SlideShare a Scribd company logo
Cryptography
An Introduction
"The art of writing and solving codes"
Internet provides essential communication between tens of millions of
people and is being increasingly used as a tool for commerce, security
becomes a tremendously important issue to deal with.
There are many aspects to security and many applications, ranging from
secure commerce and payments to private communications and protecting
passwords. One essential aspect for secure communications is that of
cryptography. But it is important to note that while cryptography is
necessary for secure communications, it is not by itself sufficient.
Antiquity
 The first documented use of cryptography in writing dates back to
Circa 1900 BC when an Egyptian scribe used non standard hieroglyphs
in an inscription. Some experts argue that cryptography appear
spontaneously sometimes after writing was invented with applications
ranging from diplomatic missives to war-time battle plans.
 Its real era started from World War II when Germany was about to
take over Great Britain, Germany used a device named "Enigma" to
send their messages secretly to their war zones. In reply GBR created
a device named "Turing Machine" by Alan Turing to decrypt or break
Enigma which resulted in saving GBR.
Greek Etymology
 Cryptography
- Crypto -----> "Kryptos" --------> Hidden
- Graphy -----> "Graphein" -------> To Write
Encryption: The translation of data into secret
code.
Decryption: The translation of secret code into
original data.
The Caesar Cipher!
Plaintext: THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG
Ciphertext: WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ
 Encryption:
E(x) = (x + n) mod 26
 Decryption:
D(x) = (x - n) mod 26
Hiding Password
Password
Encryption
Key: Shift 1
Key to right
,U[SDDEPTF
Decryption
Key: Read 1
Key to left
Splinter Cipher!
Exxegoexsrgi
Decryption Key:
Shift Gear 4
AttackAtOnce
Encryption Key:
Shift Gear 4
Splinter Vegenere Cipher!
B
• 1
Q
• 16
R
• 17
ATTACKATONCE OATMEALOATME OTMMGKLHDTIR
What in the world is OTP?
Prime Numbers!
How to find a Prime Number?
Immortal are Prime Numbers.
Prime Numbers and Cryptography.
New Prime Number??
Methods to find
Prime Numbers
A Multiplicative
Sieve
The Prime
Number Machine
The Sieve of
Erastothenes
The Sieve of Erastothenes
Let's consider a table of sequential numbers
start
2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21
,22,23,24,25,26,27,28,29,30,31,32....
The Sieve of Erastothenes
Cross out multiple of 2
2, 3, X, 5, X, 7, X, 9, X, 11, X, 13....
The Sieve of Erastothenes
The next non-overlined and non crossed out
number is three. Identify it as prime with an
overline, then cross out every third number
(every multiple of three).
2, 3, X, 5, XX, 7, X, X, X, 11, XX, 13 ...
The Sieve of Erastothenes
Continuing the process. Five is the next non-
overlined and non crossed out number. Overline
five and cross out every fifth number.
2, 3, X, 5, XX, 7, X, X, X, 11, XX, 13 ...
The Sieve of Erastothenes
The next prime number is then seven. Since
twice seven is greater than the largest visible
number in our list, all the remaining visible
numbers are prime.
2, 3, X, 5, XX, 7, X, XX, X, 11, XX, 13 ...
The Sieve of Erastothenes
Drawbacks
 The process is too slow
 Not efficient for finding huge primes.
Euclid’S Element
 The statement says that
“There are more than any finite number n of prime
numbers. Suppose that a1, a2, ..., an are prime numbers. Let
m be the product of all considered prime numbers. Consider
the number m + 1. If it's prime, then there are at least n + 1
primes.”
 So suppose m + 1 is not prime. Then, some prime g divides it.
But g cannot be any of the primes a1, a2, ..., an , since they
all divide m and do not divide m + 1. Therefore, there are at
least n + 1 primes.
 Thus, there are not a finite number of primes.
Euclid's Element
RSA
How to make sure that my data is save on the internet?
How to make sure that only an authorized person gets
my secret message?
The RSA model is the correct choice!
RSA Stands for Ron Rivest, Adi Shamir , Leonard
Adleman.
RSA
RSA is a consequence of Fermat's little theorem:
"If 'a' is not divisible by 'p' , where p is prime,
then a^(p-1) -1 is divisible by 'p'.
The Work Flow
 Generate two large random prime numbers p and q
 Find n = p*q
 Find phi = (p-1)*(q-1)
 Choose an integer e, 1 < e < phi such that GCD (e, phi) = 1
 Compute the secret exponent d, 1 < d < phi, such that e.d = 1
(mod phi)
 The public key is (n, e) and the private key is (d, p, q)
 All the values d, p, q and phi are kept secret.
The Work Flow
Select p
and q
n= p*q
phi= (p-1) *
(q-1)
e*d= 1
(mod phi)
C =
(msg)^e
mod n
Message =
(C)^d mod
n
Example
 P = 3 and Q = 11
 n = p*q = 33
 Phi = (p-1) * (q-1) = (3-1) * (11-1) = 20
 e = 7 and d =3 -------------> (3*7) mod 20 = 1
 Public Key (7, 33) and Private Key (3, 33)
 m = 13
 Encrypt: c = m^e mod n -------> c = 13^7 mod 33 = 7
 Decrypt: m = c^d mod n ---------> 7^8 mod 33 = 13
• How to break RSA?
• First we have to find p and q
• Solve the equation to find 'd'
Why is it difficult to get the decryption key?
Factoring the huge number to prime
number takes a lot of computation
Then there can be number of multiples of
N, so might be guessing on wrong number.
Presented By
Talha Saleem
Mohammad Owais

More Related Content

What's hot

Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
Mohamed Loey
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography
CryptographyCryptography
Cryptography
prasham95
 
Graphs - Discrete Math
Graphs - Discrete MathGraphs - Discrete Math
Graphs - Discrete Math
Sikder Tahsin Al-Amin
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
Abhishek Gautam
 
Matrices in computer applications
Matrices in computer applicationsMatrices in computer applications
Matrices in computer applications
Rayyan777
 
RC 4
RC 4 RC 4
RC 4
Sovan Paul
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
Twinkal Harsora
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
Dr Naim R Kidwai
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
 
Cryptography
CryptographyCryptography
Cryptography
KARNAN L S
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Application of Matrices on Cryptography
Application of Matrices on CryptographyApplication of Matrices on Cryptography
Application of Matrices on Cryptography
Ram Gupta
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
Srilal Buddika
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Cryptography
CryptographyCryptography
Cryptography
Tushar Swami
 

What's hot (20)

Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Graphs - Discrete Math
Graphs - Discrete MathGraphs - Discrete Math
Graphs - Discrete Math
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Matrices in computer applications
Matrices in computer applicationsMatrices in computer applications
Matrices in computer applications
 
RC 4
RC 4 RC 4
RC 4
 
Classical cryptography
Classical cryptographyClassical cryptography
Classical cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Application of Matrices on Cryptography
Application of Matrices on CryptographyApplication of Matrices on Cryptography
Application of Matrices on Cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Cryptography - Discrete Mathematics

11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf
VipinNegi38
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In CryptographyAadya Vatsa
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3Coleman Gorham
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In CryptographyAbhishek Nand
 
Cryptography
CryptographyCryptography
Cryptography
David Evans
 
Number theory
Number theoryNumber theory
Number theory
Samsil Arefin
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.SrinivasanMathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasanmunicsaa
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
Göktuğ Serez
 
Primes: a quick tour to spplications and challenges!
Primes: a quick tour to spplications and challenges!Primes: a quick tour to spplications and challenges!
Primes: a quick tour to spplications and challenges!Ashutosh Tripathi
 
Cryptography
CryptographyCryptography
Cryptography
Fraboni Ec
 
Cryptography
CryptographyCryptography
Cryptography
James Wong
 
Cryptography
CryptographyCryptography
Cryptography
Tony Nguyen
 
Cryptography
CryptographyCryptography
Cryptography
Harry Potter
 
Cryptography
CryptographyCryptography
Cryptography
David Hoen
 
crypto1.ppt
crypto1.pptcrypto1.ppt
crypto1.ppt
tommychauhan
 
needed.ppt
needed.pptneeded.ppt
needed.ppt
faizalkhan673954
 

Similar to Cryptography - Discrete Mathematics (20)

11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
Rsa
RsaRsa
Rsa
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Number theory
Number theoryNumber theory
Number theory
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.SrinivasanMathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Primes: a quick tour to spplications and challenges!
Primes: a quick tour to spplications and challenges!Primes: a quick tour to spplications and challenges!
Primes: a quick tour to spplications and challenges!
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
crypto1.ppt
crypto1.pptcrypto1.ppt
crypto1.ppt
 
needed.ppt
needed.pptneeded.ppt
needed.ppt
 

Recently uploaded

in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
yusufzako14
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
sonaliswain16
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
Scintica Instrumentation
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
AlaminAfendy1
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
muralinath2
 
Multi-source connectivity as the driver of solar wind variability in the heli...
Multi-source connectivity as the driver of solar wind variability in the heli...Multi-source connectivity as the driver of solar wind variability in the heli...
Multi-source connectivity as the driver of solar wind variability in the heli...
Sérgio Sacani
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
Sérgio Sacani
 
insect taxonomy importance systematics and classification
insect taxonomy importance systematics and classificationinsect taxonomy importance systematics and classification
insect taxonomy importance systematics and classification
anitaento25
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
University of Maribor
 
Structural Classification Of Protein (SCOP)
Structural Classification Of Protein  (SCOP)Structural Classification Of Protein  (SCOP)
Structural Classification Of Protein (SCOP)
aishnasrivastava
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Erdal Coalmaker
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Sérgio Sacani
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
muralinath2
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
Areesha Ahmad
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
AlguinaldoKong
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
pablovgd
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
Health Advances
 
Lab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerinLab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerin
ossaicprecious19
 

Recently uploaded (20)

in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
 
Multi-source connectivity as the driver of solar wind variability in the heli...
Multi-source connectivity as the driver of solar wind variability in the heli...Multi-source connectivity as the driver of solar wind variability in the heli...
Multi-source connectivity as the driver of solar wind variability in the heli...
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
 
insect taxonomy importance systematics and classification
insect taxonomy importance systematics and classificationinsect taxonomy importance systematics and classification
insect taxonomy importance systematics and classification
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
 
Structural Classification Of Protein (SCOP)
Structural Classification Of Protein  (SCOP)Structural Classification Of Protein  (SCOP)
Structural Classification Of Protein (SCOP)
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
 
Lab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerinLab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerin
 

Cryptography - Discrete Mathematics

  • 2. An Introduction "The art of writing and solving codes" Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient.
  • 3. Antiquity  The first documented use of cryptography in writing dates back to Circa 1900 BC when an Egyptian scribe used non standard hieroglyphs in an inscription. Some experts argue that cryptography appear spontaneously sometimes after writing was invented with applications ranging from diplomatic missives to war-time battle plans.  Its real era started from World War II when Germany was about to take over Great Britain, Germany used a device named "Enigma" to send their messages secretly to their war zones. In reply GBR created a device named "Turing Machine" by Alan Turing to decrypt or break Enigma which resulted in saving GBR.
  • 4. Greek Etymology  Cryptography - Crypto -----> "Kryptos" --------> Hidden - Graphy -----> "Graphein" -------> To Write Encryption: The translation of data into secret code. Decryption: The translation of secret code into original data.
  • 5. The Caesar Cipher! Plaintext: THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG Ciphertext: WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ  Encryption: E(x) = (x + n) mod 26  Decryption: D(x) = (x - n) mod 26
  • 6. Hiding Password Password Encryption Key: Shift 1 Key to right ,U[SDDEPTF Decryption Key: Read 1 Key to left
  • 7. Splinter Cipher! Exxegoexsrgi Decryption Key: Shift Gear 4 AttackAtOnce Encryption Key: Shift Gear 4
  • 8. Splinter Vegenere Cipher! B • 1 Q • 16 R • 17 ATTACKATONCE OATMEALOATME OTMMGKLHDTIR
  • 9. What in the world is OTP?
  • 10. Prime Numbers! How to find a Prime Number? Immortal are Prime Numbers. Prime Numbers and Cryptography. New Prime Number??
  • 11. Methods to find Prime Numbers A Multiplicative Sieve The Prime Number Machine The Sieve of Erastothenes
  • 12. The Sieve of Erastothenes Let's consider a table of sequential numbers start 2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21 ,22,23,24,25,26,27,28,29,30,31,32....
  • 13. The Sieve of Erastothenes Cross out multiple of 2 2, 3, X, 5, X, 7, X, 9, X, 11, X, 13....
  • 14. The Sieve of Erastothenes The next non-overlined and non crossed out number is three. Identify it as prime with an overline, then cross out every third number (every multiple of three). 2, 3, X, 5, XX, 7, X, X, X, 11, XX, 13 ...
  • 15. The Sieve of Erastothenes Continuing the process. Five is the next non- overlined and non crossed out number. Overline five and cross out every fifth number. 2, 3, X, 5, XX, 7, X, X, X, 11, XX, 13 ...
  • 16. The Sieve of Erastothenes The next prime number is then seven. Since twice seven is greater than the largest visible number in our list, all the remaining visible numbers are prime. 2, 3, X, 5, XX, 7, X, XX, X, 11, XX, 13 ...
  • 17. The Sieve of Erastothenes Drawbacks  The process is too slow  Not efficient for finding huge primes.
  • 18. Euclid’S Element  The statement says that “There are more than any finite number n of prime numbers. Suppose that a1, a2, ..., an are prime numbers. Let m be the product of all considered prime numbers. Consider the number m + 1. If it's prime, then there are at least n + 1 primes.”  So suppose m + 1 is not prime. Then, some prime g divides it. But g cannot be any of the primes a1, a2, ..., an , since they all divide m and do not divide m + 1. Therefore, there are at least n + 1 primes.  Thus, there are not a finite number of primes.
  • 20. RSA How to make sure that my data is save on the internet? How to make sure that only an authorized person gets my secret message? The RSA model is the correct choice! RSA Stands for Ron Rivest, Adi Shamir , Leonard Adleman.
  • 21. RSA RSA is a consequence of Fermat's little theorem: "If 'a' is not divisible by 'p' , where p is prime, then a^(p-1) -1 is divisible by 'p'.
  • 22. The Work Flow  Generate two large random prime numbers p and q  Find n = p*q  Find phi = (p-1)*(q-1)  Choose an integer e, 1 < e < phi such that GCD (e, phi) = 1  Compute the secret exponent d, 1 < d < phi, such that e.d = 1 (mod phi)  The public key is (n, e) and the private key is (d, p, q)  All the values d, p, q and phi are kept secret.
  • 23. The Work Flow Select p and q n= p*q phi= (p-1) * (q-1) e*d= 1 (mod phi) C = (msg)^e mod n Message = (C)^d mod n
  • 24. Example  P = 3 and Q = 11  n = p*q = 33  Phi = (p-1) * (q-1) = (3-1) * (11-1) = 20  e = 7 and d =3 -------------> (3*7) mod 20 = 1  Public Key (7, 33) and Private Key (3, 33)  m = 13  Encrypt: c = m^e mod n -------> c = 13^7 mod 33 = 7  Decrypt: m = c^d mod n ---------> 7^8 mod 33 = 13
  • 25. • How to break RSA? • First we have to find p and q • Solve the equation to find 'd'
  • 26. Why is it difficult to get the decryption key? Factoring the huge number to prime number takes a lot of computation Then there can be number of multiples of N, so might be guessing on wrong number.