SlideShare a Scribd company logo
1 of 33
Download to read offline
mbizdyqbkzri Ό k
pkcmsxkdsxq rscdybi

   Atul Kahate

   www.atulkahate.com / akahate@gmail.com
Cryptography – A Fascinating
History

    Atul Kahate

    www.atulkahate.com / akahate@gmail.com
Three people can keep a secret if …
                … two of them are dead


         Crypto - A Fascinating History | Atul Kahate   3
Basic Principles

 Substitution




 Transposition



                 Crypto - A Fascinating History | Atul Kahate   4
Persia Versus Greece                        (5th         Century BC)

 Wooden tables – Scratch the lower part, write
 messages, cover with wax




              Crypto - A Fascinating History | Atul Kahate             5
Greeks and Waxing of Secret Messages

 Secret messages would be written as tattoos
 into the shaven heads of messengers




              Crypto - A Fascinating History | Atul Kahate   6
Steganography




 Steganos = Covered, graphein = writing in
 Greek

              Crypto - A Fascinating History | Atul Kahate   7
Julius Caesar (100 BC-44 BC)




            Crypto - A Fascinating History | Atul Kahate   8
Queen Mary of Scotland (1542-1587) and
Queen Elizabeth I of England (1533-1603)




             Crypto - A Fascinating History | Atul Kahate   9
Early Chinese Methods

 Write messages on fine silk and put that in a
 tiny ball covered with wax – messenger
 would swallo it
 Write in invisible ink
 Cryptography
  Kryptos = Hidden in Greek
  Aim is not to hide the fact that there is a message,
  but the contents of a message


                Crypto - A Fascinating History | Atul Kahate   10
Leon Battista Alberti (1404-1472) –
Painter, Composer, Poet, Philosopher, Author




               Crypto - A Fascinating History | Atul Kahate   11
Blaise de Vigenere (1523-1596) – French
diplomat and cryptographer – See next slide




               Crypto - A Fascinating History | Atul Kahate   12
Vigenere Square Example

1.  Draw a Vigenere square (previous slide)
2.  Top row represents the plain text letter and
    columns indicate key – look for the cross-section
3.  Replace it with the cipher text letter from the
    square based on the key
Example: Message is divert troops and key is white
    then encryption would be:
Key         :      w      h      i      t      e    w
Plaintext   :      d      I      v      e      r    t
Ciphertext :       z      p      d      x      v    p


                  Crypto - A Fascinating History | Atul Kahate   13
Charles Babbage (1791-1871) – Broke Vigenere
Cipher … Difference and Analytical Engines




               Crypto - A Fascinating History | Atul Kahate   14
Lovers and Newspapers

 Encrypted messages to each other via
 personal columns in the newspapers – called
 as agony columns
  Babbage along with his friend Charles
  Wheatstone
  Oxford student incident involving Wheatstone in
  The Times
 Newspapers were posted for free in those
 days – people would use pinpricks to secretly
 add messages

               Crypto - A Fascinating History | Atul Kahate   15
USA – Independence Struggle (1770s)

 Benjamin Church                          George Washington




            Crypto - A Fascinating History | Atul Kahate   16
Telegraph – More need for Secrecy! – Morse
(1791-1872) and Wheatstone (1802-1875)




               Crypto - A Fascinating History | Atul Kahate   17
Wireless! – Galvini, Volta, Orsted, Faraday,
Ampere, Henry, Maxwell, Lodge …




               Crypto - A Fascinating History | Atul Kahate   18
Wireless! – Hertz, Marconi




             Crypto - A Fascinating History | Atul Kahate   19
First World War

 1917 – Germany, Planned attack on British
 naval base, Fear of attacking American ships
 by mistake, German Foreign Minister Arthur
 Zimmermann planned to forge an alliance
 with Mexico to help recapture lost territory




              Crypto - A Fascinating History | Atul Kahate   20
The Famous Telegram




          Crypto - A Fascinating History | Atul Kahate   21
Enigma

 1918 – Scherbius & Ritter - Company formed
 by German inventor Arthur Scherbius and his
 friend Richard Ritter




              Crypto - A Fascinating History | Atul Kahate   22
Hans-Thilo Schmidt (1888-1943)

 German soldier in The First World War,
 Rejected in the Second one, disgruntled,
 Soap factory failure, Hyperinflation, Elder
 brother Rudolph in Army authorized Enigma,
 Further anger, Sold Enigma papers for
 10,000 Marks




              Crypto - A Fascinating History | Atul Kahate   23
Breaking Enigma in the Second World
War – Marian Rejewski (1905-1980)
 Polish mathematician – Timid – Fled to
 England after Germany attacked Poland –
 1932 – Started working on breaking Enigma




             Crypto - A Fascinating History | Atul Kahate   24
Bletchley Park – Alan Turing (1912-1954)




             Crypto - A Fascinating History | Atul Kahate   25
Navajo Code Talkers




           Crypto - A Fascinating History | Atul Kahate   26
DES – 1975

 Horst Fiestel (1915-1990) and Lucifer




              Crypto - A Fascinating History | Atul Kahate   27
Public Key Cryptography - Whitfield Diffie
(1944 -) and Martin Hellman (1945 -)




 With Merkel here


                    Crypto - A Fascinating History | Atul Kahate   28
RSA




 Ron Rivest (1947 -), Adi Shamir (1952 -), and Len Adleman
 (1945 -)

                   Crypto - A Fascinating History | Atul Kahate   29
Jim Bidzos




             Crypto - A Fascinating History | Atul Kahate   30
Secure Email – Phil Zimmerman




           Crypto - A Fascinating History | Atul Kahate   31
VGhhbmsgWW91IFZlcnkgT
XVjaCE=

   QW55IFF1ZXN0aW9ucyBvciBDb21tZW
   50cz8=
Thank You Very Much!


   Any Questions or Comments?

   www.atulkahate.com / akahate@gmail.com

More Related Content

Viewers also liked

Cryptography & Network Security
Cryptography & Network SecurityCryptography & Network Security
Cryptography & Network SecurityFahad Shaikh
 
Cryptography network security atulkahate ref.book
Cryptography network security atulkahate ref.bookCryptography network security atulkahate ref.book
Cryptography network security atulkahate ref.bookPradeep Vishwakarma
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityShanthi Mathan
 
online education ppt
online education pptonline education ppt
online education pptSudip Das
 
Online education ppt
Online education pptOnline education ppt
Online education pptkriti013
 

Viewers also liked (8)

Cryptography & Network Security
Cryptography & Network SecurityCryptography & Network Security
Cryptography & Network Security
 
Cryptography network security atulkahate ref.book
Cryptography network security atulkahate ref.bookCryptography network security atulkahate ref.book
Cryptography network security atulkahate ref.book
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
online education ppt
online education pptonline education ppt
online education ppt
 
Online education ppt
Online education pptOnline education ppt
Online education ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Crypto - A Fascinating History by Atul Kahate

House of Windsor Mafia Crime Family - 2020 Demise: Free Book
House of Windsor Mafia Crime Family - 2020 Demise: Free BookHouse of Windsor Mafia Crime Family - 2020 Demise: Free Book
House of Windsor Mafia Crime Family - 2020 Demise: Free BookThe Free School
 
House of Windsor Mafia Mobster Crime Family
House of Windsor Mafia Mobster Crime Family House of Windsor Mafia Mobster Crime Family
House of Windsor Mafia Mobster Crime Family The Free School
 
Opinion Essay Outline Examples
Opinion Essay Outline ExamplesOpinion Essay Outline Examples
Opinion Essay Outline ExamplesJennifer Moore
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptographyFarah Shaikh
 
Who Was Sir Walter Raleigh?
Who Was Sir Walter Raleigh?Who Was Sir Walter Raleigh?
Who Was Sir Walter Raleigh?Bob Mayer
 
Why Europe and the West Why NotChinaDavid S. Landes.docx
Why Europe and the West Why NotChinaDavid S. Landes.docxWhy Europe and the West Why NotChinaDavid S. Landes.docx
Why Europe and the West Why NotChinaDavid S. Landes.docxhelzerpatrina
 
Elit 48 c class 8 post qhq new teams racked vs wracked
Elit 48 c class 8 post qhq new teams racked vs wrackedElit 48 c class 8 post qhq new teams racked vs wracked
Elit 48 c class 8 post qhq new teams racked vs wrackedjordanlachance
 
French revolution 1ppt
French revolution 1pptFrench revolution 1ppt
French revolution 1pptShmiley3000
 
Wk 9 archaeology and nationalism oct 17
Wk 9 archaeology and nationalism oct 17Wk 9 archaeology and nationalism oct 17
Wk 9 archaeology and nationalism oct 17qwertyqws
 
H114 Meeting 17: What Was Different about 19th-century Imperialism?
H114 Meeting 17: What Was Different about 19th-century Imperialism?H114 Meeting 17: What Was Different about 19th-century Imperialism?
H114 Meeting 17: What Was Different about 19th-century Imperialism?6500jmk4
 

Similar to Crypto - A Fascinating History by Atul Kahate (15)

Presentation Amsterdam
Presentation AmsterdamPresentation Amsterdam
Presentation Amsterdam
 
House of Windsor Mafia Crime Family - 2020 Demise: Free Book
House of Windsor Mafia Crime Family - 2020 Demise: Free BookHouse of Windsor Mafia Crime Family - 2020 Demise: Free Book
House of Windsor Mafia Crime Family - 2020 Demise: Free Book
 
House of Windsor Mafia Mobster Crime Family
House of Windsor Mafia Mobster Crime Family House of Windsor Mafia Mobster Crime Family
House of Windsor Mafia Mobster Crime Family
 
Opinion Essay Outline Examples
Opinion Essay Outline ExamplesOpinion Essay Outline Examples
Opinion Essay Outline Examples
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
83010 world pre enlightenment 50m
83010 world pre enlightenment 50m83010 world pre enlightenment 50m
83010 world pre enlightenment 50m
 
Elit 48 c class 6
Elit 48 c class 6Elit 48 c class 6
Elit 48 c class 6
 
Who Was Sir Walter Raleigh?
Who Was Sir Walter Raleigh?Who Was Sir Walter Raleigh?
Who Was Sir Walter Raleigh?
 
102810 wh prussia 2 50m
102810 wh prussia 2 50m102810 wh prussia 2 50m
102810 wh prussia 2 50m
 
Why Europe and the West Why NotChinaDavid S. Landes.docx
Why Europe and the West Why NotChinaDavid S. Landes.docxWhy Europe and the West Why NotChinaDavid S. Landes.docx
Why Europe and the West Why NotChinaDavid S. Landes.docx
 
Elit 48 c class 8 post qhq new teams racked vs wracked
Elit 48 c class 8 post qhq new teams racked vs wrackedElit 48 c class 8 post qhq new teams racked vs wracked
Elit 48 c class 8 post qhq new teams racked vs wracked
 
French revolution 1ppt
French revolution 1pptFrench revolution 1ppt
French revolution 1ppt
 
Wk 9 archaeology and nationalism oct 17
Wk 9 archaeology and nationalism oct 17Wk 9 archaeology and nationalism oct 17
Wk 9 archaeology and nationalism oct 17
 
Week 7 (Imperialism)
Week 7 (Imperialism)Week 7 (Imperialism)
Week 7 (Imperialism)
 
H114 Meeting 17: What Was Different about 19th-century Imperialism?
H114 Meeting 17: What Was Different about 19th-century Imperialism?H114 Meeting 17: What Was Different about 19th-century Imperialism?
H114 Meeting 17: What Was Different about 19th-century Imperialism?
 

More from n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Crypto - A Fascinating History by Atul Kahate

  • 1. mbizdyqbkzri Ό k pkcmsxkdsxq rscdybi Atul Kahate www.atulkahate.com / akahate@gmail.com
  • 2. Cryptography – A Fascinating History Atul Kahate www.atulkahate.com / akahate@gmail.com
  • 3. Three people can keep a secret if … … two of them are dead Crypto - A Fascinating History | Atul Kahate 3
  • 4. Basic Principles Substitution Transposition Crypto - A Fascinating History | Atul Kahate 4
  • 5. Persia Versus Greece (5th Century BC) Wooden tables – Scratch the lower part, write messages, cover with wax Crypto - A Fascinating History | Atul Kahate 5
  • 6. Greeks and Waxing of Secret Messages Secret messages would be written as tattoos into the shaven heads of messengers Crypto - A Fascinating History | Atul Kahate 6
  • 7. Steganography Steganos = Covered, graphein = writing in Greek Crypto - A Fascinating History | Atul Kahate 7
  • 8. Julius Caesar (100 BC-44 BC) Crypto - A Fascinating History | Atul Kahate 8
  • 9. Queen Mary of Scotland (1542-1587) and Queen Elizabeth I of England (1533-1603) Crypto - A Fascinating History | Atul Kahate 9
  • 10. Early Chinese Methods Write messages on fine silk and put that in a tiny ball covered with wax – messenger would swallo it Write in invisible ink Cryptography Kryptos = Hidden in Greek Aim is not to hide the fact that there is a message, but the contents of a message Crypto - A Fascinating History | Atul Kahate 10
  • 11. Leon Battista Alberti (1404-1472) – Painter, Composer, Poet, Philosopher, Author Crypto - A Fascinating History | Atul Kahate 11
  • 12. Blaise de Vigenere (1523-1596) – French diplomat and cryptographer – See next slide Crypto - A Fascinating History | Atul Kahate 12
  • 13. Vigenere Square Example 1. Draw a Vigenere square (previous slide) 2. Top row represents the plain text letter and columns indicate key – look for the cross-section 3. Replace it with the cipher text letter from the square based on the key Example: Message is divert troops and key is white then encryption would be: Key : w h i t e w Plaintext : d I v e r t Ciphertext : z p d x v p Crypto - A Fascinating History | Atul Kahate 13
  • 14. Charles Babbage (1791-1871) – Broke Vigenere Cipher … Difference and Analytical Engines Crypto - A Fascinating History | Atul Kahate 14
  • 15. Lovers and Newspapers Encrypted messages to each other via personal columns in the newspapers – called as agony columns Babbage along with his friend Charles Wheatstone Oxford student incident involving Wheatstone in The Times Newspapers were posted for free in those days – people would use pinpricks to secretly add messages Crypto - A Fascinating History | Atul Kahate 15
  • 16. USA – Independence Struggle (1770s) Benjamin Church George Washington Crypto - A Fascinating History | Atul Kahate 16
  • 17. Telegraph – More need for Secrecy! – Morse (1791-1872) and Wheatstone (1802-1875) Crypto - A Fascinating History | Atul Kahate 17
  • 18. Wireless! – Galvini, Volta, Orsted, Faraday, Ampere, Henry, Maxwell, Lodge … Crypto - A Fascinating History | Atul Kahate 18
  • 19. Wireless! – Hertz, Marconi Crypto - A Fascinating History | Atul Kahate 19
  • 20. First World War 1917 – Germany, Planned attack on British naval base, Fear of attacking American ships by mistake, German Foreign Minister Arthur Zimmermann planned to forge an alliance with Mexico to help recapture lost territory Crypto - A Fascinating History | Atul Kahate 20
  • 21. The Famous Telegram Crypto - A Fascinating History | Atul Kahate 21
  • 22. Enigma 1918 – Scherbius & Ritter - Company formed by German inventor Arthur Scherbius and his friend Richard Ritter Crypto - A Fascinating History | Atul Kahate 22
  • 23. Hans-Thilo Schmidt (1888-1943) German soldier in The First World War, Rejected in the Second one, disgruntled, Soap factory failure, Hyperinflation, Elder brother Rudolph in Army authorized Enigma, Further anger, Sold Enigma papers for 10,000 Marks Crypto - A Fascinating History | Atul Kahate 23
  • 24. Breaking Enigma in the Second World War – Marian Rejewski (1905-1980) Polish mathematician – Timid – Fled to England after Germany attacked Poland – 1932 – Started working on breaking Enigma Crypto - A Fascinating History | Atul Kahate 24
  • 25. Bletchley Park – Alan Turing (1912-1954) Crypto - A Fascinating History | Atul Kahate 25
  • 26. Navajo Code Talkers Crypto - A Fascinating History | Atul Kahate 26
  • 27. DES – 1975 Horst Fiestel (1915-1990) and Lucifer Crypto - A Fascinating History | Atul Kahate 27
  • 28. Public Key Cryptography - Whitfield Diffie (1944 -) and Martin Hellman (1945 -) With Merkel here Crypto - A Fascinating History | Atul Kahate 28
  • 29. RSA Ron Rivest (1947 -), Adi Shamir (1952 -), and Len Adleman (1945 -) Crypto - A Fascinating History | Atul Kahate 29
  • 30. Jim Bidzos Crypto - A Fascinating History | Atul Kahate 30
  • 31. Secure Email – Phil Zimmerman Crypto - A Fascinating History | Atul Kahate 31
  • 32. VGhhbmsgWW91IFZlcnkgT XVjaCE= QW55IFF1ZXN0aW9ucyBvciBDb21tZW 50cz8=
  • 33. Thank You Very Much! Any Questions or Comments? www.atulkahate.com / akahate@gmail.com