SlideShare a Scribd company logo
1 of 14
Download to read offline
HOW SPIES
COMMUNICATE
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
General Knowledge for Kids
mocomi.com/learn/general-knowledge/
HOW SPIES
COMMUNICATE
(Encryption) (Decryption)
Cryptography also known as cryptology is the
practice and study of techniques used for secure
communication in the presence of third parties.
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
HOW SPIES
COMMUNICATE
Cryptography techniques prior to the modern
age was effectively synonymous with encryp-
tion - the conversion of information from a read-
able state to apparent visible nonsense. The
person or originator of an encrypted message
shared the decoding technique needed to re-
cover the original information only with in-
tended recipients, thereby preventing un-
wanted persons to do the same.
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
HOW SPIES
COMMUNICATE
Since World War I and the invention of the com-
puter, methods used to carry out cryptology
have become extremely complex and its appli-
cation more widespread. Cryptography today
uses the disciplines of mathematics, computer
science, and electrical engineering. The applica-
tion of cryptography is now used for ATM cards,
computer passwords, and electronic commerce.
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
HOW SPIES
COMMUNICATE
Cipher Machine
Until modern times cryptography referred
almost exclusively to encryption, which is the
process of converting plain text into cipher text.
Decryption is the reverse, in other words,
moving from the cipher text back to plain text.
Terminology
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
HOW SPIES
COMMUNICATE
Cipher Output
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
HOW SPIES
COMMUNICATE
History of cryptography and cryptanalysis
A cipher (or cypher) is a pair of algorithms that
create the encryption and the reversing decryp-
tion. The operation of a cipher is controlled both
by the algorithm and in each instance by a "key".
The "key" is a secret parameter known only to
the communicants for the specific exchange of
messages.
Cryptanalysis is the study of how to crack en-
cryption algorithms or their implementations.
Before the modern era, cryptology was con-
cerned solely with encryption. Encryption was
used to attempt to ensure secrecy in communi-
cations, such as those of spies, military leaders,
and diplomats.
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
HOW SPIES
COMMUNICATE
Cryptanalysis
In recent times, the field has expanded beyond
confidentiality concerns and now include tech-
niques for message integrity checking,
sender/receiver identity authentication, digital
signatures, interactive proofs and secure com-
putation, among others.
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
HOW SPIES
COMMUNICATE
Cryptography
Classic cryptography
The earliest forms of secret writing required
little more than pen and paper, as most people
could not read. Those who were more literate
and had literate opponents required actualy
cryptography.
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
HOW SPIES
COMMUNICATE
Caesar Cipher
The main classical cipher types are transposition
ciphers, which rearrange the order of letters in a
message (e.g., 'hello dolly' becomes 'ehlol yllod'
in a simple rearrangement scheme, and substi-
tution ciphers, which systematically replace let-
ters or groups of letters with other letters or
groups of letters (e.g., 'fly at once' becomes 'gmz
bu podf') by replacing each letter with the one
following it in the Latin alphabet). These simple
versions however have never offered much con-
fidentiality from enterprising opponents.
A P P L E
D S S O H
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
HOW SPIES
COMMUNICATE
Cipher machine in the shape of a book
An early substitution cipher was the Caesar
cipher, in which each letter in the plaintext was
replaced by a letter some fixed number of posi-
tions further down the alphabet. Suetonius, a
Roman historian reports that Julius Caesar used
it with a shift of three to communicate with his
generals.
Atbash is an example of an early Hebrew cipher.
The earliest known use of cryptography is some
carved ciphertext on stone in Egypt at around
1900 BCE.
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
HOW SPIES
COMMUNICATE
Computer era
Many mechanical encryption/decryption de-
vices were invented early in the 20th century,
and several patented, among them the rotor
machines—famously including the Enigma ma-
chine used by the German government and
military from the late '20s and during World War
II. The ciphers implemented by these machines
brought about a substantial increase in crypta-
nalytic difficulty after WWI.
Cryptanalysis of the new mechanical devices
proved to be both difficult and laborious. In
Great Britain, cryptanalytic efforts during WWII
spurred the development of more efficient
means for carrying out repetitious tasks.
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
HOW SPIES
COMMUNICATE
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
Smart Card
This culminated in the development of the Co-
lossus, the world's first fully electronic, digital,
programmable computer, which assisted in the
decryption of ciphers generated by the German
Army's Lorenz SZ40/42 machine.
Just as the development of digital computers
and electronics helped in cryptanalysis, it made
possible much more complex ciphers.
HOW SPIES
COMMUNICATE
Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
Image references:
Cipher machine/Cipher output/Cryptanalysis/Cryptography/Cipher machine in the shape of a book/Smart
card - source: www.wikipedia.org. This file is licensed under the creative commons attribution Share
Alike.
Magnifying Glass/computer - source: www.openclipart.org. This image is public domain. You may use this
picture for any purpose, including commercial.
Furthermore, computers allowed for the encryp-
tion of any kind of data unlike classical ciphers
which only encrypted written language texts.
Computer use has thus supplanted linguistic
cryptography, both for cipher design and
cryptanalysis.
Decode these substitution ciphers. (J bn dszqu-
bobmztu)
Start communicating with your friends in school
through code. Those chits you pass on hence-
forth will always be safe.
Project
For more such interactive article and video, visit:
mocomi.com/learn/

More Related Content

Viewers also liked

Cypher technique
Cypher techniqueCypher technique
Cypher techniqueZubair CH
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...CODE BLUE
 
GHY101 Unit 3c Russia & the former Soviet Union
GHY101 Unit 3c Russia & the former Soviet UnionGHY101 Unit 3c Russia & the former Soviet Union
GHY101 Unit 3c Russia & the former Soviet UnionMark M. Miller
 
Spies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuelaSpies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuelaJOSE LUIS
 
Lecture - Espionage by the Numbers: Introduction to Number Stations - Delft U...
Lecture - Espionage by the Numbers: Introduction to Number Stations - Delft U...Lecture - Espionage by the Numbers: Introduction to Number Stations - Delft U...
Lecture - Espionage by the Numbers: Introduction to Number Stations - Delft U...Peter Staal
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:Asad Ali
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption TechniqueJohn Adams
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Functional programming with python
Functional programming with pythonFunctional programming with python
Functional programming with pythonMarcelo Cure
 
Android Application: Introduction
Android Application: IntroductionAndroid Application: Introduction
Android Application: IntroductionJollen Chen
 
CITY OF SPIES BY SORAYYA KHAN
CITY OF SPIES BY SORAYYA KHANCITY OF SPIES BY SORAYYA KHAN
CITY OF SPIES BY SORAYYA KHANSheikh Hasnain
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1koolkampus
 
Intelligence, spies & espionage
Intelligence, spies & espionageIntelligence, spies & espionage
Intelligence, spies & espionagedgnadt
 

Viewers also liked (20)

Spies Power Point Mini
Spies Power Point MiniSpies Power Point Mini
Spies Power Point Mini
 
Cypher technique
Cypher techniqueCypher technique
Cypher technique
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
 
One-Time Pad Encryption
One-Time Pad EncryptionOne-Time Pad Encryption
One-Time Pad Encryption
 
GHY101 Unit 3c Russia & the former Soviet Union
GHY101 Unit 3c Russia & the former Soviet UnionGHY101 Unit 3c Russia & the former Soviet Union
GHY101 Unit 3c Russia & the former Soviet Union
 
Spies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuelaSpies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuela
 
Lecture - Espionage by the Numbers: Introduction to Number Stations - Delft U...
Lecture - Espionage by the Numbers: Introduction to Number Stations - Delft U...Lecture - Espionage by the Numbers: Introduction to Number Stations - Delft U...
Lecture - Espionage by the Numbers: Introduction to Number Stations - Delft U...
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption Technique
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
SAN Review
SAN ReviewSAN Review
SAN Review
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
SAN
SANSAN
SAN
 
Functional programming with python
Functional programming with pythonFunctional programming with python
Functional programming with python
 
Android Application: Introduction
Android Application: IntroductionAndroid Application: Introduction
Android Application: Introduction
 
CITY OF SPIES BY SORAYYA KHAN
CITY OF SPIES BY SORAYYA KHANCITY OF SPIES BY SORAYYA KHAN
CITY OF SPIES BY SORAYYA KHAN
 
Trends in spies
Trends in spiesTrends in spies
Trends in spies
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
 
Intelligence, spies & espionage
Intelligence, spies & espionageIntelligence, spies & espionage
Intelligence, spies & espionage
 
Noah Z - Spies
Noah Z - SpiesNoah Z - Spies
Noah Z - Spies
 

Similar to How Spies Communicate – Mocomi.com

cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography worksvimalguptaofficial
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - PaperBernhard Hofer
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report cryptoGaurav Shukla
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYijcisjournal
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYAdityaShukla141
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
Security Systems for Digital Data
Security Systems for Digital DataSecurity Systems for Digital Data
Security Systems for Digital DataBernhard Hofer
 
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionClint Walker
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN
 
Cryptography
CryptographyCryptography
CryptographyEmaSushan
 

Similar to How Spies Communicate – Mocomi.com (20)

cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Cryptography
CryptographyCryptography
Cryptography
 
8-encryption.ppt
8-encryption.ppt8-encryption.ppt
8-encryption.ppt
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report crypto
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 
cryptography
cryptographycryptography
cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Security Systems for Digital Data
Security Systems for Digital DataSecurity Systems for Digital Data
Security Systems for Digital Data
 
Cryp Essay
Cryp EssayCryp Essay
Cryp Essay
 
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
 
cryptography
cryptographycryptography
cryptography
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption Guide
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 

More from Mocomi Kids

Mocomi TimePass The Magazine - Issue 100
Mocomi TimePass The Magazine - Issue 100Mocomi TimePass The Magazine - Issue 100
Mocomi TimePass The Magazine - Issue 100Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 99
Mocomi TimePass The Magazine - Issue 99Mocomi TimePass The Magazine - Issue 99
Mocomi TimePass The Magazine - Issue 99Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 98
Mocomi TimePass The Magazine - Issue 98Mocomi TimePass The Magazine - Issue 98
Mocomi TimePass The Magazine - Issue 98Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 97
Mocomi TimePass The Magazine - Issue 97Mocomi TimePass The Magazine - Issue 97
Mocomi TimePass The Magazine - Issue 97Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 96
Mocomi TimePass The Magazine - Issue 96Mocomi TimePass The Magazine - Issue 96
Mocomi TimePass The Magazine - Issue 96Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 95
Mocomi TimePass The Magazine - Issue 95Mocomi TimePass The Magazine - Issue 95
Mocomi TimePass The Magazine - Issue 95Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 94
Mocomi TimePass The Magazine - Issue 94Mocomi TimePass The Magazine - Issue 94
Mocomi TimePass The Magazine - Issue 94Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 91
Mocomi TimePass The Magazine - Issue 91Mocomi TimePass The Magazine - Issue 91
Mocomi TimePass The Magazine - Issue 91Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 89
Mocomi TimePass The Magazine - Issue 89Mocomi TimePass The Magazine - Issue 89
Mocomi TimePass The Magazine - Issue 89Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 88
Mocomi TimePass The Magazine - Issue 88Mocomi TimePass The Magazine - Issue 88
Mocomi TimePass The Magazine - Issue 88Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 87
Mocomi TimePass The Magazine - Issue 87Mocomi TimePass The Magazine - Issue 87
Mocomi TimePass The Magazine - Issue 87Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 86
Mocomi TimePass The Magazine - Issue 86Mocomi TimePass The Magazine - Issue 86
Mocomi TimePass The Magazine - Issue 86Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 85
Mocomi TimePass The Magazine - Issue 85Mocomi TimePass The Magazine - Issue 85
Mocomi TimePass The Magazine - Issue 85Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 84
Mocomi TimePass The Magazine - Issue 84Mocomi TimePass The Magazine - Issue 84
Mocomi TimePass The Magazine - Issue 84Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 83
Mocomi TimePass The Magazine - Issue 83Mocomi TimePass The Magazine - Issue 83
Mocomi TimePass The Magazine - Issue 83Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 82
Mocomi TimePass The Magazine - Issue 82Mocomi TimePass The Magazine - Issue 82
Mocomi TimePass The Magazine - Issue 82Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 81
Mocomi TimePass The Magazine - Issue 81Mocomi TimePass The Magazine - Issue 81
Mocomi TimePass The Magazine - Issue 81Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 80
Mocomi TimePass The Magazine - Issue 80Mocomi TimePass The Magazine - Issue 80
Mocomi TimePass The Magazine - Issue 80Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 79
Mocomi TimePass The Magazine - Issue 79Mocomi TimePass The Magazine - Issue 79
Mocomi TimePass The Magazine - Issue 79Mocomi Kids
 
Mocomi TimePass The Magazine - Issue 78
Mocomi TimePass The Magazine - Issue 78Mocomi TimePass The Magazine - Issue 78
Mocomi TimePass The Magazine - Issue 78Mocomi Kids
 

More from Mocomi Kids (20)

Mocomi TimePass The Magazine - Issue 100
Mocomi TimePass The Magazine - Issue 100Mocomi TimePass The Magazine - Issue 100
Mocomi TimePass The Magazine - Issue 100
 
Mocomi TimePass The Magazine - Issue 99
Mocomi TimePass The Magazine - Issue 99Mocomi TimePass The Magazine - Issue 99
Mocomi TimePass The Magazine - Issue 99
 
Mocomi TimePass The Magazine - Issue 98
Mocomi TimePass The Magazine - Issue 98Mocomi TimePass The Magazine - Issue 98
Mocomi TimePass The Magazine - Issue 98
 
Mocomi TimePass The Magazine - Issue 97
Mocomi TimePass The Magazine - Issue 97Mocomi TimePass The Magazine - Issue 97
Mocomi TimePass The Magazine - Issue 97
 
Mocomi TimePass The Magazine - Issue 96
Mocomi TimePass The Magazine - Issue 96Mocomi TimePass The Magazine - Issue 96
Mocomi TimePass The Magazine - Issue 96
 
Mocomi TimePass The Magazine - Issue 95
Mocomi TimePass The Magazine - Issue 95Mocomi TimePass The Magazine - Issue 95
Mocomi TimePass The Magazine - Issue 95
 
Mocomi TimePass The Magazine - Issue 94
Mocomi TimePass The Magazine - Issue 94Mocomi TimePass The Magazine - Issue 94
Mocomi TimePass The Magazine - Issue 94
 
Mocomi TimePass The Magazine - Issue 91
Mocomi TimePass The Magazine - Issue 91Mocomi TimePass The Magazine - Issue 91
Mocomi TimePass The Magazine - Issue 91
 
Mocomi TimePass The Magazine - Issue 89
Mocomi TimePass The Magazine - Issue 89Mocomi TimePass The Magazine - Issue 89
Mocomi TimePass The Magazine - Issue 89
 
Mocomi TimePass The Magazine - Issue 88
Mocomi TimePass The Magazine - Issue 88Mocomi TimePass The Magazine - Issue 88
Mocomi TimePass The Magazine - Issue 88
 
Mocomi TimePass The Magazine - Issue 87
Mocomi TimePass The Magazine - Issue 87Mocomi TimePass The Magazine - Issue 87
Mocomi TimePass The Magazine - Issue 87
 
Mocomi TimePass The Magazine - Issue 86
Mocomi TimePass The Magazine - Issue 86Mocomi TimePass The Magazine - Issue 86
Mocomi TimePass The Magazine - Issue 86
 
Mocomi TimePass The Magazine - Issue 85
Mocomi TimePass The Magazine - Issue 85Mocomi TimePass The Magazine - Issue 85
Mocomi TimePass The Magazine - Issue 85
 
Mocomi TimePass The Magazine - Issue 84
Mocomi TimePass The Magazine - Issue 84Mocomi TimePass The Magazine - Issue 84
Mocomi TimePass The Magazine - Issue 84
 
Mocomi TimePass The Magazine - Issue 83
Mocomi TimePass The Magazine - Issue 83Mocomi TimePass The Magazine - Issue 83
Mocomi TimePass The Magazine - Issue 83
 
Mocomi TimePass The Magazine - Issue 82
Mocomi TimePass The Magazine - Issue 82Mocomi TimePass The Magazine - Issue 82
Mocomi TimePass The Magazine - Issue 82
 
Mocomi TimePass The Magazine - Issue 81
Mocomi TimePass The Magazine - Issue 81Mocomi TimePass The Magazine - Issue 81
Mocomi TimePass The Magazine - Issue 81
 
Mocomi TimePass The Magazine - Issue 80
Mocomi TimePass The Magazine - Issue 80Mocomi TimePass The Magazine - Issue 80
Mocomi TimePass The Magazine - Issue 80
 
Mocomi TimePass The Magazine - Issue 79
Mocomi TimePass The Magazine - Issue 79Mocomi TimePass The Magazine - Issue 79
Mocomi TimePass The Magazine - Issue 79
 
Mocomi TimePass The Magazine - Issue 78
Mocomi TimePass The Magazine - Issue 78Mocomi TimePass The Magazine - Issue 78
Mocomi TimePass The Magazine - Issue 78
 

Recently uploaded

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 

Recently uploaded (20)

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 

How Spies Communicate – Mocomi.com

  • 1. HOW SPIES COMMUNICATE Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.© General Knowledge for Kids mocomi.com/learn/general-knowledge/
  • 2. HOW SPIES COMMUNICATE (Encryption) (Decryption) Cryptography also known as cryptology is the practice and study of techniques used for secure communication in the presence of third parties. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 3. HOW SPIES COMMUNICATE Cryptography techniques prior to the modern age was effectively synonymous with encryp- tion - the conversion of information from a read- able state to apparent visible nonsense. The person or originator of an encrypted message shared the decoding technique needed to re- cover the original information only with in- tended recipients, thereby preventing un- wanted persons to do the same. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 4. HOW SPIES COMMUNICATE Since World War I and the invention of the com- puter, methods used to carry out cryptology have become extremely complex and its appli- cation more widespread. Cryptography today uses the disciplines of mathematics, computer science, and electrical engineering. The applica- tion of cryptography is now used for ATM cards, computer passwords, and electronic commerce. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 5. HOW SPIES COMMUNICATE Cipher Machine Until modern times cryptography referred almost exclusively to encryption, which is the process of converting plain text into cipher text. Decryption is the reverse, in other words, moving from the cipher text back to plain text. Terminology Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 6. HOW SPIES COMMUNICATE Cipher Output Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 7. HOW SPIES COMMUNICATE History of cryptography and cryptanalysis A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryp- tion. The operation of a cipher is controlled both by the algorithm and in each instance by a "key". The "key" is a secret parameter known only to the communicants for the specific exchange of messages. Cryptanalysis is the study of how to crack en- cryption algorithms or their implementations. Before the modern era, cryptology was con- cerned solely with encryption. Encryption was used to attempt to ensure secrecy in communi- cations, such as those of spies, military leaders, and diplomats. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 8. HOW SPIES COMMUNICATE Cryptanalysis In recent times, the field has expanded beyond confidentiality concerns and now include tech- niques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure com- putation, among others. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 9. HOW SPIES COMMUNICATE Cryptography Classic cryptography The earliest forms of secret writing required little more than pen and paper, as most people could not read. Those who were more literate and had literate opponents required actualy cryptography. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 10. HOW SPIES COMMUNICATE Caesar Cipher The main classical cipher types are transposition ciphers, which rearrange the order of letters in a message (e.g., 'hello dolly' becomes 'ehlol yllod' in a simple rearrangement scheme, and substi- tution ciphers, which systematically replace let- ters or groups of letters with other letters or groups of letters (e.g., 'fly at once' becomes 'gmz bu podf') by replacing each letter with the one following it in the Latin alphabet). These simple versions however have never offered much con- fidentiality from enterprising opponents. A P P L E D S S O H Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 11. HOW SPIES COMMUNICATE Cipher machine in the shape of a book An early substitution cipher was the Caesar cipher, in which each letter in the plaintext was replaced by a letter some fixed number of posi- tions further down the alphabet. Suetonius, a Roman historian reports that Julius Caesar used it with a shift of three to communicate with his generals. Atbash is an example of an early Hebrew cipher. The earliest known use of cryptography is some carved ciphertext on stone in Egypt at around 1900 BCE. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 12. HOW SPIES COMMUNICATE Computer era Many mechanical encryption/decryption de- vices were invented early in the 20th century, and several patented, among them the rotor machines—famously including the Enigma ma- chine used by the German government and military from the late '20s and during World War II. The ciphers implemented by these machines brought about a substantial increase in crypta- nalytic difficulty after WWI. Cryptanalysis of the new mechanical devices proved to be both difficult and laborious. In Great Britain, cryptanalytic efforts during WWII spurred the development of more efficient means for carrying out repetitious tasks. Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.©
  • 13. HOW SPIES COMMUNICATE Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.© Smart Card This culminated in the development of the Co- lossus, the world's first fully electronic, digital, programmable computer, which assisted in the decryption of ciphers generated by the German Army's Lorenz SZ40/42 machine. Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers.
  • 14. HOW SPIES COMMUNICATE Copyright 2012 Mocomi & Anibrain Digital Technologies Pvt. Ltd. All Rights Reserved.© Image references: Cipher machine/Cipher output/Cryptanalysis/Cryptography/Cipher machine in the shape of a book/Smart card - source: www.wikipedia.org. This file is licensed under the creative commons attribution Share Alike. Magnifying Glass/computer - source: www.openclipart.org. This image is public domain. You may use this picture for any purpose, including commercial. Furthermore, computers allowed for the encryp- tion of any kind of data unlike classical ciphers which only encrypted written language texts. Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis. Decode these substitution ciphers. (J bn dszqu- bobmztu) Start communicating with your friends in school through code. Those chits you pass on hence- forth will always be safe. Project For more such interactive article and video, visit: mocomi.com/learn/