Yhpargotpyrc - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

Yhpargotpyrc

Description:

Chose 2 prime numbers p and q (p q) Get the products n = p q and. r = (p - 1) (q - 1) ... http://ed-thelen.org/comp-hist/NSA-Enigma.html [Selke 2000] ... – PowerPoint PPT presentation

Number of Views:32
Avg rating:3.0/5.0
Slides: 18
Provided by: informati69
Category:

less

Transcript and Presenter's Notes

Title: Yhpargotpyrc


1
Yhpargotpyrc
  • Dierk Lüdemann


2
Yhpargotpyrc
- Cryptography
  • Dierk Lüdemann


3
Cryptography
  • Definition
  • History
  • Techniques
  • Steganography

4
Definition
  • crypto (hiden), graphy (writting)
  • Cryptology is the sience of
  • Cryptography
  • Encoding
  • Steganography
  • Hiding
  • Cryptanalysis
  • Decoding

(Bauer 1995, S.26) und (WikipediaKryptologie)
5
HistorySkytale
  • Transposition cipher
  • 500 B.C. Sparta
  • military purposes

Peloponnesian War (431 B.C. - 404 v)
6
HistoryTransposition cipher
  • Caesar cipher - ROT3
  • Plain ABCDEFGHIJKLMNOPQRSTUVWXYZ
  • Encode DEFGHIJKLMNOPQRSTUVWXYZABC

XQL EUHPHQ
UNI BREMEN
(Worldhistory)
7
History Polyalphabetic cipher
  • Vigenère-cipher
  • Plaintext ENGLISH
  • Key UNI
  • Ciphertext YAOFVAB

Blaise de Vigenère (1523 - 1596) french
diplomat and cryptographer (WikipediaVigenère)
8
HistoryEnigma machine

electro-mechanical rotor machine 1923Arthur
Scheribus Evolution World War 2
(Wikipedia Engima)
(WikipediaEnigma)
9
Modern methods
  • Symmetric
  • DES 1970
  • IDEA 1990
  • AES 2000
  • Exchange method
  • Diffie-Hellmann 1975
  • Asymmetric
  • RSA 1978
  • ElGamal 1985

10
Modern MethodsRSA
  • Chose 2 prime numbers p and q (p ? q)
  • Get the products n p q andr (p - 1) (q -
    1)
  • Chose e with lcm(e,r) 1
  • e and n are the Public-Key
  • Determine d with (e d) mod r 1
  • d is the Private-Key
  • encode c me mod n (m lt n)decode m cd
    mod n
  • (Selke 2000, S. 66f) (Bauer 1995, S. 160f)

11
Modern MethodsRSA - Example
  • p 29, q 37
  • n p q 1073
  • r (p - 1) (q - 1) 1008
  • Chose e 17 (coprime by 1008)
  • Calculate d 593
  • encode m 424c 42417 mod 1073 gt 1012
  • dekode c 1012m 1012593 mod 1073 gt 424

12
Steganography
  • Messages not recognizable
  • Text
  • Images
  • Music
  • Used on various websites
  • for instance sport sites
  • disadvantages
  • Huge amount of data
  • Not recognizable for the the receiver

13
SteganographyExample 1
14
SteganographyExample 2
15
SteganographyExample 3
(Peticolas)
16
Source 1
  • Bauer 1995Bauer, Friedrich L. (1995)
    Entzifferte Geheimnisse. Codes und Chiffren und
    wie sie gebrochen werden. Sonderauflage für
    Weltbild Verlag GmbH, Augsburg. Heidelberg
    Springerverlag.
  • WikipediaKryptologiehttp//de.wikipedia.org/w
    iki/Kryptologie
  • Thelen, Edhttp//ed-thelen.org/comp-hist/NSA-E
    nigma.html
  • Selke 2000Selke, Gisbert W. (2000)
    Kryptograhpie. Verfahren, Ziele,
    Einsatzmöglichkeiten. 1. Auflage. Köln OReilly
    Verlag.
  • http//kai.iks-jena.de/law/eckwertkrypto.html
  • Weltgeschichtehttp//www.web-der-weltgeschichte
    .de/Caesar_0.html
  • http//einklich.net/etc/vigenere.htm
  • http//www.informatikportal.de/kryptographie.html
    politisch5

17
Source 2
  • WikipediaDiffie-Hellman-Schlüsselaustauschhtt
    p//de.wikipedia.org/wiki/Diffie-Hellman-SchlC3B
    Csselaustausch
  • Ruhmann 1996Ruhmann, Ingo (1996) Politik der
    Chiffren. Verschleierte Seiten der
    Kryptographie-Debatte. In FIfF-Kommunikation, 13
    (3), p.45-49.
  • WikipediaAEShttp//de.wikipedia.org/wiki/Advan
    ced_Encryption_Standard
  • Peticolashttp//www.petitcolas.net/fabien/index
    .html
  • WikipediaEEShttp//de.wikipedia.org/wiki/Escr
    owed_Encryption_Standard
  • Informatikportal.dehttp//informatikportal.de/k
    ryptographie.html
Write a Comment
User Comments (0)
About PowerShow.com