Top Banner
CRYPTOGRAPHY COURSE: CIS2222 SCHOOL: T.C.I. COMM. COLLEGE DATE: MAY 11, 2015 PRESENTER: DONTE FRANCIS 1
29
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  1. 1. CRYPTOGRAPHY COURSE: CIS2222 SCHOOL: T.C.I. COMM. COLLEGEDATE: MAY 11, 2015 PRESENTER: DONTE FRANCIS 1
  2. 2. WHAT IS CRYPTOGRAPHY? BRIEF HISTORY OF CRYPTOGRAPHY WHERE IS CRYPTOGRAPHY USED TODAY? SYNOPSIS: IMPORTANCE OF CRYPTOGRAPHY IS CRYPTOGRAPHY SAFE? CONCLUSION RESTRICTIONS OF CRYPTOGRAPHY 2
  3. 3. WHAT IS CRYPTOGRAPHY? Cryptography is the process of encrypting and decrypting messages to and from the sender and receiver to maintain integrity, secrecy and/or protection of confidential information. 3
  4. 4. WHAT IS CRYPTOGRAPHY? Terminologies: Encryption: The process of converting plaintext to cipher text. Decryption: The process of converting cipher text to plaintext. 4 Plaintext: Data that has not been converted; original text. Cipher text: Data that has been converted.
  5. 5. Earliest known use of cryptography was in Egypt (ca 1900 BCE) carved into a stone. BRIEF HISTORY OF CRYPTOGRAPHY: http://www.posterus.sk/?p=13784 5
  6. 6. Hebrew masters and scholars were the first to use simple cipher based on substitution. BRIEF HISTORY OF CRYPTOGRAPHY: http://www.posterus.sk/?p=13784 A = Z, B = Y, C = X, etc. Hebrew ciphers 6
  7. 7. 5th century BC Spartan introduced the first military strategists cryptography. BRIEF HISTORY OF CRYPTOGRAPHY: http://www.posterus.sk/?p=13784 Scytale 7
  8. 8. One of historys most famous ciphers called Ceasar cipher (named after Julius Cipher) BRIEF HISTORY OF CRYPTOGRAPHY: http://www.posterus.sk/?p=13784 Caesar Cipher 8
  9. 9. The modern field of cryptography is computerised and can be divided into two kinds, symmetric-key and asymmetric-key cryptography. WHERE IS CRYPTOGRAPHY USED TODAY? 9
  10. 10. symmetric-key cryptography: encryption method in which both the sender and receiver share the same key (a unique way of decrypting messages). asymmetric-key cryptography: encryption method of using two keys; a public and a private key. key: a secret or public way of encrypting and/or decrypting cipher text. WHERE IS CRYPTOGRAPHY USED TODAY? Terminologies 10
  11. 11. WHERE IS CRYPTOGRAPHY USED TODAY? Symmetric-key Cryptography 11
  12. 12. WHERE IS CRYPTOGRAPHY USED TODAY? Symmetric-key Cryptography Caesar Cipher Circle 12
  13. 13. WHERE IS CRYPTOGRAPHY USED TODAY? Symmetric-key Cryptography 13
  14. 14. WHERE IS CRYPTOGRAPHY USED TODAY? Asymmetric-key Cryptography 14
  15. 15. WHERE IS CRYPTOGRAPHY USED TODAY? Asymmetric-key Cryptography 15
  16. 16. WHERE IS CRYPTOGRAPHY USED TODAY? Device Password Alarm Systems ATMS & CREDIT CARDS ATMS & CREDIT CARDSONLINE USE 16
  17. 17. In some countries, even the domestic use of cryptography is, or has been, restricted. RESTRICTIONS OF CRYPTOGRAPHY According to Crypto Law Survey (2013), In China and Iran, a license is still required to use cryptography. 17
  18. 18. Many countries have tight restrictions on the use of cryptography. Among the more restrictive are laws in Belarus, Kazakhstan, Mongolia, Pakistan, Singapore, Tunisia, and Vietnam. Link: (http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/cryptographic-policies-countries.htm) RESTRICTIONS OF CRYPTOGRAPHY 18
  19. 19. In the United States, cryptography is legal for domestic use, but there has been much conflict over legal issues related to cryptography. RESTRICTIONS OF CRYPTOGRAPHY 19 Did you know? After World War II, it was illegal in the US to sell or distribute encryption technology overseas (Rosenoer, 1995).
  20. 20. In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to decrypt files or hand over passwords that protect encryption keys. Failure to comply is an offence in its own right, punishable on conviction by a two-year jail sentence or up to five years in cases involving national security. Link: (http://www.pcworld.com/article/137881/uk_data_encryption_disclosure_law_takes_effect.html) RESTRICTIONS OF CRYPTOGRAPHY 20
  21. 21. Adobe, lost all due to everything being accessed by hackers (a group of people that seeks and exploits weaknesses in a computer system or computer network). October 2013; Customer Identities; Customer Passwords; All belonging to over 3 Million Adobe Customers. Scenario: 21
  22. 22. Cryptanalysis: Definition: The study of analysing information systems in order to study the hidden aspects of the systems Espionage Bribery Burglary Defection 22
  23. 23. Cryptanalysis: Governments have long recognised the potential benefits of cryptanalysis for intelligence, both military and diplomatic, and established dedicated organisations devoted to breaking the codes and ciphers of other nations. "Breaking codes: An impossible task?". BBC News. June 21, 2004. 23
  24. 24. Adobe, lost all due to everything being accessed by hackers (a group of people that seeks and exploits weaknesses in a computer system or computer network). IS CRYPTOGRAPHY SAFE? October 2013; Customer Identities; Customer Passwords; All belonging to over 3 Million Adobe Customers. Scenario: 24
  25. 25. IS CRYPTOGRAPHY SAFE? October 2013; Customer Identities; Customer Passwords; All belonging to over 3 Million Adobe Customers. Scenario: There is a diamond of good news in their announcement. They had encrypted their data. GOOD NEWS! ENCRYPTED! ENCRYPTED! 25
  26. 26. CRYPTOGRAPHY BENEFITS: The tools of encryption and key management can (and should, especially after this scenario) be applied at numerous layers of business to protect, isolate, and control data. Adobe did not lose anything! IMPORTANCE OF CRYPTOGRAPHY 26
  27. 27. CONCLUSION 27
  28. 28. CONCLUSION In conclusion, we can therefore agree that cryptography is not alone the process of encrypting and decrypting confidential information; it is the evolutionary need for life. It is easy to deploy and use and provides a strong protection against data thieves. 28
  29. 29. 29 THANK YOU