SlideShare a Scribd company logo
An  introduction  to  cryptography
Cryptography Cryptography comes from the Greek word ‘Kyrptos’. Kyrptos means  hidden message
Cryptography is thought to go back as far a Egyptians and their use of hieroglyphics.  Cryptography
Hieroglyphics were complex pictures that were used in the same way we use the alphabet, to tell things.  At the time, only a few people could understand hieroglyphics.  Cryptography
Do you know what this message means? Cryptography
You will only be able to understand this message if you had the code to unlock or decipher it.  Cryptography
Now using the key, see if you can decipher the message. What does it say? Cryptography
Julius Caesar developed the first modern cipher. It is known as the ‘Caesar cipher’.  Cryptography
On the ‘Caesar cipher’ each character in a message is replaced with the character three positions ahead of it in the alphabet.  Cryptography
Can you work these out? Cryptography A B C G M Z D E _ _ _ _
Check you answers: Cryptography
Cryptography Can you decode the following message? ZXBPXO ZFSEBO - ZOVMWLDOXMEV
Cryptography The Message said: Caesar Cipher- Cryptography

More Related Content

Similar to Lesson 1 presentation

Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003
keyurbz
 
Cryptography
CryptographyCryptography
Cryptography
Niharjyoti Sarangi
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Anas Rock
 
4.Cryptography handout 2.pptx
4.Cryptography  handout 2.pptx4.Cryptography  handout 2.pptx
4.Cryptography handout 2.pptx
MikiAbera
 
Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
Faraz Qureshi
 
Human being from ages had 2 inherent wants (a) to speak and share d.pdf
Human being from ages had 2 inherent wants  (a) to speak and share d.pdfHuman being from ages had 2 inherent wants  (a) to speak and share d.pdf
Human being from ages had 2 inherent wants (a) to speak and share d.pdf
anand1213
 
Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1
Mark Morris
 
Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docx
robert345678
 
Cryptography
CryptographyCryptography
Cryptography
Christian Bokhove
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
Bikramjit Sarkar, Ph.D.
 
Cryptography with caesar Cipher
Cryptography with caesar CipherCryptography with caesar Cipher
Cryptography with caesar Cipher
Dushhyant Kumar
 
Ijcta2011020338
Ijcta2011020338Ijcta2011020338
Ijcta2011020338
Prabhu Prabhu
 
Cryptography
CryptographyCryptography
Cryptography
Kushagro Dhar
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
Primary Task ResponseJulius  Caesar used one of the earliest .docx
Primary Task ResponseJulius  Caesar used one of the earliest .docxPrimary Task ResponseJulius  Caesar used one of the earliest .docx
Primary Task ResponseJulius  Caesar used one of the earliest .docx
keilenettie
 
Primary Task ResponseJulius Caesar used one of the earliest kno.docx
Primary Task ResponseJulius Caesar used one of the earliest kno.docxPrimary Task ResponseJulius Caesar used one of the earliest kno.docx
Primary Task ResponseJulius Caesar used one of the earliest kno.docx
keilenettie
 
SubstitutionAndCaesar
SubstitutionAndCaesarSubstitutionAndCaesar
SubstitutionAndCaesar
Robert Clemente
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
nathanurag
 

Similar to Lesson 1 presentation (19)

Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )
 
4.Cryptography handout 2.pptx
4.Cryptography  handout 2.pptx4.Cryptography  handout 2.pptx
4.Cryptography handout 2.pptx
 
Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
 
Human being from ages had 2 inherent wants (a) to speak and share d.pdf
Human being from ages had 2 inherent wants  (a) to speak and share d.pdfHuman being from ages had 2 inherent wants  (a) to speak and share d.pdf
Human being from ages had 2 inherent wants (a) to speak and share d.pdf
 
Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1Presentation for cryptography session 01 v1
Presentation for cryptography session 01 v1
 
Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docx
 
Cryptography
CryptographyCryptography
Cryptography
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
Cryptography with caesar Cipher
Cryptography with caesar CipherCryptography with caesar Cipher
Cryptography with caesar Cipher
 
Ijcta2011020338
Ijcta2011020338Ijcta2011020338
Ijcta2011020338
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Primary Task ResponseJulius  Caesar used one of the earliest .docx
Primary Task ResponseJulius  Caesar used one of the earliest .docxPrimary Task ResponseJulius  Caesar used one of the earliest .docx
Primary Task ResponseJulius  Caesar used one of the earliest .docx
 
Primary Task ResponseJulius Caesar used one of the earliest kno.docx
Primary Task ResponseJulius Caesar used one of the earliest kno.docxPrimary Task ResponseJulius Caesar used one of the earliest kno.docx
Primary Task ResponseJulius Caesar used one of the earliest kno.docx
 
SubstitutionAndCaesar
SubstitutionAndCaesarSubstitutionAndCaesar
SubstitutionAndCaesar
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 

Lesson 1 presentation