1
EE TIMES – MONTICELLO.ORG – WIRED.COM - THE CODE BOOK: THE SCIENCE OF SECRECY FROM ANCIENT EGYPT TO QUANTUM CRYPTOGRAPHY - CYPHER.COM.AU – A SHORT HISTORY OF CRYPTOGRAPHY - TRINITY COLLEGE ©2013 AOL INC. ALL RIGHTS RESERVED SOURCES SPONSORED BY WHAT IS A BIT? KEY SIZE FORMULA POSSIBLE COMBINATIONS HOW LONG WOULD IT TAKE TO CRACK AN ENCRYPTION KEY OF 256 BIT (VIA BRUTE FORCE) ASSUMING: Polyalphabetic Cipher 1460’s - Use of multiple alphabet substitutions per letter in a text, credited to Italian scholar Leon Alberti Jefferson Wheel 1780’s - A polyalphabetic cipher using 26 cylinders with alphabets on a spindle, created by Thomas Jefferson Enigma Machine 1920’s - Very sophisticated letter switching machine, created by Arthur Scherbius for the German Army Cryptologic Bombe 1940 - Designed to crack the Enigma Machine’s daily settings, created by Alan Turing and Gordon Welchman Data Encryption Standard 56 (DES 56) 1977 - Digital encryption standard published by the National Bureau of Standards Advanced Encryption Standard (AES) 2001- Variants of either 128, 192, 256 bit digital encryption developed by Joan Daemen and Vincent Rijmen chosen as the new standard by the National Institute of Standards and Technology A bit is a basic unit of information in computing, often represented as either a 0 or 1. Encryption keys rely on the exponential function of bit length for security 1-Bit 2-Bit 4-Bit 8-Bit 16-Bit 32-Bit 64-Bit 2^1 2^2 2^4 2^8 2^16 2^32 2^64 2 4 16 256 65536 4294967296 1.84467E+19 • 7 billion people on the planet • Every person on the planet owns 10 computers • Each computer can test 1 billion combinations per second WHILE NOTHING IS 100% GUARANTEED, THERE ARE MANY STEPS WHEN SELECTING A PASSWORD TO STAY SAFE HOW CAN I KEEP MYSELF SAFE? Make sure all passwords are different The more characters used the better Use numbers, symbols and mixed-case letters Do not use any common words or dates 1 2 3 4 IT WOULD ONLY TAKE THE EARTH'S POPULATION 77,000,000,000,000,000,000,000,000 YEARS TO CRACK IT! Transposition Ciphers 500BC - Rearrangement of position of letters within text – Spartan use of the Skytale Frequency Analysis 800’s - Analysis of the frequency of letters in cipher text, credited to Arab philosopher Al-Kindi Caesar Cipher 50BC - Shifted letters by a fixed number in the alphabet ABCDE ABCDE Difficulty 5 0 0 B C 2 0 1 0 A D A walk through some of cryptology’s greatest breakthroughs

A History of Encryption Since 500 BC

  • Upload
    teamaol

  • View
    634

  • Download
    1

Embed Size (px)

Citation preview

EE TIMES – MONTICELLO.ORG – WIRED.COM - THE CODE BOOK: THE SCIENCE OF SECRECY FROM ANCIENT EGYPT TO QUANTUM CRYPTOGRAPHY - CYPHER.COM.AU – A SHORT HISTORY OF CRYPTOGRAPHY - TRINITY COLLEGE

©2013 AOL INC. ALL RIGHTS RESERVED

SOURCESSPONSORED BY

WHAT IS A BIT?

KEY SIZE FORMULAPOSSIBLECOMBINATIONS

HOW LONG WOULD IT TAKETO CRACK AN ENCRYPTIONKEY OF 256 BIT (VIA BRUTEFORCE) ASSUMING:

Polyalphabetic Cipher1460’s - Use of multiple alphabet substitutions per letter in a text, credited to Italian scholar Leon Alberti

Jefferson Wheel1780’s - A polyalphabetic cipher using 26 cylinders with alphabets on a spindle, created by Thomas Je�erson

Enigma Machine 1920’s - Very sophisticated letter switching machine, created by Arthur Scherbius for the German Army

Cryptologic Bombe1940 - Designed to crack the Enigma Machine’s daily settings, created by Alan Turing and Gordon Welchman

Data Encryption Standard 56 (DES 56)1977 - Digital encryption standard published by the National Bureau of Standards

Advanced Encryption Standard (AES)2001- Variants of either 128, 192, 256 bit digital encryption developed by Joan Daemen and Vincent Rijmen chosen as the new standard by the National Institute of Standards and Technology

A bit is a basic unit of information in computing, often represented as either a 0 or 1. Encryption keys rely on the exponential function of bit length for security

1-Bit2-Bit4-Bit8-Bit16-Bit32-Bit64-Bit

2^12^22^42^82^162^322^64

24162566553642949672961.84467E+19

• 7 billion people on the planet• Every person on the planet owns 10 computers• Each computer can test 1 billion combinations per second

WHILE NOTHING IS 100% GUARANTEED, THERE AREMANY STEPS WHEN SELECTING A PASSWORD TO STAY SAFE

HOW CAN I KEEP MYSELF SAFE?

Make sure all passwords are di�erentThe more characters used the betterUse numbers, symbols and mixed-case lettersDo not use any common words or dates

1234

IT WOULD ONLY TAKE THE EARTH'S POPULATION 77,000,000,000,000,000,000,000,000 YEARS TO CRACK IT!

Transposition Ciphers 500BC - Rearrangement of position of letters within text – Spartan use of the Skytale

Frequency Analysis800’s - Analysis of the frequency of letters in cipher text, credited to Arab philosopher Al-Kindi

Caesar Cipher 50BC - Shifted letters by a fixed number in the alphabet

ABCDEABCDE

Difficulty

500 BC

2010AD

A walk through some of cryptology’s greatest breakthroughs