SlideShare a Scribd company logo
Intro to Cryptography
By Sean O’Mahoney from the Computing Society at Futures Friday
What?
“Cryptography is associated with the process of converting ordinary plain text into unintelligible text
and vice-versa. It is a method of storing and transmitting data in a particular form so that only those
for whom it is intended can read and process it. Cryptography not only protects data from theft or
alteration, but can also be used for user authentication.”
– The Economic Times
Why & History
 The first known evidence of the use of cryptography (in some form) was found in an inscription
carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in
Egypt
 Fast forwarding to around 100 BC, Julius Caesar was known to use a form of encryption to
convey secret messages to his army generals posted in the war front (the Caesar Cipher)
 During the 16th century, Vigenere designed a cipher that was supposedly the first cipher which
used an encryption key.
 During the 18th the Freemasons used a cipher called Pigpen to keep their records private
 At the start of the 19th century when everything became electric, Hebern designed an electro-
mechanical contraption which was called the Hebern rotor machine. It uses a single rotor, in
which the secret key is embedded in a rotating disc.
 The Engima machine was invented by German engineer Arthur Scherbius at the end of World
War I, and was heavily used by the German forces during the Second World War.
https://access.redhat.com/blogs/766093/posts/1976023
Modern Day
“Encryption makes the modern world go round. Every time you make a mobile phone call, buy
something with a credit card in a shop or on the web, or even get cash from an ATM, encryption
bestows upon that transaction the confidentiality and security to make it possible.”
- BBC
https://www.bbc.co.uk/news/technology-24667834
PGP (Pretty Good Protection) – HTTPS
You have a public key (to lock/encrypt the
message) and a private key (to unlock/decrypt
the message). You would send the public key to
all your friends so that they can encrypt sensitive
messages that they want to send to you. Once
you receive an encrypted message, you use your
private key to decrypt it.
https://medium.freecodecamp.org/how-does-pretty-good-privacy-work-3f5f75ecea97
Challenge – Caesar Cipher
Ubcrshyyl lbh pna
qrpbqr guvf
Challenge – Atbash
The Atbash cipher is a very
common, simple cipher. It was for
the Hebrew alphabet, but modified
here to work with the English
alphabet. Basically, when encoded,
an "A" becomes a "Z", "B" turns into
"Y", etc.
Rg'h ivozgrevob
vzhb gl wvxlwv
Challenge - Pigpen
https://v2.cryptii.com/text/pigpen

More Related Content

PDF
Singapore Korea IT Symposium 2018 - SovereignWallet Network
PPTX
CACT 1.pptx Computational Complexity in Cryptology & Coding Theory
PPTX
Cryptography
PPTX
Introduction to Cryptography
PDF
Security Systems for Digital Data - Paper
PPT
8-encryption.ppt
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Singapore Korea IT Symposium 2018 - SovereignWallet Network
CACT 1.pptx Computational Complexity in Cryptology & Coding Theory
Cryptography
Introduction to Cryptography
Security Systems for Digital Data - Paper
8-encryption.ppt
CRYPTOGRAPHY AND NETWORK SECURITY

Similar to Intro to Cryptography (Futures Friday) (20)

PPTX
cryptography presentation this about how cryptography works
PDF
Crypto_Artemis Final oooo Presentation.pdf
PPTX
Cryptography
PPT
History of cryptography
PPTX
Cryptography.pptxhis document provides an overview of cryptography. It define...
PDF
How Spies Communicate – Mocomi.com
PPSX
5 Cryptography Part1
PPT
Security Systems for Digital Data
PDF
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
PDF
Computer Security Chapter III.pdf
PPT
ENCRYPTION
PDF
WHAT IS CRYPTOGRAPHY - A COMPREHENSIVE GUIDE
PPTX
Ciphertext(usman 57, humza-34)
PDF
PPTX
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
PDF
CyberGhost VPN Encryption Guide
ODP
Week12
PPTX
Advanced cryptography and implementation
PDF
DataMotion-IG1-TheEvolutionofEncryption
PPTX
Encryption
cryptography presentation this about how cryptography works
Crypto_Artemis Final oooo Presentation.pdf
Cryptography
History of cryptography
Cryptography.pptxhis document provides an overview of cryptography. It define...
How Spies Communicate – Mocomi.com
5 Cryptography Part1
Security Systems for Digital Data
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
Computer Security Chapter III.pdf
ENCRYPTION
WHAT IS CRYPTOGRAPHY - A COMPREHENSIVE GUIDE
Ciphertext(usman 57, humza-34)
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
CyberGhost VPN Encryption Guide
Week12
Advanced cryptography and implementation
DataMotion-IG1-TheEvolutionofEncryption
Encryption
Ad

More from Sean O'Mahoney (10)

PPTX
Tips & Tricks From The Experts
PPTX
Managing Your Assessments
PPTX
Making the Most of Lectures
PPTX
CompiledMCR
PPTX
Front-end Performance 101
PPTX
University Recommendations
PPTX
Creating Your Own Static Website Generator
PPTX
Single Page Web App
PPTX
BCS Hackathon: Check Your Numbers
PPTX
TAPIT Pitch Idea
Tips & Tricks From The Experts
Managing Your Assessments
Making the Most of Lectures
CompiledMCR
Front-end Performance 101
University Recommendations
Creating Your Own Static Website Generator
Single Page Web App
BCS Hackathon: Check Your Numbers
TAPIT Pitch Idea
Ad

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity
A comparative analysis of optical character recognition models for extracting...
MIND Revenue Release Quarter 2 2025 Press Release
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
sap open course for s4hana steps from ECC to s4
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Programs and apps: productivity, graphics, security and other tools
NewMind AI Weekly Chronicles - August'25-Week II
Assigned Numbers - 2025 - Bluetooth® Document
Machine learning based COVID-19 study performance prediction

Intro to Cryptography (Futures Friday)

  • 1. Intro to Cryptography By Sean O’Mahoney from the Computing Society at Futures Friday
  • 2. What? “Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.” – The Economic Times
  • 3. Why & History  The first known evidence of the use of cryptography (in some form) was found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in Egypt  Fast forwarding to around 100 BC, Julius Caesar was known to use a form of encryption to convey secret messages to his army generals posted in the war front (the Caesar Cipher)  During the 16th century, Vigenere designed a cipher that was supposedly the first cipher which used an encryption key.  During the 18th the Freemasons used a cipher called Pigpen to keep their records private  At the start of the 19th century when everything became electric, Hebern designed an electro- mechanical contraption which was called the Hebern rotor machine. It uses a single rotor, in which the secret key is embedded in a rotating disc.  The Engima machine was invented by German engineer Arthur Scherbius at the end of World War I, and was heavily used by the German forces during the Second World War. https://access.redhat.com/blogs/766093/posts/1976023
  • 4. Modern Day “Encryption makes the modern world go round. Every time you make a mobile phone call, buy something with a credit card in a shop or on the web, or even get cash from an ATM, encryption bestows upon that transaction the confidentiality and security to make it possible.” - BBC https://www.bbc.co.uk/news/technology-24667834
  • 5. PGP (Pretty Good Protection) – HTTPS You have a public key (to lock/encrypt the message) and a private key (to unlock/decrypt the message). You would send the public key to all your friends so that they can encrypt sensitive messages that they want to send to you. Once you receive an encrypted message, you use your private key to decrypt it. https://medium.freecodecamp.org/how-does-pretty-good-privacy-work-3f5f75ecea97
  • 6. Challenge – Caesar Cipher Ubcrshyyl lbh pna qrpbqr guvf
  • 7. Challenge – Atbash The Atbash cipher is a very common, simple cipher. It was for the Hebrew alphabet, but modified here to work with the English alphabet. Basically, when encoded, an "A" becomes a "Z", "B" turns into "Y", etc. Rg'h ivozgrevob vzhb gl wvxlwv