The document discusses the history and applications of cryptology. It describes ancient encryption techniques like the Atbash cipher and Skytale. It provides an example from The Da Vinci Code involving a cryptex. The document also discusses cryptology in nature, religion, and World War II. It explains how cryptology is now combined with computer science and mathematics to securely encode information.
3. So What’s Cryptology
What happened in the Past
How they did it??
Example from the Novel Da Vinci Code
Examples: Lock and Key, Cryptex , Atbash Cipher, Skytale
Cryptology in Nature
Visual Cryptology
Symbol Cryptology
Religion Cryptology
Cryptology World War II
Importance and Uses
1/31/2013
3
4. Cryptology is the Study of ‘’Secret Writings’’
Modern Cryptology combines the studies of
Computer Science and Mathematics for the
purpose of Encoding information to ensure that
data is secure.
Cryptology comes from Crypt which means A
Code
Cryptology sometimes is referred as
cipherology
1/31/2013
4
5. Cryptography- from greek words kryptos meaning
hidden and Graphein meaning to write. Literally secret
writing
Cryptanalysis- also referred to as code breaking, the
process of undoing cryptography
Encryption- converts plaintext into an encoded text or a
cipher-text
Decryption- the reverse of encryption
Cipher techniques used to encipher and decipher
1/31/2013
5
6. Cryptology was a mean of Coding a message,
so that it remains secret within an Organisation
Cryptology was of various forms varying from
the numerical and alphabetical coding to
symbols figures and architecture
Examples, Atbash cipher, Cryptex, Kryptos,
1/31/2013
6
7. Classic Cryptology
Ancient Cryptology
Symbol Cryptology
Religion Cryptology
Modern Cryptology
VisualCryptology
Nature Cryptology
Cryptology World War II
Cyber Cryptology
1/31/2013
7
8. Lock and key
Offcourse lock and key is a paradigm example of Classic Cryptology
The above subject was invented 4000 years ago by
Romans, a lock that beheld only one key
1/31/2013
8
9. Ancient Cryptex Modern Cryptex
Cryptex is a masterpiece in history, invented by Da Vinci
1/31/2013
9
10. Skytale used by Spartans, the message written on the paper
strip was unveiled by rolling it on the rod of some other secret
diameter, that encrypted on the paper.
1/31/2013
10
11. Replacement of the alphabets on the above pattern is called
Atbash Cipher
Illustrations
Petroleum VNGZKY
Hi how are you TZ TZZP THG Z
1/31/2013
11
12. Quoting an example from Dan Browns Famous Novel, The Da Vinci Code
Quoting an example from Dan Browns Famous Novel, The Da Vinci Code
In this case poem is a coded message to unlock the
cryptex, that bears a secret Document
e
y
1/31/2013
12
13. Quoting an example from Dan Browns Famous Novel, The Da Vinci Code
Scroll
Wisdom
Headstone Praised by Templars Is the key
(Baphomet God)
Atbash
1/31/2013
13
14. Quoting an example from Dan Browns Famous Novel, The Da Vinci Code
A headstone by templars is the key:
Baphomet.
B-P-V-M-T in Atbash.
Changing the letters in the code
Sh-V-P-Y-A ,becomes "Sofia" (Wisdom).
And then Cryptex is Unlocked by the code SOFIA
1/31/2013
14
15. Quoting an example from Dan Browns Famous Novel, The Da Vinci Code
1/31/2013
15
16. How holy books have prophecised the upcoming of 911 in encryption..????
Holy Bible
1/31/2013
16
17. How holy books have prophecised the upcoming of 911 in encryption..????
Holy Quran
1/31/2013
17
18. Can You Decode the Encrypted Words???
Holy Quran
1/31/2013
18
19. Holy Quran Can You Decode the Encrypted Words???
Encryptions:
Allies Other Than Allah
Weakest Of Homes
The House Of Spider
1/31/2013
19
20. Holy Quran Can You Decode the Encrypted Words???
Encryptions:
Allies Other Than Allah
Weakest Of Homes
The House Of Spider
1/31/2013
20
21. Prophetic Cryptology
The hour will not come to pass before The River
Euphrates dries up to unveil a Mountain Of Gold for
which people will fight, 99 out of 100 will die and every
man among them will say perhaps I may be the one to
remain alive and thus posses the gold
(Sahih Muslim)
1/31/2013
21
22. Prophetic Cryptology
• The hour will not come unless a war, The Romans and
The Muslims fight together against an Unknown Force
1/31/2013
22
23. Genetics And Gene Code
•No Finger Print No Iris Structure Of A Man Matches To The Other’s
Fingerprints and DNA - Encrypted Message Gene Code- The Key
1/31/2013
23
24. Visual Encrypt 1 is overlapped on the Visual Encrypt 2 to get the Code
The more the number of visual encrypts the more powerful code will be
1/31/2013
24
26. Codes Were Intensely Used in WWII
Japan Lost due to Decryption of The Code
PURPLE By USA
PURPLE Included Sensitive Information
About Japan And Germany Attacks
1/31/2013
26
27. Codes Were Intensely Used in WWII
USA’s the most frequent code in WWII was
NAVAJO
The Japanese never broke the code
NAVAJO
1/31/2013
27
28. Some modern methods of communication are insecure
•Internet is very insecure
•Ethernet sniffers liable to having Sniffers
•Cable modems passing through homes
1/31/2013
28
29. Modern Cryptography is useful for transactions and e-bankings
•Huge amount of money move everyday
•You can throw away the paper stuff that you still carry in
your pocket
•Public use of Cryptology quick and safe
1/31/2013
29