1 / 1

Cryptography and Encryption Gamalier Oliveras and Mariely Vega Josefina Barceló High School

Cryptography and Encryption Gamalier Oliveras and Mariely Vega Josefina Barceló High School. ABSTRACT. RESULTS.

janae
Download Presentation

Cryptography and Encryption Gamalier Oliveras and Mariely Vega Josefina Barceló High School

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptography and Encryption GamalierOliveras and Mariely Vega Josefina Barceló High School ABSTRACT RESULTS Have you ever wanted to send your crush a secret love letter without anyone else understanding what this message says? This is where Cryptography comes in. Cryptography is a way to secure data and has been part of life since ancient times, although it has developed and evolved. This technique is used all over the world to secure information. The method used to apply cryptography is encryption. This consists of using codes and ciphers to write secret messages that nobody besides a selected number of people can understand. This research investigated and searched for better ways to apply these methods or systems, to make it easier for everyone to understand how they can protect their information and privacy from eavesdroppers. An experiment was conducted which consisted on making people encrypt and decrypt a message to see which method was easier and faster for them to use. Some algorithms were compared to see which of these contained more bits (digital memory). Also, some codes and ciphers were compared to show their most common uses and how they could be used to make it easier to protect personal information. We found out that the Pig pen code was faster to encrypt and decrypt the messages taking 42% less time than the Caesar Cipher that took 58% more time. We divided the four processes individually and got this results: 1-CS (encryption): 89% 2-CS (decryption):120% 3- PC (encryption):74.6% 4- PC ( decryption): 76.4% The pigpen code encryption method was the one to take less time with 74.6% We got 5 to 0 votes all agreeing that the pigpen code was easier to use. HYPOTHESIS Cipher encryption will be easier and faster to protect information than code encryption. n n number of bits = 2 possible combinations. Need to know terms • CRYPTOGRAPHY : THE ART AND SCIENCE OF THE SECERT WRITING.THE ORIGIN OF THIS WORD COMES FROM THE GREEK LANGUAGE KRYPTOS:SECRET AND GRAPHOS:WRITING. • ENCRYPTION: THE CURRENT METHOD FOR APPLYING CRYPTOGRAPHY. • CODE: IT CONSISTS ON REPLACING WORDS OR PHRASES WITH LETTERS OR NUMBER. USUALLY WE NEED A CODE BOOK TO encrypt or DECRYPT A MESSAGE WRITTEN IN CODE. • cipher: is based on replacing individual letters by other numbers or letters. • Algorithms: MeTHodfor solving a problem. • Private key: THIS SYSTEM USES A SINGLE KEY both TO encrypt and decrypt the information. • Public key: We need two keys for this system, a public and a private key. The private key must remain a secret unlike the public key. CONCLUSIONS By comparing two easy cipher and code encryption methods, we concluded that it is easier and faster to use a code method than a cipher method. MATERIALS AND METHODS BIBLIOGRAPHY We selected 5 random people and asked them to encrypt and decrypt secret messages using both easy code and cipher encryption methods. The Pigpen code and the Caesar cipher. We took the time to see which cryptography method took longer and asked them some questions to see which one they thought was easier. http://es.wikipedia.org/wiki/Bit http://spectrum.ieee.org/image/62374 http://www.scouting.org.za/codes/pigpen.php http://www.diserio.com/cryptography.html ACKNOWLEDGEMENT We would like to acknowledge Eduardo Vélezand Lorena Oliveras for their cooperation inour investigation.

More Related