1 / 12

Cryptography

Cryptography. (Cryptography). the basics cryptography deals with techniques for secure communication in the presence of third parties (adversaries). modern cryptography uses mathematics, computer science, and electrical engineering the word “cryptography” originates

milica
Download Presentation

Cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptography (Cryptography)

  2. the basics • cryptography deals with techniques for secure communication in the presence of third parties (adversaries). • modern cryptography uses • mathematics, computer science, • and electrical engineering • the word “cryptography” originates • from two Greek words: • “hidden/secret” and “writing”

  3. cipher systems • a cipher is the algorithm that transforms information • symmetric vs. asymmetric serpent

  4. the olden days • cryptography was basically encryption • information -> nonsense -> information • whoever wrote the message provided the recipient with the decoding key

  5. exhaustive key search on a Caesar Cipher code = XMZVH

  6. modular arithmetic in a Caesar Cipher, a shift of 26 is the same as a shift of 0. for example: 37 = 11(mod 26)

  7. we want a large number of keys (but having lots of keys is no guarantee of a strong system) number of potential keys = number of ways 26 letters can be arranged 26! = 403,291,461,126,605,635,584,000,000

  8. a large number of keys does not guarantee that a cipher is unbreakable German Armed Forces, WWII Enigma Machine Mary, Queen of Scots 1542 - 1587

  9. Diffie-Hellman Key Exchange

  10. asymmetric cipher systems and more modular arithmetic

  11. the primitive root of 17 is a number that has no factors in common (3)

More Related