Chapter 1 of Data Security and Cryptography
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 1
Chapter 1. A Very Brief History and Prospect of Encryption
• Cryptography development during different historical periods
1. Ancient time (2000 BCE – Roman Empire)
2. Medieval and Renaissance
3. Cryptography from 1800 to World War I
4. Cryptography during World War II
5. Modern encryption algorithms (1946 – )
6. Public key cryptography (1976 – )
7. Post-quantum cryptography (Recent – )
8. Quantum cryptography (Recent – )
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 2
1.1. Ancient time (2000 BCE – Roman Empire)
• Two representatives from ancient time:
1. In ancient Greece, the Spartan army used scytale cipher.
2. Ancient Romans are known to use the Caesar cipher in
battlefield.
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 3
Scytale Cipher (Spartan Cipher)
Scytale Cipher (aka. Spartan Cipher)
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 4
Caesar Cipher and Shift Cipher
Caesar Cipher and Shift Cipher
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 5
1.2. Medieval and Renaissance
• Arabic mathematician Al-Kindi used frequency-
analysis method and broke all shift ciphers and
monoalphabetic substitution ciphers.
• So French Bellaso devised more sophisticate
Vigenère cipher:
▪ One of the first polyalphabetic ciphers
▪ Later it was used in American Civil War
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 6
Vigenère Cipher
• Vigenère Cipher
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 7
1.3. From 1800 to World War I
• Dutch Auguste Kerckhoffs proposed in 1883:
o Kerckhoffs’ principle laid the foundation of cryptography:
The security of a cryptosystem must depend only on
the key, and not on the secrecy of any other part of
the system.
-- Still valid today.
• Playfair cipher
o Invented by English C. Wheatstone in 1854
o Probably the best cipher used in WWI
o Also used in WWII
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 8
Playfair Cipher
• Playfair Cipher
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 9
1.4. World War II Cryptography
• Enigma
o An electromechanical rotor machine used by German army.
o Broken by a group of British and Polish mathematicians
with help from French.
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 10
Enigma Machine
• Enigma Machine
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 11
1.5. Modern Cryptography
• After electric computer was invented in 1946,
all classical ciphers were soon broken.
• More complex ciphers were in a need for
secure communication.
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 12
Modern Cryptography
• Two representatives:
o DES (Data Encryption Standard):
▪ Standard cipher used by US government (1975-2000)
o AES (Advanced Encryption Standard):
▪ Encryption algorithm standardised by NIST and IEEE
around 2000 and adopted by many governments.
▪ Regarded as the current most secure encryption
algorithm.
▪ AES will be covered in Chapter 5.
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 13
1.6. Public Key Cryptography
• Extremely important in network security:
o Provide new network security services, for example, key
distribution, digital signature, etc., in addition to
encryption
• The first PKC was invented in 1976.
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 14
Public Key Cryptosystems
• well known public key cryptosystems:
o Diffie-Hellman Key Exchange:
▪ Invented in 1976
o RSA:
▪ Invented in 1977
o ElGamal:
▪ Invented in 1985
o Elliptic Curve:
▪ Invented in 1986
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 15
Public Key Cryptography Concept
• Diffie-Hellman Key Exchange
o (starts at 2.08 min)
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 16
1.7. PQC: Post-Quantum Cryptography
• As quantum computer is about to be available,
many existing cryptosystems become
vulnerable to quantum attacks.
• PQC designs systems that are immune to
quantum attacks.
o NTRU system
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 17
Why Post Quantum Cryptography?
• Post-Quantum Cryptography
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 18
1.8. Quantum Cryptography
• Cryptography based on quantum mechanics
o Different from PQC
• Use qubit
• Quantum cryptography systems
o Quantum key distribution
o Bounded quantum storage
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 19
Quantum cryptography concepts
• A Qubit in the Making
(a qubit is a quantum bit, used in quantum computing.)
• Quantum Key Distribution
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 20
Note
• Picture and videos used in the set of slides
courtesy to YouTube and Google Image.
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 21