welcome welcome welcome welcome what will happen today
play

Welcome! Welcome! Welcome! Welcome! What will happen today? What - PowerPoint PPT Presentation

th January 2008 20 th 20 January 2008 University College London University College London Welcome! Welcome! Welcome! Welcome! What will happen today? What will happen today? Lecture Lecture - - bear with us, will start in a minute!


  1. th January 2008 20 th 20 January 2008 University College London University College London Welcome! Welcome! Welcome! Welcome!

  2. What will happen today? What will happen today? Lecture Lecture - - bear with us, will start in a minute! bear with us, will start in a minute! Tour around UCL Tour Tour around UCL Tour around UCL around UCL will give you a taste of an academic life. will give you a taste of an academic life. Workshops Workshops: : try to use what you’ve learnt. try to use what you’ve learnt.

  3. Cryptography Cryptography Better don’t get confused! Better don’t get confused!

  4. First First things things first first

  5. First First things things first first Cryptography Cryptography

  6. First First things things first first Cryptography Cryptography

  7. First First things things first first Cryptography Cryptography κρυπτός [ κρυπτός κρυπτός [ κρυπτός [ kryptos [ kryptos kryptos ] kryptos ] ] ] "secret" "secret" γράφω γράφω [ [ gráphō ] "I write" write"

  8. First First things things first first Cryptography Cryptography κρυπτός κρυπτός [ κρυπτός [ κρυπτός [ kryptos [ kryptos kryptos ] kryptos ] ] ] "secret" "secret" γράφω γράφω [ [ gráphō ] "I write" write" Steganography Stegano graphy

  9. First First things things first first Cryptography Cryptography κρυπτός κρυπτός [ κρυπτός [ κρυπτός [ kryptos [ kryptos kryptos ] kryptos ] ] ] "secret" "secret" γράφω γράφω [ [ gráphō ] "I write" write" Steganography Stegano graphy

  10. First First things things first first Cryptography Cryptography κρυπτός κρυπτός [ κρυπτός [ κρυπτός [ kryptos [ kryptos kryptos ] kryptos ] ] ] "secret" "secret" γράφω [ γράφω [ gráphō ] "I write" write" "covered " covered" " Steganography Stegano graphy

  11. Steganography Steganography - - examples examples

  12. Steganography Steganography - - examples examples http://www.mcbworld.com/mcbworld/gadget-c-3.html

  13. Steganography Steganography - - examples examples http://lawngospel.wordpress.com/2008/10/12/the-redeemed- tattoo-if-were-gonna-ink-wed-better-think/ http://www.mcbworld.com/mcbworld/gadget-c-3.html

  14. More about cryptography More about cryptography

  15. More about cryptography More about cryptography � CODE WORDS CODE WORDS �

  16. More about cryptography More about cryptography � CODE WORDS CODE WORDS � apple pie = prepare the attack apple pie = prepare the attack mum’s favourite broom = enemies mum’s favourite broom = enemies

  17. More about cryptography More about cryptography � CODE WORDS CODE WORDS � � � TRANSPOSITION CIPHER TRANSPOSITION CIPHER

  18. More about cryptography More about cryptography � CODE WORDS CODE WORDS � � � TRANSPOSITION CIPHER TRANSPOSITION CIPHER need a break need a break = = ende a rbaek ende a rbaek

  19. More about cryptography More about cryptography � CODE WORDS CODE WORDS � � � TRANSPOSITION CIPHER TRANSPOSITION CIPHER � � SUBSTITUTION CIPHER SUBSTITUTION CIPHER

  20. More about cryptography More about cryptography � CODE WORDS CODE WORDS � � � TRANSPOSITION CIPHER TRANSPOSITION CIPHER � SUBSTITUTION CIPHER � SUBSTITUTION CIPHER A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B… A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B… fly f ly = ekx = ekx (1 place to the left (1 place to the left) ) rainbow = udlqerz rainbow = udlqerz (3 places to the right) (3 places to the right) � � Caesar cipher Caesar cipher

  21. More about cryptography More about cryptography � CODE WORDS CODE WORDS � � � TRANSPOSITION CIPHER TRANSPOSITION CIPHER � � SUBSTITUTION CIPHER SUBSTITUTION CIPHER � � S SYMBOLIC CIPHER YMBOLIC CIPHER

  22. More about cryptography More about cryptography � CODE WORDS CODE WORDS � � � TRANSPOSITION CIPHER TRANSPOSITION CIPHER � � SUBSTITUTION CIPHER SUBSTITUTION CIPHER � � S SYMBOLIC CIPHER YMBOLIC CIPHER I am hungry = I am hungry =

  23. More about cryptography More about cryptography � CODE WORDS CODE WORDS � � � TRANSPOSITION CIPHER TRANSPOSITION CIPHER � � SUBSTITUTION CIPHER SUBSTITUTION CIPHER � � S SYMBOLIC CIPHER YMBOLIC CIPHER � many more… � many more…

  24. Right… but how to crack the code? Right… but how to crack the code?

  25. Right… but how to crack the code? Right… but how to crack the code? http://www.thedavincigame.com/Code_breaking.html http://www.thedavincigame.com/Code_breaking.html

  26. Kid Kid- -RSA RSA RSA creators: RSA creators: Ron Rivest, Ron Rivest, Adi Shamir Adi Shamir Leonard Adleman Leonard Adleman RSA was first RSA was first described in 1977. described in 1977. One of the two most popular ways of coding a message. One of the two most popular ways of coding a message. Kid Kid- -RSA: RSA: proposed by Neal Koblitz proposed by Neal Koblitz

  27. Quick recap Quick recap � � integer integer � � modulo modulo � public key � public key public key and public key and and private key and private key private key private key � � encryption encryption plaintext plaintext ciphertext ciphertext decryption decryption

  28. Here it comes… ! Here it comes… !

  29. Here it comes… ! Here it comes… ! Remember: letters are just symbols, Remember: letters are just symbols, you can use pictures if you find it easier! you can use pictures if you find it easier! M M = = a a * * b b - -1 1 is essentially the same as: is essentially the same as: � � � � � -1

  30. Bibliography Bibliography 1. 1. http://www.scribd.com/doc/2345053/Modular http://www.scribd.com/doc/2345053/Modular- -Arithmetic Arithmetic- -RSA RSA- -Encryption Encryption 2. 2. http://www.math.washington.edu/~koblitz/crlogia.html http://www.math.washington.edu/~koblitz/crlogia.html 3. 3. http://www.cs.uri.edu/cryptography/publickeykidkrypto.htm http://www.cs.uri.edu/cryptography/publickeykidkrypto.htm 4. 4. http://www.mathaware.org/mam/06/Sauerberg_PKC http://www.mathaware.org/mam/06/Sauerberg_PKC- -essay.html essay.html 5. 5. http http://axion.physics.ubc.ca/crypt.html#RSA ://axion.physics.ubc.ca/crypt.html#RSA 6. 6. http://www.answers.com/RSA http://www.answers.com/RSA 7. 7. http://www.mcld.co.uk/decipher/ http://www.mcld.co.uk/decipher/ 8. 8. http://www.exploratorium.edu/ronh/secret/secret.html http://www.exploratorium.edu/ronh/secret/secret.html 9. 9. http http://en.wikipedia.org/wiki/Cryptography ://en.wikipedia.org/wiki/Cryptography 10. 10. http://en.wikipedia.org/wiki/Steganography http://en.wikipedia.org/wiki/Steganography 11. 11. http://en.wikipedia.org/wiki/Public_key http://en.wikipedia.org/wiki/Public_key

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend