SlideShare a Scribd company logo
1 of 31
CRYPTOGRAPHY
Dr Christian Bokhove
Professor in Mathematics Education
Disclaimer: I too am standing on the shoulders of giants and have made use of many
excellent resources on the web.
https://is.gd/y9crypto
What is it?
Cryptography – maths in service of security
Cryptanalysis – breaking cryptographic systems
Four functions
Confidentiality – “set of rules that limits access”
Integrity – “consistency and accuracy of
data throughout its life-cycle”
Authentication – “confirms a truth claimed
by some entity”
Non-repudiation – “ensure that the author of a piece
of information cannot deny it”
https://www.cryptool.org/en/
Origins of Cryptography
• Thought that the earliest form of cryptography was in the
Egyptian town of Menet Khufu
• The hieroglyphics on the tomb of nobleman
KHNUMHOTEP II contained unusual symbols, used to
obscure the meaning of the inscriptions.
1900 BC
Menet Khufu
Method: substitution
Origins of Cryptography
• The Spartans, in 5 BC,
developed a device called
a Scytale.
• A messenger would carry
a strip of parchment, which
was meaningless until it
was wrapped around a
Scytale of the same
dyameter.
• https://www.cryptool.org/en
/cto/scytale
Method: transposition
Caesar Cipher: c = m + 3
Caesar Shift Cipher
• Each letter was substituted by shifting n places
• Only 25 possible ciphers.
7
Julius Caesar
100 BC- 44 BC
Caesar Cipher
Many people will have tried this!
+m
A->C
B->D
C->E etc
a b c d e f g h I j k l m n o p q r s t u v w x y z
a b c d e f g h I j k l m n o p q r s t u v w x y z
Let m == 3, then the cleartext CAT
becomes the ciphertext FDW
DEMO CAESAR
https://www.cryptool.org/en/cto/caesar
But….
These are easily broken by frequency analysis:
given “enough” ciphertext, the code breaks itself
Attacking Substitution Ciphers
11
Trick 2:
Letter
Frequency
Most common: e,t,a,o,i,n
Least common: j,x,q,z
image source: wikipedia
Trick 1:
Word
Frequency
DEMO FREQUENCY
ANALYSIS
Cryptool 2.0 software
Exdsv wynobx dswoc, mbizdyqbkzri bopobbon kvwycd ohmvecsfovi dy
"oxmbizdsyx", grsmr sc dro zbymocc yp myxfobdsxq ybnsxkbi sxpybwkdsyx (mkvvon
zvksxdohd) sxdy kx exsxdovvsqslvo pybw (mkvvon mszrobdohd).[13] Nombizdsyx sc
dro bofobco, sx ydrob gybnc, wyfsxq pbyw dro exsxdovvsqslvo mszrobdohd lkmu dy
zvksxdohd. K mszrob (yb mizrob) sc k zksb yp kvqybsdrwc drkd mkbbi yed dro
oxmbizdsyx kxn dro bofobcsxq nombizdsyx. Dro nodksvon yzobkdsyx yp k mszrob sc
myxdbyvvon lydr li dro kvqybsdrw kxn, sx okmr sxcdkxmo, li k "uoi". Dro uoi sc k
combod (snokvvi uxygx yxvi dy dro mywwexsmkxdc), ecekvvi k cdbsxq yp
mrkbkmdobc (snokvvi crybd cy sd mkx lo bowowlobon li dro ecob), grsmr sc xoonon
dy nombizd dro mszrobdohd. Sx pybwkv wkdrowkdsmkv dobwc, k "mbizdycicdow"
sc dro ybnobon vscd yp ovowoxdc yp psxsdo zyccslvo zvksxdohdc, psxsdo zyccslvo
mizrobdohdc, psxsdo zyccslvo uoic, kxn dro oxmbizdsyx kxn nombizdsyx kvqybsdrwc
drkd mybboczyxn dy okmr uoi. Uoic kbo swzybdkxd lydr pybwkvvi kxn sx kmdekv
zbkmdsmo, kc mszrobc gsdryed fkbsklvo uoic mkx lo dbsfskvvi lbyuox gsdr yxvi dro
uxygvonqo yp dro mszrob econ kxn kbo drobopybo ecovocc (yb ofox myexdob-
zbynemdsfo) pyb wycd zebzycoc. Rscdybsmkvvi, mszrobc gobo ypdox econ
nsbomdvi pyb oxmbizdsyx yb nombizdsyx gsdryed knnsdsyxkv zbymoneboc cemr kc
kedroxdsmkdsyx yb sxdoqbsdi mromuc.
13
Until modern times, cryptography referred almost exclusively to "encryption",
which is the process of converting ordinary information (called plaintext) into an
unintelligible form (called ciphertext).[13] Decryption is the reverse, in other words,
moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a
pair of algorithms that carry out the encryption and the reversing decryption. The
detailed operation of a cipher is controlled both by the algorithm and, in each
instance, by a "key". The key is a secret (ideally known only to the communicants),
usually a string of characters (ideally short so it can be remembered by the user),
which is needed to decrypt the ciphertext. In formal mathematical terms, a
"cryptosystem" is the ordered list of elements of finite possible plaintexts, finite
possible cyphertexts, finite possible keys, and the encryption and decryption
algorithms that correspond to each key. Keys are important both formally and in
actual practice, as ciphers without variable keys can be trivially broken with only the
knowledge of the cipher used and are therefore useless (or even counter-
productive) for most purposes. Historically, ciphers were often used directly for
encryption or decryption without additional procedures such as authentication or
integrity checks.
15
https://en.wikipedia.org/wiki/Cryptography
Vigenère
• The Vigenère cipher is a polyalphabetic cipher. The relationship
between a character in the plaintext to a character in the
cipher text is one-to-many.
• Blaise de Vigenère, a 16th century French mathematician.
• It was used in the American civil war and was once believed to
be unbreakable.
• A Vigenère cipher uses a different strategy to create the key
stream. The key stream is a repetition of an initial secret key
stream of length m, where we have 1 ≤ m ≤ 26.
• The Vigenère cipher is a method of encrypting alphabetic text
by using a series of different Caesar ciphers based on the
letters of a keyword.
• The Vigenère cipher uses multiple mixed alphabets, each is a
shift cipher.
Modular arithmetic
• Telling time is famously ‘modular arithmetic’.
• Can see it as arithmetic with remainders:
20 divided by 7  remainder is 6.
• The alphabet consists of 26 letters. Let’s number them 0,
1, 3, 4….., 25.
• What if I would do B+C?
That would be 1+2=3 and that’s D.
• What if I do R+T? That’s 17+19 = 36.
• But the alphabet doesn’t go that high, so start counting
from 0 again after 25, so that’s 10, or K.
• This is arithmetic ‘modulo 26’
• Notation: 17 + 19 mod 26 = 10.
Vigenere Cipher
We can encrypt the message “She is listening” using
the 6-character keyword “PASCAL“. The initial key stream
is (15,0,18,2,0,11). The key stream is the repetition of this
initial key stream (as many times as needed) .
Use encryption algorithm:
Vigenère Table
Vigenere Cipher
• This method was actually discovered earlier, in 1854 by
Charles Babbage.
• Vigenere-like substitution ciphers were regarded by many
as practically unbreakable for 300 years.
• In 1863, a Prussian major named Kasiski proposed a
method for breaking a Vigenere cipher that consisted of
finding the length of the keyword and then dividing the
message into that many simple substitution cryptograms.
ONLINE DEMO VIGENERE
https://www.cryptool.org/en/cto/vigenere
Government Communications Headquarters
• During WWI, the British Army had a separate division from
the British Navy (“Room 40”).
• After WWI, it was proposed that a peacetime
codebreaking division be created.
• The Government Communications Headquarters was
created.
• Pre WWII, was a very small department.
• By 1940, was attacking codes of 26 countries and over
150 diplomatic cryptosystems.
• In USA many developments during WWII, including
Elizabeth Friedman, Grace Hopper and others.
World War II Cryptography
• Most Famous example of
Cryptography in World War
II was the German
Enigma.
• Made use of Rotors and
Plugboards
• One or more of the rotors
moved after each key
press, depending on the
settings.
• Created a changing
substitution cypher, or a
polyalphabetic substitution
cypher.
https://www.cryptool.org/en/cto/enigma-step-by-step
RSA Encryption
• Developed by Ron Rivest, Adi Shamir, and Leonard
Adleman.
• Type of Public Key Encryption.
• Later discovered that a similar method had been
developed by the GCHQ (The British SIGINT agency), in
1973, but was kept classified until 1997.
• “The security of RSA is based on the fact that it is easy to
calculate the product n of two large primes p and q.
However, it is very difficult to determine only from the
product n the two primes that yield the product. This
decomposition is also called the factorization of n.”
Prime numbers
• A prime number only has 1 or itself as ‘factor’.
• So, 7 is prime
• 13 is prime
• 21 is not prime because that can also be 3*7
• No even number is prime because 2 is always a factor.
• It’s not even always easy to know whether a(n odd)
number is prime or not.
Example
11677
39727
Easy to do: 11677 times 39727 is 463892179
Not so easy to do: what product of prime numbers
is 463892179 ?
RSA
https://www.cryptool.org/en/cto/rsa-step-by-step
Current day cryptography
• E.g. DES uses a 56-bit key, so 256 possible keys.
• 72,057,594,037,927,936 keys (72 thousand billion in the
UK, 72 quadrillion in the US)
• Even with all these keys, still susceptible to brute force
attacks.
• “It is known that the NSA encouraged, if not persuaded,
IBM to reduce the key size from 128 to 64 bits, and from
there to 56 bits; this is often taken as an indication that
the NSA possessed enough computer power to break
keys of this length even in the mid-1970s.” (Wikipedia)
• Many uses: Whatsapp, banking, https, 802.11, WPA,
GSM, Bluetooth, encrypting files on disk, content
protection on DVD/Blu-ray, user authentication.
https://mysterytwister.org/
https://www.cipherchallenge.org/
Thank you
Dr Christian Bokhove C.Bokhove@soton.ac.uk
Professor in Mathematics Education

More Related Content

Similar to Cryptography

sabith.pptx
sabith.pptxsabith.pptx
sabith.pptxsabith15
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developersKai Koenig
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-finalTaymoor Nazmy
 
cryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptcryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptJohnree4
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Information and network security 15 other poly alphabatic ciphers
Information and network security 15 other poly alphabatic ciphersInformation and network security 15 other poly alphabatic ciphers
Information and network security 15 other poly alphabatic ciphersVaibhav Khanna
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynoteKaya Ota
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1Alfred Ouyang
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"Aditya Raina
 
Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Yekini Nureni
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - PaperBernhard Hofer
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to PracticeXequeMateShannon
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 

Similar to Cryptography (20)

sabith.pptx
sabith.pptxsabith.pptx
sabith.pptx
 
Crypto
CryptoCrypto
Crypto
 
History of Cryptography
History of CryptographyHistory of Cryptography
History of Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
cryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptcryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.ppt
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Information and network security 15 other poly alphabatic ciphers
Information and network security 15 other poly alphabatic ciphersInformation and network security 15 other poly alphabatic ciphers
Information and network security 15 other poly alphabatic ciphers
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
 
Cns 1
Cns 1Cns 1
Cns 1
 
Cryptography
CryptographyCryptography
Cryptography
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption Guide
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 

More from Christian Bokhove

Can data from largescale assessments ever be useful For mathematics education?
Can data from largescale assessments ever be useful For mathematics education?Can data from largescale assessments ever be useful For mathematics education?
Can data from largescale assessments ever be useful For mathematics education?Christian Bokhove
 
Creating interactive digital books for the transition from secondary to under...
Creating interactive digital books for the transition from secondary to under...Creating interactive digital books for the transition from secondary to under...
Creating interactive digital books for the transition from secondary to under...Christian Bokhove
 
Research on school inspections: What do we know?
Research on school inspections: What do we know?Research on school inspections: What do we know?
Research on school inspections: What do we know?Christian Bokhove
 
Master mathematics teachers: What do Chinese primary schools look like?
Master mathematics teachers: What do Chinese primary schools look like?Master mathematics teachers: What do Chinese primary schools look like?
Master mathematics teachers: What do Chinese primary schools look like?Christian Bokhove
 
The role of non-cognitive factors in science achievement: an analysis of PISA...
The role of non-cognitive factors in science achievement: an analysis of PISA...The role of non-cognitive factors in science achievement: an analysis of PISA...
The role of non-cognitive factors in science achievement: an analysis of PISA...Christian Bokhove
 
Multilevel modelling of Chinese primary children’s metacognitive strategies i...
Multilevel modelling of Chinese primary children’s metacognitive strategies i...Multilevel modelling of Chinese primary children’s metacognitive strategies i...
Multilevel modelling of Chinese primary children’s metacognitive strategies i...Christian Bokhove
 
Help-seeking in an online maths environment: A sequence analysis of log files
Help-seeking in an online maths environment: A sequence analysis of log filesHelp-seeking in an online maths environment: A sequence analysis of log files
Help-seeking in an online maths environment: A sequence analysis of log filesChristian Bokhove
 
Learning loss and learning inequalities during the covid-19 pandemic: an anal...
Learning loss and learning inequalities during the covid-19 pandemic: an anal...Learning loss and learning inequalities during the covid-19 pandemic: an anal...
Learning loss and learning inequalities during the covid-19 pandemic: an anal...Christian Bokhove
 
The challenge of proof in the transition from A-level mathematics to university
The challenge of proof in the transition from A-level mathematics to universityThe challenge of proof in the transition from A-level mathematics to university
The challenge of proof in the transition from A-level mathematics to universityChristian Bokhove
 
How can we develop expansive, research-informed ITE ?
How can we develop expansive, research-informed ITE ?How can we develop expansive, research-informed ITE ?
How can we develop expansive, research-informed ITE ?Christian Bokhove
 
(On)waarheden en (on)bekende zaken uit onderzoek over reken-wiskundeonderwijs
(On)waarheden en (on)bekende zaken uit onderzoek over reken-wiskundeonderwijs(On)waarheden en (on)bekende zaken uit onderzoek over reken-wiskundeonderwijs
(On)waarheden en (on)bekende zaken uit onderzoek over reken-wiskundeonderwijsChristian Bokhove
 
Transparency in Data Analysis
Transparency in Data AnalysisTransparency in Data Analysis
Transparency in Data AnalysisChristian Bokhove
 
Proof by induction in Calculus: Investigating first-year students’ examinatio...
Proof by induction in Calculus: Investigating first-year students’ examinatio...Proof by induction in Calculus: Investigating first-year students’ examinatio...
Proof by induction in Calculus: Investigating first-year students’ examinatio...Christian Bokhove
 
Evidence informed: Waar is de Bijsluiter?
Evidence informed: Waar is de Bijsluiter?Evidence informed: Waar is de Bijsluiter?
Evidence informed: Waar is de Bijsluiter?Christian Bokhove
 
Methodological innovation for mathematics education research
Methodological innovation for mathematics education researchMethodological innovation for mathematics education research
Methodological innovation for mathematics education researchChristian Bokhove
 
Roundtable slides RiTE Paderborn 24/9/2021
Roundtable slides RiTE Paderborn 24/9/2021Roundtable slides RiTE Paderborn 24/9/2021
Roundtable slides RiTE Paderborn 24/9/2021Christian Bokhove
 
Structural Topic Modelling of Ofsted Documents
Structural Topic Modelling of Ofsted DocumentsStructural Topic Modelling of Ofsted Documents
Structural Topic Modelling of Ofsted DocumentsChristian Bokhove
 
Learning loss and learning inequalities during the Covid-19 pandemic: an anal...
Learning loss and learning inequalities during the Covid-19 pandemic: an anal...Learning loss and learning inequalities during the Covid-19 pandemic: an anal...
Learning loss and learning inequalities during the Covid-19 pandemic: an anal...Christian Bokhove
 
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...Christian Bokhove
 

More from Christian Bokhove (20)

Can data from largescale assessments ever be useful For mathematics education?
Can data from largescale assessments ever be useful For mathematics education?Can data from largescale assessments ever be useful For mathematics education?
Can data from largescale assessments ever be useful For mathematics education?
 
Creating interactive digital books for the transition from secondary to under...
Creating interactive digital books for the transition from secondary to under...Creating interactive digital books for the transition from secondary to under...
Creating interactive digital books for the transition from secondary to under...
 
Research on school inspections: What do we know?
Research on school inspections: What do we know?Research on school inspections: What do we know?
Research on school inspections: What do we know?
 
Master mathematics teachers: What do Chinese primary schools look like?
Master mathematics teachers: What do Chinese primary schools look like?Master mathematics teachers: What do Chinese primary schools look like?
Master mathematics teachers: What do Chinese primary schools look like?
 
The role of non-cognitive factors in science achievement: an analysis of PISA...
The role of non-cognitive factors in science achievement: an analysis of PISA...The role of non-cognitive factors in science achievement: an analysis of PISA...
The role of non-cognitive factors in science achievement: an analysis of PISA...
 
Multilevel modelling of Chinese primary children’s metacognitive strategies i...
Multilevel modelling of Chinese primary children’s metacognitive strategies i...Multilevel modelling of Chinese primary children’s metacognitive strategies i...
Multilevel modelling of Chinese primary children’s metacognitive strategies i...
 
Help-seeking in an online maths environment: A sequence analysis of log files
Help-seeking in an online maths environment: A sequence analysis of log filesHelp-seeking in an online maths environment: A sequence analysis of log files
Help-seeking in an online maths environment: A sequence analysis of log files
 
Learning loss and learning inequalities during the covid-19 pandemic: an anal...
Learning loss and learning inequalities during the covid-19 pandemic: an anal...Learning loss and learning inequalities during the covid-19 pandemic: an anal...
Learning loss and learning inequalities during the covid-19 pandemic: an anal...
 
The challenge of proof in the transition from A-level mathematics to university
The challenge of proof in the transition from A-level mathematics to universityThe challenge of proof in the transition from A-level mathematics to university
The challenge of proof in the transition from A-level mathematics to university
 
How can we develop expansive, research-informed ITE ?
How can we develop expansive, research-informed ITE ?How can we develop expansive, research-informed ITE ?
How can we develop expansive, research-informed ITE ?
 
Discussant EARLI sig 27
Discussant EARLI sig 27Discussant EARLI sig 27
Discussant EARLI sig 27
 
(On)waarheden en (on)bekende zaken uit onderzoek over reken-wiskundeonderwijs
(On)waarheden en (on)bekende zaken uit onderzoek over reken-wiskundeonderwijs(On)waarheden en (on)bekende zaken uit onderzoek over reken-wiskundeonderwijs
(On)waarheden en (on)bekende zaken uit onderzoek over reken-wiskundeonderwijs
 
Transparency in Data Analysis
Transparency in Data AnalysisTransparency in Data Analysis
Transparency in Data Analysis
 
Proof by induction in Calculus: Investigating first-year students’ examinatio...
Proof by induction in Calculus: Investigating first-year students’ examinatio...Proof by induction in Calculus: Investigating first-year students’ examinatio...
Proof by induction in Calculus: Investigating first-year students’ examinatio...
 
Evidence informed: Waar is de Bijsluiter?
Evidence informed: Waar is de Bijsluiter?Evidence informed: Waar is de Bijsluiter?
Evidence informed: Waar is de Bijsluiter?
 
Methodological innovation for mathematics education research
Methodological innovation for mathematics education researchMethodological innovation for mathematics education research
Methodological innovation for mathematics education research
 
Roundtable slides RiTE Paderborn 24/9/2021
Roundtable slides RiTE Paderborn 24/9/2021Roundtable slides RiTE Paderborn 24/9/2021
Roundtable slides RiTE Paderborn 24/9/2021
 
Structural Topic Modelling of Ofsted Documents
Structural Topic Modelling of Ofsted DocumentsStructural Topic Modelling of Ofsted Documents
Structural Topic Modelling of Ofsted Documents
 
Learning loss and learning inequalities during the Covid-19 pandemic: an anal...
Learning loss and learning inequalities during the Covid-19 pandemic: an anal...Learning loss and learning inequalities during the Covid-19 pandemic: an anal...
Learning loss and learning inequalities during the Covid-19 pandemic: an anal...
 
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...
 

Recently uploaded

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Recently uploaded (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

Cryptography

  • 1. CRYPTOGRAPHY Dr Christian Bokhove Professor in Mathematics Education Disclaimer: I too am standing on the shoulders of giants and have made use of many excellent resources on the web. https://is.gd/y9crypto
  • 2. What is it? Cryptography – maths in service of security Cryptanalysis – breaking cryptographic systems
  • 3. Four functions Confidentiality – “set of rules that limits access” Integrity – “consistency and accuracy of data throughout its life-cycle” Authentication – “confirms a truth claimed by some entity” Non-repudiation – “ensure that the author of a piece of information cannot deny it”
  • 5. Origins of Cryptography • Thought that the earliest form of cryptography was in the Egyptian town of Menet Khufu • The hieroglyphics on the tomb of nobleman KHNUMHOTEP II contained unusual symbols, used to obscure the meaning of the inscriptions. 1900 BC Menet Khufu Method: substitution
  • 6. Origins of Cryptography • The Spartans, in 5 BC, developed a device called a Scytale. • A messenger would carry a strip of parchment, which was meaningless until it was wrapped around a Scytale of the same dyameter. • https://www.cryptool.org/en /cto/scytale Method: transposition
  • 7. Caesar Cipher: c = m + 3 Caesar Shift Cipher • Each letter was substituted by shifting n places • Only 25 possible ciphers. 7 Julius Caesar 100 BC- 44 BC
  • 8. Caesar Cipher Many people will have tried this! +m A->C B->D C->E etc a b c d e f g h I j k l m n o p q r s t u v w x y z a b c d e f g h I j k l m n o p q r s t u v w x y z Let m == 3, then the cleartext CAT becomes the ciphertext FDW
  • 10. But…. These are easily broken by frequency analysis: given “enough” ciphertext, the code breaks itself
  • 11. Attacking Substitution Ciphers 11 Trick 2: Letter Frequency Most common: e,t,a,o,i,n Least common: j,x,q,z image source: wikipedia Trick 1: Word Frequency
  • 13. Exdsv wynobx dswoc, mbizdyqbkzri bopobbon kvwycd ohmvecsfovi dy "oxmbizdsyx", grsmr sc dro zbymocc yp myxfobdsxq ybnsxkbi sxpybwkdsyx (mkvvon zvksxdohd) sxdy kx exsxdovvsqslvo pybw (mkvvon mszrobdohd).[13] Nombizdsyx sc dro bofobco, sx ydrob gybnc, wyfsxq pbyw dro exsxdovvsqslvo mszrobdohd lkmu dy zvksxdohd. K mszrob (yb mizrob) sc k zksb yp kvqybsdrwc drkd mkbbi yed dro oxmbizdsyx kxn dro bofobcsxq nombizdsyx. Dro nodksvon yzobkdsyx yp k mszrob sc myxdbyvvon lydr li dro kvqybsdrw kxn, sx okmr sxcdkxmo, li k "uoi". Dro uoi sc k combod (snokvvi uxygx yxvi dy dro mywwexsmkxdc), ecekvvi k cdbsxq yp mrkbkmdobc (snokvvi crybd cy sd mkx lo bowowlobon li dro ecob), grsmr sc xoonon dy nombizd dro mszrobdohd. Sx pybwkv wkdrowkdsmkv dobwc, k "mbizdycicdow" sc dro ybnobon vscd yp ovowoxdc yp psxsdo zyccslvo zvksxdohdc, psxsdo zyccslvo mizrobdohdc, psxsdo zyccslvo uoic, kxn dro oxmbizdsyx kxn nombizdsyx kvqybsdrwc drkd mybboczyxn dy okmr uoi. Uoic kbo swzybdkxd lydr pybwkvvi kxn sx kmdekv zbkmdsmo, kc mszrobc gsdryed fkbsklvo uoic mkx lo dbsfskvvi lbyuox gsdr yxvi dro uxygvonqo yp dro mszrob econ kxn kbo drobopybo ecovocc (yb ofox myexdob- zbynemdsfo) pyb wycd zebzycoc. Rscdybsmkvvi, mszrobc gobo ypdox econ nsbomdvi pyb oxmbizdsyx yb nombizdsyx gsdryed knnsdsyxkv zbymoneboc cemr kc kedroxdsmkdsyx yb sxdoqbsdi mromuc. 13
  • 14.
  • 15. Until modern times, cryptography referred almost exclusively to "encryption", which is the process of converting ordinary information (called plaintext) into an unintelligible form (called ciphertext).[13] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a pair of algorithms that carry out the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and, in each instance, by a "key". The key is a secret (ideally known only to the communicants), usually a string of characters (ideally short so it can be remembered by the user), which is needed to decrypt the ciphertext. In formal mathematical terms, a "cryptosystem" is the ordered list of elements of finite possible plaintexts, finite possible cyphertexts, finite possible keys, and the encryption and decryption algorithms that correspond to each key. Keys are important both formally and in actual practice, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter- productive) for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks. 15 https://en.wikipedia.org/wiki/Cryptography
  • 16. Vigenère • The Vigenère cipher is a polyalphabetic cipher. The relationship between a character in the plaintext to a character in the cipher text is one-to-many. • Blaise de Vigenère, a 16th century French mathematician. • It was used in the American civil war and was once believed to be unbreakable. • A Vigenère cipher uses a different strategy to create the key stream. The key stream is a repetition of an initial secret key stream of length m, where we have 1 ≤ m ≤ 26. • The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. • The Vigenère cipher uses multiple mixed alphabets, each is a shift cipher.
  • 17. Modular arithmetic • Telling time is famously ‘modular arithmetic’. • Can see it as arithmetic with remainders: 20 divided by 7  remainder is 6. • The alphabet consists of 26 letters. Let’s number them 0, 1, 3, 4….., 25. • What if I would do B+C? That would be 1+2=3 and that’s D. • What if I do R+T? That’s 17+19 = 36. • But the alphabet doesn’t go that high, so start counting from 0 again after 25, so that’s 10, or K. • This is arithmetic ‘modulo 26’ • Notation: 17 + 19 mod 26 = 10.
  • 18. Vigenere Cipher We can encrypt the message “She is listening” using the 6-character keyword “PASCAL“. The initial key stream is (15,0,18,2,0,11). The key stream is the repetition of this initial key stream (as many times as needed) . Use encryption algorithm:
  • 20. Vigenere Cipher • This method was actually discovered earlier, in 1854 by Charles Babbage. • Vigenere-like substitution ciphers were regarded by many as practically unbreakable for 300 years. • In 1863, a Prussian major named Kasiski proposed a method for breaking a Vigenere cipher that consisted of finding the length of the keyword and then dividing the message into that many simple substitution cryptograms.
  • 22. Government Communications Headquarters • During WWI, the British Army had a separate division from the British Navy (“Room 40”). • After WWI, it was proposed that a peacetime codebreaking division be created. • The Government Communications Headquarters was created. • Pre WWII, was a very small department. • By 1940, was attacking codes of 26 countries and over 150 diplomatic cryptosystems. • In USA many developments during WWII, including Elizabeth Friedman, Grace Hopper and others.
  • 23. World War II Cryptography • Most Famous example of Cryptography in World War II was the German Enigma. • Made use of Rotors and Plugboards • One or more of the rotors moved after each key press, depending on the settings. • Created a changing substitution cypher, or a polyalphabetic substitution cypher. https://www.cryptool.org/en/cto/enigma-step-by-step
  • 24. RSA Encryption • Developed by Ron Rivest, Adi Shamir, and Leonard Adleman. • Type of Public Key Encryption. • Later discovered that a similar method had been developed by the GCHQ (The British SIGINT agency), in 1973, but was kept classified until 1997. • “The security of RSA is based on the fact that it is easy to calculate the product n of two large primes p and q. However, it is very difficult to determine only from the product n the two primes that yield the product. This decomposition is also called the factorization of n.”
  • 25. Prime numbers • A prime number only has 1 or itself as ‘factor’. • So, 7 is prime • 13 is prime • 21 is not prime because that can also be 3*7 • No even number is prime because 2 is always a factor. • It’s not even always easy to know whether a(n odd) number is prime or not.
  • 26. Example 11677 39727 Easy to do: 11677 times 39727 is 463892179 Not so easy to do: what product of prime numbers is 463892179 ?
  • 28. Current day cryptography • E.g. DES uses a 56-bit key, so 256 possible keys. • 72,057,594,037,927,936 keys (72 thousand billion in the UK, 72 quadrillion in the US) • Even with all these keys, still susceptible to brute force attacks. • “It is known that the NSA encouraged, if not persuaded, IBM to reduce the key size from 128 to 64 bits, and from there to 56 bits; this is often taken as an indication that the NSA possessed enough computer power to break keys of this length even in the mid-1970s.” (Wikipedia) • Many uses: Whatsapp, banking, https, 802.11, WPA, GSM, Bluetooth, encrypting files on disk, content protection on DVD/Blu-ray, user authentication.
  • 31. Thank you Dr Christian Bokhove C.Bokhove@soton.ac.uk Professor in Mathematics Education

Editor's Notes

  1. Thanks to slides from: Adam Goodbar