1 / 13

CRYPTOGRAPHY

CRYPTOGRAPHY. ŞEYMA GÜNEY. AGENDA. What is Cryptography Basic Definitions Cryptography (Old Times) Shift Substitution. Subject : Maths Target Students : 11th Grade Relevant Concept in Curriculum : Matrices

Download Presentation

CRYPTOGRAPHY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CRYPTOGRAPHY ŞEYMA GÜNEY

  2. AGENDA • What is Cryptography • BasicDefinitions • Cryptography (Old Times) • Shift • Substitution Subject: Maths TargetStudents: 11th Grade RelevantConcept in Curriculum: Matrices How toUse it: Inthebeginning of thesubtopic of encryptionwithmatricesexamples in ordertoattractattention.

  3. What is Cryptography?

  4. Basic Definitions Cryptology =cryptography + cryptanalysis.

  5. Cryptography (Old Times) • Two Main Techniques: • Shift • Substitution

  6. Shift Cipher: Plaintext:I CAME I SAW I CONQUERED Ciphertext: L FDPH L VDZ L FRQTXHUHG Sample: http://www.rot-n.com/

  7. Security Strength of a Shift Cipher Substitution: What’s the ciphertext of “solutionsoffinalexam”?

  8. Cryptography (Old Times) 1500 BC – Assyrian merchants’s intaglioas signature 1900 BC – Egyptian hieroglyphs

  9. ENİGMA: 1928-1945

  10. Crypto and Security Related Movies U-571" (2000) "Windtalkers" (2002) "A Beautiful Mind" (2001) ‘’PearlHarbor’’ (2001) ‘’TheDa Vinci Code’’ (2006) "Enigma" (2001)

  11. PDWJG UKQ Shift 22 letters THANK YOU 

  12. REFERENCES http://en.wikipedia.org/wiki/Cryptography (visited on February 25, 2012) http://www.sans.org/reading_room/whitepapers/vpns/history-encryption_730 (visited on February 25, 2012

More Related