Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Cryptography
______________
Florian Deckert
23.03.2007
Encyclopedia Britannica:
Cryptography: Practice of the enciphering and
deciphering of messages in secret code in order
to render them unintelligible to all but the intended
receiver.
23.03.2007
Florian Deckert
Early Cryptography
3500 BC: Sumerians
Cuneiform writings
23.03.2007
Florian Deckert
Early Cryptography
1900 BC: Egypt
First known use of cryptography
23.03.2007
Florian Deckert
Early Cryptography
500 600 BC:
ATBASH Cipher
Used by Hebrew
scribes
Substitution cipher
(reversed alphabet)
23.03.2007
Florian Deckert
Early Cryptography
486 BC: Greece
skytale
23.03.2007
Florian Deckert
Early Cryptography
60 50 BC: Julius Caesar
substitution cipher
Shift letters by X positions:
E.g. X = 3: A D, B E,
C F, ...
Weakness?
Frequency analysis (1000 AD)
23.03.2007
Florian Deckert
Medieval Cryptography
1587: Vigenre Cipher
Polyalphabetic: one to
many relationship
Example
Encrypt: lamp
Keyword: ubc
Ciphertext: fboj
23.03.2007
Florian Deckert
Modern Cryptography
1845: Morse Code
Represention by code
signal
States (on and off)
composed into 5
symbols
23.03.2007
Florian Deckert
Modern Cryptography
1863: Kasiski breaks Vigenere:
Find length of keyword
Divide message into substitution cryptograms
Use frequency analysis to solve these
23.03.2007
Florian Deckert
10
Modern Cryptography
1918: ADFGVX Cipher
Used in the German army in WWI
A
D
F
G
X
23.03.2007
A
B
D
Q
G
M
D
T
H
F
J
R
F
A
O
V
C
E
Florian Deckert
G
L
Z
S
U
W
X
P
K
N
X
Y
11
Modern Cryptography
1918: The Enigma
Arthur Scherbius
Business: confidential
docs
No codebooks
Rotors multi
substitution
Wireing changes as-youtype
German forces in WWII
Room 40
23.03.2007
Florian Deckert
12
Modern Cryptography
1937 1945: Navajo Code Talkers
23.03.2007
Florian Deckert
13
Modern Cryptography
1949: Shannon:
Communication
Theory of Secret
Systems
Proved: One time pad
unbreakable
23.03.2007
Florian Deckert
14
Modern Cryptography
Until mid 70s
23.03.2007
Florian Deckert
15
Modern Cryptography
1976: Diffie Hellman Key Exchange
Whitfield Diffie and Martin Hellman
Discrete logarithm problem:
G: finite cyclic group with n elements
Modulo n multiplication
b: generator of G: every element g of G can be
written as g = bk for some integer k
Goal: find k given g and b and n!
Florian Deckert
16
Modern Cryptography
So how does it work?
Exploits?
Man in the middle
Fix: additional authentication
23.03.2007
Florian Deckert
17
Modern Cryptography
Public Key Crypto
Key exchange problem
Asymmetric key algorithm
E.g: RSA, MIT, 1977
23.03.2007
Florian Deckert
18
Modern Cryptography
1991: PGP Pretty Good Privacy
Protocol, uses RSA
Encryption & decryption
Digital signatures
How does that work?
Web of Trust
Third party signs (public) key to attest association
between person and key
Florian Deckert
19
Thank You!
Lets go to Koerners.