SlideShare a Scribd company logo
History Of Cryptography
Presented By Farhana Shaikh
Title Page
Introduction
Classical
Cryptography
Middle Age
Cryptography
Cryptography In
Renniasance
Times
From 1800 to
World War 2
Modern
Cryptography
Ages Of Cryptography
Classical Cryptography The History of
Cryptography begins
thousands of years ago.
Until recent decades, it has
been the story of what
might be called classical
cryptography.
That is, methods of
encryption that use pen
and paper, or perhaps
simple mechanical aids.
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Modern Cryptography
Classical Cryptography
Egypt's Old Kingdom
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Modern Cryptography
The earliest known use of
cryptography is found in
non-standard hieroglyphs
carved into monuments
from Egypt's Old Kingdom
( 4500+ years ago).
Classical Cryptography
Clay Tablets
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Modern Cryptography
Some clay tablets from
Mesopotamia are clearly
meant to protect
information—they encrypt
recipes, presumably
commercially valuable.
Classical Cryptography
Scytale
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Modern Cryptography
The scytale was first
mentioned by the Greek
poet Archilochus who lived
in the 7th century B.C.
(over 2500 years
ago).
The ancient Greeks, and
the Spartans in particular,
are said to have used this
cipher to communicate
during military campaigns.
Classical Cryptography
Scytale
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Modern Cryptography
 Sender and recipient
each had a cylinder (called
a scytale) of exactly the
same radius. The sender
wound a narrow ribbon of
parchment around his
cylinder, then wrote on it
lengthwise.
 After the ribbon is
unwound, the writing could
be read only by a person
who had a cylinder of
exactly the same radius.
Classical Cryptography
Scytale Example
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Modern Cryptography
 Original message:
Kill king tomorrow midnight
 Write Lengthwise:
k i l l k i n g
t o m o r r o w
m i d n i g h t
 Encoded message:
ktm ioi lmd lon kri irg
noh gwt
Classical Cryptography
Polybius Square
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Modern Cryptography
Another Greek method
was developed by Polybius
(called the "Polybius
Square").
Each letter is represented
by its coordinates in the
grid. Example, "BAT"
becomes "12 11 44“
Classical Cryptography
Caeser Cipher
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Modern Cryptography
Romans Caesar Cipher:
The method is named after
Julius Caesar, who used it
to communicate with his
generals.
The Ceasar Cipher is an
example of what is called a
shift cipher. To encode a
message, letters are
replaced with a letter that is
a fixed number of letters
beyond the current letter.
Caeser Cipher
Classical Cryptography
Monoalphabetic Cipher
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Modern Cryptography
Hebrew scholars made use
of simple monoalphabetic
substitution ciphers.
The Atbash cipher is a
specific case of substitution
cipher where the letters of
the alphabet are reversed.
In otherwords, all As are
replaced with Zs, all Bs are
replaced with Ys, and so
on.
Classical Cryptography
Medieval Cryptography
Frequency Analysis
In Reniassance Times
1800 to World War 2
Modern Cryptography
Al - Kindi, wrote a book on
cryptology, the "Risalah fi
Istikhraj al-Mu'amma"
(Manuscript for the
Deciphering Cryptographic
Messages), circa 850 CE.
He was a pioneer in
cryptanalysis and
cryptology, and devised
new methods of breaking
ciphers, including the
frequency analysis method.
Frequency Analysis
Classical Cryptography
Caeser Cipher
Medieval Cryptography
In Reniassance Times
Polyalphabetic Cipher
1800 to World War 2
Modern Cryptography
Essentially all ciphers
remained vulnerable to the
cryptanalytic technique of
frequency analysis until the
development of the
polyalphabetic cipher.
The polyalphabetic cipher
was explained by Leon
Battista Alberti around the
year 1467, for which he
was called the "father of
Western cryptology".
STUDENTS = XHTQKEMG
Polyalphabetic Cipher
Classical Cryptography
Caeser Cipher
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Modern Cryptography
In Europe, cryptography
became (secretly) more
important as a
consequence of political
competition and religious
revolution.
Outside of Europe, after
the end of the Muslim
Golden Age at the hand of
the Mongols, cryptography
remained comparatively
undeveloped.
Classical Cryptography
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Systematic methods
Modern Cryptography
Edgar Allan Poe used
systematic methods to
solve ciphers in the 1840s.
In particular he placed a
notice of his abilities in the
Philadelphia paper, inviting
submissions of ciphers, of
which he proceeded to
solve almost all.
Classical Cryptography
Medieval Cryptography
In Reniassance Times
Modern Cryptography
His success created a
public stir for some
months. He later wrote an
essay on methods of
cryptography which proved
useful as an introduction
for novice British
cryptanalysts attempting to
break German codes and
ciphers during World War I.
1800 to World War 2
Systematic methods
Medieval Cryptography
In Reniassance Times
Modern Cryptography
In 1917, Gilbert Vernam
proposed a teletype cipher
in which a previously-
prepared key, kept on
paper tape, is combined
character by character with
the plaintext message to
produce the cyphertext.
This led to the
development of
electromechanical devices
as cipher machines.
Classical Cryptography
1800 to World War 2
Electro mechanical
Medieval Cryptography
In Reniassance Times
Modern Cryptography
By World War II,
mechanical and
electromechanical cipher
machines were in wide
use, although—where such
machines were impractical
—manual systems
continued in use.
The Enigma machine was
widely used by Nazi Germany
where as SIGABA was used by
British army.
Classical Cryptography
1800 to World War 2
Enigma and SIGABA
Engima and Sigaba
Classical Cryptography
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Modern Cryptography
Claude Shannon
Availability of computers,
and the Internet as a
communications medium,
bring effective
cryptography into common
use by national
governments or large
enterprises.
The era of modern
cryptography really begins
with Claude Shannon, the
father of mathematical
cryptography.
Classical Cryptography
Medieval Cryptography
In Reniassance Times
1800 to World War 2
Modern Cryptography
Claude Shannon
He established a solid
theoretical basis for
cryptography and also for
much of cryptanalysis. And
with that, cryptography
more or less disappeared
into secret government
communications
organizations such as
NSA, GCHQ, and their
equivalents elsewhere.
Classical Cryptography
Medieval Cryptography
In Reniassance Times
1800 to World War 2
The DES cipher was
submitted by a research
group at IBM, at the
invitation of the National
Bureau of Standards (now
NIST), in an effort to
develop secure electronic
communication facilities for
businesses such as banks
and other large financial
organizations.
Modern Cryptography
Data Encryption Standard
Classical Cryptography
Medieval Cryptography
In Reniassance Times
1800 to World War 2
DES was the first publicly
accessible cipher to be
'blessed' by a national
agency such as NSA. The
release of its specification
by National Bureau of
Standards (NBS)
stimulated an explosion of
public and academic
interest in cryptography.
But, the DES key size (56-
bits) was thought to be too
small.
Modern Cryptography
Data Encryption Standard
Classical Cryptography
Medieval Cryptography
In Reniassance Times
1800 to World War 2
There was suspicion that
government organizations
even then had sufficient
computing power to break
DES messages, clearly
others have achieved this
capability.
The aging DES was
officially replaced by the
Advanced Encryption
Standard (AES) in 2001.
Modern Cryptography
Advanced Encryption Standard
Classical Cryptography
Medieval Cryptography
In Reniassance Times
1800 to World War 2
The publication of the
paper New Directions in
Cryptography by Whitfield
Diffie and Martin Hellman.
It introduced a radically
new method of distributing
cryptographic keys, which
went far toward solving one
of the fundamental
problems of cryptography,
key distribution, and has
become known as Diffie-
Hellman key exchange.
Modern Cryptography
Public key
Any Question Or
Suggestion ??

More Related Content

What's hot

Cryptography
CryptographyCryptography
Cryptography
Jens Patel
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
Information Technology
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
Marcelo Martins
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
Arun ACE
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
Perfect Training Center
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
thai
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Cryptography
CryptographyCryptography
Cryptography
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 

Viewers also liked

A Brief History of Cryptography
A Brief History of CryptographyA Brief History of Cryptography
A Brief History of Cryptography
guest9006ab
 
Cryptography its history application and beyond
Cryptography its history application and beyondCryptography its history application and beyond
Cryptography its history application and beyond
kinleay
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
New Dawn of Security in Telecommunications: Quantum Cryptography
New Dawn of Security in Telecommunications: Quantum CryptographyNew Dawn of Security in Telecommunications: Quantum Cryptography
New Dawn of Security in Telecommunications: Quantum Cryptography
Society of Women Engineers
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
Himanshu Shekhar
 
Cryptography
CryptographyCryptography
Cryptography
Kushagro Dhar
 
Fund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine SimulatorFund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine Simulator
Craig Heath
 
Cryptography
CryptographyCryptography
Cryptography
jayashri kolekar
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
Bro Jayaram
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream Cipher
Amirul Wiramuda
 
IPsec
IPsecIPsec
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital Signatures
Robert Talbert
 
IPSec VPN Basics
IPSec VPN BasicsIPSec VPN Basics
IPSec VPN Basics
Martin Bratina
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
Asim Neupane
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
Abdullaziz Tagawy
 
Ipsec
IpsecIpsec

Viewers also liked (20)

A Brief History of Cryptography
A Brief History of CryptographyA Brief History of Cryptography
A Brief History of Cryptography
 
Cryptography its history application and beyond
Cryptography its history application and beyondCryptography its history application and beyond
Cryptography its history application and beyond
 
Cryptography
CryptographyCryptography
Cryptography
 
New Dawn of Security in Telecommunications: Quantum Cryptography
New Dawn of Security in Telecommunications: Quantum CryptographyNew Dawn of Security in Telecommunications: Quantum Cryptography
New Dawn of Security in Telecommunications: Quantum Cryptography
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Fund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine SimulatorFund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine Simulator
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream Cipher
 
Cryptography
Cryptography Cryptography
Cryptography
 
IPsec
IPsecIPsec
IPsec
 
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital Signatures
 
IPSec VPN Basics
IPSec VPN BasicsIPSec VPN Basics
IPSec VPN Basics
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
block ciphers
block ciphersblock ciphers
block ciphers
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Ipsec
IpsecIpsec
Ipsec
 

Similar to History of cryptography

Cryptography
CryptographyCryptography
Cryptography
Niharjyoti Sarangi
 
Intro to Cryptography (Futures Friday)
Intro to Cryptography (Futures Friday)Intro to Cryptography (Futures Friday)
Intro to Cryptography (Futures Friday)
Sean O'Mahoney
 
History of Cryptography
History of CryptographyHistory of Cryptography
History of Cryptography
- Mark - Fullbright
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
vimalguptaofficial
 
Crypto - A Fascinating History by Atul Kahate
Crypto - A Fascinating History by Atul KahateCrypto - A Fascinating History by Atul Kahate
Crypto - A Fascinating History by Atul Kahate
n|u - The Open Security Community
 
Slide share technical communicators from antiquity to infinity
Slide share technical communicators from antiquity to infinitySlide share technical communicators from antiquity to infinity
Slide share technical communicators from antiquity to infinity
Ken Reid
 
A brief history of computing
A brief history of computingA brief history of computing
A brief history of computing
voxace
 
Science, Technology, and Society lesson 6.pptx
Science, Technology, and Society lesson 6.pptxScience, Technology, and Society lesson 6.pptx
Science, Technology, and Society lesson 6.pptx
LuisSalenga1
 
Security Systems for Digital Data
Security Systems for Digital DataSecurity Systems for Digital Data
Security Systems for Digital Data
Bernhard Hofer
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
Harrisentertainment
 
Spring12_topic01.ppt
Spring12_topic01.pptSpring12_topic01.ppt
Spring12_topic01.ppt
DakshPrajapati23
 
Mla coursework trends in communication
Mla coursework trends in communicationMla coursework trends in communication
Mla coursework trends in communicationTitleconnect
 
Mla coursework trends in communication
Mla coursework trends in communicationMla coursework trends in communication
Mla coursework trends in communicationTitleconnect
 
Heinrich Himmler Essay
Heinrich Himmler EssayHeinrich Himmler Essay
Heinrich Himmler Essay
Sandra Ahn
 
Human being from ages had 2 inherent wants (a) to speak and share d.pdf
Human being from ages had 2 inherent wants  (a) to speak and share d.pdfHuman being from ages had 2 inherent wants  (a) to speak and share d.pdf
Human being from ages had 2 inherent wants (a) to speak and share d.pdf
anand1213
 
EE 4 Ancient egyptian history class four fall 2010, spring 2011 part 3, life ...
EE 4 Ancient egyptian history class four fall 2010, spring 2011 part 3, life ...EE 4 Ancient egyptian history class four fall 2010, spring 2011 part 3, life ...
Mla style course work trends in communication
Mla style course work   trends in communicationMla style course work   trends in communication
Mla style course work trends in communication
CustomEssayOrder
 
Seminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPTSeminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPT
Alexander Kolybelnikov
 

Similar to History of cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
Intro to Cryptography (Futures Friday)
Intro to Cryptography (Futures Friday)Intro to Cryptography (Futures Friday)
Intro to Cryptography (Futures Friday)
 
Crypto
CryptoCrypto
Crypto
 
History of Cryptography
History of CryptographyHistory of Cryptography
History of Cryptography
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Crypto - A Fascinating History by Atul Kahate
Crypto - A Fascinating History by Atul KahateCrypto - A Fascinating History by Atul Kahate
Crypto - A Fascinating History by Atul Kahate
 
Slide share technical communicators from antiquity to infinity
Slide share technical communicators from antiquity to infinitySlide share technical communicators from antiquity to infinity
Slide share technical communicators from antiquity to infinity
 
A brief history of computing
A brief history of computingA brief history of computing
A brief history of computing
 
Science, Technology, and Society lesson 6.pptx
Science, Technology, and Society lesson 6.pptxScience, Technology, and Society lesson 6.pptx
Science, Technology, and Society lesson 6.pptx
 
Security Systems for Digital Data
Security Systems for Digital DataSecurity Systems for Digital Data
Security Systems for Digital Data
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
Spring12_topic01.ppt
Spring12_topic01.pptSpring12_topic01.ppt
Spring12_topic01.ppt
 
Mla coursework trends in communication
Mla coursework trends in communicationMla coursework trends in communication
Mla coursework trends in communication
 
Mla coursework trends in communication
Mla coursework trends in communicationMla coursework trends in communication
Mla coursework trends in communication
 
Heinrich Himmler Essay
Heinrich Himmler EssayHeinrich Himmler Essay
Heinrich Himmler Essay
 
Human being from ages had 2 inherent wants (a) to speak and share d.pdf
Human being from ages had 2 inherent wants  (a) to speak and share d.pdfHuman being from ages had 2 inherent wants  (a) to speak and share d.pdf
Human being from ages had 2 inherent wants (a) to speak and share d.pdf
 
EE 4 Ancient egyptian history class four fall 2010, spring 2011 part 3, life ...
EE 4 Ancient egyptian history class four fall 2010, spring 2011 part 3, life ...EE 4 Ancient egyptian history class four fall 2010, spring 2011 part 3, life ...
EE 4 Ancient egyptian history class four fall 2010, spring 2011 part 3, life ...
 
Mla style course work trends in communication
Mla style course work   trends in communicationMla style course work   trends in communication
Mla style course work trends in communication
 
Prime essay writings sample trends in the development of communication
Prime essay writings sample trends in the development of communicationPrime essay writings sample trends in the development of communication
Prime essay writings sample trends in the development of communication
 
Seminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPTSeminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPT
 

Recently uploaded

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 

Recently uploaded (20)

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 

History of cryptography

  • 1. History Of Cryptography Presented By Farhana Shaikh Title Page
  • 3. Classical Cryptography The History of Cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classical cryptography. That is, methods of encryption that use pen and paper, or perhaps simple mechanical aids. Medieval Cryptography In Reniassance Times 1800 to World War 2 Modern Cryptography
  • 4. Classical Cryptography Egypt's Old Kingdom Medieval Cryptography In Reniassance Times 1800 to World War 2 Modern Cryptography The earliest known use of cryptography is found in non-standard hieroglyphs carved into monuments from Egypt's Old Kingdom ( 4500+ years ago).
  • 5. Classical Cryptography Clay Tablets Medieval Cryptography In Reniassance Times 1800 to World War 2 Modern Cryptography Some clay tablets from Mesopotamia are clearly meant to protect information—they encrypt recipes, presumably commercially valuable.
  • 6. Classical Cryptography Scytale Medieval Cryptography In Reniassance Times 1800 to World War 2 Modern Cryptography The scytale was first mentioned by the Greek poet Archilochus who lived in the 7th century B.C. (over 2500 years ago). The ancient Greeks, and the Spartans in particular, are said to have used this cipher to communicate during military campaigns.
  • 7. Classical Cryptography Scytale Medieval Cryptography In Reniassance Times 1800 to World War 2 Modern Cryptography  Sender and recipient each had a cylinder (called a scytale) of exactly the same radius. The sender wound a narrow ribbon of parchment around his cylinder, then wrote on it lengthwise.  After the ribbon is unwound, the writing could be read only by a person who had a cylinder of exactly the same radius.
  • 8.
  • 9. Classical Cryptography Scytale Example Medieval Cryptography In Reniassance Times 1800 to World War 2 Modern Cryptography  Original message: Kill king tomorrow midnight  Write Lengthwise: k i l l k i n g t o m o r r o w m i d n i g h t  Encoded message: ktm ioi lmd lon kri irg noh gwt
  • 10. Classical Cryptography Polybius Square Medieval Cryptography In Reniassance Times 1800 to World War 2 Modern Cryptography Another Greek method was developed by Polybius (called the "Polybius Square"). Each letter is represented by its coordinates in the grid. Example, "BAT" becomes "12 11 44“
  • 11. Classical Cryptography Caeser Cipher Medieval Cryptography In Reniassance Times 1800 to World War 2 Modern Cryptography Romans Caesar Cipher: The method is named after Julius Caesar, who used it to communicate with his generals. The Ceasar Cipher is an example of what is called a shift cipher. To encode a message, letters are replaced with a letter that is a fixed number of letters beyond the current letter.
  • 13. Classical Cryptography Monoalphabetic Cipher Medieval Cryptography In Reniassance Times 1800 to World War 2 Modern Cryptography Hebrew scholars made use of simple monoalphabetic substitution ciphers. The Atbash cipher is a specific case of substitution cipher where the letters of the alphabet are reversed. In otherwords, all As are replaced with Zs, all Bs are replaced with Ys, and so on.
  • 14. Classical Cryptography Medieval Cryptography Frequency Analysis In Reniassance Times 1800 to World War 2 Modern Cryptography Al - Kindi, wrote a book on cryptology, the "Risalah fi Istikhraj al-Mu'amma" (Manuscript for the Deciphering Cryptographic Messages), circa 850 CE. He was a pioneer in cryptanalysis and cryptology, and devised new methods of breaking ciphers, including the frequency analysis method.
  • 16. Classical Cryptography Caeser Cipher Medieval Cryptography In Reniassance Times Polyalphabetic Cipher 1800 to World War 2 Modern Cryptography Essentially all ciphers remained vulnerable to the cryptanalytic technique of frequency analysis until the development of the polyalphabetic cipher. The polyalphabetic cipher was explained by Leon Battista Alberti around the year 1467, for which he was called the "father of Western cryptology".
  • 18. Classical Cryptography Caeser Cipher Medieval Cryptography In Reniassance Times 1800 to World War 2 Modern Cryptography In Europe, cryptography became (secretly) more important as a consequence of political competition and religious revolution. Outside of Europe, after the end of the Muslim Golden Age at the hand of the Mongols, cryptography remained comparatively undeveloped.
  • 19. Classical Cryptography Medieval Cryptography In Reniassance Times 1800 to World War 2 Systematic methods Modern Cryptography Edgar Allan Poe used systematic methods to solve ciphers in the 1840s. In particular he placed a notice of his abilities in the Philadelphia paper, inviting submissions of ciphers, of which he proceeded to solve almost all.
  • 20. Classical Cryptography Medieval Cryptography In Reniassance Times Modern Cryptography His success created a public stir for some months. He later wrote an essay on methods of cryptography which proved useful as an introduction for novice British cryptanalysts attempting to break German codes and ciphers during World War I. 1800 to World War 2 Systematic methods
  • 21. Medieval Cryptography In Reniassance Times Modern Cryptography In 1917, Gilbert Vernam proposed a teletype cipher in which a previously- prepared key, kept on paper tape, is combined character by character with the plaintext message to produce the cyphertext. This led to the development of electromechanical devices as cipher machines. Classical Cryptography 1800 to World War 2 Electro mechanical
  • 22. Medieval Cryptography In Reniassance Times Modern Cryptography By World War II, mechanical and electromechanical cipher machines were in wide use, although—where such machines were impractical —manual systems continued in use. The Enigma machine was widely used by Nazi Germany where as SIGABA was used by British army. Classical Cryptography 1800 to World War 2 Enigma and SIGABA
  • 24. Classical Cryptography Medieval Cryptography In Reniassance Times 1800 to World War 2 Modern Cryptography Claude Shannon Availability of computers, and the Internet as a communications medium, bring effective cryptography into common use by national governments or large enterprises. The era of modern cryptography really begins with Claude Shannon, the father of mathematical cryptography.
  • 25. Classical Cryptography Medieval Cryptography In Reniassance Times 1800 to World War 2 Modern Cryptography Claude Shannon He established a solid theoretical basis for cryptography and also for much of cryptanalysis. And with that, cryptography more or less disappeared into secret government communications organizations such as NSA, GCHQ, and their equivalents elsewhere.
  • 26. Classical Cryptography Medieval Cryptography In Reniassance Times 1800 to World War 2 The DES cipher was submitted by a research group at IBM, at the invitation of the National Bureau of Standards (now NIST), in an effort to develop secure electronic communication facilities for businesses such as banks and other large financial organizations. Modern Cryptography Data Encryption Standard
  • 27. Classical Cryptography Medieval Cryptography In Reniassance Times 1800 to World War 2 DES was the first publicly accessible cipher to be 'blessed' by a national agency such as NSA. The release of its specification by National Bureau of Standards (NBS) stimulated an explosion of public and academic interest in cryptography. But, the DES key size (56- bits) was thought to be too small. Modern Cryptography Data Encryption Standard
  • 28. Classical Cryptography Medieval Cryptography In Reniassance Times 1800 to World War 2 There was suspicion that government organizations even then had sufficient computing power to break DES messages, clearly others have achieved this capability. The aging DES was officially replaced by the Advanced Encryption Standard (AES) in 2001. Modern Cryptography Advanced Encryption Standard
  • 29. Classical Cryptography Medieval Cryptography In Reniassance Times 1800 to World War 2 The publication of the paper New Directions in Cryptography by Whitfield Diffie and Martin Hellman. It introduced a radically new method of distributing cryptographic keys, which went far toward solving one of the fundamental problems of cryptography, key distribution, and has become known as Diffie- Hellman key exchange. Modern Cryptography Public key