis to solve these 23.03.2007 Florian Deckert 10
  • 11. Modern Cryptography • 1918: ADFGVX Cipher – Used in the German army in WWI A D F G X B T A L P A D H O Z K D Q F V S N F G J C U X G M R E W Y X 23.03.2007 Florian Deckert 11
  • 12. Modern Cryptography • 1918: The Enigma – Arthur Scherbius – Business: confidential docs – No codebooks – Rotors multi substitution – Wireing changes as-you- type – German forces in WWII – Room 40 23.03.2007 Florian Deckert 12
  • 13. Modern Cryptography • 1937 – 1945: Navajo Code Talkers 23.03.2007 Florian Deckert 13
  • 14. Modern Cryptography • 1949: Shannon: – Communication Theory of Secret Systems – Proved: One time pad unbreakable 23.03.2007 Florian Deckert 14
  • 15. Modern Cryptography • Until mid 70‘s 23.03.2007 Florian Deckert 15
  • 16. Modern Cryptography • 1976: Diffie – Hellman Key Exchange – Whitfield Diffie and Martin Hellman – Discrete logarithm problem: • G: finite cyclic group with n elements • Modulo n multiplication • b: generator of G: every element g of G can be written as g = bk for some integer k • Goal: find k given g and b and n! • Very hard problem 23.03.2007 Florian Deckert 16
  • 17. Modern Cryptography • So how does it work? • Exploits? – Man in the middle – Fix: additional authentication 23.03.2007 Florian Deckert 17
  • 18. Modern Cryptography • Public Key Crypto – Key exchange problem – Asymmetric key algorithm – E.g: RSA, MIT, 1977 23.03.2007 Florian Deckert 18
  • 19. Modern Cryptography • 1991: PGP Pretty Good Privacy – Protocol, uses RSA – Encryption & decryption – Digital signatures • How does that work? – Web of Trust • Third party signs (public) key to attest association between person and key – Other Possibility: Hierarchical, CA based • E.g.: X.509 Certificates in SSL 23.03.2007 Florian Deckert 19
  • 20. Thank You! Let’s go to Koerner’s.