Top Banner
@agatestudio Cryptography M Saepul Knight Agate Studio
18
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography by Epul

@agatestudio

Cryptography

M Saepul

Knight

Agate Studio

Page 2: Cryptography by Epul

M. Saepul Ramdani

Cryptography

Page 3: Cryptography by Epul

What is …

Crypto = secret

Graph = writing

Or

Cryptology = science of secret

Page 4: Cryptography by Epul

Alice

Bob

M

Chester

Alice and Bob are communicating via insecure channel

(nguping)

Page 5: Cryptography by Epul

How

We need “machine” or “function”

To modify original message to cipher text.

And then…

We need a “secret”, we need key

Page 6: Cryptography by Epul

More details

Encryption E (m, k) = c;

Decryption D (c, k) = m;

D ( E ( m, k ), k ) = m

Page 7: Cryptography by Epul

Alice

Bob

c

Chester

Alice and Bob are communicating via insecure channel

(nguping)

E (m, k1) = c

D (c, k2) = m

Page 8: Cryptography by Epul

Example

Vigenère cipher

TheVigenère cipher is a method of encrypting alphabetic text by

using a series of different Caesar ciphers based on the letters of a

keyword. It is a simple form of polyalphabetic substitution.

Page 9: Cryptography by Epul

Vigenère cipher

Example:

m = Z

k = S

c = R

m : AGATE

k : MLAML

c : MRAFP

Page 10: Cryptography by Epul

Burial at the sea

Page 11: Cryptography by Epul

Periodic table

Page 12: Cryptography by Epul

There’s nothing to do with that

chemical structure

(But we need look at the atomic numbers)

Sc-Sc-Ti-P-Li-Cl-Na-Mg-P-Be-Mg

21-21-22-15-3-17-11-12-15-4-12

U-U-V-O-C-Q-K-L-O-D-L

Remember the Vigenère cipher!

And also, we have SUCHONG as key

Why SUCHONG ? Because you should never underestimate

the fallibility of an egomaniac

Page 13: Cryptography by Epul

Next?

U-U-V-O-C-Q-K-L-O-D-L

S-U-C-H-O-N-G-S-U-C-H

C-A-T-H-O-D-E-T-U-B-E

Cathode Tube

NB: Actually, that wasn’t good implementation

Page 14: Cryptography by Epul

When we start use our

implementation?

We won’t and we mustn’t

Because, we need a secure cipher which proven by the expert

mathematically and statistically

Unless, we do it for fun or learning

Page 15: Cryptography by Epul

Perfect but impractical

The cipher called perfect when there’s no clue/information

about key or message on cipher text

Why impractical ?

(We will discuss it after next slide)

Page 16: Cryptography by Epul

One Time Pad

Use XOR operation

1 ^ 1 = 0

1 ^ 0 = 1

0 ^ 1 = 1

0 ^ 0 = 0

Quiz: z = x ^ y ^ x; z = ?

z = y (whether value x and y)

M ^ K = C

Page 17: Cryptography by Epul

… back to impractical

One time pad is a perfect cipher

As long:|k| >= |M|

Page 18: Cryptography by Epul

Closure

Next time, we’ll discuss more about keys, modern cipher,

how it works, how we use it etc.

Uh… Question, anyone ?

Thank you