Cryptography has a long history spanning thousands of years. Early uses include hieroglyphs in Egypt circa 1900BC and encrypted pottery recipes in Mesopotamia circa 1500BC. Modern cryptography emerged in the 20th century with the development of algorithms like DES and public key cryptography. Cryptography ensures confidentiality, integrity, authentication and non-repudiation through techniques like encryption, digital signatures, hashes and challenge-response protocols. It has applications in online transactions, digital signatures and password protection but faces challenges from key management and emerging technologies like quantum computing.
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
23 views
Group 03 Security
Cryptography has a long history spanning thousands of years. Early uses include hieroglyphs in Egypt circa 1900BC and encrypted pottery recipes in Mesopotamia circa 1500BC. Modern cryptography emerged in the 20th century with the development of algorithms like DES and public key cryptography. Cryptography ensures confidentiality, integrity, authentication and non-repudiation through techniques like encryption, digital signatures, hashes and challenge-response protocols. It has applications in online transactions, digital signatures and password protection but faces challenges from key management and emerging technologies like quantum computing.
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9
GROUP 03
HISTORY AND OVERVIEW OF
CRYPTOGRAPHY HISTORY OF CRYPTOGRAPHY ■ Cryptography is the art and science of using codes and ciphers to protect secrets. It has a long and fascinating history that spans thousands of years and many civilizations. Here is a brief summary of some of the key events and developments in the history of cryptography: ■ The earliest known use of cryptography was found in non-standard hieroglyphs carved into the wall of a tomb from the Old Kingdom of Egypt circa 1900BC ■ Some clay tablets from Mesopotamia around 1500BC were found to encrypt a craftsman’s recipe for pottery glaze, presumably commercially valuable ■ Hebrew scholars made use of simple monoalphabetic substitution ciphers (such as the Atbash cipher) beginning perhaps around 600 to 500 BC ■ The ancient Greeks used various methods of encryption, such as the scytale transposition cipher used by the Spartan military History continue… ■ The first well-documented use of cryptography in warfare was by Julius Caesar, who used a simple substitution cipher (now known as the Caesar cipher) to communicate with his generals around 50 BC ■ In medieval times, cryptography was used by various groups for political, religious, or personal reasons, such as by the Arabs, the Mongols, the Templars, and the Rosicrucians ■ The first systematic study of cryptography was done by the Arab mathematician and polymath Al-Kindi, who wrote a book on cryptanalysis in the 9th century AD. He introduced techniques such as frequency analysis and statistical methods to break ciphers History continue… ■ The first polyalphabetic cipher, which used multiple substitution alphabets to increase security, was invented by Leon Battista Alberti in 1467. He also designed a cipher disk that could be used to encrypt and decrypt messages ■ The first printed book on cryptography was written by Johannes Trithemius in 1508, titled Steganographia. It contained both steganography (hidden writing) and cryptography (secret writing), and was considered so mysterious that it was banned by the Catholic Church ■ The first machine that could encrypt and decrypt messages automatically was invented by Edward Hebern in 1917, using a rotor mechanism. It was followed by more advanced machines such as the Enigma, used by Nazi Germany during World War II ■ The first digital encryption scheme was proposed by Claude Shannon in his seminal paper "Communication Theory of Secrecy Systems" in 1949, where he applied information theory and mathematics to cryptography History continue… ■ The first public encryption standard was developed by IBM and adopted by the US government as the Data Encryption Standard (DES) in 1976, using a 56-bit key and a block cipher algorithm ■ The first public-key cryptography system was invented by Whitfield Diffie and Martin Hellman in 1976, using a mathematical concept called discrete logarithms. It allowed two parties to exchange secret keys over an insecure channel without prior contact ■ The first digital signature scheme was invented by Ralph Merkle, Ronald Rivest, Adi Shamir, and Leonard Adleman in 1977, using another mathematical concept called factorization. It allowed one party to sign a message with a private key that could be verified by anyone with a public key ■ The first challenge-response authentication protocol was invented by Leslie Lamport in 1981, using a one-way hash function. It allowed one party to prove its identity to another party without revealing any secret information ■ The first secure hash algorithm was developed by the US National Security Agency (NSA) and published as SHA-1 OVERVIEW OF CRYPTOGRAPHY ■ Cryptography is the study and practice of techniques for secure communication in the presence of third parties called adversaries ■ It deals with developing and analyzing protocols that prevents malicious third parties from retrieving information being shared between two entities thereby following the various aspects of information security ■ Some of the main purposes of cryptography are • Confidentiality: ensuring that only the authorized parties can access the information. • Integrity: ensuring that the information is not altered by unauthorized parties or in transit. • Authentication: ensuring that the parties involved in the communication are who they claim to be. • Non-repudiation: ensuring that the parties involved in the communication cannot deny their actions Types of cryptography ■ Secret-key cryptography: also known as symmetric cryptography, it uses a single key that is shared by both parties to encrypt and decrypt messages. Examples are DES, AES, and RC4. ■ Public-key cryptography: also known as asymmetric cryptography, it uses a pair of keys that are mathematically related but not identical. One key is public and can be shared with anyone, while the other key is private and kept secret. The public key can be used to encrypt messages that can only be decrypted by the private key, or to verify signatures that are generated by the private key. Examples are RSA, Diffie-Hellman, and ECC. ■ Hash functions: also known as one-way functions, they map an arbitrary input to a fixed-length output that is hard to invert. They can be used to generate digital fingerprints of data, to verify data integrity, or to derive keys from passwords. Examples are MD5, SHA-1, and SHA-256. Applications of Cryptography:
■ Secure online transactions: Cryptography is used to secure
online transactions, such as online banking and e-commerce, by encrypting sensitive data and protecting it from unauthorized access. ■ Digital signatures: Digital signatures are used to verify the authenticity and integrity of digital documents and ensure that they have not been tampered with. ■ Password protection: Passwords are often encrypted using cryptographic algorithms to protect them from being stolen or intercepted. Challenges of cryptography:
■ Key management: Cryptography relies on the use of keys,
which must be managed carefully to maintain the security of the communication. ■ Quantum computing: The development of quantum computing poses a potential threat to current cryptographic algorithms, which may become vulnerable to attacks. ■ Human error: Cryptography is only as strong as its weakest link, and human error can easily compromise the security of a communication.