Ch1 2024 Crypto History

Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

Chapter 1 of Data Security and Cryptography

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 1


Chapter 1. A Very Brief History and Prospect of Encryption

• Cryptography development during different historical periods


1. Ancient time (2000 BCE – Roman Empire)
2. Medieval and Renaissance
3. Cryptography from 1800 to World War I
4. Cryptography during World War II
5. Modern encryption algorithms (1946 – )
6. Public key cryptography (1976 – )
7. Post-quantum cryptography (Recent – )
8. Quantum cryptography (Recent – )

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 2


1.1. Ancient time (2000 BCE – Roman Empire)

• Two representatives from ancient time:

1. In ancient Greece, the Spartan army used scytale cipher.

2. Ancient Romans are known to use the Caesar cipher in

battlefield.

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 3


Scytale Cipher (Spartan Cipher)

Scytale Cipher (aka. Spartan Cipher)

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 4


Caesar Cipher and Shift Cipher

Caesar Cipher and Shift Cipher

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 5


1.2. Medieval and Renaissance

• Arabic mathematician Al-Kindi used frequency-


analysis method and broke all shift ciphers and
monoalphabetic substitution ciphers.

• So French Bellaso devised more sophisticate


Vigenère cipher:
▪ One of the first polyalphabetic ciphers

▪ Later it was used in American Civil War


Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 6
Vigenère Cipher

• Vigenère Cipher

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 7


1.3. From 1800 to World War I
• Dutch Auguste Kerckhoffs proposed in 1883:
o Kerckhoffs’ principle laid the foundation of cryptography:

The security of a cryptosystem must depend only on


the key, and not on the secrecy of any other part of
the system.
-- Still valid today.

• Playfair cipher
o Invented by English C. Wheatstone in 1854
o Probably the best cipher used in WWI
o Also used in WWII

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 8


Playfair Cipher

• Playfair Cipher

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 9


1.4. World War II Cryptography

• Enigma
o An electromechanical rotor machine used by German army.

o Broken by a group of British and Polish mathematicians


with help from French.

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 10


Enigma Machine

• Enigma Machine

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 11


1.5. Modern Cryptography

• After electric computer was invented in 1946,


all classical ciphers were soon broken.
• More complex ciphers were in a need for
secure communication.

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 12


Modern Cryptography
• Two representatives:
o DES (Data Encryption Standard):
▪ Standard cipher used by US government (1975-2000)
o AES (Advanced Encryption Standard):
▪ Encryption algorithm standardised by NIST and IEEE
around 2000 and adopted by many governments.
▪ Regarded as the current most secure encryption
algorithm.
▪ AES will be covered in Chapter 5.
Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 13
1.6. Public Key Cryptography
• Extremely important in network security:
o Provide new network security services, for example, key
distribution, digital signature, etc., in addition to
encryption
• The first PKC was invented in 1976.

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 14


Public Key Cryptosystems
• well known public key cryptosystems:
o Diffie-Hellman Key Exchange:
▪ Invented in 1976

o RSA:
▪ Invented in 1977

o ElGamal:
▪ Invented in 1985

o Elliptic Curve:
▪ Invented in 1986

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 15


Public Key Cryptography Concept

• Diffie-Hellman Key Exchange


o (starts at 2.08 min)

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 16


1.7. PQC: Post-Quantum Cryptography
• As quantum computer is about to be available,
many existing cryptosystems become
vulnerable to quantum attacks.
• PQC designs systems that are immune to
quantum attacks.
o NTRU system

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 17


Why Post Quantum Cryptography?

• Post-Quantum Cryptography

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 18


1.8. Quantum Cryptography

• Cryptography based on quantum mechanics


o Different from PQC

• Use qubit
• Quantum cryptography systems
o Quantum key distribution

o Bounded quantum storage

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 19


Quantum cryptography concepts

• A Qubit in the Making


(a qubit is a quantum bit, used in quantum computing.)

• Quantum Key Distribution

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 20


Note
• Picture and videos used in the set of slides
courtesy to YouTube and Google Image.

Data Security & Cryptography (2024W) Huapeng Wu @ U. Windsor 21

You might also like