SlideShare a Scribd company logo
A BRIEF HISTORY OF
SECRET WRITING
Secret Writing
(hidden writing) (obfuscated writing)
Steganography Cryptography
A Brief History of
EXAMPLES OF HIDDEN WRITING
STEGANOGRAPHY
480 BC - hidden writing in behind wax tables - used to warn Sparta
of an incoming attack from Xerxes of Persia
EXAMPLES OF HIDDEN WRITING
STEGANOGRAPHY
Weird Chinese thing
• Write message on silk
• Ball up silk, and coat in wax
• Eat ball
• ???????????????????
• Profit
EXAMPLES OF HIDDEN WRITING
STEGANOGRAPHY
Invisible ink
• Typically organic, e.g. thithymallus milk
• Dries transparently but chars easily when heated
• Sometimes is wee
https://commons.wikimedia.org/wiki/File:Manneken_Pis_in_judopak_Brussel.jpg
EXAMPLES OF HIDDEN WRITING
STEGANOGRAPHY
Microdots
We need to buy an elephant to keep the
city free from the things
that are scared of elephants
and the future they foresee
LAST YEAR
WE BOUGHT A RHINO
WITH BUT ONE FATAL FLAW
THERE WAS NO
INTIMIDATION IN
THE FUTURE HE FORESAW
END
HIDING THE MEANING OF A MESSAGE
CRYPTOGRAPHY
Teeshirts and Sunglasses
Time slows down
As I'm walking on the sand
Skimming Stones
ENCRYPT
Grrfuvegf naq Fhatynffrf
Gvzr fybjf qbja
Nf V'z jnyxvat ba gur fnaq
Fxvzzvat Fgbarf
DECRYPT
Teeshirts and Sunglasses
Time slows down
As I'm walking on the sand
Skimming Stones
HIDING THE MEANING OF A MESSAGE
CRYPTOGRAPHY
Secret Writing
CryptographySteganography
Transposition Substitution
RAIL FENCE
TRANSPOSITION CIPHERS
THE WAY SHE MOVES IS KIND OF COOL SHES FIXING HER VW
T E A S E O E I K N O C O S E F X N H R W
H W Y H M V S S I D F O L H S I I G E V
TEASEOEIKNOCOSEFXNHRWHWYHMVSSIDFOLHSIIGEV
SCYTALE
TRANSPOSITION CIPHERS
Lysander of Sparta vs Pharnabazus of Persia, 5th century BCE
https://en.wikipedia.org/wiki/File:Skytale.png
SIMPLE SUBSTITUTION CIPHERS
SUBSTITUTION CIPHER
Caesar (shift) Cipher
a b c d e f g h i j k l m n o p q r s t u v w x y z
w x y z a b c d e f g h i j k l m n o p q r s t u v
plaintext
ciphertext
JMVWX MQ SR XLI SYXWMHI EW MQ PSSOMRK EX XLI GIRXVI
ILUVW LP RQ WKH RXWVLGH DV LP ORRNLQJ DW WKH FHQWUHKey -1
HKTUV KO QP VJG QWVUKFG CU KO NQQMKPI CV VJG EGPVTGKey -2
GJSTU JN PO UIF PVUTJEF BT JN MPPLJOH BU UIF DFOUSFKey -3
FIRST IM ON THE OUTSIDE AS IM LOOKING AT THE CENTREKey -4
Caesar cipher is limited to 25 keys
SIMPLE SUBSTITUTION CIPHERS - INCREASE THE KEYS
SUBSTITUTION CIPHER
Generate far more potential keys by pairing letters in random order
plaintext
ciphertext
a b c d e f g h i j k l m n o p q r s t u v w x y z
h
i j
x d k l g n q p o r m t u v w i y z a b c j e f s
• 400000000000000000000000000 (400 septillion) possible keys!
• But all users have to know the custom alphabet
• Use a keyword or phrase to make it easy to remember whilst still
keeping the number of potential keys high
SIMPLE SUBSTITUTION CIPHERS - MEMORABLE KEYS
SUBSTITUTION CIPHER
plaintext
ciphertext
a b c d e f g h i j k l m n o p q r s t u v w x y z
n
i j
o r t h w e s d u p a l g i j k m q v x y z b c f
Northwest Drupal User Group
northwestdrupalusergroup
northwesdupalg
ENTER THE ARABS
V
Frequency Analysis
53‡‡†305))6*;4826)4‡.)4‡);806*;
48†8¶60))85;;]8*;:‡*8†83(88)5*†;46(;88*96*?;8)*‡(;
485)5*†2:*‡(;4956*2(5*—4)8¶8*;4069285);)6†8)4‡‡;
1(‡9;48081;8:8‡1;48†85;4)485†528806*81(‡9;48;(88;4(‡?34;48)4‡;
161;:188;‡?;
https://en.wikipedia.org/wiki/The_Gold-Bug#/media/File:Zlaty_brouk_-
_frekvence_pismen.svg
https://en.wikipedia.org/wiki/The_Gold-Bug#/media/
File:English_letter_frequency_(frequency).svg
ENTER THE ARABS
CRYPTANALYSIS VS CRYPTOGRAPHY
Frequency Analysis
53‡‡†305))6*;4826)4‡.)4‡);806*;
48†8¶60))85;;]8*;:‡*8†83(88)5*†;46(;88*96*?;8)*‡(;
485)5*†2:*‡(;4956*2(5*—4)8¶8*;4069285);)6†8)4‡‡;
1(‡9;48081;8:8‡1;48†85;4)485†528806*81(‡9;48;(88;4(‡?34;48)4‡;
161;:188;‡?;
A good glass in the bishop's hostel in the devil's seat
twenty-one degrees and thirteen minutes northeast and by north
main branch seventh limb east side
shoot from the left eye of the death's-head
a bee line from the tree through the shot fifty feet out
The Gold Bug, Edgar Allen Poe
MARY QUEEN OF SCOTS
THE BABINGTON PLOT
JAMES V
OF
SCOTLAND
MARGERET
TUDOR
QUEEN
ELIZABETH
I
MARY
QUEEN OF
SCOTS
MARY OF
GUISE
ANNE
BOLEYN
HENRY VII
ELIZABETH
OF YORK
JAMES IV
OF
SCOTLAND
HENRY VIII
FIRST COUSINS ONCE
REMOVED
MARY QUEEN OF SCOTS
THE BABINGTON PLOT
MARY
QUEEN OF
SCOTS
ANTHONY
BABINGTON
CONSPIRATOR
CONSPIRATOR
CONSPIRATOR
CONSPIRATOR
CONSPIRATOR
CONSPIRATOR
GILBERT
GIFFORD
SIR FRANCIS
WALSINGHAM
QUEEN
ELIZABETH
I
MARY QUEEN OF SCOTS
THE BABINGTON PLOT
https://en.wikipedia.org/wiki/Babington_Plot#/
media/File:Mary-cipher-code.jpg
TURNING IT UP TO 26
VIGENERE CIPHER
a b c d e f g h i j k l m n o p q r s t u v w x y z
b c d e f g h i j k l m n o p q r s t u v w x y z a
c d e f g h i j k l m n o p q r s t u v w x y z a b
d e f g h i j k l m n o p q r s t u v w x y z a b c
e f g h i j k l m n o p q r s t u v w x y z a b c d
f g h i j k l m n o p q r s t u v w x y z a b c d e
g h i j k l m n o p q r s t u v w x y z a b c d e f
h i j k l m n o p q r s t u v w x y z a b c d e f g
i j k l m n o p q r s t u v w x y z a b c d e f g h
j k l m n o p q r s t u v w x y z a b c d e f g h i
k l m n o p q r s t u v w x y z a b c d e f g h i j
l m n o p q r s t u v w x y z a b c d e f g h i j k
m n o p q r s t u v w x y z a b c d e f g h i j k l
n o p q r s t u v w x y z a b c d e f g h i j k l m
o p q r s t u v w x y z a b c d e f g h i j k l m n
p q r s t u v w x y z a b c d e f g h i j k l m n o
q r s t u v w x y z a b c d e f g h i j k l m n o p
r s t u v w x y z a b c d e f g h i j k l m n o p q
s t u v w x y z a b c d e f g h i j k l m n o p q r
t u v w x y z a b c d e f g h i j k l m n o p q r s
u v w x y z a b c d e f g h i j k l m n o p q r s t
v w x y z a b c d e f g h i j k l m n o p q r s t u
w x y z a b c d e f g h i j k l m n o p q r s t u v
x y z a b c d e f g h i j k l m n o p q r s t u v w
y z a b c d e f g h i j k l m n o p q r s t u v w x
z a b c d e f g h i j k l m n o p q r s t u v w x y
• aka Le Chiffre
Indechriffrable
• Polyalphabetic cipher
• Alternate alphabets by
key - so using a key of
Drupal would mean
alternating between rows
4/18/21/16/1/12 for each
encrypted character
• Removes correlation
between character
frequencies, defeating
frequency analysis attack
CRYPTANALYST AND SHIZZ
ENTER BABBAGE
https://www.flickr.com/photos/stubot/17902445998/in/album-72157650729143213/
https://creativecommons.org/licenses/by-nc-sa/2.0/
CRYPTANALYST AND SHIZZ
ENTER BABBAGE
• Invented method of cracking Vigenere cipher in response
to John Hall Brock Thwaites
• Method involved looking for multiple repeated patterns,
taking common factors and deducing the length of the
key
• Then treat as n separate frequency analyses
• Work not published - due to the Crimean War?
INTO THE 20TH CENTURY
DRIVERS OF CRYPTOGRAPHY
• Technology
• Telegraph
• Wireless
• Literature
• The Gold Bug by Edgar Allen Poe
• The Adventure of the Dancing Men by Arthur Conan Doyle
• Illicit personals in the newspapers
https://en.wikipedia.org/wiki/The_Adventure_of_the_Dancing_Men#/media/File:Dancing_men.svg
CRYPTOGRAPHY AND CRYPTANALYSIS
WAR! WHAT IS IT GOOD FOR?
• World War I
• French pulled up the landlines
• German ADFGVX cipher, broken by Georges Painvin
• More variations on 19th century ciphers
• Germany late to the party
HIDING YOUR HAND
WAR! WHAT IS IT GOOD FOR?
• The Zimmerman Telegram
• Germany proposed military alliance with Mexico
• Encrypted but broken by the British
• Had to also steal the decrypted version
• Hastened America's entry in to the war
MECHANISED ENCRYPTION
ENTER THE ENIGMA MACHINE
https://en.wikipedia.org/wiki/Enigma_machine#/media/File:Enigma_(crittografia)_-
_Museo_scienza_e_tecnologia_Milano.jpg
MECHANISED ENCRYPTION
ENTER THE ENIGMA MACHINE
• Used commercially from about 1925
• More complicated versions for the military
• Plans acquired by the French who ignored them
• Shared by agreement with Poland who were far more nervous and
cracked the initial version
• When the encryption increased, all research handed over to the
British
BLETCHLEY PARK CREW
ENTER THE ENIGMA MACHINE
• Daily code repeated
• Seeding
• Stealing code books from submarines
• Reckoned to have shortened the war by 3 years
• Work not disclosed until 1974
DIFFIE & HELLMAN & MERKLE
SOLVING KEY DISTRIBUTION
• Inspired by the Arpanet
• First proved a synchronous form of key exchange
• Developed asymmetric key concept
• Working algorithm developed by Rivest, Shamir & Adleman in
1977. RSA.
• Independently invented in GCHQ in half an afternoon by Cocks
building on others' work 4 years earlier but not disclosed until
1994
PHIL ZIMMERMAN
PRETTY GOOD PRIVACY
• Built on RSA but brought it to the masses
• Freeware, but not initially
• Released 1991 and immediately used in conflict zones
• Kicked off a debate that's still going today
BUY THIS BOOK
FURTHER READING
BUY ALL HIS BOOKS
THE CODE BOOK
Simon Singh
ISBN: 978-1-85702-879-9

More Related Content

What's hot

Handwriting_analysis.ppt
Handwriting_analysis.pptHandwriting_analysis.ppt
Handwriting_analysis.ppt
PallaviKumari112
 
Forensic Question Document Examination,
Forensic Question Document Examination,Forensic Question Document Examination,
Forensic Question Document Examination,
Ishan Tiwari
 
Age of document ppt mansi
Age of document ppt  mansiAge of document ppt  mansi
Age of document ppt mansi
MansiGupta298
 
Poroscopy and edgeoscopy
Poroscopy and edgeoscopyPoroscopy and edgeoscopy
Poroscopy and edgeoscopy
kiran malik
 
VSC ppt forensic science Shailesh Chaubey .pptx
VSC ppt  forensic science Shailesh Chaubey .pptxVSC ppt  forensic science Shailesh Chaubey .pptx
VSC ppt forensic science Shailesh Chaubey .pptx
SHAILESH CHAUBEY
 
Class Characteristics of Handwriting.pptx
Class Characteristics of Handwriting.pptxClass Characteristics of Handwriting.pptx
Class Characteristics of Handwriting.pptx
Soham Bhattacharya
 
alterations_oblitearations.pptx
alterations_oblitearations.pptxalterations_oblitearations.pptx
alterations_oblitearations.pptx
PallaviKumari112
 
Paints as evidence
Paints as evidencePaints as evidence
Paints as evidence
VaishnaviBorse8
 
Age of documents (Questioned Document)
Age of  documents (Questioned Document)Age of  documents (Questioned Document)
Age of documents (Questioned Document)
Shreyas Patel
 
restoration of toolmarks
restoration of toolmarksrestoration of toolmarks
restoration of toolmarks
Hemant Jain
 
Forensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressionsForensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressions
kiran malik
 
Chemical tests for GSR
Chemical tests for GSRChemical tests for GSR
Chemical tests for GSR
Ketan Patil
 
Portrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatPortrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S Shaktawat
G.S Shaktawat
 
alteration_in_documents.pptx
alteration_in_documents.pptxalteration_in_documents.pptx
alteration_in_documents.pptx
PallaviKumari112
 
Improvised Firearms
Improvised FirearmsImprovised Firearms
Improvised Firearms
Ketan Patil
 
Individual Characteristics.pptx
Individual Characteristics.pptxIndividual Characteristics.pptx
Individual Characteristics.pptx
Soham Bhattacharya
 
History of fingerprinting
History of fingerprintingHistory of fingerprinting
History of fingerprintingDakota Boswell
 
Video Spectral Comparator
Video Spectral ComparatorVideo Spectral Comparator
Video Spectral Comparator
Palash Mehar
 

What's hot (20)

Handwriting_analysis.ppt
Handwriting_analysis.pptHandwriting_analysis.ppt
Handwriting_analysis.ppt
 
Forensic Question Document Examination,
Forensic Question Document Examination,Forensic Question Document Examination,
Forensic Question Document Examination,
 
Age of document ppt mansi
Age of document ppt  mansiAge of document ppt  mansi
Age of document ppt mansi
 
Poroscopy and edgeoscopy
Poroscopy and edgeoscopyPoroscopy and edgeoscopy
Poroscopy and edgeoscopy
 
VSC ppt forensic science Shailesh Chaubey .pptx
VSC ppt  forensic science Shailesh Chaubey .pptxVSC ppt  forensic science Shailesh Chaubey .pptx
VSC ppt forensic science Shailesh Chaubey .pptx
 
Class Characteristics of Handwriting.pptx
Class Characteristics of Handwriting.pptxClass Characteristics of Handwriting.pptx
Class Characteristics of Handwriting.pptx
 
alterations_oblitearations.pptx
alterations_oblitearations.pptxalterations_oblitearations.pptx
alterations_oblitearations.pptx
 
Paints as evidence
Paints as evidencePaints as evidence
Paints as evidence
 
Age of documents (Questioned Document)
Age of  documents (Questioned Document)Age of  documents (Questioned Document)
Age of documents (Questioned Document)
 
restoration of toolmarks
restoration of toolmarksrestoration of toolmarks
restoration of toolmarks
 
Forensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressionsForensic examination of stamp, seal and other mechanical impressions
Forensic examination of stamp, seal and other mechanical impressions
 
Chemical tests for GSR
Chemical tests for GSRChemical tests for GSR
Chemical tests for GSR
 
Portrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S ShaktawatPortrait Parle via Bertillon System By G S Shaktawat
Portrait Parle via Bertillon System By G S Shaktawat
 
alteration_in_documents.pptx
alteration_in_documents.pptxalteration_in_documents.pptx
alteration_in_documents.pptx
 
Improvised Firearms
Improvised FirearmsImprovised Firearms
Improvised Firearms
 
Individual Characteristics.pptx
Individual Characteristics.pptxIndividual Characteristics.pptx
Individual Characteristics.pptx
 
Forensic qd
Forensic qdForensic qd
Forensic qd
 
Gun shot residue
Gun shot residueGun shot residue
Gun shot residue
 
History of fingerprinting
History of fingerprintingHistory of fingerprinting
History of fingerprinting
 
Video Spectral Comparator
Video Spectral ComparatorVideo Spectral Comparator
Video Spectral Comparator
 

Viewers also liked

Mary, Queen of Scots VS. Elizabeth, Queen of England
Mary, Queen of Scots VS. Elizabeth, Queen of EnglandMary, Queen of Scots VS. Elizabeth, Queen of England
Mary, Queen of Scots VS. Elizabeth, Queen of England
Alejandro De Greef
 
Bharat QR code
Bharat QR codeBharat QR code
Bharat QR code
Peahen Sharmi
 
Coding and Decoding
Coding and DecodingCoding and Decoding
Coding and Decoding
Sudiksha Joshi
 
QR code
QR codeQR code
QR code
Noah Kim
 
Qr code ppt
Qr code pptQr code ppt
Qr code ppt
mrudula14
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 

Viewers also liked (7)

Mary, Queen of Scots VS. Elizabeth, Queen of England
Mary, Queen of Scots VS. Elizabeth, Queen of EnglandMary, Queen of Scots VS. Elizabeth, Queen of England
Mary, Queen of Scots VS. Elizabeth, Queen of England
 
Bharat QR code
Bharat QR codeBharat QR code
Bharat QR code
 
Coding and Decoding
Coding and DecodingCoding and Decoding
Coding and Decoding
 
QR code
QR codeQR code
QR code
 
Qr code ppt
Qr code pptQr code ppt
Qr code ppt
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to A Brief History of Secret Writing

Cryptanalysis - basic ciphers and a bit more
Cryptanalysis - basic ciphers and a bit moreCryptanalysis - basic ciphers and a bit more
Cryptanalysis - basic ciphers and a bit more
Things Lab
 
Why can't we all just get along? [Bettakultcha]
Why can't we all just get along? [Bettakultcha]Why can't we all just get along? [Bettakultcha]
Why can't we all just get along? [Bettakultcha]
Cormac Lawler
 
Copywriting Social Media
Copywriting Social MediaCopywriting Social Media
Copywriting Social Media
Okina Fitto
 
Connecting The Digital To Analog - Brian Suda
Connecting The Digital To Analog - Brian SudaConnecting The Digital To Analog - Brian Suda
Connecting The Digital To Analog - Brian Suda
beyond tellerrand
 
2012 Jaguar XF For Sale NY | Jaguar Dealer Near Buffalo
2012 Jaguar XF For Sale NY | Jaguar Dealer Near Buffalo2012 Jaguar XF For Sale NY | Jaguar Dealer Near Buffalo
2012 Jaguar XF For Sale NY | Jaguar Dealer Near Buffalo
West-Herr Jaguar
 
family-cocabulary-fun-activities-games_3102.doc
family-cocabulary-fun-activities-games_3102.docfamily-cocabulary-fun-activities-games_3102.doc
family-cocabulary-fun-activities-games_3102.doc
Ana Costa
 
Prithvii - Rohan Lifescapes
Prithvii - Rohan Lifescapes Prithvii - Rohan Lifescapes
Prithvii - Rohan Lifescapes
Rohan Lifescapes
 
Kirstie Minifie Portfolio Final 2
Kirstie Minifie Portfolio Final 2Kirstie Minifie Portfolio Final 2
Kirstie Minifie Portfolio Final 2Kirstie Minifie
 
Lastra - EP Henry
Lastra - EP HenryLastra - EP Henry
Lastra - EP Henry
Tri County Exteriors LLC
 
Presentación de prueba
Presentación de pruebaPresentación de prueba
Presentación de pruebajesusrra
 
Actividad de mecanografia
Actividad de mecanografiaActividad de mecanografia
Actividad de mecanografia
Docentic Inecicu
 
Interior Design Portfolio
Interior Design PortfolioInterior Design Portfolio
Interior Design Portfolio
Cassandra Ryan
 
Passivhaus on a shoestring
Passivhaus on a shoestringPassivhaus on a shoestring
Passivhaus on a shoestring
Paul Testa
 
War robot.pptx
War robot.pptxWar robot.pptx
War robot.pptx
Tejas561833
 
Cryptography (Distributed computing)
Cryptography (Distributed computing)Cryptography (Distributed computing)
Cryptography (Distributed computing)Sri Prasanna
 
Cloud-Star.pdf
Cloud-Star.pdfCloud-Star.pdf
Cloud-Star.pdf
Brij Consulting, LLC
 

Similar to A Brief History of Secret Writing (20)

Cryptanalysis - basic ciphers and a bit more
Cryptanalysis - basic ciphers and a bit moreCryptanalysis - basic ciphers and a bit more
Cryptanalysis - basic ciphers and a bit more
 
Why can't we all just get along? [Bettakultcha]
Why can't we all just get along? [Bettakultcha]Why can't we all just get along? [Bettakultcha]
Why can't we all just get along? [Bettakultcha]
 
Copywriting Social Media
Copywriting Social MediaCopywriting Social Media
Copywriting Social Media
 
Connecting The Digital To Analog - Brian Suda
Connecting The Digital To Analog - Brian SudaConnecting The Digital To Analog - Brian Suda
Connecting The Digital To Analog - Brian Suda
 
2012 Jaguar XF For Sale NY | Jaguar Dealer Near Buffalo
2012 Jaguar XF For Sale NY | Jaguar Dealer Near Buffalo2012 Jaguar XF For Sale NY | Jaguar Dealer Near Buffalo
2012 Jaguar XF For Sale NY | Jaguar Dealer Near Buffalo
 
Tecno
TecnoTecno
Tecno
 
family-cocabulary-fun-activities-games_3102.doc
family-cocabulary-fun-activities-games_3102.docfamily-cocabulary-fun-activities-games_3102.doc
family-cocabulary-fun-activities-games_3102.doc
 
Prithvii - Rohan Lifescapes
Prithvii - Rohan Lifescapes Prithvii - Rohan Lifescapes
Prithvii - Rohan Lifescapes
 
Kirstie Minifie Portfolio Final 2
Kirstie Minifie Portfolio Final 2Kirstie Minifie Portfolio Final 2
Kirstie Minifie Portfolio Final 2
 
Lastra - EP Henry
Lastra - EP HenryLastra - EP Henry
Lastra - EP Henry
 
AOP via PIAB and Unity
AOP via PIAB and UnityAOP via PIAB and Unity
AOP via PIAB and Unity
 
Presentación de prueba
Presentación de pruebaPresentación de prueba
Presentación de prueba
 
Actividad de mecanografia
Actividad de mecanografiaActividad de mecanografia
Actividad de mecanografia
 
New pp
New ppNew pp
New pp
 
45_FR_Diary
45_FR_Diary45_FR_Diary
45_FR_Diary
 
Interior Design Portfolio
Interior Design PortfolioInterior Design Portfolio
Interior Design Portfolio
 
Passivhaus on a shoestring
Passivhaus on a shoestringPassivhaus on a shoestring
Passivhaus on a shoestring
 
War robot.pptx
War robot.pptxWar robot.pptx
War robot.pptx
 
Cryptography (Distributed computing)
Cryptography (Distributed computing)Cryptography (Distributed computing)
Cryptography (Distributed computing)
 
Cloud-Star.pdf
Cloud-Star.pdfCloud-Star.pdf
Cloud-Star.pdf
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

A Brief History of Secret Writing

  • 1. A BRIEF HISTORY OF SECRET WRITING
  • 2. Secret Writing (hidden writing) (obfuscated writing) Steganography Cryptography A Brief History of
  • 3. EXAMPLES OF HIDDEN WRITING STEGANOGRAPHY 480 BC - hidden writing in behind wax tables - used to warn Sparta of an incoming attack from Xerxes of Persia
  • 4. EXAMPLES OF HIDDEN WRITING STEGANOGRAPHY Weird Chinese thing • Write message on silk • Ball up silk, and coat in wax • Eat ball • ??????????????????? • Profit
  • 5. EXAMPLES OF HIDDEN WRITING STEGANOGRAPHY Invisible ink • Typically organic, e.g. thithymallus milk • Dries transparently but chars easily when heated • Sometimes is wee https://commons.wikimedia.org/wiki/File:Manneken_Pis_in_judopak_Brussel.jpg
  • 6. EXAMPLES OF HIDDEN WRITING STEGANOGRAPHY Microdots We need to buy an elephant to keep the city free from the things that are scared of elephants and the future they foresee LAST YEAR WE BOUGHT A RHINO WITH BUT ONE FATAL FLAW THERE WAS NO INTIMIDATION IN THE FUTURE HE FORESAW END
  • 7. HIDING THE MEANING OF A MESSAGE CRYPTOGRAPHY Teeshirts and Sunglasses Time slows down As I'm walking on the sand Skimming Stones ENCRYPT Grrfuvegf naq Fhatynffrf Gvzr fybjf qbja Nf V'z jnyxvat ba gur fnaq Fxvzzvat Fgbarf DECRYPT Teeshirts and Sunglasses Time slows down As I'm walking on the sand Skimming Stones
  • 8. HIDING THE MEANING OF A MESSAGE CRYPTOGRAPHY Secret Writing CryptographySteganography Transposition Substitution
  • 9. RAIL FENCE TRANSPOSITION CIPHERS THE WAY SHE MOVES IS KIND OF COOL SHES FIXING HER VW T E A S E O E I K N O C O S E F X N H R W H W Y H M V S S I D F O L H S I I G E V TEASEOEIKNOCOSEFXNHRWHWYHMVSSIDFOLHSIIGEV
  • 10. SCYTALE TRANSPOSITION CIPHERS Lysander of Sparta vs Pharnabazus of Persia, 5th century BCE https://en.wikipedia.org/wiki/File:Skytale.png
  • 11. SIMPLE SUBSTITUTION CIPHERS SUBSTITUTION CIPHER Caesar (shift) Cipher a b c d e f g h i j k l m n o p q r s t u v w x y z w x y z a b c d e f g h i j k l m n o p q r s t u v plaintext ciphertext JMVWX MQ SR XLI SYXWMHI EW MQ PSSOMRK EX XLI GIRXVI ILUVW LP RQ WKH RXWVLGH DV LP ORRNLQJ DW WKH FHQWUHKey -1 HKTUV KO QP VJG QWVUKFG CU KO NQQMKPI CV VJG EGPVTGKey -2 GJSTU JN PO UIF PVUTJEF BT JN MPPLJOH BU UIF DFOUSFKey -3 FIRST IM ON THE OUTSIDE AS IM LOOKING AT THE CENTREKey -4 Caesar cipher is limited to 25 keys
  • 12. SIMPLE SUBSTITUTION CIPHERS - INCREASE THE KEYS SUBSTITUTION CIPHER Generate far more potential keys by pairing letters in random order plaintext ciphertext a b c d e f g h i j k l m n o p q r s t u v w x y z h i j x d k l g n q p o r m t u v w i y z a b c j e f s • 400000000000000000000000000 (400 septillion) possible keys! • But all users have to know the custom alphabet • Use a keyword or phrase to make it easy to remember whilst still keeping the number of potential keys high
  • 13. SIMPLE SUBSTITUTION CIPHERS - MEMORABLE KEYS SUBSTITUTION CIPHER plaintext ciphertext a b c d e f g h i j k l m n o p q r s t u v w x y z n i j o r t h w e s d u p a l g i j k m q v x y z b c f Northwest Drupal User Group northwestdrupalusergroup northwesdupalg
  • 14. ENTER THE ARABS V Frequency Analysis 53‡‡†305))6*;4826)4‡.)4‡);806*; 48†8¶60))85;;]8*;:‡*8†83(88)5*†;46(;88*96*?;8)*‡(; 485)5*†2:*‡(;4956*2(5*—4)8¶8*;4069285);)6†8)4‡‡; 1(‡9;48081;8:8‡1;48†85;4)485†528806*81(‡9;48;(88;4(‡?34;48)4‡; 161;:188;‡?; https://en.wikipedia.org/wiki/The_Gold-Bug#/media/File:Zlaty_brouk_- _frekvence_pismen.svg https://en.wikipedia.org/wiki/The_Gold-Bug#/media/ File:English_letter_frequency_(frequency).svg
  • 15. ENTER THE ARABS CRYPTANALYSIS VS CRYPTOGRAPHY Frequency Analysis 53‡‡†305))6*;4826)4‡.)4‡);806*; 48†8¶60))85;;]8*;:‡*8†83(88)5*†;46(;88*96*?;8)*‡(; 485)5*†2:*‡(;4956*2(5*—4)8¶8*;4069285);)6†8)4‡‡; 1(‡9;48081;8:8‡1;48†85;4)485†528806*81(‡9;48;(88;4(‡?34;48)4‡; 161;:188;‡?; A good glass in the bishop's hostel in the devil's seat twenty-one degrees and thirteen minutes northeast and by north main branch seventh limb east side shoot from the left eye of the death's-head a bee line from the tree through the shot fifty feet out The Gold Bug, Edgar Allen Poe
  • 16. MARY QUEEN OF SCOTS THE BABINGTON PLOT JAMES V OF SCOTLAND MARGERET TUDOR QUEEN ELIZABETH I MARY QUEEN OF SCOTS MARY OF GUISE ANNE BOLEYN HENRY VII ELIZABETH OF YORK JAMES IV OF SCOTLAND HENRY VIII FIRST COUSINS ONCE REMOVED
  • 17. MARY QUEEN OF SCOTS THE BABINGTON PLOT MARY QUEEN OF SCOTS ANTHONY BABINGTON CONSPIRATOR CONSPIRATOR CONSPIRATOR CONSPIRATOR CONSPIRATOR CONSPIRATOR GILBERT GIFFORD SIR FRANCIS WALSINGHAM QUEEN ELIZABETH I
  • 18. MARY QUEEN OF SCOTS THE BABINGTON PLOT https://en.wikipedia.org/wiki/Babington_Plot#/ media/File:Mary-cipher-code.jpg
  • 19. TURNING IT UP TO 26 VIGENERE CIPHER a b c d e f g h i j k l m n o p q r s t u v w x y z b c d e f g h i j k l m n o p q r s t u v w x y z a c d e f g h i j k l m n o p q r s t u v w x y z a b d e f g h i j k l m n o p q r s t u v w x y z a b c e f g h i j k l m n o p q r s t u v w x y z a b c d f g h i j k l m n o p q r s t u v w x y z a b c d e g h i j k l m n o p q r s t u v w x y z a b c d e f h i j k l m n o p q r s t u v w x y z a b c d e f g i j k l m n o p q r s t u v w x y z a b c d e f g h j k l m n o p q r s t u v w x y z a b c d e f g h i k l m n o p q r s t u v w x y z a b c d e f g h i j l m n o p q r s t u v w x y z a b c d e f g h i j k m n o p q r s t u v w x y z a b c d e f g h i j k l n o p q r s t u v w x y z a b c d e f g h i j k l m o p q r s t u v w x y z a b c d e f g h i j k l m n p q r s t u v w x y z a b c d e f g h i j k l m n o q r s t u v w x y z a b c d e f g h i j k l m n o p r s t u v w x y z a b c d e f g h i j k l m n o p q s t u v w x y z a b c d e f g h i j k l m n o p q r t u v w x y z a b c d e f g h i j k l m n o p q r s u v w x y z a b c d e f g h i j k l m n o p q r s t v w x y z a b c d e f g h i j k l m n o p q r s t u w x y z a b c d e f g h i j k l m n o p q r s t u v x y z a b c d e f g h i j k l m n o p q r s t u v w y z a b c d e f g h i j k l m n o p q r s t u v w x z a b c d e f g h i j k l m n o p q r s t u v w x y • aka Le Chiffre Indechriffrable • Polyalphabetic cipher • Alternate alphabets by key - so using a key of Drupal would mean alternating between rows 4/18/21/16/1/12 for each encrypted character • Removes correlation between character frequencies, defeating frequency analysis attack
  • 20. CRYPTANALYST AND SHIZZ ENTER BABBAGE https://www.flickr.com/photos/stubot/17902445998/in/album-72157650729143213/ https://creativecommons.org/licenses/by-nc-sa/2.0/
  • 21. CRYPTANALYST AND SHIZZ ENTER BABBAGE • Invented method of cracking Vigenere cipher in response to John Hall Brock Thwaites • Method involved looking for multiple repeated patterns, taking common factors and deducing the length of the key • Then treat as n separate frequency analyses • Work not published - due to the Crimean War?
  • 22. INTO THE 20TH CENTURY DRIVERS OF CRYPTOGRAPHY • Technology • Telegraph • Wireless • Literature • The Gold Bug by Edgar Allen Poe • The Adventure of the Dancing Men by Arthur Conan Doyle • Illicit personals in the newspapers https://en.wikipedia.org/wiki/The_Adventure_of_the_Dancing_Men#/media/File:Dancing_men.svg
  • 23. CRYPTOGRAPHY AND CRYPTANALYSIS WAR! WHAT IS IT GOOD FOR? • World War I • French pulled up the landlines • German ADFGVX cipher, broken by Georges Painvin • More variations on 19th century ciphers • Germany late to the party
  • 24. HIDING YOUR HAND WAR! WHAT IS IT GOOD FOR? • The Zimmerman Telegram • Germany proposed military alliance with Mexico • Encrypted but broken by the British • Had to also steal the decrypted version • Hastened America's entry in to the war
  • 25. MECHANISED ENCRYPTION ENTER THE ENIGMA MACHINE https://en.wikipedia.org/wiki/Enigma_machine#/media/File:Enigma_(crittografia)_- _Museo_scienza_e_tecnologia_Milano.jpg
  • 26. MECHANISED ENCRYPTION ENTER THE ENIGMA MACHINE • Used commercially from about 1925 • More complicated versions for the military • Plans acquired by the French who ignored them • Shared by agreement with Poland who were far more nervous and cracked the initial version • When the encryption increased, all research handed over to the British
  • 27. BLETCHLEY PARK CREW ENTER THE ENIGMA MACHINE • Daily code repeated • Seeding • Stealing code books from submarines • Reckoned to have shortened the war by 3 years • Work not disclosed until 1974
  • 28. DIFFIE & HELLMAN & MERKLE SOLVING KEY DISTRIBUTION • Inspired by the Arpanet • First proved a synchronous form of key exchange • Developed asymmetric key concept • Working algorithm developed by Rivest, Shamir & Adleman in 1977. RSA. • Independently invented in GCHQ in half an afternoon by Cocks building on others' work 4 years earlier but not disclosed until 1994
  • 29. PHIL ZIMMERMAN PRETTY GOOD PRIVACY • Built on RSA but brought it to the masses • Freeware, but not initially • Released 1991 and immediately used in conflict zones • Kicked off a debate that's still going today
  • 30. BUY THIS BOOK FURTHER READING BUY ALL HIS BOOKS THE CODE BOOK Simon Singh ISBN: 978-1-85702-879-9