Top Banner
Cryptography Cryptography By, Anthony Lonigro By, Anthony Lonigro & & Valentine Mbah Valentine Mbah
136

Cryptography By, Anthony Lonigro & Valentine Mbah.

Dec 31, 2015

Download

Documents

Anthony Haynes
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography By, Anthony Lonigro & Valentine Mbah.

CryptographyCryptography

By, Anthony LonigroBy, Anthony Lonigro

&&

Valentine MbahValentine Mbah

Page 2: Cryptography By, Anthony Lonigro & Valentine Mbah.

IntroductionIntroduction

• Cryptography is the enciphering and deciphering of messages in secret code.

• As time moves on cryptography is required to evolve and with the existence of computers, cryptography has become a key feature in the lifeline of

all developed countries.

Page 3: Cryptography By, Anthony Lonigro & Valentine Mbah.

Enigma MachineEnigma Machine

• Electrical pathways

• Custom Rotors

• Polyalphabetic substitution and One-time pads

• It’s breech was a momentous occasion in WWII

Page 4: Cryptography By, Anthony Lonigro & Valentine Mbah.
Page 5: Cryptography By, Anthony Lonigro & Valentine Mbah.
Page 6: Cryptography By, Anthony Lonigro & Valentine Mbah.

Importance of CryptographyImportance of Cryptography

• Almost all communications of sensitive data are done by software programs with file encryption capabilities.

• Without it, countries would fall.

• Used in digital signatures and credit card transactions over the internet.

Page 7: Cryptography By, Anthony Lonigro & Valentine Mbah.

Importance Continued…Importance Continued…

• Companies could not have online interfaces without it.

• Imagine if every sensitive piece of information you entered to the internet was easily accessible by hackers.

Page 8: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 9: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 10: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 11: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 12: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 13: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 14: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 15: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 16: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 17: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 18: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 19: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 20: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 21: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 22: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 23: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 24: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 25: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 26: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 27: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 28: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 29: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 30: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 31: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 32: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 33: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 34: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 35: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 36: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 37: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 38: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 39: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 40: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 41: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 42: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 43: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 44: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 45: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Page 46: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Page 47: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Page 48: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Page 49: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Page 50: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Page 51: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Page 52: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Page 53: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Page 54: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Page 55: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Page 56: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Page 57: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Page 58: Cryptography By, Anthony Lonigro & Valentine Mbah.

With CryptographyWith Cryptography

Hacker!!

Information safe!

Page 59: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Page 60: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Page 61: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Page 62: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Page 63: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Page 64: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Page 65: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Page 66: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!Hacker!

Page 67: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 68: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 69: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 70: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 71: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 72: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 73: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 74: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 75: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 76: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 77: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 78: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 79: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 80: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 81: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 82: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 83: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 84: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 85: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 86: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 87: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 88: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 89: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 90: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Page 91: Cryptography By, Anthony Lonigro & Valentine Mbah.

Without CryptographyWithout Cryptography

Hacker!

Hello World!

Information Compromised!

Page 92: Cryptography By, Anthony Lonigro & Valentine Mbah.

ExampleExample

• Plaintext = hello

• Encoded = ifmmp

• Every letter is transformed into the letter preceding it.

Page 93: Cryptography By, Anthony Lonigro & Valentine Mbah.

CiphersCiphers

• The mathematical algorithm used to encrypt a message is called a cipher.

• Types: Symmetric Key Cipher & Asymmetric Key Cipher.

Page 94: Cryptography By, Anthony Lonigro & Valentine Mbah.

Symmetric Key CipherSymmetric Key Cipher

• One Key

Encryption key = Decryption key

Page 95: Cryptography By, Anthony Lonigro & Valentine Mbah.
Page 96: Cryptography By, Anthony Lonigro & Valentine Mbah.

Asymmetric Key CipherAsymmetric Key Cipher

• Two Keys

Encryption Key != Decryption Key

Page 97: Cryptography By, Anthony Lonigro & Valentine Mbah.
Page 98: Cryptography By, Anthony Lonigro & Valentine Mbah.

Modern CryptographyModern Cryptography

• Quantum Cryptography

• Unlike other cryptography methods which rely on computational security, quantum cryptography uses every single particle of light, which is called a photon, to transmit data.

Page 99: Cryptography By, Anthony Lonigro & Valentine Mbah.

Modern Cryptography Cont..Modern Cryptography Cont..

• In old methods a couple photons could be intercepted and the users would not know.

• In Quantum Cryptography, if any photon is intercepted the data is transformed and the users are informed.

Page 100: Cryptography By, Anthony Lonigro & Valentine Mbah.
Page 101: Cryptography By, Anthony Lonigro & Valentine Mbah.

Parallel ProgrammingParallel Programming

• With parallel programming a hacker can use multiple key cracking algorithms.

• This makes it easier to crack keys that have lower encryption bits.

• With most of the

encryptions today,

a key can be broken in

O(2^n) time.

Page 102: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key, parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 103: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 104: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 105: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 106: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 107: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 108: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 109: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 110: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 111: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 112: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 113: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 114: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 115: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 116: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 117: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 118: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 119: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 120: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 121: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 122: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 123: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 124: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 125: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 126: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 127: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 128: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 129: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 130: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 131: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 132: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 133: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 134: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 135: Cryptography By, Anthony Lonigro & Valentine Mbah.

HackersHackers

• Even with a 56 bit encryption key parallel programming helps to crack the key.

• With a 56 bit key a regular user would take 38 years to crack this key but if you used computers from a large corporation it would only take 6 minutes to break this key with a brute force algorithm.

1 Computer

Many computers with parallel programming

Page 136: Cryptography By, Anthony Lonigro & Valentine Mbah.

QuestionsQuestions