Encryption & cryptography

Preview:

Citation preview

ENCRYPTION & CRYPTOGRAPHY

Sean, Josh, James and Tom

What’s the difference?

Encryption

Cryptography Method

Cryptography Method

Cryptography Method

What is Encryption Translation of information/data into secret

code Exercised heavily in ecommerce systems

(such as online stores and authorization) Used more and more as technology

improves

Cryptography Overview Thousands of years old (Classic

Cryptography) Typically utilises secret keys or passwords

Uses of Cryptography Internet (Online Stores, Authentication

Logins) Web SSL Certificates (Secure Browsing

https) Governments – Classified Documents Digital Watermarking Images within Images (Steganography) Terrorist Attacks and other illegal

activities

Classic CryptographyOld Kingdom of Egypt – Circa 1900BC

Classic Cryptography Substitution ciphers

letter replacement Caesar Cipher

3 Point Shift

H E L L O

K H O O R

IJ

FG

MN

MN

PQ

Classic Cryptography Cont’ Transposition ciphers

Letters Unchanged Letters Reordered E.g. “Hello my name is” could encrypt to..

“si eman ym olleH”

Modern CryptographyWorld War II

Modern Cryptography Enigma Machine – Invented 1918

Used until 1939 Then modified in the war and latter

called the M4 Heavily regarded as helping to win the

war

…So how does it work?

Enigma MachineCode to Encrypt: “Permission to attack”

Stage 1 CryptographyABCDEFGHIJKLMNOPQRSTUVWXYZDEMIJKVWXYLQRSTUABCZNOPFGH

Resulting Code: “Wjbrxccxus zu dzzdml”

Enigma Machine cont’Original Code: “Permission to attack”stage 1 Code: “Wjbrxccxus zu dzzdml”

Stage 2 CryptographyABCDEFGHIJKLMNOPQRSTUVWXYZRSXNOPYLQFMIZKVWGHUATDEBCJ

Resulting Code: “Efshbxxbau ja njjnzm”

Enigma Machine cont’Original Code: “Permission to attack”Stage 1 Code: “Wjbrxccxus zu dzzdml”Stage 2 Code: “Efshbxxbau ja njjnzm”

Stage 3 Cryptography (Caesar Cipher)Efshbxxbau ja njjnzm

Resulting Code: “Hivkeaaedx md qmmqcp”

Enigma Machine cont’Original Code: “Permission to attack”Stage 1 Code: “Wjbrxccxus zu dzzdml”Stage 2 Code: “Efshbxxbau ja njjnzm”Stage 3 Code: “Hivkeaaedx md qmmqcp”

Stage 4 Cryptography (Reflector)Swapped in pairs.Resulting Code: “Ihkvaeeaxd dm mqmqpc”

Enigma Machine cont’Original Code: “Permission to attack”

….…Stage 4 Code: “Ihkvaeeaxd dm mqmqpc”

…This is then put back through the Caesar Cipher, followed by 2 random substitution layers

Resulting in “Cwzbhllhiu Ut xaxake”

Web Encryption

“In my role as Wikileaks editor, I've been involved in fighting off many legal attacks. To do that, and keep our sources safe, we have had to spread assets, encrypt everything, and move telecommunications and people around the world to activate

protective laws in different national jurisdictions.”Julian Assange, WikiLeaks

Web Encryption: MD5 Most common form of encryption Widely used on the web Used to also check data integrity Produces a 128bit (16-byte) hash

value Cannot be Decrypted (One way hash)

Hello = md5(8b1a9953c4611296a827abf8c47804d7)

Web Encryption: Salt Adds a string of characters before an

cryptography process takes place.

Salt Key = 1083Result = 1083HelloMD5(21326fad24a68107521358e4cfa8535f)

MD5 Hash Databasehttp://md5decrypter.co.uk/

Web Encryption: SSL/ TLS Secure Communications over the

internet SSL = Secure Socket Layer TLS = Transport Layer Security Main way of achieving this is via

HTTPS

Future Of Encryption Encryption has developed greatly over

the last 10 years and will continue… Hackers become more wise Technology becomes more personal

…Encryption needs to keep up with technology

Any Questions?

…thank you!

Recommended