cryptography
Download
Skip this Video
Download Presentation
Cryptography

Loading in 2 Seconds...

play fullscreen
1 / 136

Cryptography - PowerPoint PPT Presentation


  • 244 Views
  • Uploaded on

Cryptography. By, Anthony Lonigro & Valentine Mbah. Introduction. Cryptography is the enciphering and deciphering of messages in secret code. As time moves on cryptography is required to evolve and with the existence of computers, cryptography has become a key feature in the lifeline of

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Cryptography' - shaman


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
cryptography

Cryptography

By, Anthony Lonigro

&

Valentine Mbah

introduction
Introduction
  • Cryptography is the enciphering and deciphering of messages in secret code.
  • As time moves on cryptography is required to evolve and with the existence of computers, cryptography has become a key feature in the lifeline of

all developed countries.

enigma machine
Enigma Machine
  • Electrical pathways
  • Custom Rotors
  • Polyalphabetic substitution and One-time pads
  • It’s breech was a momentous occasion in WWII
importance of cryptography
Importance of Cryptography
  • Almost all communications of sensitive data are done by software programs with file encryption capabilities.
  • Without it, countries would fall.
  • Used in digital signatures and credit card transactions over the internet.
importance continued
Importance Continued…
  • Companies could not have online interfaces without it.
  • Imagine if every sensitive piece of information you entered to the internet was easily accessible by hackers.
with cryptography50
With Cryptography

Hacker!!

Information safe!

without cryptography7
Without Cryptography

Hacker!

Hacker!

without cryptography32
Without Cryptography

Hacker!

Information Compromised!

Hello World!

example
Example
  • Plaintext = hello
  • Encoded = ifmmp
  • Every letter is transformed into the letter preceding it.
ciphers
Ciphers
  • The mathematical algorithm used to encrypt a message is called a cipher.
  • Types: Symmetric Key Cipher & Asymmetric Key Cipher.
symmetric key cipher
Symmetric Key Cipher
  • One Key

Encryption key = Decryption key

asymmetric key cipher
Asymmetric Key Cipher
  • Two Keys

Encryption Key != Decryption Key

modern cryptography
Modern Cryptography
  • Quantum Cryptography
  • Unlike other cryptography methods which rely on computational security, quantum cryptography uses every single particle of light, which is called a photon, to transmit data.
modern cryptography cont
Modern Cryptography Cont..
  • In old methods a couple photons could be intercepted and the users would not know.
  • In Quantum Cryptography, if any photon is intercepted the data is transformed and the users are informed.
parallel programming
Parallel Programming
  • With parallel programming a hacker can use multiple key cracking algorithms.
  • This makes it easier to crack keys that have lower encryption bits.
  • With most of the

encryptions today,

a key can be broken in

O(2^n) time.

hackers
Hackers
  • Even with a 56 bit encryption key, parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers1
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers2
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers3
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers4
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers5
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers6
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers7
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers8
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers9
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers10
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers11
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers12
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers13
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers14
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers15
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers16
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers17
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers18
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers19
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers20
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers21
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers22
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers23
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers24
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers25
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers26
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers27
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers28
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers29
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers30
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers31
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers32
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

hackers33
Hackers
  • Even with a 56 bit encryption key parallel programming helps to crack the key.
  • With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

ad