21
ENCRYPTION & CRYPTOGRAPHY Sean, Josh, James and Tom

Encryption & cryptography

Embed Size (px)

Citation preview

Page 1: Encryption & cryptography

ENCRYPTION & CRYPTOGRAPHY

Sean, Josh, James and Tom

Page 2: Encryption & cryptography

What’s the difference?

Encryption

Cryptography Method

Cryptography Method

Cryptography Method

Page 3: Encryption & cryptography

What is Encryption Translation of information/data into secret

code Exercised heavily in ecommerce systems

(such as online stores and authorization) Used more and more as technology

improves

Page 4: Encryption & cryptography

Cryptography Overview Thousands of years old (Classic

Cryptography) Typically utilises secret keys or passwords

Page 5: Encryption & cryptography

Uses of Cryptography Internet (Online Stores, Authentication

Logins) Web SSL Certificates (Secure Browsing

https) Governments – Classified Documents Digital Watermarking Images within Images (Steganography) Terrorist Attacks and other illegal

activities

Page 6: Encryption & cryptography

Classic CryptographyOld Kingdom of Egypt – Circa 1900BC

Page 7: Encryption & cryptography

Classic Cryptography Substitution ciphers

letter replacement Caesar Cipher

3 Point Shift

H E L L O

K H O O R

IJ

FG

MN

MN

PQ

Page 8: Encryption & cryptography

Classic Cryptography Cont’ Transposition ciphers

Letters Unchanged Letters Reordered E.g. “Hello my name is” could encrypt to..

“si eman ym olleH”

Page 9: Encryption & cryptography

Modern CryptographyWorld War II

Page 10: Encryption & cryptography

Modern Cryptography Enigma Machine – Invented 1918

Used until 1939 Then modified in the war and latter

called the M4 Heavily regarded as helping to win the

war

…So how does it work?

Page 11: Encryption & cryptography

Enigma MachineCode to Encrypt: “Permission to attack”

Stage 1 CryptographyABCDEFGHIJKLMNOPQRSTUVWXYZDEMIJKVWXYLQRSTUABCZNOPFGH

Resulting Code: “Wjbrxccxus zu dzzdml”

Page 12: Encryption & cryptography

Enigma Machine cont’Original Code: “Permission to attack”stage 1 Code: “Wjbrxccxus zu dzzdml”

Stage 2 CryptographyABCDEFGHIJKLMNOPQRSTUVWXYZRSXNOPYLQFMIZKVWGHUATDEBCJ

Resulting Code: “Efshbxxbau ja njjnzm”

Page 13: Encryption & cryptography

Enigma Machine cont’Original Code: “Permission to attack”Stage 1 Code: “Wjbrxccxus zu dzzdml”Stage 2 Code: “Efshbxxbau ja njjnzm”

Stage 3 Cryptography (Caesar Cipher)Efshbxxbau ja njjnzm

Resulting Code: “Hivkeaaedx md qmmqcp”

Page 14: Encryption & cryptography

Enigma Machine cont’Original Code: “Permission to attack”Stage 1 Code: “Wjbrxccxus zu dzzdml”Stage 2 Code: “Efshbxxbau ja njjnzm”Stage 3 Code: “Hivkeaaedx md qmmqcp”

Stage 4 Cryptography (Reflector)Swapped in pairs.Resulting Code: “Ihkvaeeaxd dm mqmqpc”

Page 15: Encryption & cryptography

Enigma Machine cont’Original Code: “Permission to attack”

….…Stage 4 Code: “Ihkvaeeaxd dm mqmqpc”

…This is then put back through the Caesar Cipher, followed by 2 random substitution layers

Resulting in “Cwzbhllhiu Ut xaxake”

Page 16: Encryption & cryptography

Web Encryption

“In my role as Wikileaks editor, I've been involved in fighting off many legal attacks. To do that, and keep our sources safe, we have had to spread assets, encrypt everything, and move telecommunications and people around the world to activate

protective laws in different national jurisdictions.”Julian Assange, WikiLeaks

Page 17: Encryption & cryptography

Web Encryption: MD5 Most common form of encryption Widely used on the web Used to also check data integrity Produces a 128bit (16-byte) hash

value Cannot be Decrypted (One way hash)

Hello = md5(8b1a9953c4611296a827abf8c47804d7)

Page 18: Encryption & cryptography

Web Encryption: Salt Adds a string of characters before an

cryptography process takes place.

Salt Key = 1083Result = 1083HelloMD5(21326fad24a68107521358e4cfa8535f)

MD5 Hash Databasehttp://md5decrypter.co.uk/

Page 19: Encryption & cryptography

Web Encryption: SSL/ TLS Secure Communications over the

internet SSL = Secure Socket Layer TLS = Transport Layer Security Main way of achieving this is via

HTTPS

Page 20: Encryption & cryptography

Future Of Encryption Encryption has developed greatly over

the last 10 years and will continue… Hackers become more wise Technology becomes more personal

…Encryption needs to keep up with technology

Page 21: Encryption & cryptography

Any Questions?

…thank you!