Your SlideShare is downloading. ×
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

How Spies Communicate – Mocomi.com

89

Published on

How Spies Communicate – Mocomi.com …

How Spies Communicate – Mocomi.com

For more interesting article and video, visit: http://mocomi.com/learn/general-knowledge/

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
89
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. HOW SPIES COMMUNICATE Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.© General Knowledge for Kids mocomi.com/learn/general-knowledge/
  • 2. HOW SPIES COMMUNICATE (Encryption) (Decryption) Cryptography also known as cryptology is the practice and study of techniques used for secure communication in the presence of third parties. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 3. HOW SPIES COMMUNICATE Cryptography techniques prior to the modern age was effectively synonymous with encryp- tion - the conversion of information from a read- able state to apparent visible nonsense. The person or originator of an encrypted message shared the decoding technique needed to re- cover the original information only with in- tended recipients, thereby preventing un- wanted persons to do the same. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 4. HOW SPIES COMMUNICATE Since World War I and the invention of the com- puter, methods used to carry out cryptology have become extremely complex and its appli- cation more widespread. Cryptography today uses the disciplines of mathematics, computer science, and electrical engineering. The applica- tion of cryptography is now used for ATM cards, computer passwords, and electronic commerce. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 5. HOW SPIES COMMUNICATE Cipher Machine Until modern times cryptography referred almost exclusively to encryption, which is the process of converting plain text into cipher text. Decryption is the reverse, in other words, moving from the cipher text back to plain text. Terminology Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 6. HOW SPIES COMMUNICATE Cipher Output Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 7. HOW SPIES COMMUNICATE History of cryptography and cryptanalysis A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryp- tion. The operation of a cipher is controlled both by the algorithm and in each instance by a "key". The "key" is a secret parameter known only to the communicants for the specific exchange of messages. Cryptanalysis is the study of how to crack en- cryption algorithms or their implementations. Before the modern era, cryptology was con- cerned solely with encryption. Encryption was used to attempt to ensure secrecy in communi- cations, such as those of spies, military leaders, and diplomats. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 8. HOW SPIES COMMUNICATE Cryptanalysis In recent times, the field has expanded beyond confidentiality concerns and now include tech- niques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure com- putation, among others. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 9. HOW SPIES COMMUNICATE Cryptography Classic cryptography The earliest forms of secret writing required little more than pen and paper, as most people could not read. Those who were more literate and had literate opponents required actualy cryptography. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 10. HOW SPIES COMMUNICATE Caesar Cipher The main classical cipher types are transposition ciphers, which rearrange the order of letters in a message (e.g., 'hello dolly' becomes 'ehlol yllod' in a simple rearrangement scheme, and substi- tution ciphers, which systematically replace let- ters or groups of letters with other letters or groups of letters (e.g., 'fly at once' becomes 'gmz bu podf') by replacing each letter with the one following it in the Latin alphabet). These simple versions however have never offered much con- fidentiality from enterprising opponents. A P P L E D S S O H Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 11. HOW SPIES COMMUNICATE Cipher machine in the shape of a book An early substitution cipher was the Caesar cipher, in which each letter in the plaintext was replaced by a letter some fixed number of posi- tions further down the alphabet. Suetonius, a Roman historian reports that Julius Caesar used it with a shift of three to communicate with his generals. Atbash is an example of an early Hebrew cipher. The earliest known use of cryptography is some carved ciphertext on stone in Egypt at around 1900 BCE. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 12. HOW SPIES COMMUNICATE Computer era Many mechanical encryption/decryption de- vices were invented early in the 20th century, and several patented, among them the rotor machines—famously including the Enigma ma- chine used by the German government and military from the late '20s and during World War II. The ciphers implemented by these machines brought about a substantial increase in crypta- nalytic difficulty after WWI. Cryptanalysis of the new mechanical devices proved to be both difficult and laborious. In Great Britain, cryptanalytic efforts during WWII spurred the development of more efficient means for carrying out repetitious tasks. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 13. HOW SPIES COMMUNICATE Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.© Smart Card This culminated in the development of the Co- lossus, the world's first fully electronic, digital, programmable computer, which assisted in the decryption of ciphers generated by the German Army's Lorenz SZ40/42 machine. Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers.
  • 14. HOW SPIES COMMUNICATE Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.© Image references: Cipher machine/Cipher output/Cryptanalysis/Cryptography/Cipher machine in the shape of a book/Smart card - source: www.wikipedia.org. This file is licensed under the creative commons attribution Share Alike. Magnifying Glass/computer - source: www.openclipart.org. This image is public domain. You may use this picture for any purpose, including commercial. Furthermore, computers allowed for the encryp- tion of any kind of data unlike classical ciphers which only encrypted written language texts. Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis. Decode these substitution ciphers. (J bn dszqu- bobmztu) Start communicating with your friends in school through code. Those chits you pass on hence- forth will always be safe. Project For more such interactive article and video, visit: mocomi.com/learn/

×