220 likes | 398 Views
Cryptography Evolution. Joshua Poplawski 4/18/2013. Which of these is an example of cryptography?. P S A N A N K N O Y M O P G O N N K D O CODE-187. C. Don’t get confused. Code: Using letters, figures and/or symbols to represent a message CODE 187.
E N D
Cryptography Evolution Joshua Poplawski 4/18/2013
Which of these is an example of cryptography? • PSANANKNOYMOPGONNKDO • CODE-187 C.
Don’t get confused • Code: Using letters, figures and/or symbols to represent a message • CODE 187
Steganography: Art and practice of concealing a message • http://www.youtube.com/watch?v=_8wAUdKF9Yk
Cipher • Replacing regular letters numbers or symbols with others P S A N A N K N O Y M O P G O N N K D O thisisasecret message PSAN AN K NOYMOP GONNKDO
WAR • Romans Used Ciphers • 1917 -- US Army created the Cipher Bureau with in the Military Intelligence Division • 1930 – US Army Signal Security Agency (SSA) • 1949 – Armed Forces Security Agency (AFSA) • 1952 – National Security Agency (NSA)
Cryptography = Munitions?! • Until 1996 encryption fell under International Traffic in Arms Regulations (ITAR) • classified encryption as arms • prohibiting export of encryption from the US without a license. • In 1996 fell under Export Administration Regulations (EAR) • EAR amended some provisions in 2010
Cryptography in the Commercial realm • Growing use of wire money transfers put pressure on export restrictions • Data Encryption Standard 1975 • The rise of Personal Computers and The Internet • Development of electronic commerce
Where is encryption used? • EVERY WHERE! • You need encryption any time you are storing, sharing or transmitting “sensitive information”
Fundamental Concepts • Symmetric • One key to encrypt and decrypt • Asymmetric • Two keys, one to encrypt and one to decrypt • Generally used to share symmetric keys.
Fundamental Concepts • Confusion • Obscuring the relationship between plaintext and cipher text • Substitution • Polyalphabetic cipher
Fundamental Concepts • Diffusion • Dissipates redundancy of plaintext • Transposition/permutation
Fundamental Concepts • Block Cipher • Encrypts a group of bits at a time as one block • Can be used in multiple ways • Have to wait for whole block to encrypt before you send block • Stream Cipher • Convert plain text to cipher text one bit at a time • Can send bit by bit, good for streaming Audio or Video
Strong Modern Cipher Algorithms • Rijendael Cipher (AES) • Serpent • Twofish
Reference List • http://www.colemer.org/Common_Police_Codes.htm • http://www.youtube.com/watch?v=_8wAUdKF9Yk • http://www.nsa.gov/public_info/_files/cryptologic_spectrum/early_history_nsa.pdf • http://www.nsa.gov/about/cryptologic_heritage/vigilance_park/origins_of_asa.shtml • http://en.wikipedia.org/wiki/National_Security_Agency • http://ncoic.com/nsa.htm • http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_United_States • http://www.gibsondunn.com/publications/Documents/WebcastSlides-EncryptionExportControls-02-21-2012.pdf • http://www.bis.doc.gov/encryption/ • http://www.gibsondunn.com/publications/Documents/WebcastSlides-EncryptionExportControls-02-21-2012.pdf • http://encryption_policies.tripod.com/us/baker_060100_regulation.htm • http://arstechnica.com/business/2012/02/from-encryption-to-darknets-as-governments-snoop-activists-fight-back/ • http://www.bis.doc.gov/encryption/question6sub_2.htm • http://www.bis.doc.gov/encryption/question6sub_3.htm • http://www.bis.doc.gov/encryption/question6sub_4.htm • http://www.bis.doc.gov/encryption/enc_faqs.htm • http://packetlife.net/blog/2010/nov/23/symmetric-asymmetric-encryption-hashing/ • http://www.infosectoday.com/Articles/Intro_to_Cryptography/CryptoFig04.jpg • http://www.kellermansoftware.com/t-ArticleStrongestAlgo.aspx
Reference List • Pfleeger, Charles. Pfleeger, Shari; Security in Computing; 3rd Edition; Prentice Hall PTR; 2003; ISBN: 0-13-035548-8 • Schneier, Bruce; Applied Cryptography Protocols, Algorithms, and Source Code in C; John Wiley & Sons, Inc.; 1994; ISBN: 0-471-59756-2 • http://en.wikipedia.org/wiki/Serpent_(cipher) • http://en.wikipedia.org/wiki/Advanced_Encryption_Standard_process • http://en.wikipedia.org/wiki/Rijndael
short answer exam question • What developments lead to the private and commercial use of encryption?