SlideShare una empresa de Scribd logo
1 de 15
Western Town College




Introduction to Cryptography


                    Bruno Taboada
Schedule

●   Motivation
●   What is it?
●   A brief history.
●   How does it work?
●   Conclusion
Motivation

●   Recently we have a generation of people more
    and more dependent on information technology
    but many of them don't have any idea about
    risks involved on it.
●   Facebook, Cell Phones, Notebooks and any
    others are able to store data digitally.
What is it?

●   Cryptography is the science of using the math
    to encrypt and decrypt data.

●   In my own words, Cryptography is the study of
    techniques to ensure the integrity,
    confidentiality and authentication.
How does it work?
How does it work?

●   All means of cryptography are based on
    intractability of a problem mathematics
●   The most famous are whole number or the
    discrete logarithm problems.
●   Both methods are efficient.
A brief history.

●   The earliest forms of secret required nothing
    more than a piece of paper and writing as a
    much of people couldn't read.
A brief history.
A brief history.
A brief history
A brief history
A brief history
A brief history
At Present
Conclusion

●   From now on, We will never have anymore
    cryptography without computing.
●   For security reasons, the next wars in the world
    will use as much cryptography as possible.
●   The cryptography always has been a important
    role in the humanity.
●   Doesn't exist secure without cryptography.

Más contenido relacionado

Similar a Crypthography

Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
groot83
 
Edward Alexis Andrea Digital Citizenship
Edward Alexis Andrea Digital CitizenshipEdward Alexis Andrea Digital Citizenship
Edward Alexis Andrea Digital Citizenship
gingijumper
 
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
mysociety
 

Similar a Crypthography (20)

Digital forensics and giving evidence by Jonathan Haddock
Digital forensics and giving evidence by Jonathan Haddock Digital forensics and giving evidence by Jonathan Haddock
Digital forensics and giving evidence by Jonathan Haddock
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
 
Internet
InternetInternet
Internet
 
Edward Alexis Andrea Digital Citizenship
Edward Alexis Andrea Digital CitizenshipEdward Alexis Andrea Digital Citizenship
Edward Alexis Andrea Digital Citizenship
 
The Basics of Digital Literacy .pptx
The Basics of Digital Literacy .pptxThe Basics of Digital Literacy .pptx
The Basics of Digital Literacy .pptx
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Seun - Breaking into Protocol Engineering (1).pptx
Seun - Breaking into Protocol Engineering (1).pptxSeun - Breaking into Protocol Engineering (1).pptx
Seun - Breaking into Protocol Engineering (1).pptx
 
Guerrilla UX: Practical and Affordable Research
Guerrilla UX: Practical and Affordable ResearchGuerrilla UX: Practical and Affordable Research
Guerrilla UX: Practical and Affordable Research
 
Security & privacy on the internet: things you should now
Security & privacy on the internet: things you should nowSecurity & privacy on the internet: things you should now
Security & privacy on the internet: things you should now
 
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
 
State of the art in Natural Language Processing (March 2019)
State of the art in Natural Language Processing (March 2019)State of the art in Natural Language Processing (March 2019)
State of the art in Natural Language Processing (March 2019)
 
CKX: The Dark Side of Data
CKX: The Dark Side of DataCKX: The Dark Side of Data
CKX: The Dark Side of Data
 
1427 Women in Cybersecurity-Taking Charge and Protecting the World
1427 Women in Cybersecurity-Taking Charge and Protecting the World1427 Women in Cybersecurity-Taking Charge and Protecting the World
1427 Women in Cybersecurity-Taking Charge and Protecting the World
 
Cats and mice ever evolving attackers and other game changers
Cats and mice   ever evolving attackers and other game changersCats and mice   ever evolving attackers and other game changers
Cats and mice ever evolving attackers and other game changers
 
The future of digital
The future of digitalThe future of digital
The future of digital
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Week7 presentation
Week7 presentationWeek7 presentation
Week7 presentation
 
International Cooperative: APT Hunting
International Cooperative: APT HuntingInternational Cooperative: APT Hunting
International Cooperative: APT Hunting
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
 
epractice.eu presentation, Brussels 15 Oct '13
epractice.eu presentation, Brussels 15 Oct '13epractice.eu presentation, Brussels 15 Oct '13
epractice.eu presentation, Brussels 15 Oct '13
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Crypthography

  • 1. Western Town College Introduction to Cryptography Bruno Taboada
  • 2. Schedule ● Motivation ● What is it? ● A brief history. ● How does it work? ● Conclusion
  • 3. Motivation ● Recently we have a generation of people more and more dependent on information technology but many of them don't have any idea about risks involved on it. ● Facebook, Cell Phones, Notebooks and any others are able to store data digitally.
  • 4. What is it? ● Cryptography is the science of using the math to encrypt and decrypt data. ● In my own words, Cryptography is the study of techniques to ensure the integrity, confidentiality and authentication.
  • 5. How does it work?
  • 6. How does it work? ● All means of cryptography are based on intractability of a problem mathematics ● The most famous are whole number or the discrete logarithm problems. ● Both methods are efficient.
  • 7. A brief history. ● The earliest forms of secret required nothing more than a piece of paper and writing as a much of people couldn't read.
  • 15. Conclusion ● From now on, We will never have anymore cryptography without computing. ● For security reasons, the next wars in the world will use as much cryptography as possible. ● The cryptography always has been a important role in the humanity. ● Doesn't exist secure without cryptography.