mechanising cryptography
DESCRIPTION
Mechanising Cryptography. Professor Richard Walton CB. Cryptography is concerned with the application of technology to the problem of encrypting and decrypting a message. The Mathematics is subordinate to the technology. 20 th Century Cryptography. Development of Crypt in the 1900s - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/1.jpg)
Mechanising Cryptography
Professor Richard Walton CB
![Page 2: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/2.jpg)
Cryptography is concerned with the application of technology to the problem of encrypting and decrypting a message.
The Mathematics is subordinate to the technology
![Page 3: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/3.jpg)
20th Century Cryptography
Development of Crypt in the 1900s Manual Methods
– Slow– Laborious– Error-Prone
Need to mechanise Importance of technology for design Nature of technological constraints
![Page 4: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/4.jpg)
CRYPTOGRAPHYSecurity
Usability Cost
![Page 5: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/5.jpg)
Cryptanalysis 1918
Knowledge of language Frequency Analysis Key Re-use (Depth)
Skill Requirement:To solve crossword puzzles
in foreign languages
![Page 6: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/6.jpg)
Rotor Machines
![Page 7: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/7.jpg)
Rotors
![Page 8: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/8.jpg)
Commercial Enigma
![Page 9: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/9.jpg)
Enigma
![Page 10: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/10.jpg)
Enigma
Army
Navy
Navy – 4 wheel
![Page 11: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/11.jpg)
![Page 12: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/12.jpg)
![Page 13: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/13.jpg)
Early Machine Cryptography
Limitations of Security Design Balance Security against Cost Usability – Human Factors
![Page 14: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/14.jpg)
Electronics – 1960-1980
Shift Registers and Simple Logic Gates Linear Algebra Galois Theory Rich Mathematical structure Rigorous Analysis Expensive Components
![Page 15: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/15.jpg)
Large Scale Integration
Application Specific Integrated Circuits Complex Algorithms Tailored to purpose Standard Cryptographic Primitives Software and Firmware
![Page 16: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/16.jpg)
Public Key Cryptography
Key Management Non-Secret Encryption
– Ellis, Cocks & Williamson– Beyond 1970’s technology
Widespread after 1985 Search for easier solutions
– Elliptic Curve Cryptography
![Page 17: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/17.jpg)
Next Challenge
Quantum Computers destroycurrent Public Key algorithms
Find new algorithms to resist Quantum Computer attacks
![Page 18: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/18.jpg)
![Page 19: Mechanising Cryptography](https://reader031.vdocuments.site/reader031/viewer/2022020800/56812ecb550346895d946bd2/html5/thumbnails/19.jpg)
Mechanising Cryptography
Acknowledgement
Illustrations concerning Enigma in this presentation have been taken from the user manual for Enigma – E
by Paul Reuvers & Marc Simons.
For details of Enigma-E, which is available for purchase from Bletchley Park Museum, see www.xat.nl/enigma-e/