0% found this document useful (0 votes)
5 views18 pages

Cryptography

Cryptography is the practice of securing information using mathematical algorithms to ensure that only authorized users can access it. It has historical roots, with notable examples like the Caesar Cipher and the Enigma Machine, and consists of key concepts such as plaintext, ciphertext, encryption, and decryption. Modern cryptography is crucial in various fields, including finance and military operations, and continues to evolve with technologies like AES.

Uploaded by

thecat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views18 pages

Cryptography

Cryptography is the practice of securing information using mathematical algorithms to ensure that only authorized users can access it. It has historical roots, with notable examples like the Caesar Cipher and the Enigma Machine, and consists of key concepts such as plaintext, ciphertext, encryption, and decryption. Modern cryptography is crucial in various fields, including finance and military operations, and continues to evolve with technologies like AES.

Uploaded by

thecat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

CRYPT

OGRAP
HY
Maira Sakhi, Zainab
Asim
What is
Cryptography? Cryptography is the process of ensuring
information is only accessible to certain
authorized users. It employs the usage of
mathematical algorithms, and specified
protocols to encrypt data.

Cryptography is derived from the Greek word “kryptós”,


which means hidden, and “graphein”, to write.
Key Concepts In Cryptography
Plaintext Encryption
(a format of text representation in The process of encrypting data in such a
characters that are fully readable). manner that only authorized individuals can
decode
Ciphertext Shift Value

(an encrypted version of A shift value replaces a value with another fixed value. e.g.
Ceaser Cipher +3
the plaintext).

Algorithm Decryption

In Cryptography, an algorithm is a The process of decoding ciphertext back into


set of mathematical procedures plaintext using a key and an algorithm.
and calculations carried out by a
computer for decoding.
In History
Originating from ancient times, the
practice of cryptography has carried
into modern times. Some of the most
pertinent examples are the Ceaser
Cipher and the Enigma Machine.

Roman emperor, Julius Ceaser, who invented


the Ceaser Cipher.
Asymmetrical VS
Symmetrical
Asymmetric Symmetric
Asymmetrical encryption employs the usage of
al
two keys, a private and a public one. The private al
Symmetrical encryption only requires one key
that can be used to encode and decode data. A
key is kept secret and used to sign message so ciphertext can easily be decrypted by reverse
others can identify a certain individual. The engineering the key. e.g, if the key is +3, you
public key is shared with others so they can can decode it by applying -3.
encrypt a message that you can understand.
Disadvantages/
Advantages
Symmetrical Asymmetrical
Asymmetrical encryption, because of its singular Asymmetrical encryption is much safer than
1. 1. Symmetrical encryption because the private key
key, is much easier and faster to execute.
is not distributed.

Asymmetrical encryption often requires more complicated


However, if the key is not safely stored,
2. sensitive data can easily be accessed. 2. mathematical calculations so it is difficult to execute manually.
1. Write down your message in
plaintext. e.g. “The five boxing
wizards jump quickly.”

2. Decide on the shift value to


Example Of A
correspond to the preexisting
values. In this instance, we will
skip ahead four letters from the
Symmetrical
Suppose you want to disguise a
message written in the English
concerned letter.
Cipher
alphabet in plaintext. For this
example, we will use a symmetrical
3. Apply your shift value (+4)
substitution cipher.

4. Now, the ciphertext is:


“xlifsBmrkAmDevhwnyqtuymgopC”

This message may seem incoherent but with the shift value, it is
easy to decode. The encryption ensures that only those with
knowledge of the shift value can access the information.
ENCRYPTION
1. Take a number between 1
and 10. (9) Example Of An
2. Add 7 to the number. (7 + 9 =
16)
Asymmetrical
3. Take only the last digit. (6)
Encrypted Number = 6
Cipher
Suppose you want to disguise a
message consisting of a number
between 1 and 10. For this example,
DECRYPTIO we will use a asymmetrical cipher.

NAdd 3 to the encrypted number. ( 6 + 3 = 9)


1.

2. Take only the last digit of the number. (9)


Decrypted Number = 9
Decryption
Despite being practically impossible to crack, the enigma code was
eventually cracked by Alan Turing and a few other cryptologists. The
design of the Enigma Machine had one design flaw: a letter could never
show up as its own self in any code, which made it possible to break.
British cryptologists used captured codebooks to predict the next codes
and “cribs”, which were estimates about what the message was about.
The most important encrypted reports were Weather Reports, which were
invaluable as they provided specific locations and stated they were
reports regarding the weather. In addition to this, German operators
usually picked the names of loved ones as the key, despite being told to
pick random 4 letter keys. These were called “Cillies”, after an operator’s
excessive use of the name “Celia.” The signing-off on many important
messages with “Heil Hitler” also provided help in decryption.
The Enigma
Machine
The Enigma Machine was a cipher device used
extensively by Nazi Germany to send confidential
military messages during WWII. It resembled a
typewriter and to use it, one person would type in
a message on the keyboard, this would be the
plaintext. For each letter that was typed in, an
alternate letter lit up on the above alphabet,
which would be noted down by another person as
the ciphertext. The rotary motors, which had 26
settings determined which letters would light up.
The Enigma Machine had 150,000,000,000,000
possible combinations. To decrypt a message,
you would apply the right rotor settings on
another enigma machine.
Cryptography
In Modern
Cryptology is still widely used today to secure

Times
information. Cryptography is especially important
in financial services, communication, government
and military operation and authentication. The
AES is used in almost all of these encryptions.
Conclusion
In very simple terms, cryptography takes “plaintext” and
scrambles it into “ciphertext” using an “algorithm”. Cryptography
has always been an immensely important part of securing and
transmitting information to an authorized sender. Originating from
ancient times, cryptography is an invaluable science that is still
practiced today.
Question
Ciphertext
No. 1
Q: What is the
Algorithm
name of the
original message
Plaintext
which has not
been encrypted?
Question No. 2
Asymmetric
al
Q: Which type of
cryptography can
be done manually?
Symmetric
al
Question No. 3

Repetition of certain
names
Q: Which one of
Captured Codebooks
these was NOT a
flaw in the Enigma
Letters Never Encrypt
machine?
ing As Themselves
Try Again.
Correct!
Thank
You! +
Q/A
Maira Sakhi Zainab Asim VIII-O G1

You might also like