1 / 22

ENCRYPTION

ENCRYPTION. Jo Cromwell Cornelia Bradford. History of Encryption. Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt (Hieroglyphics) The Spartans developed a transposition cipher

dyani
Download Presentation

ENCRYPTION

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ENCRYPTION • Jo Cromwell • Cornelia Bradford

  2. History of Encryption • Encryption has been around since antiquity • Cryptography began around 2,000 B.C in Egypt (Hieroglyphics) • The Spartans developed a transposition cipher • Greeks provided 1st recorded ciphers using numerical substitutions – 5th Century B.C. • Arabian 1st to document cryptanalytic methods - 1412

  3. The Polybius Square

  4. Telegraph • 1835-- Samuel Morse invented the Morse Code • 1843-- Construction of experimental telegraph line from Washington to Baltimore (40 miles)

  5. Radio • 1895 – Changed Cryptology— • Communications were open for anyone’s inspection

  6. Electromechanical Cryptography • The rotor – a thick disk with two faces, 26 brass contacts, plaintext input face,and output (ciphertext) face • Americans used rotors to break Japanese codes • Germany used similar machines to the rotor • Polish cryptanalysts broke Enigma early in WW2 • First computers were used for decoding Enigma ciphers

  7. The Enigma Machine Like a typewriter, combining substitution and rotation ciphers in such a manner that the resulting overall cipher was difficult to break, unlike the constituent ciphers. The machine could decode as well as encoding messages. The Enigma is configured by selecting several rotors from a larger set, placing them in a particular order and a particular start position. Received messages are decoded by setting the Enigma to the same state as the encoding Enigma X instead of and processing the message again. The result is clear text with the letter spaces.

  8. Enigma Machine

  9. Enigma Machine

  10. Enigma Machine

  11. Encryption • The conversion of data into ciphertext, that cannot be easily understood by unauthorized people.

  12. Decryption • The process of converting encrypted data back into its original form so that it can be understood.

  13. Text: Human, readable sequences of characters and words that are formed that can be encoded into computer readable format such as ASCII Plaintext: What you have before encryption Ciphertext: Encrypted test Cipher: Usually refers to the method of encryption Computer Encryption

  14. Computer Encryption • ASCII: American Standard Code for Information Exchange • Most common format for text files in computers and on Internet • Unix & DOS-based systems use ASCII • Windows NT & 2000 use the newer Unicode • IBM uses an 8-bit code, EBCDIC

  15. Symmetric Key Encryption *Each computer has Secret Key *Code provides key to decoding message Public-key Encryption *Combination of Private Key and Public Key *Pretty Good Policy Computer Encryption

  16. Authentication • Verifies that information comes from a trusted source • Works hand-in-hand with Encryptionto create Secure Environment

  17. How Do You Authenticate? • Password • Pass Cards • Digital Signatures • Biometrics • Fingerprint Scan • Retina Scan • Face Scan • Voice Identification

  18. JOYS • End danger of information interception • Keeps business information secure • Even if Info/Password is intercepted • – Can’t Read!

  19. Government Standards • National Institute of Standards and Technology (NIST) adopted Advanced Encryption Standard (AES) • Banking industry will probably follow • One B-I-G Algorithm Party!

  20. www.howstuffworks.com www.donet.com http://whatis.techtarget.com www.all.net/books www.cescomm.com References

More Related