SlideShare a Scribd company logo
CRYPTOGRAPHY
Dr Christian Bokhove
Professor in Mathematics Education
Disclaimer: I too am standing on the shoulders of giants and have made use of many
excellent resources on the web.
https://is.gd/y9crypto
What is it?
Cryptography – maths in service of security
Cryptanalysis – breaking cryptographic systems
Four functions
Confidentiality – “set of rules that limits access”
Integrity – “consistency and accuracy of
data throughout its life-cycle”
Authentication – “confirms a truth claimed
by some entity”
Non-repudiation – “ensure that the author of a piece
of information cannot deny it”
https://www.cryptool.org/en/
Origins of Cryptography
• Thought that the earliest form of cryptography was in the
Egyptian town of Menet Khufu
• The hieroglyphics on the tomb of nobleman
KHNUMHOTEP II contained unusual symbols, used to
obscure the meaning of the inscriptions.
1900 BC
Menet Khufu
Method: substitution
Origins of Cryptography
• The Spartans, in 5 BC,
developed a device called
a Scytale.
• A messenger would carry
a strip of parchment, which
was meaningless until it
was wrapped around a
Scytale of the same
dyameter.
• https://www.cryptool.org/en
/cto/scytale
Method: transposition
Caesar Cipher: c = m + 3
Caesar Shift Cipher
• Each letter was substituted by shifting n places
• Only 25 possible ciphers.
7
Julius Caesar
100 BC- 44 BC
Caesar Cipher
Many people will have tried this!
+m
A->C
B->D
C->E etc
a b c d e f g h I j k l m n o p q r s t u v w x y z
a b c d e f g h I j k l m n o p q r s t u v w x y z
Let m == 3, then the cleartext CAT
becomes the ciphertext FDW
DEMO CAESAR
https://www.cryptool.org/en/cto/caesar
But….
These are easily broken by frequency analysis:
given “enough” ciphertext, the code breaks itself
Attacking Substitution Ciphers
11
Trick 2:
Letter
Frequency
Most common: e,t,a,o,i,n
Least common: j,x,q,z
image source: wikipedia
Trick 1:
Word
Frequency
DEMO FREQUENCY
ANALYSIS
Cryptool 2.0 software
Exdsv wynobx dswoc, mbizdyqbkzri bopobbon kvwycd ohmvecsfovi dy
"oxmbizdsyx", grsmr sc dro zbymocc yp myxfobdsxq ybnsxkbi sxpybwkdsyx (mkvvon
zvksxdohd) sxdy kx exsxdovvsqslvo pybw (mkvvon mszrobdohd).[13] Nombizdsyx sc
dro bofobco, sx ydrob gybnc, wyfsxq pbyw dro exsxdovvsqslvo mszrobdohd lkmu dy
zvksxdohd. K mszrob (yb mizrob) sc k zksb yp kvqybsdrwc drkd mkbbi yed dro
oxmbizdsyx kxn dro bofobcsxq nombizdsyx. Dro nodksvon yzobkdsyx yp k mszrob sc
myxdbyvvon lydr li dro kvqybsdrw kxn, sx okmr sxcdkxmo, li k "uoi". Dro uoi sc k
combod (snokvvi uxygx yxvi dy dro mywwexsmkxdc), ecekvvi k cdbsxq yp
mrkbkmdobc (snokvvi crybd cy sd mkx lo bowowlobon li dro ecob), grsmr sc xoonon
dy nombizd dro mszrobdohd. Sx pybwkv wkdrowkdsmkv dobwc, k "mbizdycicdow"
sc dro ybnobon vscd yp ovowoxdc yp psxsdo zyccslvo zvksxdohdc, psxsdo zyccslvo
mizrobdohdc, psxsdo zyccslvo uoic, kxn dro oxmbizdsyx kxn nombizdsyx kvqybsdrwc
drkd mybboczyxn dy okmr uoi. Uoic kbo swzybdkxd lydr pybwkvvi kxn sx kmdekv
zbkmdsmo, kc mszrobc gsdryed fkbsklvo uoic mkx lo dbsfskvvi lbyuox gsdr yxvi dro
uxygvonqo yp dro mszrob econ kxn kbo drobopybo ecovocc (yb ofox myexdob-
zbynemdsfo) pyb wycd zebzycoc. Rscdybsmkvvi, mszrobc gobo ypdox econ
nsbomdvi pyb oxmbizdsyx yb nombizdsyx gsdryed knnsdsyxkv zbymoneboc cemr kc
kedroxdsmkdsyx yb sxdoqbsdi mromuc.
13
Cryptography
Until modern times, cryptography referred almost exclusively to "encryption",
which is the process of converting ordinary information (called plaintext) into an
unintelligible form (called ciphertext).[13] Decryption is the reverse, in other words,
moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a
pair of algorithms that carry out the encryption and the reversing decryption. The
detailed operation of a cipher is controlled both by the algorithm and, in each
instance, by a "key". The key is a secret (ideally known only to the communicants),
usually a string of characters (ideally short so it can be remembered by the user),
which is needed to decrypt the ciphertext. In formal mathematical terms, a
"cryptosystem" is the ordered list of elements of finite possible plaintexts, finite
possible cyphertexts, finite possible keys, and the encryption and decryption
algorithms that correspond to each key. Keys are important both formally and in
actual practice, as ciphers without variable keys can be trivially broken with only the
knowledge of the cipher used and are therefore useless (or even counter-
productive) for most purposes. Historically, ciphers were often used directly for
encryption or decryption without additional procedures such as authentication or
integrity checks.
15
https://en.wikipedia.org/wiki/Cryptography
Vigenère
• The Vigenère cipher is a polyalphabetic cipher. The relationship
between a character in the plaintext to a character in the
cipher text is one-to-many.
• Blaise de Vigenère, a 16th century French mathematician.
• It was used in the American civil war and was once believed to
be unbreakable.
• A Vigenère cipher uses a different strategy to create the key
stream. The key stream is a repetition of an initial secret key
stream of length m, where we have 1 ≤ m ≤ 26.
• The Vigenère cipher is a method of encrypting alphabetic text
by using a series of different Caesar ciphers based on the
letters of a keyword.
• The Vigenère cipher uses multiple mixed alphabets, each is a
shift cipher.
Modular arithmetic
• Telling time is famously ‘modular arithmetic’.
• Can see it as arithmetic with remainders:
20 divided by 7  remainder is 6.
• The alphabet consists of 26 letters. Let’s number them 0,
1, 3, 4….., 25.
• What if I would do B+C?
That would be 1+2=3 and that’s D.
• What if I do R+T? That’s 17+19 = 36.
• But the alphabet doesn’t go that high, so start counting
from 0 again after 25, so that’s 10, or K.
• This is arithmetic ‘modulo 26’
• Notation: 17 + 19 mod 26 = 10.
Vigenere Cipher
We can encrypt the message “She is listening” using
the 6-character keyword “PASCAL“. The initial key stream
is (15,0,18,2,0,11). The key stream is the repetition of this
initial key stream (as many times as needed) .
Use encryption algorithm:
Vigenère Table
Vigenere Cipher
• This method was actually discovered earlier, in 1854 by
Charles Babbage.
• Vigenere-like substitution ciphers were regarded by many
as practically unbreakable for 300 years.
• In 1863, a Prussian major named Kasiski proposed a
method for breaking a Vigenere cipher that consisted of
finding the length of the keyword and then dividing the
message into that many simple substitution cryptograms.
ONLINE DEMO VIGENERE
https://www.cryptool.org/en/cto/vigenere
Government Communications Headquarters
• During WWI, the British Army had a separate division from
the British Navy (“Room 40”).
• After WWI, it was proposed that a peacetime
codebreaking division be created.
• The Government Communications Headquarters was
created.
• Pre WWII, was a very small department.
• By 1940, was attacking codes of 26 countries and over
150 diplomatic cryptosystems.
• In USA many developments during WWII, including
Elizabeth Friedman, Grace Hopper and others.
World War II Cryptography
• Most Famous example of
Cryptography in World War
II was the German
Enigma.
• Made use of Rotors and
Plugboards
• One or more of the rotors
moved after each key
press, depending on the
settings.
• Created a changing
substitution cypher, or a
polyalphabetic substitution
cypher.
https://www.cryptool.org/en/cto/enigma-step-by-step
RSA Encryption
• Developed by Ron Rivest, Adi Shamir, and Leonard
Adleman.
• Type of Public Key Encryption.
• Later discovered that a similar method had been
developed by the GCHQ (The British SIGINT agency), in
1973, but was kept classified until 1997.
• “The security of RSA is based on the fact that it is easy to
calculate the product n of two large primes p and q.
However, it is very difficult to determine only from the
product n the two primes that yield the product. This
decomposition is also called the factorization of n.”
Prime numbers
• A prime number only has 1 or itself as ‘factor’.
• So, 7 is prime
• 13 is prime
• 21 is not prime because that can also be 3*7
• No even number is prime because 2 is always a factor.
• It’s not even always easy to know whether a(n odd)
number is prime or not.
Example
11677
39727
Easy to do: 11677 times 39727 is 463892179
Not so easy to do: what product of prime numbers
is 463892179 ?
RSA
https://www.cryptool.org/en/cto/rsa-step-by-step
Current day cryptography
• E.g. DES uses a 56-bit key, so 256 possible keys.
• 72,057,594,037,927,936 keys (72 thousand billion in the
UK, 72 quadrillion in the US)
• Even with all these keys, still susceptible to brute force
attacks.
• “It is known that the NSA encouraged, if not persuaded,
IBM to reduce the key size from 128 to 64 bits, and from
there to 56 bits; this is often taken as an indication that
the NSA possessed enough computer power to break
keys of this length even in the mid-1970s.” (Wikipedia)
• Many uses: Whatsapp, banking, https, 802.11, WPA,
GSM, Bluetooth, encrypting files on disk, content
protection on DVD/Blu-ray, user authentication.
https://mysterytwister.org/
https://www.cipherchallenge.org/
Thank you
Dr Christian Bokhove C.Bokhove@soton.ac.uk
Professor in Mathematics Education

More Related Content

PPTX
Dark Side of the Net Lecture 2 Cryptography
PPTX
Functionality of the RSA Cipher
PPT
Classical Encryption Techniques in Network Security
PPT
Cns 13f-lec03- Classical Encryption Techniques
PPTX
Cryptography chap#6.pptx
PPTX
Tales From the Crypt(ography)
PPTX
Classical$ nn Encryption Techniques.pptx
PPSX
Introductory Lecture on Cryptography and Information Security
Dark Side of the Net Lecture 2 Cryptography
Functionality of the RSA Cipher
Classical Encryption Techniques in Network Security
Cns 13f-lec03- Classical Encryption Techniques
Cryptography chap#6.pptx
Tales From the Crypt(ography)
Classical$ nn Encryption Techniques.pptx
Introductory Lecture on Cryptography and Information Security

Similar to Cryptography (20)

PDF
MAT255_Final_Paper_RSA_Encryption
PPTX
sabith.pptx
PPTX
Cryptography, Cryptology, Encryption and types
PDF
History of Cryptography
PDF
Crypto
PPT
Fundamentals of cryptography
PDF
What is Cryptography?
KEY
Cryptography for developers
PPTX
Introduction to cryptography part1-final
PPT
cryptography_priceton_university_fall_2007.ppt
PPTX
Cryptography & Steganography
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PPTX
Information and network security 15 other poly alphabatic ciphers
PPTX
Cs166 mynote
PPSX
5 Cryptography Part1
DOCX
Cryptography- "A Black Art"
PDF
Data Security on Computer Network and Telecommunication System Using Caesar C...
PPTX
2 Mathematics of Cryptographyy chapter 2
PDF
Security Systems for Digital Data - Paper
PDF
WEEK-2 (1).pdfdccccccccccccccccccccccccccccccccccc
MAT255_Final_Paper_RSA_Encryption
sabith.pptx
Cryptography, Cryptology, Encryption and types
History of Cryptography
Crypto
Fundamentals of cryptography
What is Cryptography?
Cryptography for developers
Introduction to cryptography part1-final
cryptography_priceton_university_fall_2007.ppt
Cryptography & Steganography
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Information and network security 15 other poly alphabatic ciphers
Cs166 mynote
5 Cryptography Part1
Cryptography- "A Black Art"
Data Security on Computer Network and Telecommunication System Using Caesar C...
2 Mathematics of Cryptographyy chapter 2
Security Systems for Digital Data - Paper
WEEK-2 (1).pdfdccccccccccccccccccccccccccccccccccc
Ad

More from Christian Bokhove (20)

PPTX
This is the new m*th! 2024 edition (researchEd Belfast 28-9-24)
PPTX
THE POTENTIAL OF SEQUENCE ANALYSIS FOR ANALYSING DATA FROM AN ONLINE MATHEM...
PPTX
Master Mathematics Teachers in Chinese primary schools
PPTX
Can data from largescale assessments ever be useful For mathematics education?
PPTX
Creating interactive digital books for the transition from secondary to under...
PPTX
Research on school inspections: What do we know?
PPTX
Master mathematics teachers: What do Chinese primary schools look like?
PPTX
The role of non-cognitive factors in science achievement: an analysis of PISA...
PPTX
Multilevel modelling of Chinese primary children’s metacognitive strategies i...
PPTX
Help-seeking in an online maths environment: A sequence analysis of log files
PPTX
Learning loss and learning inequalities during the covid-19 pandemic: an anal...
PPTX
The challenge of proof in the transition from A-level mathematics to university
PPTX
How can we develop expansive, research-informed ITE ?
PPTX
Discussant EARLI sig 27
PPTX
(On)waarheden en (on)bekende zaken uit onderzoek over reken-wiskundeonderwijs
PPTX
Transparency in Data Analysis
PPTX
Proof by induction in Calculus: Investigating first-year students’ examinatio...
PPTX
Evidence informed: Waar is de Bijsluiter?
PPTX
Methodological innovation for mathematics education research
PPTX
Roundtable slides RiTE Paderborn 24/9/2021
This is the new m*th! 2024 edition (researchEd Belfast 28-9-24)
THE POTENTIAL OF SEQUENCE ANALYSIS FOR ANALYSING DATA FROM AN ONLINE MATHEM...
Master Mathematics Teachers in Chinese primary schools
Can data from largescale assessments ever be useful For mathematics education?
Creating interactive digital books for the transition from secondary to under...
Research on school inspections: What do we know?
Master mathematics teachers: What do Chinese primary schools look like?
The role of non-cognitive factors in science achievement: an analysis of PISA...
Multilevel modelling of Chinese primary children’s metacognitive strategies i...
Help-seeking in an online maths environment: A sequence analysis of log files
Learning loss and learning inequalities during the covid-19 pandemic: an anal...
The challenge of proof in the transition from A-level mathematics to university
How can we develop expansive, research-informed ITE ?
Discussant EARLI sig 27
(On)waarheden en (on)bekende zaken uit onderzoek over reken-wiskundeonderwijs
Transparency in Data Analysis
Proof by induction in Calculus: Investigating first-year students’ examinatio...
Evidence informed: Waar is de Bijsluiter?
Methodological innovation for mathematics education research
Roundtable slides RiTE Paderborn 24/9/2021
Ad

Recently uploaded (20)

PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
RMMM.pdf make it easy to upload and study
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Institutional Correction lecture only . . .
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Business Ethics Teaching Materials for college
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
RMMM.pdf make it easy to upload and study
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Classroom Observation Tools for Teachers
Anesthesia in Laparoscopic Surgery in India
Abdominal Access Techniques with Prof. Dr. R K Mishra
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Institutional Correction lecture only . . .
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Supply Chain Operations Speaking Notes -ICLT Program
Business Ethics Teaching Materials for college
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Microbial disease of the cardiovascular and lymphatic systems
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Renaissance Architecture: A Journey from Faith to Humanism
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Module 4: Burden of Disease Tutorial Slides S2 2025
Week 4 Term 3 Study Techniques revisited.pptx

Cryptography

  • 1. CRYPTOGRAPHY Dr Christian Bokhove Professor in Mathematics Education Disclaimer: I too am standing on the shoulders of giants and have made use of many excellent resources on the web. https://is.gd/y9crypto
  • 2. What is it? Cryptography – maths in service of security Cryptanalysis – breaking cryptographic systems
  • 3. Four functions Confidentiality – “set of rules that limits access” Integrity – “consistency and accuracy of data throughout its life-cycle” Authentication – “confirms a truth claimed by some entity” Non-repudiation – “ensure that the author of a piece of information cannot deny it”
  • 5. Origins of Cryptography • Thought that the earliest form of cryptography was in the Egyptian town of Menet Khufu • The hieroglyphics on the tomb of nobleman KHNUMHOTEP II contained unusual symbols, used to obscure the meaning of the inscriptions. 1900 BC Menet Khufu Method: substitution
  • 6. Origins of Cryptography • The Spartans, in 5 BC, developed a device called a Scytale. • A messenger would carry a strip of parchment, which was meaningless until it was wrapped around a Scytale of the same dyameter. • https://www.cryptool.org/en /cto/scytale Method: transposition
  • 7. Caesar Cipher: c = m + 3 Caesar Shift Cipher • Each letter was substituted by shifting n places • Only 25 possible ciphers. 7 Julius Caesar 100 BC- 44 BC
  • 8. Caesar Cipher Many people will have tried this! +m A->C B->D C->E etc a b c d e f g h I j k l m n o p q r s t u v w x y z a b c d e f g h I j k l m n o p q r s t u v w x y z Let m == 3, then the cleartext CAT becomes the ciphertext FDW
  • 10. But…. These are easily broken by frequency analysis: given “enough” ciphertext, the code breaks itself
  • 11. Attacking Substitution Ciphers 11 Trick 2: Letter Frequency Most common: e,t,a,o,i,n Least common: j,x,q,z image source: wikipedia Trick 1: Word Frequency
  • 13. Exdsv wynobx dswoc, mbizdyqbkzri bopobbon kvwycd ohmvecsfovi dy "oxmbizdsyx", grsmr sc dro zbymocc yp myxfobdsxq ybnsxkbi sxpybwkdsyx (mkvvon zvksxdohd) sxdy kx exsxdovvsqslvo pybw (mkvvon mszrobdohd).[13] Nombizdsyx sc dro bofobco, sx ydrob gybnc, wyfsxq pbyw dro exsxdovvsqslvo mszrobdohd lkmu dy zvksxdohd. K mszrob (yb mizrob) sc k zksb yp kvqybsdrwc drkd mkbbi yed dro oxmbizdsyx kxn dro bofobcsxq nombizdsyx. Dro nodksvon yzobkdsyx yp k mszrob sc myxdbyvvon lydr li dro kvqybsdrw kxn, sx okmr sxcdkxmo, li k "uoi". Dro uoi sc k combod (snokvvi uxygx yxvi dy dro mywwexsmkxdc), ecekvvi k cdbsxq yp mrkbkmdobc (snokvvi crybd cy sd mkx lo bowowlobon li dro ecob), grsmr sc xoonon dy nombizd dro mszrobdohd. Sx pybwkv wkdrowkdsmkv dobwc, k "mbizdycicdow" sc dro ybnobon vscd yp ovowoxdc yp psxsdo zyccslvo zvksxdohdc, psxsdo zyccslvo mizrobdohdc, psxsdo zyccslvo uoic, kxn dro oxmbizdsyx kxn nombizdsyx kvqybsdrwc drkd mybboczyxn dy okmr uoi. Uoic kbo swzybdkxd lydr pybwkvvi kxn sx kmdekv zbkmdsmo, kc mszrobc gsdryed fkbsklvo uoic mkx lo dbsfskvvi lbyuox gsdr yxvi dro uxygvonqo yp dro mszrob econ kxn kbo drobopybo ecovocc (yb ofox myexdob- zbynemdsfo) pyb wycd zebzycoc. Rscdybsmkvvi, mszrobc gobo ypdox econ nsbomdvi pyb oxmbizdsyx yb nombizdsyx gsdryed knnsdsyxkv zbymoneboc cemr kc kedroxdsmkdsyx yb sxdoqbsdi mromuc. 13
  • 15. Until modern times, cryptography referred almost exclusively to "encryption", which is the process of converting ordinary information (called plaintext) into an unintelligible form (called ciphertext).[13] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a pair of algorithms that carry out the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and, in each instance, by a "key". The key is a secret (ideally known only to the communicants), usually a string of characters (ideally short so it can be remembered by the user), which is needed to decrypt the ciphertext. In formal mathematical terms, a "cryptosystem" is the ordered list of elements of finite possible plaintexts, finite possible cyphertexts, finite possible keys, and the encryption and decryption algorithms that correspond to each key. Keys are important both formally and in actual practice, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter- productive) for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks. 15 https://en.wikipedia.org/wiki/Cryptography
  • 16. Vigenère • The Vigenère cipher is a polyalphabetic cipher. The relationship between a character in the plaintext to a character in the cipher text is one-to-many. • Blaise de Vigenère, a 16th century French mathematician. • It was used in the American civil war and was once believed to be unbreakable. • A Vigenère cipher uses a different strategy to create the key stream. The key stream is a repetition of an initial secret key stream of length m, where we have 1 ≤ m ≤ 26. • The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. • The Vigenère cipher uses multiple mixed alphabets, each is a shift cipher.
  • 17. Modular arithmetic • Telling time is famously ‘modular arithmetic’. • Can see it as arithmetic with remainders: 20 divided by 7  remainder is 6. • The alphabet consists of 26 letters. Let’s number them 0, 1, 3, 4….., 25. • What if I would do B+C? That would be 1+2=3 and that’s D. • What if I do R+T? That’s 17+19 = 36. • But the alphabet doesn’t go that high, so start counting from 0 again after 25, so that’s 10, or K. • This is arithmetic ‘modulo 26’ • Notation: 17 + 19 mod 26 = 10.
  • 18. Vigenere Cipher We can encrypt the message “She is listening” using the 6-character keyword “PASCAL“. The initial key stream is (15,0,18,2,0,11). The key stream is the repetition of this initial key stream (as many times as needed) . Use encryption algorithm:
  • 20. Vigenere Cipher • This method was actually discovered earlier, in 1854 by Charles Babbage. • Vigenere-like substitution ciphers were regarded by many as practically unbreakable for 300 years. • In 1863, a Prussian major named Kasiski proposed a method for breaking a Vigenere cipher that consisted of finding the length of the keyword and then dividing the message into that many simple substitution cryptograms.
  • 22. Government Communications Headquarters • During WWI, the British Army had a separate division from the British Navy (“Room 40”). • After WWI, it was proposed that a peacetime codebreaking division be created. • The Government Communications Headquarters was created. • Pre WWII, was a very small department. • By 1940, was attacking codes of 26 countries and over 150 diplomatic cryptosystems. • In USA many developments during WWII, including Elizabeth Friedman, Grace Hopper and others.
  • 23. World War II Cryptography • Most Famous example of Cryptography in World War II was the German Enigma. • Made use of Rotors and Plugboards • One or more of the rotors moved after each key press, depending on the settings. • Created a changing substitution cypher, or a polyalphabetic substitution cypher. https://www.cryptool.org/en/cto/enigma-step-by-step
  • 24. RSA Encryption • Developed by Ron Rivest, Adi Shamir, and Leonard Adleman. • Type of Public Key Encryption. • Later discovered that a similar method had been developed by the GCHQ (The British SIGINT agency), in 1973, but was kept classified until 1997. • “The security of RSA is based on the fact that it is easy to calculate the product n of two large primes p and q. However, it is very difficult to determine only from the product n the two primes that yield the product. This decomposition is also called the factorization of n.”
  • 25. Prime numbers • A prime number only has 1 or itself as ‘factor’. • So, 7 is prime • 13 is prime • 21 is not prime because that can also be 3*7 • No even number is prime because 2 is always a factor. • It’s not even always easy to know whether a(n odd) number is prime or not.
  • 26. Example 11677 39727 Easy to do: 11677 times 39727 is 463892179 Not so easy to do: what product of prime numbers is 463892179 ?
  • 28. Current day cryptography • E.g. DES uses a 56-bit key, so 256 possible keys. • 72,057,594,037,927,936 keys (72 thousand billion in the UK, 72 quadrillion in the US) • Even with all these keys, still susceptible to brute force attacks. • “It is known that the NSA encouraged, if not persuaded, IBM to reduce the key size from 128 to 64 bits, and from there to 56 bits; this is often taken as an indication that the NSA possessed enough computer power to break keys of this length even in the mid-1970s.” (Wikipedia) • Many uses: Whatsapp, banking, https, 802.11, WPA, GSM, Bluetooth, encrypting files on disk, content protection on DVD/Blu-ray, user authentication.
  • 31. Thank you Dr Christian Bokhove C.Bokhove@soton.ac.uk Professor in Mathematics Education

Editor's Notes

  • #2: Thanks to slides from: Adam Goodbar