SlideShare a Scribd company logo
1 of 30
1/31/2013   2
So What’s Cryptology
         What happened in the Past
         How they did it??
                Example from the Novel Da Vinci Code

Examples: Lock and Key, Cryptex , Atbash Cipher, Skytale

         Cryptology in Nature
         Visual Cryptology
         Symbol Cryptology
         Religion Cryptology
         Cryptology World War II
         Importance and Uses
                                             1/31/2013
                                                            3
 Cryptology   is the Study of ‘’Secret Writings’’
  Modern Cryptology combines the studies of
  Computer Science and Mathematics for the
  purpose of Encoding information to ensure that
  data is secure.
 Cryptology comes from Crypt which means A
  Code
 Cryptology sometimes is referred as
  cipherology


                                1/31/2013
                                                     4
   Cryptography- from greek words kryptos meaning
    hidden and Graphein meaning to write. Literally secret
    writing
   Cryptanalysis- also referred to as code breaking, the
    process of undoing cryptography
   Encryption- converts plaintext into an encoded text or a
    cipher-text
   Decryption- the reverse of encryption
   Cipher techniques used to encipher and decipher




                                      1/31/2013
                                                               5
 Cryptology    was a mean of Coding a message,
  so that it remains secret within an Organisation
 Cryptology was of various forms varying from
  the numerical and alphabetical coding to
  symbols figures and architecture
 Examples, Atbash cipher, Cryptex, Kryptos,




                                1/31/2013
                                                     6
 Classic   Cryptology
 Ancient Cryptology
 Symbol Cryptology
 Religion Cryptology
 Modern    Cryptology
 VisualCryptology
 Nature Cryptology
 Cryptology World War II
 Cyber Cryptology




                            1/31/2013
                                        7
Lock and key
Offcourse lock and key is a paradigm example of Classic Cryptology




  The above subject was invented 4000 years ago by
  Romans, a lock that beheld only one key


                                           1/31/2013
                                                                     8
Ancient Cryptex               Modern Cryptex

Cryptex is a masterpiece in history, invented by Da Vinci

                                         1/31/2013
                                                            9
Skytale used by Spartans, the message written on the paper
strip was unveiled by rolling it on the rod of some other secret
diameter, that encrypted on the paper.



                                        1/31/2013
                                                                   10
Replacement of the alphabets on the above pattern is called
Atbash Cipher

Illustrations

 Petroleum                VNGZKY

Hi how are you           TZ TZZP THG Z



                                         1/31/2013
                                                              11
Quoting an example from Dan Browns Famous Novel, The Da Vinci Code
    Quoting an example from Dan Browns Famous Novel, The Da Vinci Code




       In this case poem is a coded message to unlock the
               cryptex, that bears a secret Document

e
y


                                                1/31/2013
                                                                              12
Quoting an example from Dan Browns Famous Novel, The Da Vinci Code




  Scroll
  Wisdom
  Headstone Praised by Templars Is the key
              (Baphomet God)
  Atbash



                                         1/31/2013
                                                                     13
Quoting an example from Dan Browns Famous Novel, The Da Vinci Code




         A headstone by templars is the key:
                     Baphomet.
               B-P-V-M-T in Atbash.
           Changing the letters in the code
       Sh-V-P-Y-A ,becomes "Sofia" (Wisdom).
          And then Cryptex is Unlocked by the code SOFIA


                                          1/31/2013
                                                                     14
Quoting an example from Dan Browns Famous Novel, The Da Vinci Code




                                         1/31/2013
                                                                     15
How holy books have prophecised the upcoming of 911 in encryption..????

Holy Bible




                                               1/31/2013
                                                                          16
How holy books have prophecised the upcoming of 911 in encryption..????
Holy Quran




                                               1/31/2013
                                                                          17
Can You Decode the Encrypted Words???
Holy Quran




                                       1/31/2013
                                                     18
Holy Quran        Can You Decode the Encrypted Words???

 Encryptions:

             Allies Other Than Allah
             Weakest Of Homes

             The House Of Spider




                                            1/31/2013
                                                          19
Holy Quran        Can You Decode the Encrypted Words???

 Encryptions:

             Allies Other Than Allah
             Weakest Of Homes

             The House Of Spider




                                            1/31/2013
                                                          20
Prophetic Cryptology

The hour will not come to pass before The River
Euphrates dries up to unveil a Mountain Of Gold for
which people will fight, 99 out of 100 will die and every
man among them will say perhaps I may be the one to
remain alive and thus posses the gold
(Sahih Muslim)




                                       1/31/2013
                                                            21
Prophetic Cryptology

• The hour will not come unless a war, The Romans and
The Muslims fight together against an Unknown Force




                                   1/31/2013
                                                        22
Genetics And Gene Code
•No Finger Print No Iris Structure Of A Man Matches To The Other’s




Fingerprints and DNA - Encrypted Message    Gene Code- The Key

                                             1/31/2013
                                                                     23
Visual Encrypt 1 is overlapped on the Visual Encrypt 2 to get the Code
 The more the number of visual encrypts the more powerful code will be

                                               1/31/2013
                                                                         24
1/31/2013
            25
Codes Were Intensely Used in WWII

Japan Lost due to Decryption of The Code
PURPLE By USA

 PURPLE Included Sensitive Information
About Japan And Germany Attacks




                                            1/31/2013
                                                        26
Codes Were Intensely Used in WWII

USA’s the most frequent code in WWII was
NAVAJO

          The Japanese never broke the code
          NAVAJO




                                            1/31/2013
                                                        27
Some modern methods of communication are insecure

          •Internet is very insecure
          •Ethernet sniffers liable to having Sniffers

          •Cable modems passing through homes




                                                 1/31/2013
                                                             28
Modern Cryptography is useful for transactions and e-bankings




           •Huge amount of money move everyday

           •You can throw away the paper stuff that you still carry in
           your pocket

            •Public use of Cryptology quick and safe




                                                1/31/2013
                                                                         29
1/31/2013   30

More Related Content

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Cryptology Past Present and Future

  • 1.
  • 3. So What’s Cryptology What happened in the Past How they did it?? Example from the Novel Da Vinci Code Examples: Lock and Key, Cryptex , Atbash Cipher, Skytale Cryptology in Nature Visual Cryptology Symbol Cryptology Religion Cryptology Cryptology World War II Importance and Uses 1/31/2013 3
  • 4.  Cryptology is the Study of ‘’Secret Writings’’ Modern Cryptology combines the studies of Computer Science and Mathematics for the purpose of Encoding information to ensure that data is secure.  Cryptology comes from Crypt which means A Code  Cryptology sometimes is referred as cipherology 1/31/2013 4
  • 5. Cryptography- from greek words kryptos meaning hidden and Graphein meaning to write. Literally secret writing  Cryptanalysis- also referred to as code breaking, the process of undoing cryptography  Encryption- converts plaintext into an encoded text or a cipher-text  Decryption- the reverse of encryption  Cipher techniques used to encipher and decipher 1/31/2013 5
  • 6.  Cryptology was a mean of Coding a message, so that it remains secret within an Organisation  Cryptology was of various forms varying from the numerical and alphabetical coding to symbols figures and architecture  Examples, Atbash cipher, Cryptex, Kryptos, 1/31/2013 6
  • 7.  Classic Cryptology  Ancient Cryptology  Symbol Cryptology  Religion Cryptology  Modern Cryptology  VisualCryptology  Nature Cryptology  Cryptology World War II  Cyber Cryptology 1/31/2013 7
  • 8. Lock and key Offcourse lock and key is a paradigm example of Classic Cryptology The above subject was invented 4000 years ago by Romans, a lock that beheld only one key 1/31/2013 8
  • 9. Ancient Cryptex Modern Cryptex Cryptex is a masterpiece in history, invented by Da Vinci 1/31/2013 9
  • 10. Skytale used by Spartans, the message written on the paper strip was unveiled by rolling it on the rod of some other secret diameter, that encrypted on the paper. 1/31/2013 10
  • 11. Replacement of the alphabets on the above pattern is called Atbash Cipher Illustrations Petroleum VNGZKY Hi how are you TZ TZZP THG Z 1/31/2013 11
  • 12. Quoting an example from Dan Browns Famous Novel, The Da Vinci Code Quoting an example from Dan Browns Famous Novel, The Da Vinci Code In this case poem is a coded message to unlock the cryptex, that bears a secret Document e y 1/31/2013 12
  • 13. Quoting an example from Dan Browns Famous Novel, The Da Vinci Code Scroll Wisdom Headstone Praised by Templars Is the key (Baphomet God) Atbash 1/31/2013 13
  • 14. Quoting an example from Dan Browns Famous Novel, The Da Vinci Code A headstone by templars is the key: Baphomet. B-P-V-M-T in Atbash. Changing the letters in the code Sh-V-P-Y-A ,becomes "Sofia" (Wisdom). And then Cryptex is Unlocked by the code SOFIA 1/31/2013 14
  • 15. Quoting an example from Dan Browns Famous Novel, The Da Vinci Code 1/31/2013 15
  • 16. How holy books have prophecised the upcoming of 911 in encryption..???? Holy Bible 1/31/2013 16
  • 17. How holy books have prophecised the upcoming of 911 in encryption..???? Holy Quran 1/31/2013 17
  • 18. Can You Decode the Encrypted Words??? Holy Quran 1/31/2013 18
  • 19. Holy Quran Can You Decode the Encrypted Words??? Encryptions: Allies Other Than Allah Weakest Of Homes The House Of Spider 1/31/2013 19
  • 20. Holy Quran Can You Decode the Encrypted Words??? Encryptions: Allies Other Than Allah Weakest Of Homes The House Of Spider 1/31/2013 20
  • 21. Prophetic Cryptology The hour will not come to pass before The River Euphrates dries up to unveil a Mountain Of Gold for which people will fight, 99 out of 100 will die and every man among them will say perhaps I may be the one to remain alive and thus posses the gold (Sahih Muslim) 1/31/2013 21
  • 22. Prophetic Cryptology • The hour will not come unless a war, The Romans and The Muslims fight together against an Unknown Force 1/31/2013 22
  • 23. Genetics And Gene Code •No Finger Print No Iris Structure Of A Man Matches To The Other’s Fingerprints and DNA - Encrypted Message Gene Code- The Key 1/31/2013 23
  • 24. Visual Encrypt 1 is overlapped on the Visual Encrypt 2 to get the Code The more the number of visual encrypts the more powerful code will be 1/31/2013 24
  • 25. 1/31/2013 25
  • 26. Codes Were Intensely Used in WWII Japan Lost due to Decryption of The Code PURPLE By USA  PURPLE Included Sensitive Information About Japan And Germany Attacks 1/31/2013 26
  • 27. Codes Were Intensely Used in WWII USA’s the most frequent code in WWII was NAVAJO The Japanese never broke the code NAVAJO 1/31/2013 27
  • 28. Some modern methods of communication are insecure •Internet is very insecure •Ethernet sniffers liable to having Sniffers •Cable modems passing through homes 1/31/2013 28
  • 29. Modern Cryptography is useful for transactions and e-bankings •Huge amount of money move everyday •You can throw away the paper stuff that you still carry in your pocket •Public use of Cryptology quick and safe 1/31/2013 29
  • 30. 1/31/2013 30