19
Mechanising Cryptography Professor Richard Walton CB

Mechanising Cryptography

  • Upload
    pepper

  • View
    30

  • Download
    0

Embed Size (px)

DESCRIPTION

Mechanising Cryptography. Professor Richard Walton CB. Cryptography is concerned with the application of technology to the problem of encrypting and decrypting a message. The Mathematics is subordinate to the technology. 20 th Century Cryptography. Development of Crypt in the 1900s - PowerPoint PPT Presentation

Citation preview

Page 1: Mechanising Cryptography

Mechanising Cryptography

Professor Richard Walton CB

Page 2: Mechanising Cryptography

Cryptography is concerned with the application of technology to the problem of encrypting and decrypting a message.

The Mathematics is subordinate to the technology

Page 3: Mechanising Cryptography

20th Century Cryptography Development of Crypt in the 1900s Manual Methods

– Slow– Laborious– Error-Prone

Need to mechanise Importance of technology for design Nature of technological constraints

Page 4: Mechanising Cryptography

CRYPTOGRAPHYSecurity

Usability Cost

Page 5: Mechanising Cryptography

Cryptanalysis 1918 Knowledge of language Frequency Analysis Key Re-use (Depth)

Skill Requirement:To solve crossword puzzles

in foreign languages

Page 6: Mechanising Cryptography

Rotor Machines

Page 7: Mechanising Cryptography

Rotors

Page 8: Mechanising Cryptography

Commercial Enigma

Page 9: Mechanising Cryptography

Enigma

Page 10: Mechanising Cryptography

Enigma

Army

Navy

Navy – 4 wheel

Page 11: Mechanising Cryptography
Page 12: Mechanising Cryptography
Page 13: Mechanising Cryptography

Early Machine Cryptography Limitations of Security Design Balance Security against Cost Usability – Human Factors

Page 14: Mechanising Cryptography

Electronics – 1960-1980 Shift Registers and Simple Logic Gates Linear Algebra Galois Theory Rich Mathematical structure Rigorous Analysis Expensive Components

Page 15: Mechanising Cryptography

Large Scale Integration Application Specific Integrated Circuits Complex Algorithms Tailored to purpose Standard Cryptographic Primitives Software and Firmware

Page 16: Mechanising Cryptography

Public Key Cryptography Key Management Non-Secret Encryption

– Ellis, Cocks & Williamson– Beyond 1970’s technology

Widespread after 1985 Search for easier solutions

– Elliptic Curve Cryptography

Page 17: Mechanising Cryptography

Next Challenge

Quantum Computers destroycurrent Public Key algorithms

Find new algorithms to resist Quantum Computer attacks

Page 18: Mechanising Cryptography
Page 19: Mechanising Cryptography

Mechanising CryptographyAcknowledgement

Illustrations concerning Enigma in this presentation have been taken from the user manual for Enigma – E

by Paul Reuvers & Marc Simons.

For details of Enigma-E, which is available for purchase from Bletchley Park Museum, see www.xat.nl/enigma-e/