Upload
teamaol
View
634
Download
1
Embed Size (px)
Citation preview
EE TIMES – MONTICELLO.ORG – WIRED.COM - THE CODE BOOK: THE SCIENCE OF SECRECY FROM ANCIENT EGYPT TO QUANTUM CRYPTOGRAPHY - CYPHER.COM.AU – A SHORT HISTORY OF CRYPTOGRAPHY - TRINITY COLLEGE
©2013 AOL INC. ALL RIGHTS RESERVED
SOURCESSPONSORED BY
WHAT IS A BIT?
KEY SIZE FORMULAPOSSIBLECOMBINATIONS
HOW LONG WOULD IT TAKETO CRACK AN ENCRYPTIONKEY OF 256 BIT (VIA BRUTEFORCE) ASSUMING:
Polyalphabetic Cipher1460’s - Use of multiple alphabet substitutions per letter in a text, credited to Italian scholar Leon Alberti
Jefferson Wheel1780’s - A polyalphabetic cipher using 26 cylinders with alphabets on a spindle, created by Thomas Je�erson
Enigma Machine 1920’s - Very sophisticated letter switching machine, created by Arthur Scherbius for the German Army
Cryptologic Bombe1940 - Designed to crack the Enigma Machine’s daily settings, created by Alan Turing and Gordon Welchman
Data Encryption Standard 56 (DES 56)1977 - Digital encryption standard published by the National Bureau of Standards
Advanced Encryption Standard (AES)2001- Variants of either 128, 192, 256 bit digital encryption developed by Joan Daemen and Vincent Rijmen chosen as the new standard by the National Institute of Standards and Technology
A bit is a basic unit of information in computing, often represented as either a 0 or 1. Encryption keys rely on the exponential function of bit length for security
1-Bit2-Bit4-Bit8-Bit16-Bit32-Bit64-Bit
2^12^22^42^82^162^322^64
24162566553642949672961.84467E+19
• 7 billion people on the planet• Every person on the planet owns 10 computers• Each computer can test 1 billion combinations per second
WHILE NOTHING IS 100% GUARANTEED, THERE AREMANY STEPS WHEN SELECTING A PASSWORD TO STAY SAFE
HOW CAN I KEEP MYSELF SAFE?
Make sure all passwords are di�erentThe more characters used the betterUse numbers, symbols and mixed-case lettersDo not use any common words or dates
1234
IT WOULD ONLY TAKE THE EARTH'S POPULATION 77,000,000,000,000,000,000,000,000 YEARS TO CRACK IT!
Transposition Ciphers 500BC - Rearrangement of position of letters within text – Spartan use of the Skytale
Frequency Analysis800’s - Analysis of the frequency of letters in cipher text, credited to Arab philosopher Al-Kindi
Caesar Cipher 50BC - Shifted letters by a fixed number in the alphabet
ABCDEABCDE
Difficulty
500 BC
2010AD
A walk through some of cryptology’s greatest breakthroughs