Cryptography
Download
1 / 136

Cryptography - PowerPoint PPT Presentation


  • 244 Views
  • Uploaded on

Cryptography. By, Anthony Lonigro & Valentine Mbah. Introduction. Cryptography is the enciphering and deciphering of messages in secret code. As time moves on cryptography is required to evolve and with the existence of computers, cryptography has become a key feature in the lifeline of

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Cryptography' - shaman


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Cryptography

Cryptography

By, Anthony Lonigro

&

Valentine Mbah


Introduction
Introduction

  • Cryptography is the enciphering and deciphering of messages in secret code.

  • As time moves on cryptography is required to evolve and with the existence of computers, cryptography has become a key feature in the lifeline of

    all developed countries.


Enigma machine
Enigma Machine

  • Electrical pathways

  • Custom Rotors

  • Polyalphabetic substitution and One-time pads

  • It’s breech was a momentous occasion in WWII


Importance of cryptography
Importance of Cryptography

  • Almost all communications of sensitive data are done by software programs with file encryption capabilities.

  • Without it, countries would fall.

  • Used in digital signatures and credit card transactions over the internet.


Importance continued
Importance Continued…

  • Companies could not have online interfaces without it.

  • Imagine if every sensitive piece of information you entered to the internet was easily accessible by hackers.




















































With cryptography50
With Cryptography

Hacker!!

Information safe!









Without cryptography7
Without Cryptography

Hacker!

Hacker!


























Without cryptography32
Without Cryptography

Hacker!

Information Compromised!

Hello World!


Example
Example

  • Plaintext = hello

  • Encoded = ifmmp

  • Every letter is transformed into the letter preceding it.


Ciphers
Ciphers

  • The mathematical algorithm used to encrypt a message is called a cipher.

  • Types: Symmetric Key Cipher & Asymmetric Key Cipher.


Symmetric key cipher
Symmetric Key Cipher

  • One Key

    Encryption key = Decryption key


Asymmetric key cipher
Asymmetric Key Cipher

  • Two Keys

    Encryption Key != Decryption Key


Modern cryptography
Modern Cryptography

  • Quantum Cryptography

  • Unlike other cryptography methods which rely on computational security, quantum cryptography uses every single particle of light, which is called a photon, to transmit data.


Modern cryptography cont
Modern Cryptography Cont..

  • In old methods a couple photons could be intercepted and the users would not know.

  • In Quantum Cryptography, if any photon is intercepted the data is transformed and the users are informed.


Parallel programming
Parallel Programming

  • With parallel programming a hacker can use multiple key cracking algorithms.

  • This makes it easier to crack keys that have lower encryption bits.

  • With most of the

    encryptions today,

    a key can be broken in

    O(2^n) time.


Hackers
Hackers

  • Even with a 56 bit encryption key, parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers1
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers2
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers3
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers4
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers5
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers6
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers7
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers8
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers9
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers10
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers11
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers12
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers13
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers14
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers15
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers16
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers17
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers18
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers19
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers20
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers21
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers22
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers23
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers24
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers25
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers26
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers27
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers28
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers29
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers30
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers31
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers32
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming


Hackers33
Hackers

  • Even with a 56 bit encryption key parallel programming helps to crack the key.

  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming



ad