Cryptography in Computing: Ian Perry Terence O'Brien
Cryptography in Computing: Ian Perry Terence O'Brien
Ian Perry
Terence O’Brien
Pre-WWII
• Cryptography performed by hand
• Keys distributed by hand
• Cryptanalysis (breaking cryptography) played a significant role in
World War I
• Most ciphers were weak to cryptanalysis
World War II
• The first use of mechanical and electromechanical tools for crypto
• Colossus - World’s first programmable digital electronic computer
• Enigma – The German crypto machine secretly broken by the allies
The Internet
• Secure communication required on large scale
• No easy way to distribute keys
• Previous ciphers and algorithms breakable
• Lead to advent of Data Encryption Standard (DES)
• Lead to advent of Asymmetric Key Encryption (Public-key)
• Later on Advanced Encryption Standard (AES)
• AES-NI – Intel’s hardware accelerated implementation on Intel Core
• Later on Secure Socket Layer (SSL)
Modern Cryptography Basics
Hashing Functions:
MD5, SHA1/256/512
Intel AES-NI
Intel SHA
References
(1) https://en.wikipedia.org/wiki/SSL_acceleration#/media/File:Sun-crypto-accelerator-1000.jpg
(2)https://docs.oracle.com/cd/E19412-01/819-0425-11/819-0425-11.pdf
(3) https://webobjects2.cdw.com/is/image/CDW/2599360?$product-main$
(4) http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1050.pdf
(5)http://avdiran.com/index.php/fa/2012-02-13-11-59-57/server
(6) http://www.cpu-world.com/forum/viewtopic.php?t=21226&start=150