0% found this document useful (0 votes)
160 views

Liwagon Slides Understanding Codes in Data Transmission and Security 2

The document discusses cryptography and codes used for data transmission and security. It provides background on the history of cryptography from ancient times to the modern digital world. It also explains key cryptography concepts like encryption, decryption, symmetric and asymmetric key systems, and algorithms like the Caesar cipher and RSA. The document is intended to help understand cryptography and codes.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
160 views

Liwagon Slides Understanding Codes in Data Transmission and Security 2

The document discusses cryptography and codes used for data transmission and security. It provides background on the history of cryptography from ancient times to the modern digital world. It also explains key cryptography concepts like encryption, decryption, symmetric and asymmetric key systems, and algorithms like the Caesar cipher and RSA. The document is intended to help understand cryptography and codes.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Understanding Codes in

Data Transmission and


Security
Elgie T. Liwagon
Department of Mathematics and Statistics
College of Science and Mathematics

Elgie T. Liwagon
Faculty of DMS, MSU-IIT
Introduction

Cryptography is a method of storing and


transmitting data in a particular form so that only
those for whom it is intended can read and
process it. Cryptography is closely related to the
disciplines of cryptology and cryptanalysis.
Cryptography includes techniques or ways to hide
information in storage or transit.

Understanding Codes in Data Transmission and Security


German Lorenz cipher machine, used in World
War II to encrypt very-high-level general staff
messages.

Understanding Codes in Data Transmission and Security


HISTORY

Understanding Codes in Data Transmission and Security


BCE: Spartan use of scytale, the Egyptians develop hieroglyphic writing and

Notable Roman ciphers such as the Caesar cipher .


Understanding Codes in Data Transmission and Security
1-1799: Leon Battista Alberti invents polyalphabetic
cipher, also known as the first mechanical cipher
machine.

Understanding Codes in Data Transmission and Security


1800-1899: The first long distance telegraphic device was made by
Joseph Henry and Samuel Morse invented a telegraph system for
sending messages using electricity

Understanding Codes in Data Transmission and Security


Understanding Codes in Data Transmission and Security
1900-1949: First break of German Army Enigma by Marian Rejewski in Poland.

Understanding Codes in Data Transmission and Security


1950-1999: Charles Bennett and Gilles Brassard design the first quantum cryptography
protocol, BB84.

Understanding Codes in Data Transmission and Security


2000 to present: Microsoft and its allies vow to end "full disclosure" of
security vulnerabilities by replacing it with "responsible" disclosure
guidelines.

Understanding Codes in Data Transmission and Security


CLASSIC CRYPTOGRAPHY

THE SCYTALE

Understanding Codes in Data Transmission and Security


CRYPTOGRAPHY in the DIGITAL WORLD

Understanding Codes in Data Transmission and Security


TERMINOLOGY

 Plaintext: Message that is going to be transmitted or stored. Anyone can


read plaintext.
 Encryption: The method by which we can hide the actual meaning of
plaintext.
 Cipher text: The result of encryption which results in unreadable gibberish.
 Decryption: The method by which the original meaning of cipher text can
be recovered. Simply the process of converting Cipher text to plaintext is
called Decryption.
 Key: the secret piece of information which is used for encryption and
decryption in Cryptography.

Understanding Codes in Data Transmission and Security


Understanding Codes in Data Transmission and Security
2 Basic Types of Cryptographic Systems

Symmetric Key System

Symmetric key systems require both the sender and the


recipient to have the same key. This key is used by the
sender to encrypt the data, and again by the recipient to
decrypt the data.

Understanding Codes in Data Transmission and Security


Understanding Codes in Data Transmission and Security
Caesar Cipher

Understanding Codes in Data Transmission and Security


Caesar Cipher with shifting value ‘3’

Understanding Codes in Data Transmission and Security


Understanding Codes in Data Transmission and Security
2 Basic Types of Cryptographic Systems

Asymmetric Key System

Asymmetric cryptographic systems are considered much


more flexible. Each user has both a public key and a
private key. Messages are encrypted with one key and
can be decrypted only by the other key. The public key
can be published widely while the private key is kept
secret. If Alice wishes to send Bob a secret, she finds and
verifies Bob's public key, encrypts her message with it, and
mails it off to Bob. When Bob gets the message, he uses his
private key to decrypt it.
Understanding Codes in Data Transmission and Security
Understanding Codes in Data Transmission and Security
RSA ALGORITHM

 RSA derives its security from the computational difficulty


of factoring large integers that are the product of two
large prime numbers.
 Multiplying two large primes is easy, but the difficulty of
determining the original numbers from the product --
factoring -- forms the basis of public key cryptography
security. The time it takes to factor the product of two
sufficiently large primes is considered to be beyond the
capabilities of most attackers.

Understanding Codes in Data Transmission and Security


USES of CRYPTOGRAPHY in the MODERN
WORLD

Understanding Codes in Data Transmission and Security


THANK YOU for WATCHING!

You might also like