Cryptography Presentation
Preview:
Citation preview
- 1. CRYPTOGRAPHY COURSE: CIS2222 SCHOOL: T.C.I. COMM.
COLLEGEDATE: MAY 11, 2015 PRESENTER: DONTE FRANCIS 1
- 2. WHAT IS CRYPTOGRAPHY? BRIEF HISTORY OF CRYPTOGRAPHY WHERE IS
CRYPTOGRAPHY USED TODAY? SYNOPSIS: IMPORTANCE OF CRYPTOGRAPHY IS
CRYPTOGRAPHY SAFE? CONCLUSION RESTRICTIONS OF CRYPTOGRAPHY 2
- 3. WHAT IS CRYPTOGRAPHY? Cryptography is the process of
encrypting and decrypting messages to and from the sender and
receiver to maintain integrity, secrecy and/or protection of
confidential information. 3
- 4. WHAT IS CRYPTOGRAPHY? Terminologies: Encryption: The process
of converting plaintext to cipher text. Decryption: The process of
converting cipher text to plaintext. 4 Plaintext: Data that has not
been converted; original text. Cipher text: Data that has been
converted.
- 5. Earliest known use of cryptography was in Egypt (ca 1900
BCE) carved into a stone. BRIEF HISTORY OF CRYPTOGRAPHY:
http://www.posterus.sk/?p=13784 5
- 6. Hebrew masters and scholars were the first to use simple
cipher based on substitution. BRIEF HISTORY OF CRYPTOGRAPHY:
http://www.posterus.sk/?p=13784 A = Z, B = Y, C = X, etc. Hebrew
ciphers 6
- 7. 5th century BC Spartan introduced the first military
strategists cryptography. BRIEF HISTORY OF CRYPTOGRAPHY:
http://www.posterus.sk/?p=13784 Scytale 7
- 8. One of historys most famous ciphers called Ceasar cipher
(named after Julius Cipher) BRIEF HISTORY OF CRYPTOGRAPHY:
http://www.posterus.sk/?p=13784 Caesar Cipher 8
- 9. The modern field of cryptography is computerised and can be
divided into two kinds, symmetric-key and asymmetric-key
cryptography. WHERE IS CRYPTOGRAPHY USED TODAY? 9
- 10. symmetric-key cryptography: encryption method in which both
the sender and receiver share the same key (a unique way of
decrypting messages). asymmetric-key cryptography: encryption
method of using two keys; a public and a private key. key: a secret
or public way of encrypting and/or decrypting cipher text. WHERE IS
CRYPTOGRAPHY USED TODAY? Terminologies 10
- 11. WHERE IS CRYPTOGRAPHY USED TODAY? Symmetric-key
Cryptography 11
- 12. WHERE IS CRYPTOGRAPHY USED TODAY? Symmetric-key
Cryptography Caesar Cipher Circle 12
- 13. WHERE IS CRYPTOGRAPHY USED TODAY? Symmetric-key
Cryptography 13
- 14. WHERE IS CRYPTOGRAPHY USED TODAY? Asymmetric-key
Cryptography 14
- 15. WHERE IS CRYPTOGRAPHY USED TODAY? Asymmetric-key
Cryptography 15
- 16. WHERE IS CRYPTOGRAPHY USED TODAY? Device Password Alarm
Systems ATMS & CREDIT CARDS ATMS & CREDIT CARDSONLINE USE
16
- 17. In some countries, even the domestic use of cryptography
is, or has been, restricted. RESTRICTIONS OF CRYPTOGRAPHY According
to Crypto Law Survey (2013), In China and Iran, a license is still
required to use cryptography. 17
- 18. Many countries have tight restrictions on the use of
cryptography. Among the more restrictive are laws in Belarus,
Kazakhstan, Mongolia, Pakistan, Singapore, Tunisia, and Vietnam.
Link:
(http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/cryptographic-policies-countries.htm)
RESTRICTIONS OF CRYPTOGRAPHY 18
- 19. In the United States, cryptography is legal for domestic
use, but there has been much conflict over legal issues related to
cryptography. RESTRICTIONS OF CRYPTOGRAPHY 19 Did you know? After
World War II, it was illegal in the US to sell or distribute
encryption technology overseas (Rosenoer, 1995).
- 20. In the United Kingdom, the Regulation of Investigatory
Powers Act gives UK police the powers to force suspects to decrypt
files or hand over passwords that protect encryption keys. Failure
to comply is an offence in its own right, punishable on conviction
by a two-year jail sentence or up to five years in cases involving
national security. Link:
(http://www.pcworld.com/article/137881/uk_data_encryption_disclosure_law_takes_effect.html)
RESTRICTIONS OF CRYPTOGRAPHY 20
- 21. Adobe, lost all due to everything being accessed by hackers
(a group of people that seeks and exploits weaknesses in a computer
system or computer network). October 2013; Customer Identities;
Customer Passwords; All belonging to over 3 Million Adobe
Customers. Scenario: 21
- 22. Cryptanalysis: Definition: The study of analysing
information systems in order to study the hidden aspects of the
systems Espionage Bribery Burglary Defection 22
- 23. Cryptanalysis: Governments have long recognised the
potential benefits of cryptanalysis for intelligence, both military
and diplomatic, and established dedicated organisations devoted to
breaking the codes and ciphers of other nations. "Breaking codes:
An impossible task?". BBC News. June 21, 2004. 23
- 24. Adobe, lost all due to everything being accessed by hackers
(a group of people that seeks and exploits weaknesses in a computer
system or computer network). IS CRYPTOGRAPHY SAFE? October 2013;
Customer Identities; Customer Passwords; All belonging to over 3
Million Adobe Customers. Scenario: 24
- 25. IS CRYPTOGRAPHY SAFE? October 2013; Customer Identities;
Customer Passwords; All belonging to over 3 Million Adobe
Customers. Scenario: There is a diamond of good news in their
announcement. They had encrypted their data. GOOD NEWS! ENCRYPTED!
ENCRYPTED! 25
- 26. CRYPTOGRAPHY BENEFITS: The tools of encryption and key
management can (and should, especially after this scenario) be
applied at numerous layers of business to protect, isolate, and
control data. Adobe did not lose anything! IMPORTANCE OF
CRYPTOGRAPHY 26
- 27. CONCLUSION 27
- 28. CONCLUSION In conclusion, we can therefore agree that
cryptography is not alone the process of encrypting and decrypting
confidential information; it is the evolutionary need for life. It
is easy to deploy and use and provides a strong protection against
data thieves. 28
- 29. 29 THANK YOU