










Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A comprehensive overview of the history of cryptography, tracing its evolution from ancient egypt to modern encryption techniques. It explores key milestones, influential figures, and the impact of cryptography on communication security. Classical cryptography techniques, including the scytale cipher, polybius square, and caesar cipher, as well as the development of frequency analysis and polyalphabetic ciphers. It also delves into the contributions of al-kindi, leon battista alberti, and claude shannon, highlighting their groundbreaking work in the field. The document concludes with a discussion of modern cryptography, including the data encryption standard (des), advanced encryption standard (aes), and public-key cryptography.
Typology: Slides
1 / 18
This page cannot be seen from the preview
Don't miss anything!
Cryptography is technique of securing information and communications from unauthorized access and tampering. It
involves converting messages into secret codes to prevent unauthorized people from reading or tampering with them. It
involves processes like encryption (turning plain information into secret code) and decryption (turning the secret code
back into readable information). The word 'cryptography' is combination of two Greek words, 'Krypto' meaning hidden
and 'graphene' meaning writing.
Protect Privacy: Keep personal and sensitive information secret from unauthorized individuals or groups.
Ensure Data Integrity: Make sure that data has not been altered or tampered with during transmission or storage.
Secure Communication
Prevent Unauthorized Access
The Greeks and Romans employed cryptography primarily for military and secret communication.
(scytale). The letters on the strip would form a meaningful message only when wrapped around a rod of the same
diameter.
of numbers representing their coordinates. For example, "BAT" would be encoded as "12 11 44". It was particularly
useful in signaling with pairs of torches or other devices, allowing for discrete and efficient communication over
distance.
Caesar Cipher: Later, the scholars moved on to using simple mono-alphabetic substitution ciphers during 500 to 600 BC.
This involved replacing alphabets of message with other alphabets with some secret rule. This rule became a key to
retrieve the message back from the garbled message.
the Caesar cipher , was used by Julius Caesar to secure military communications.
The ancient Greeks were well known for the use of Ciphers. The Caesar Cipher or Shift Cipher is one of the earliest and
simplest well-known cryptographic techniques. It is a form of Substitution Cipher where each character in a word is
replaced by a fixed number of positions. For example with a shift of 3, A is replaced by D, B by E, and so on.
ROMAN CRYPTOGRAPHY:
How it Works : Uses a keyword to encrypt the message, making it harder to break than the Caesar Cipher.
Example : Encrypting "HELLO" with the key "KEY" changes the letters based on their positions.
Al-Kindi’s contributions to mathematics, especially in introducing Arabic numerals, were instrumental in advancing both
Islamic and Western knowledge.
His methods in cryptanalysis influenced not just the Muslim world but eventually also Western Europe, where his ideas
were integrated centuries later.
Beyond cryptography, Al-Kindi applied his analytical skills to medicine, developing a scale for quantifying the potency of
medications. This shows the breadth of his intellectual pursuits, linking cryptography, mathematics, and medical
science.
methods were often improvised. By the late 1800s, cryptographers, like Auguste Kerckhoffs, began to formalize the
field.
In the 1840s, famous writer Edgar Allan Poe used systematic techniques to crack ciphers. He even invited people to
send him codes through a Philadelphia newspaper, which he solved almost entirely, gaining public attention. Poe
later wrote an essay on cryptography, which became helpful for British codebreakers during World War I.
In World War I, a British group called "Room 40" played a key role by breaking German naval codes. This allowed
them to intercept German fleets, leading to important battles like Dogger Bank and Jutland in the North Sea.
Cryptography was critical to military success during this time.
In 1917, Gilbert Vernam proposed a teletype cipher in which a previously-prepared key, kept on paper tape, is
combined character by character with the plaintext message to produce the cyphertext. This led to the
development of electromechanical devices as cipher machines.
In the 1840s, Edgar Allan Poe showcased his cryptographic skills by advertising in a Philadelphia newspaper, inviting
people to submit ciphers. He successfully solved nearly all the ciphers he received.
There was suspicion that government organizations even then had sufficient computing power to break DES messages,
clearly others have achieved this capability.
The aging DES was officially replaced by the Advanced Encryption Standard (AES) in 2001
The publication of the paper New Directions in Cryptography by Whitfield Diffie and Martin Hellman.
It introduced a radically new method of distributing cryptographic keys, which went far toward solving one of the
fundamental problems of cryptography, key distribution, and has become known as Diffie- Hellman key exchange.
cryptosystems might work. This was the publication of the paper New Directions in Cryptography by Whitfield Diffie and
Martin Hellman.
It introduced a radically new method of distributing cryptographic keys, which went far toward solving one of the
fundamental problems of cryptography, key distribution, and has become known as Diffie-Hellman key exchange. The
article also stimulated the almost immediate public development of a new class of enciphering algorithms, the
asymmetric key algorithms.
Conclusion :-
Cryptography has evolved significantly over time, from basic techniques like the Caesar Cipher to advanced algorithms
like AES. It plays a crucial role in securing modern communication, ensuring privacy and protecting sensitive data in
the digital age. As technology advances, especially with the potential of quantum computing, cryptography will
continue to adapt, shaping the future of secure communication.