0% found this document useful (0 votes)
22 views21 pages

Ch1 2024 Crypto History

This document provides an overview of the history and development of encryption from ancient times to modern cryptography. It discusses early manual ciphers used by ancient Greeks and Romans and covers important developments through each era such as the invention of public key cryptography and the emergence of quantum cryptography.

Uploaded by

Mohsen Shahabi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views21 pages

Ch1 2024 Crypto History

This document provides an overview of the history and development of encryption from ancient times to modern cryptography. It discusses early manual ciphers used by ancient Greeks and Romans and covers important developments through each era such as the invention of public key cryptography and the emergence of quantum cryptography.

Uploaded by

Mohsen Shahabi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Chapter 1 of Data Security and Cryptography

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 1


Chapter 1. A Very Brief History and Prospect of Encryption

• Cryptography development during different historical periods


1. Ancient time (2000 BCE – Roman Empire)
2. Medieval and Renaissance
3. Cryptography from 1800 to World War I
4. Cryptography during World War II
5. Modern encryption algorithms (1946 – )
6. Public key cryptography (1976 – )
7. Post-quantum cryptography (Recent – )
8. Quantum cryptography (Recent – )

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 2


1.1. Ancient time (2000 BCE – Roman Empire)

• Two representatives from ancient time:

1. In ancient Greece, the Spartan army used scytale cipher.

2. Ancient Romans are known to use the Caesar cipher in

battlefield.

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 3


Scytale Cipher (Spartan Cipher)

Scytale Cipher (aka. Spartan Cipher)

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 4


Caesar Cipher and Shift Cipher

Caesar Cipher and Shift Cipher

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 5


1.2. Medieval and Renaissance

• Arabic mathematician Al-Kindi used frequency-


analysis method and broke all shift ciphers and
monoalphabetic substitution ciphers.

• So French Bellaso devised more sophisticate


Vigenère cipher:
▪ One of the first polyalphabetic ciphers

▪ Later it was used in American Civil War


Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 6
Vigenère Cipher

• Vigenère Cipher

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 7


1.3. From 1800 to World War I
• Dutch Auguste Kerckhoffs proposed in 1883:
o Kerckhoffs’ principle laid the foundation of cryptography:

The security of a cryptosystem must depend only on


the key, and not on the secrecy of any other part of
the system.
-- Still valid today.

• Playfair cipher
o Invented by English C. Wheatstone in 1854
o Probably the best cipher used in WWI
o Also used in WWII

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 8


Playfair Cipher

• Playfair Cipher

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 9


1.4. World War II Cryptography

• Enigma
o An electromechanical rotor machine used by German army.

o Broken by a group of British and Polish mathematicians


with help from French.

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 10


Enigma Machine

• Enigma Machine

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 11


1.5. Modern Cryptography

• After electric computer was invented in 1946,


all classical ciphers were soon broken.
• More complex ciphers were in a need for
secure communication.

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 12


Modern Cryptography
• Two representatives:
o DES (Data Encryption Standard):
▪ Standard cipher used by US government (1975-2000)
o AES (Advanced Encryption Standard):
▪ Encryption algorithm standardised by NIST and IEEE
around 2000 and adopted by many governments.
▪ Regarded as the current most secure encryption
algorithm.
▪ AES will be covered in Chapter 5.
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 13
1.6. Public Key Cryptography
• Extremely important in network security:
o Provide new network security services, for example, key
distribution, digital signature, etc., in addition to
encryption
• The first PKC was invented in 1976.

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 14


Public Key Cryptosystems
• well known public key cryptosystems:
o Diffie-Hellman Key Exchange:
▪ Invented in 1976

o RSA:
▪ Invented in 1977

o ElGamal:
▪ Invented in 1985

o Elliptic Curve:
▪ Invented in 1986

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 15


Public Key Cryptography Concept

• Diffie-Hellman Key Exchange


o (starts at 2.08 min)

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 16


1.7. PQC: Post-Quantum Cryptography
• As quantum computer is about to be available,
many existing cryptosystems become
vulnerable to quantum attacks.
• PQC designs systems that are immune to
quantum attacks.
o NTRU system

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 17


Why Post Quantum Cryptography?

• Post-Quantum Cryptography

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 18


1.8. Quantum Cryptography

• Cryptography based on quantum mechanics


o Different from PQC

• Use qubit
• Quantum cryptography systems
o Quantum key distribution

o Bounded quantum storage

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 19


Quantum cryptography concepts

• A Qubit in the Making


(a qubit is a quantum bit, used in quantum computing.)

• Quantum Key Distribution

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 20


Note
• Picture and videos used in the set of slides
courtesy to YouTube and Google Image.

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 21

You might also like