SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
A Brief History of
 Cryptography
   ______________

   Florian Deckert
       23.03.2007
Encyclopedia Britannica:
   “Cryptography: Practice of the enciphering and
  deciphering of messages in secret code in order
 to render them unintelligible to all but the intended
                     receiver.”




23.03.2007             Florian Deckert               2
Early Cryptography
• 3500 BC: Sumerians
     – Cuneiform writings




23.03.2007                  Florian Deckert   3
Early Cryptography
• 1900 BC: Egypt
     – First known use of cryptography




23.03.2007                Florian Deckert   4
Early Cryptography
                            • 500 – 600 BC:
                              ATBASH Cipher
                                     – Used by Hebrew
                                       scribes
                                     – Substitution cipher
                                       (reversed alphabet)




23.03.2007         Florian Deckert                           5
Early Cryptography
• 486 BC: Greece
     – σκυτάλη – skytale




23.03.2007                 Florian Deckert   6
Early Cryptography
• 60 – 50 BC: Julius Caesar
     – substitution cipher
     – Shift letters by X positions:
             • E.g. X = 3: A   D, B      E,
               C    F, ...
     – Weakness?
             • Frequency analysis (1000 AD)
     – 1466: Leon Albertini: cipher
       disk
             • Used until 16th century


23.03.2007                         Florian Deckert   7
Medieval Cryptography
• 1587: Vigenère Cipher
     – Polyalphabetic: one to
       many relationship
     – Example
             • Encrypt: lamp
             • Keyword: ubc
             • Ciphertext: fboj
• Apart from that...



23.03.2007                        Florian Deckert   8
Modern Cryptography
• 1845: Morse Code
     – Represention by code
       signal
     – States (on and off)
       composed into 5
       symbols




23.03.2007               Florian Deckert   9
Modern Cryptography
• 1863: Kasiski breaks Vigenere:
     – Find length of keyword
     – Divide message into substitution cryptograms
     – Use frequency analysis to solve these




23.03.2007             Florian Deckert            10
Modern Cryptography
• 1918: ADFGVX Cipher
     – Used in the German army in WWI

              A        D              F   G   X
              B        T              A   L   P
     A
              D        H              O   Z   K
     D
              Q        F              V   S   N
     F
              G        J              C   U   X
     G
              M        R              E   W   Y
     X
23.03.2007              Florian Deckert           11
Modern Cryptography
• 1918: The Enigma
     – Arthur Scherbius
     – Business: confidential
       docs
     – No codebooks
     – Rotors     multi
       substitution
     – Wireing changes as-you-
       type
     – German forces in WWII
     – Room 40

23.03.2007               Florian Deckert   12
Modern Cryptography
• 1937 – 1945: Navajo Code Talkers




23.03.2007          Florian Deckert   13
Modern Cryptography
• 1949: Shannon:
     – Communication
       Theory of Secret
       Systems
     – Proved: One time pad
       unbreakable




23.03.2007               Florian Deckert   14
Modern Cryptography
• Until mid 70‘s




23.03.2007          Florian Deckert   15
Modern Cryptography
• 1976: Diffie – Hellman Key Exchange
     – Whitfield Diffie and Martin Hellman
     – Discrete logarithm problem:
             • G: finite cyclic group with n elements
             • Modulo n multiplication
             • b: generator of G: every element g of G can be
               written as g = bk for some integer k
             • Goal: find k given g and b and n!
             • Very hard problem

23.03.2007                     Florian Deckert                  16
Modern Cryptography
• So how does it work?
• Exploits?
     – Man in the middle
     – Fix: additional authentication




23.03.2007              Florian Deckert   17
Modern Cryptography
• Public Key Crypto
     – Key exchange problem
     – Asymmetric key algorithm
     – E.g: RSA, MIT, 1977




23.03.2007               Florian Deckert   18
Modern Cryptography
• 1991: PGP Pretty Good Privacy
     – Protocol, uses RSA
     – Encryption & decryption
     – Digital signatures
             • How does that work?
     – Web of Trust
             • Third party signs (public) key to attest association
               between person and key
     – Other Possibility: Hierarchical, CA based
             • E.g.: X.509 Certificates in SSL
23.03.2007                      Florian Deckert                       19
Thank You!

Let’s go to Koerner’s.

Contenu connexe

Tendances

6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptographyzahid-mian
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography
CryptographyCryptography
Cryptographyprasham95
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal CryptosystemAdri Jovin
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAdri Jovin
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Anas Rock
 

Tendances (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
One time Pad Encryption
One time Pad EncryptionOne time Pad Encryption
One time Pad Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 

En vedette

Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Cryptography its history application and beyond
Cryptography its history application and beyondCryptography its history application and beyond
Cryptography its history application and beyondkinleay
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYHimanshu Shekhar
 
Bruce Lee Guide to Strategic Content (Remix)
Bruce Lee Guide to Strategic Content (Remix)Bruce Lee Guide to Strategic Content (Remix)
Bruce Lee Guide to Strategic Content (Remix)Steve Floyd
 
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladiumNed Hayes
 
Week 2 reality tv institutions
Week 2 reality tv institutionsWeek 2 reality tv institutions
Week 2 reality tv institutionslatymermedia
 
A2 media studies reality tv
A2 media studies reality tvA2 media studies reality tv
A2 media studies reality tvannabrindle28
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 

En vedette (20)

Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography its history application and beyond
Cryptography its history application and beyondCryptography its history application and beyond
Cryptography its history application and beyond
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Bruce Lee Guide to Strategic Content (Remix)
Bruce Lee Guide to Strategic Content (Remix)Bruce Lee Guide to Strategic Content (Remix)
Bruce Lee Guide to Strategic Content (Remix)
 
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladium
 
Week 2 reality tv institutions
Week 2 reality tv institutionsWeek 2 reality tv institutions
Week 2 reality tv institutions
 
palladium
palladiumpalladium
palladium
 
A2 media studies reality tv
A2 media studies reality tvA2 media studies reality tv
A2 media studies reality tv
 
Cryptography
CryptographyCryptography
Cryptography
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 

Plus de guest9006ab

Proportional-Derivative-Integral (PID) Control
Proportional-Derivative-Integral (PID) ControlProportional-Derivative-Integral (PID) Control
Proportional-Derivative-Integral (PID) Controlguest9006ab
 
Eigenvalues in a Nutshell
Eigenvalues in a NutshellEigenvalues in a Nutshell
Eigenvalues in a Nutshellguest9006ab
 
SMART Goals and Feedback (Project Management)
SMART Goals and Feedback (Project Management)SMART Goals and Feedback (Project Management)
SMART Goals and Feedback (Project Management)guest9006ab
 
C Code and the Art of Obfuscation
C Code and the Art of ObfuscationC Code and the Art of Obfuscation
C Code and the Art of Obfuscationguest9006ab
 
Top Super-models of Computer Graphics
Top Super-models of Computer GraphicsTop Super-models of Computer Graphics
Top Super-models of Computer Graphicsguest9006ab
 
Human Nature and its Consequences
Human Nature and its ConsequencesHuman Nature and its Consequences
Human Nature and its Consequencesguest9006ab
 
Slipping the Surly Bonds
Slipping the Surly BondsSlipping the Surly Bonds
Slipping the Surly Bondsguest9006ab
 
Communication with Extraterrestrial Intelligence
Communication with Extraterrestrial IntelligenceCommunication with Extraterrestrial Intelligence
Communication with Extraterrestrial Intelligenceguest9006ab
 
Canada vs. Germany: Une réflection
Canada vs. Germany: Une réflectionCanada vs. Germany: Une réflection
Canada vs. Germany: Une réflectionguest9006ab
 
Signal Compression and JPEG
Signal Compression and JPEGSignal Compression and JPEG
Signal Compression and JPEGguest9006ab
 
Brain-Computer Interfaces
Brain-Computer InterfacesBrain-Computer Interfaces
Brain-Computer Interfacesguest9006ab
 
The ABC's of the Bible
The ABC's of the BibleThe ABC's of the Bible
The ABC's of the Bibleguest9006ab
 

Plus de guest9006ab (14)

Proportional-Derivative-Integral (PID) Control
Proportional-Derivative-Integral (PID) ControlProportional-Derivative-Integral (PID) Control
Proportional-Derivative-Integral (PID) Control
 
Eigenvalues in a Nutshell
Eigenvalues in a NutshellEigenvalues in a Nutshell
Eigenvalues in a Nutshell
 
SMART Goals and Feedback (Project Management)
SMART Goals and Feedback (Project Management)SMART Goals and Feedback (Project Management)
SMART Goals and Feedback (Project Management)
 
C Code and the Art of Obfuscation
C Code and the Art of ObfuscationC Code and the Art of Obfuscation
C Code and the Art of Obfuscation
 
OS Mélange
OS MélangeOS Mélange
OS Mélange
 
Top Super-models of Computer Graphics
Top Super-models of Computer GraphicsTop Super-models of Computer Graphics
Top Super-models of Computer Graphics
 
Human Nature and its Consequences
Human Nature and its ConsequencesHuman Nature and its Consequences
Human Nature and its Consequences
 
Slipping the Surly Bonds
Slipping the Surly BondsSlipping the Surly Bonds
Slipping the Surly Bonds
 
Communication with Extraterrestrial Intelligence
Communication with Extraterrestrial IntelligenceCommunication with Extraterrestrial Intelligence
Communication with Extraterrestrial Intelligence
 
Canada vs. Germany: Une réflection
Canada vs. Germany: Une réflectionCanada vs. Germany: Une réflection
Canada vs. Germany: Une réflection
 
Signal Compression and JPEG
Signal Compression and JPEGSignal Compression and JPEG
Signal Compression and JPEG
 
Clouds
CloudsClouds
Clouds
 
Brain-Computer Interfaces
Brain-Computer InterfacesBrain-Computer Interfaces
Brain-Computer Interfaces
 
The ABC's of the Bible
The ABC's of the BibleThe ABC's of the Bible
The ABC's of the Bible
 

Dernier

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Dernier (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

A Brief History of Cryptography

  • 1. A Brief History of Cryptography ______________ Florian Deckert 23.03.2007
  • 2. Encyclopedia Britannica: “Cryptography: Practice of the enciphering and deciphering of messages in secret code in order to render them unintelligible to all but the intended receiver.” 23.03.2007 Florian Deckert 2
  • 3. Early Cryptography • 3500 BC: Sumerians – Cuneiform writings 23.03.2007 Florian Deckert 3
  • 4. Early Cryptography • 1900 BC: Egypt – First known use of cryptography 23.03.2007 Florian Deckert 4
  • 5. Early Cryptography • 500 – 600 BC: ATBASH Cipher – Used by Hebrew scribes – Substitution cipher (reversed alphabet) 23.03.2007 Florian Deckert 5
  • 6. Early Cryptography • 486 BC: Greece – σκυτάλη – skytale 23.03.2007 Florian Deckert 6
  • 7. Early Cryptography • 60 – 50 BC: Julius Caesar – substitution cipher – Shift letters by X positions: • E.g. X = 3: A D, B E, C F, ... – Weakness? • Frequency analysis (1000 AD) – 1466: Leon Albertini: cipher disk • Used until 16th century 23.03.2007 Florian Deckert 7
  • 8. Medieval Cryptography • 1587: Vigenère Cipher – Polyalphabetic: one to many relationship – Example • Encrypt: lamp • Keyword: ubc • Ciphertext: fboj • Apart from that... 23.03.2007 Florian Deckert 8
  • 9. Modern Cryptography • 1845: Morse Code – Represention by code signal – States (on and off) composed into 5 symbols 23.03.2007 Florian Deckert 9
  • 10. Modern Cryptography • 1863: Kasiski breaks Vigenere: – Find length of keyword – Divide message into substitution cryptograms – Use frequency analysis to solve these 23.03.2007 Florian Deckert 10
  • 11. Modern Cryptography • 1918: ADFGVX Cipher – Used in the German army in WWI A D F G X B T A L P A D H O Z K D Q F V S N F G J C U X G M R E W Y X 23.03.2007 Florian Deckert 11
  • 12. Modern Cryptography • 1918: The Enigma – Arthur Scherbius – Business: confidential docs – No codebooks – Rotors multi substitution – Wireing changes as-you- type – German forces in WWII – Room 40 23.03.2007 Florian Deckert 12
  • 13. Modern Cryptography • 1937 – 1945: Navajo Code Talkers 23.03.2007 Florian Deckert 13
  • 14. Modern Cryptography • 1949: Shannon: – Communication Theory of Secret Systems – Proved: One time pad unbreakable 23.03.2007 Florian Deckert 14
  • 15. Modern Cryptography • Until mid 70‘s 23.03.2007 Florian Deckert 15
  • 16. Modern Cryptography • 1976: Diffie – Hellman Key Exchange – Whitfield Diffie and Martin Hellman – Discrete logarithm problem: • G: finite cyclic group with n elements • Modulo n multiplication • b: generator of G: every element g of G can be written as g = bk for some integer k • Goal: find k given g and b and n! • Very hard problem 23.03.2007 Florian Deckert 16
  • 17. Modern Cryptography • So how does it work? • Exploits? – Man in the middle – Fix: additional authentication 23.03.2007 Florian Deckert 17
  • 18. Modern Cryptography • Public Key Crypto – Key exchange problem – Asymmetric key algorithm – E.g: RSA, MIT, 1977 23.03.2007 Florian Deckert 18
  • 19. Modern Cryptography • 1991: PGP Pretty Good Privacy – Protocol, uses RSA – Encryption & decryption – Digital signatures • How does that work? – Web of Trust • Third party signs (public) key to attest association between person and key – Other Possibility: Hierarchical, CA based • E.g.: X.509 Certificates in SSL 23.03.2007 Florian Deckert 19
  • 20. Thank You! Let’s go to Koerner’s.