Presentation on the topic of the mystery of cryptography. Cryptography Scientific supervisor: Ovcharenko Lyudmila Pavlovna computer science teacher Municipal educational institution Secondary school
Cryptography is the science of ensuring the secrecy of a message.
Cryptology is a branch of mathematics that studies the mathematical foundations of cryptographic methods
Periods of cryptography: 1. The first period (from approximately the 3rd millennium BC) is characterized by the dominance of mono-alphabetic ciphers (the basic principle is the replacement of the original text alphabet with another alphabet through the replacement of letters with other letters or symbols)
CAESAR CIPHER (shift cipher, Caesar shift) A B C D E F G H I J K L M N O P Q R S T U V W X Y Z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Example of Caesar cipher (encryption using key K=3): Encrypt the word “FAMILI” We get: IDPLOL (shift by 3)
An example of encryption using the key K=3 in the Russian alphabet. Original alphabet: A B C D E E F G H I J K L M N O P R S T U V X C CH W Y Y Y Z Ciphered: G E F G H I J K L M N O P R S T U V H C C H W S H Y Y Y A B V Original text: To succeed, students need to catch up with those who are ahead and not wait for those who are behind. The cipher text is obtained by replacing each letter of the original text with the corresponding letter of the encrypted alphabet: Tsъзрлнгп ъхсдиу тустзфтзхя ргжсжсёсрхя хзш НХС езузжл l рз йжгхя хзш НХС сткгжл
2. The second period (chronological framework - from the 9th century in the Middle East (Al-Kindi) and from the 15th century in Europe (Leon Battista Alberti) - until the beginning of the 20th century) was marked by the introduction of polyalphabetic ciphers into use
For example, in the encryption process, the Vigenère table is used, which is structured as follows: the entire alphabet is written out in the first line, and in each subsequent line a cyclic shift is carried out by one letter. This results in a square table, the number of rows of which is equal to the number of letters of the alphabet.
3. The third period (from the beginning to the middle of the 20th century) is characterized by the introduction of electromechanical devices into the work of cryptographers. At the same time, the use of polyalphabetic ciphers continued.
For example, the German Enigma machine was used to encrypt classified information during the Second World War. The Second World War served as a catalyst for the development of computer systems - through cryptography.
Wehrmacht Enigma ("Enigma") Cipher machine of the Third Reich. The code created using Enigma is considered one of the strongest used in World War II. Turing Bombe A decoder developed under the direction of Alan Turing. Its use allowed the Allies to crack the seemingly monolithic Enigma code.
4. The fourth period - from the mid to 70s of the XX century - the period of transition to mathematical cryptography. In Shannon's work, strict mathematical definitions of the amount of information, data transfer, entropy, and encryption functions appear. A mandatory step in creating a cipher is to study its vulnerability to various known attacks - linear and differential cryptanalysis. However, until 1975, cryptography remained “classical” or, more correctly, secret key cryptography.
5. The modern period of development of cryptography (from the late 1970s to the present) is distinguished by the emergence and development of a new direction - public key cryptography.
Cryptanalysis is the science of how to break an encrypted message, that is, how to extract the plaintext without knowing the key.
The relationship between algebra and critology
Def. 1. Encryption is the reversible transformation of plaintext into ciphertext. It is defined by two mutually inverse mappings, Ek: T →C and Dk: C→T, where T is the set of plaintexts, C is the set of all ciphertexts, k is the key chosen from the key space K. If we denote by E the set ( Ek : k∈K ) of all encryption mappings, and through D the set ( Dk: k∈K ) of all decryption mappings, then for any t ∈T, k∈K the equality Dk (Ek (t)) =t holds. Then the collection (T, C, K, E, D) is called a cipher, or cipher system. The simplest and oldest classes of ciphers are permutation and substitution ciphers. In these ciphers C = T =, where A is the text alphabet, n is the message length.
Def. 2. The role of key k in the permutation cipher is played by an arbitrary permutation k∈Sn from the permutation group of the set (1, ..., n); Thus, the key space K=Sn, the encryption mapping is determined by the equality: and the decryption mapping is determined by the equality:
Def. 3. The role of key k in the substitution cipher is played by an arbitrary permutation k ∈ Sn from the group of permutations of the alphabet A; Thus, the key space K = Sn, the encryption mapping is given by: and the decryption mapping is given by:
Example. 1. If history is to be believed, the first permutation cipher was used in Sparta. A narrow parchment ribbon was wound tightly, turn to turn, around the cylinder, which was called a scital. Then, text was written along the axis of the cylinder. When the tape was removed from the cylinder, a chain of letters remained on it, at first glance, completely disordered. The tape was wound up and handed over to the recipient, who read the message by winding the tape around the same citala. After this, the text again became understandable. The key to the cipher is the diameter of the scital. Therefore, she did not protect trusted secrets very well, because soon enough, Aristotle came up with the device of the “anti-scital,” who proposed winding a tape around a cone, moving it from the top to the base of the cone. Where the diameter of the conical section coincided with the diameter of the scital, meaningful syllables and words appeared on the tape, after which a scital of the appropriate diameter was made and the letters were combined into a coherent text.
Example 2: The first substitution cipher was invented by Julius Caesar. To rearrange the letters of the alphabet, he simply used a cyclic shift of three letters. The reverse permutation is also, naturally, a cyclic shift. In general, this cipher used a shift type and the key was the number k. Since the key space is small, Caesar’s encryption algorithm apparently did not advertise much.
Example 3. The class of permutation ciphers includes route permutation ciphers. This is their idea. The message is written to the table along one route, for example along horizontal lines, and read through another, for example along vertical lines. To increase the key space, the table columns were also rearranged.
CIPHER WITH LETTERS REPLACED BY NUMBERS A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 For example: “LIFE” - “12 9 6 5"
NUMERIC TABLE The first digit in the code is a column, the second is a row, or vice versa. So the word “MIND” can be encrypted as “33 24 34 14”.
POLYBIUS SQUARE 1 METHOD. Instead of each letter in a word, the corresponding letter below is used (A = F, B = G, etc.). Example: CIPHER - HOUNIW. 2 METHOD. The numbers corresponding to each letter from the table are indicated. The first number is written horizontally, the second – vertically. (A = 11, B = 21...). Example: CIPHER = 31 42 53 32 51 24
Color chart A B C D E E F G H I J K L M N O P R S T U V H C CH W S H Y J 0 1 2 3 4 5 6 7 8 9 . , : ; ! ? The first color in the code is a row, the second is a column
Source text: The purpose of studying this topic is to familiarize students with the theory of text encryption, as well as to develop skills in studying mathematical objects and methods of using them in teaching and organizing research work for schoolchildren; involving students in research activities. Encrypted text:
Julian Assange R. 1971 On his portal, WikiLeaks publicly demonstrated to everyone the underbelly of many government structures. Corruption, war crimes, top-secret secrets - in general, everything that an active libertarian could get his hands on became public knowledge. In addition, Assange is the creator of an infernal cryptosystem called “Deniable encryption”. This is a way of arranging encrypted information that allows for plausible deniability of its presence.
Bram Cohen R. 1975 American programmer, originally from sunny California. To the delight of the whole world, he came up with the BitTorrent protocol, which is still successfully used to this day.
Films Zodiac 2007. An intense thriller by David Fincher, based on real events. For most of the film, the smartest San Francisco police officers try in vain to crack the code of the presumptuous maniac. Enigma 2001. A live-action film set in the backdrop of World War II: brilliant mathematicians gather in Bletchley Park to solve the new code of the insidious Nazis. The picture is full of inexplicable mysteries and secrets - however, you can guess this from the title.
Every user of electronic means of information exchange will need familiarity with cryptography, so cryptography in the future will become a “third literacy” on a par with the “second literacy” - computer and information technology skills.
Classification of ciphers and their features
Cryptography
The work was completed by: Artamonova Ekaterina gr.6409-ok
Subject of research: cryptographic systems and types of ciphers
Purpose of the study: study of cryptographic methods for encrypting information
Research objectives:
- Study the features of various cryptographic systems;
- Explore different types of ciphers.
Research methods: literature analysis, comparison, synthesis.
Cryptography as a Privacy Tool
Cryptography(from ancient Greek κρυπτός - hidden and γράφω - I write) - the science of privacy practices(impossibility for outsiders to read information) and authenticity(integrity and authenticity of authorship, as well as the impossibility of renouncing authorship) information.
History of the development of the science of cryptography
Formally, cryptography (from Greek - “secret writing”) is defined as a science that ensures the secrecy of a message.
The history of cryptography goes back about 4 thousand years. As the main criterion for the periodization of cryptography, it is possible to use the technological characteristics of the encryption methods used:
1.First period(3 thousand BC e.)
Monoalphabetic ciphers
The basic principle is to replace the alphabet of the source text with another alphabet by replacing letters with other letters or symbols
2.Second period(9th century in the Middle East(Al-Kindi) and 15th century in Europe(Leon Battista Alberti) - early 20th century) - polyalphabetic ciphers.
Leon Battiste Alberti
3. Third period(from the beginning to the middle of the 20th century) - the introduction of electromechanical devices into the work of cryptographers.
Continued use of polyalphabetic ciphers.
4.Fourth period -from the 50s to the 70s of the XX century- transition to mathematical cryptography. In Shannon's work, strict mathematical definitions of the amount of information, data transfer, entropy, and encryption functions appear.
Claude Shannon
5.Modern period(from the late 1970s to the present time) the emergence and development of a new direction - public key cryptography.
Another periodization of the history of cryptography is also known:
1.Aeneas Tactician wrote the first scientific work on cryptography.
The Scytala cipher is widely known - Sparta against Athens in the 5th century BC. uh.
2. Middle Ages
-Code Copiale- an elegantly designed manuscript with watermarks, which has not yet been fully deciphered.
Code Copiale
3.Renaissance - the golden age of cryptography: Francis Bacon studied it and proposed a binary encryption method.
Francis Bacon
4. The appearance of the telegraph- the fact of data transfer is no longer secret.
5.World War I-cryptography has become a recognized combat tool.
6.World War II-development of computer systems. The encryption machines used clearly demonstrated the vital importance of information control.
Wehrmacht Enigma (“Enigma”)-
Cipher machine of the Third Reich.
Turing Bombe
A decoder developed under the direction of Alan Turing.
Classification of cryptographic systems
General use cryptosystems
Restricted Cryptosystems
1. By area of application
2. According to the features of the encryption algorithm
Single-key
Two-key
Substitutions (substitutions)
Rearrangements
Additive (gamming)
Deterministic
Probabilistic
Quantum
Combined (composite)
3. By the number of message characters
Streaming
4. According to the strength of the cipher
unstable
practically resistant
perfect
Basic requirements for cryptosystems
- The complexity and laboriousness of encryption and decryption procedures;
- Time and cost costs for information protection;
- Encryption and decryption procedures;
- The number of all possible cipher keys;
- Redundancy of messages;
- Any key from a variety of possible ones;
- Minor key change;
- Encrypted message.
Code (from French. chiffre"digit" from Arabic. صِفْر, sifr“zero”) - any text conversion system with a secret (key) to ensure the secrecy of transmitted information.
Cipher classification
Rearrangements
Compositional
Multiple-valued
Single digit
Symmetrical
Asymmetrical
In-line
Mono-alphabetic
Polyalphabetic
Gamma ciphers
Affine cipher
An affine cipher is a simple substitution cipher that uses two numbers as a key. The linear dependence of an affine cipher can be like this:
Caesar Cipher
Replacing plaintext characters according to formula, for example like this:
N is the number of the character in the alphabet
INFORMATION LRISUQDWMDSR
Dancing men code
Advantage - due to shorthand properties encryption can be written anywhere. Disadvantage - does not provide sufficient confidentiality or authenticity.
P R O T I V O I D I E
Vigenère cipher
A word (phrase) that is convenient for memorization is taken as the key of the Vigenère cipher; the word (code phrase) is repeated until it becomes equal to the length of the message.
Vigenère table
To encrypt a message with a Vigenère cipher using a Vigenère table, select the column starting with the first character of the plaintext and the row starting with the first character of the key. At the intersection of these columns and rows there will be the first encryption character.
Barcodes
Linear barcode
Bar code (barcode) is graphic information applied to the surface, marking or packaging of products, making it readable by technical means - a sequence of black and white stripes or other geometric shapes.
Information encoding methods:
1.Linear
2.Two-dimensional
Areas of application
- Increasing the speed of document flow of payment systems;
- Minimizing data reading errors by automating the process;
- Employee identification;
- Organization of time recording systems;
- Unification of forms for collecting different types of data;
- Simplification of warehouse inventory;
- Monitoring the availability and promotion of goods in stores, ensuring their safety.
The main advantage of a QR code is its easy recognition by scanning equipment.
Conclusion
1. There is a unified classification of cryptographic systems according to various parameters, each of which has its own distinctive features, advantages and disadvantages.
2. There are a huge number of ciphers in the world, which in turn can be combined into groups according to individual characteristics.
3. Cryptography is relevant now, because information protection today is one of the most serious problems of humanity in the information society.
Sources
http://shifr-online-ru.1gb.ru/vidy-shifrov.htm
http://studopedia.org/3-18461.html
KeyKEY
Key - a cipher parameter that determines
selection of a specific transformation of a given
text.
In modern ciphers the algorithm
encryption is known, and cryptographic
the strength of the cipher is entirely determined
key secrecy (Kerkhoffs principle).
cryptographic conversion
plaintext based algorithm and
key
ciphertext.
Decryption is a normal process
application of cryptographic
converting ciphertext to
open.
Types of text
TYPES OF TEXTOpen (source) text - data
transmitted without use
cryptography
Closed (ciphered) text - data,
received after application
cryptosystems with the specified key.
History of cryptography
HISTORY OF CRYPTOGRAPHYMethods of secret correspondence were invented
independently in many ancient states,
such as Egypt, Greece and Japan. The first examples of cryptography
tattoo
TATTOOHerodotus (484 BC – 425 BC)
Tattoo made on shaved
slave's head, hidden under
regrown hair.
Scytala (cipher of Ancient Sparta)
SCYTALA (CIPHER OF ANCIENT SPARTA)The hermitage was first mentioned in Greek
the poet Archilochus.
A scytale is a wooden cylinder.
(from Greek Σκυτάλη - rod)
Crypto communication requires two cylinders (one
wandered from the one who will send the message,
the other is at the addressee.
The diameter of both should be
strictly the same.
Encryption principle
ENCRYPTION PRINCIPLE1
4
Sending to recipient
3
2
Bible
BIBLEBook of the prophet Jeremiah (22.23): "...and the king
Sessakha will drink after them."
In the original language we have the word
Babylon.
Atbash
ATBASHOriginal text:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Encrypted text:
ZYXWVUTSRQPONMLKJIHGFEDCBA
Alberti ciphertext disk
DISC WITH ALBERTI CIPHERTEXTLeon Battista Alberti
(1404-1472)
"Treatise on Ciphers"
The first letter is encrypted by
the first cipher alphabet,
second by second, etc.
Cardan grille
GRILLE TO CARDANGerolamo Cardano (1501-1576)
"YOU KILL AT ONCE"
"I LOVE YOU. I HAVE YOU DEEP UNDER MY
SKIN. MY LOVE LASTS
FOREVER IN
HYPERSPACE."
Pyotr and Modest Tchaikovsky
PETER AND MODEST TCHAIKOVSKYReplacing each vowel of the Russian language with
another vowel, each consonant - to another
I agree:
"shyr-pir yu pyapyuzhgy zelemgy gesryg"
instead of:
“Once upon a time there lived a gray boy with his grandmother
goat."
Vigenère cipher
VIGENÉRE CIPHERKey - ABC
Literature about cryptography
LITERATURE ABOUT CRYPTOGRAPHY"Treatise on Ciphers" by Gabriel de Lavind
"Encyclopedia of all sciences", Shehaba
Kalkashandi (classification methods
content of correspondence)
Intelligence Service, Oliver Cromwell
(decryption section)
"Military Cryptography" by Auguste Kerghoffs
…
Cipher
CIPHER(from Arabic: ص ْفر
ِ,ṣifr “zero”, fr. chiffre "digit";
related to the word number)
Cipher - a set of algorithms
cryptographic transformations. Cipher
symmetric
asymmetrical
classic types of encryption
CLASSICAL TYPES OF ENCRYPTIONeasy replacement
EASY REPLACEMENTa b c d e f... i
1 2 3 4 5 6 ... 33
Or:
A b c d t f ...
! @ # $ % *...
Example:
33 9 29 12 16 9 15 1 15 10 6
LINGUISTICS
Permutation view
PERMANENT VIEWThe letters of the message are rearranged:
"help me"
"I'll come on Tuesday"
"remember me"
"rpdiu ov tvroink"
Replacement view
SUBSTITUTE VIEWReplace each letter with the next one in
alphabet:
"very fast"
"pshzhoy vutusp"
“good bye”
"hppe czf"
Caesar's cipher
CAESAR'S CIPHERN
o p Rs...
Julius Caesar used a cipher with
offset 3 when communicating with your
commanders during military campaigns.
Cryptography and other sciences
CRYPTOGRAPHY AND OTHER SCIENCESUntil the 20th century, cryptography dealt only with
linguistic samples.
Now:
use of mathematics
part of engineering
application in quantum cryptography
physicists CRYPTOGRAPHY
PERSISTENT
WEAK
Cryptographic attack
CRYPTOGRAPHIC ATTACKCryptographic attack - results
cryptanalysis of a specific cipher.
Successful
cryptographer
attack
breaking
opening
Enigma rotary crypto machine
ROTARY CRYPTOMACHINE ENIGMAFirst encryption
car.
Used
German troops
from the late 1920s to
end of World War II
war. Disassembled rotor
1. ring with notches
2. marking point
3. for pin "A"
4. alphabet ring
5. tinned contacts
6. electrical wiring
7. pin contacts
8. spring lever for
9. ring settings
10. bushing
11. finger ring
12. ratchet wheel
Enigma rotors assembled
ENIGMA ROTORS ASSEMBLEDEnigma encryption examples
EXAMPLES OF ENIGMA ENCRYPTIONE = PRMLUL − 1M − 1R − 1P − 1
E = P(ρiRρ − i)(ρjMρ − j)(ρkLρ − k)U(ρkL − 1ρ −
k)(ρjM − 1ρ − j)(ρiR − 1ρ − i)P − 1
German crypto machine Lorenz
GERMAN CRYPTOMACHINE LORENZCryptanalysis
CRYPTOANALYSISCryptanalysis is the science of methods of obtaining
original encrypted value
information without having access to secret
information (key) necessary for this.
(William F. Friedman, 1920) A cryptanalyst is a person who creates and
using cryptanalysis methods.
cryptology
CRYPTOLOGYCryptology is a science that deals with methods
encryption and decryption.
modern cryptography
MODERN CRYPTOGRAPHYIncludes:
asymmetric cryptosystems
electronic digital signature systems
(EDS) hash functions
key management
obtaining hidden information
quantum cryptography
Modern cryptography
MODERN CRYPTOGRAPHYCommon algorithms:
symmetric DES, Twofish, IDEA, etc.;
asymmetric RSA and Elgamal
hash functions MD4, MD5, GOST R 34.11-94.
List of manufacturers using microdots:
LIST OF MANUFACTURERS USING
MICRODOTS:
Audi
BMW in Australia
Mitsubishi Ralliart
Porsche
Subaru
Techmashimport in Russia
Toyota Digital watermarks
DIGITAL WATERMARKS
Digital watermark is a special
a label embedded in digital content with
for the purpose of copyright protection. The relevance of encryption today
RELEVANCE OF ENCRYPTION TODAY
widespread use of the World Wide Web
the emergence of modern heavy-duty
computers the scope of application has expanded
computer networks
possibility of discrediting encryption
systems that just yesterday were considered completely
safe Information security tools today
INFORMATION SECURITY TODAY Bibliography
BIBLIOGRAPHY
o
o
o
o
o
o
o
o
o
o
o
Practical cryptography, A.V. Agranovsky
English-Russian dictionary-reference book on cryptography
Encryption algorithms, S. Panasenko
Dictionary of cryptographic terms, Pogorelova
B.A.
http://crypto-r.narod.ru
http://www.cryptopro.ru
http://dic.academic.ru
http://www.citforum.ru
http://www.krugosvet.ru
http://cryptolog.ru
http://www.kpr-zgt.ru
- generalize and systematize knowledge of basic concepts: code, coding, cryptography;
- get acquainted with the simplest encryption methods and their creators;
- practice the ability to read codes and encrypt information.
Developmental:
- develop cognitive activity and creative abilities of students;
- form logical and abstract thinking;
- develop the ability to apply acquired knowledge in non-standard situations;
- develop imagination and attentiveness.
Educational:
- cultivate a communicative culture;
- develop cognitive interest.
Slide 1. « Cryptography Basics »
Recently, more and more attention has been paid to ensuring the security of communications, data storage, confidentiality of data access and similar aspects. Numerous solutions are offered, both at the hardware and software levels.
Please note that the use of data encryption does not guarantee the confidentiality of this data. The simplest example is to intercept an encrypted message, determine the block/blocks corresponding to the sending time, and then use the same encrypted message, but with a different sending time. This technique can be used to falsify messages between banks, for example to transfer sums of money to an attacker's account.
Cryptography only provides algorithms and some techniques for client authentication and information encryption. How did encryption come about in the first place?
Slide 2.
Cryptography(from ancient Greek κρυπτ?ς - hidden and γρ?φω - write) - (impossibility of reading information by outsiders) and authenticity(integrity and authenticity of authorship, as well as the impossibility of renouncing authorship) information.
Slide 3.
Cryptanalysis(from ancient Greek κρυπτ?ς - hidden and analysis) - the science of methods for deciphering encrypted information without a key intended for such decryption.
The most famous ciphers are:
Slide 4: The cipher of the wanderer
Lycurgus was the king of Sparta from the Eurypontid family, who ruled from 220 to 212 BC. e.
In cryptography wandered(or scitala from Greek σκυτ?λη , rod), also known as Ancient Sparta code, is a device used to perform permutation encryption, consisting of a cylinder and a narrow strip of parchment wound around it in a spiral, on which a message was written. The ancient Greeks and the Spartans in particular used this code to communicate during military campaigns.
Slide 5: Caesar Cipher
Gaius Julius Caesar (100 BC - 44 BC) - ancient Roman statesman and politician, dictator, commander, writer.
Caesar Cipher, also known as shift cipher, Caesar code or Caesar's shift is one of the simplest and most widely known encryption methods.
Slide 6: Francois? Vie?t
Francois? Vie?t (1540 - 1603) - French mathematician, founder of symbolic algebra.
At the royal court, François Viète showed himself to be a talented specialist in deciphering complex ciphers (secret writing) used by inquisitorial Spain in the war against France. Thanks to its complex code, militant Spain could freely communicate with the opponents of the French king even within France, and this correspondence remained unsolved all the time.
As one would expect, after the French deciphered the intercepted Spanish secret reports, the Spaniards began to suffer one defeat after another. The Spaniards were perplexed for a long time about the unfavorable turn in military operations for them. Finally, from secret sources they learned that their code was no longer a secret to the French and that the person responsible for deciphering it was François Viête. The Spanish Inquisition declared Vieta an apostate and sentenced the scientist in absentia to be burned at the stake, but was unable to carry out his barbaric plan.
Slide number 7: John Wallis
The term “cryptography” was introduced into widespread use by the English mathematician, one of the predecessors of mathematical analysis as a science, John Wallis.
In 1655, Wallis published a large treatise, The Arithmetic of the Infinite, where he introduced the infinity symbol he invented. In the book, he formulated a strict definition of the limit of a variable quantity, continued many of Descartes’ ideas, introduced negative abscissas for the first time, and calculated the sums of infinite series - essentially integral sums, although the concept of an integral did not yet exist.
Slide number 8: Leon Batista Alberti
Batista Alberti, Italian architect, sculptor, art theorist, artist and musician. He made a revolutionary breakthrough in European cryptographic science in the 15th century. In the field of cryptography, Alberti's merits were the 25-page “Treatise on Ciphers” - he published the first book in Europe devoted to cryptanalysis, and invented a device that implements a polyalphabetic substitution cipher, called the “Alberti disk”.
Slide #9: William Friedman
American cryptographer, one of the founders of modern scientific cryptography. During World War I, Friedman served in the American Cryptographic Service, including as a codebreaker. In addition to his cryptanalytic work, Friedman taught a course in cryptography for army officers. By 1918, he had prepared a series of eight lectures for listeners. In total, Friedman wrote 3 textbooks on military cryptography and a number of scientific works on the analysis of codes and ciphers, and he also developed 9 cipher machines. Friedman demonstrated the effectiveness of probability-theoretic methods in solving cryptographic problems. He took part in the development and evaluation of the strength of a number of American encryptors. Before and during World War II, he made significant progress in deciphering Japanese messages.
Slide No. 10: Types of ciphers
Thus, the main types of ciphers are:
- monoalphabetic substitution
- polyalphabetic substitution
Slide 11: Mono-alphabetic substitution
Mono-alphabetic substitution is an encryption system that uses a single cipher alphabet to hide the letters of a clear message.
In Europe by the beginning of the 15th century. Mono-alphabetic ciphers were most often used as a method of masking information. In mono-alphabetic substitution, special characters or numbers can also be used as equivalents. In a mono-alphabetic cipher, a letter can not only be replaced by a letter; in it, a letter can be represented by several equivalents.
Slide 12:
Shift Cipher (Caesar Cipher)
One of the earliest and simplest varieties of cipher that uses letter substitution is the Caesar substitution cipher. This cipher is named after Gaius Julius Caesar, who used it to encrypt messages during his successful military campaigns in Gaul (an area covering modern France, Belgium, parts of the Netherlands, Germany, Switzerland and Italy).
Plain text alphabet: A B C D E E F G H I J K L M N O P R S T U V H C CH W SQ Y Y Y Y
Cipher alphabet: G D E E F G H I J K L M N O P R S T U V
Slide 13: Multi-alphabetic replacement
Multi-alphabetic substitution is a method of generating a cipher using several substitution alphabets.
This technique allows cryptographers to hide the words and sentences of their original message among the meanings of several levels of letters.
Slide 14:
This table was one of the first geometric figures used to accommodate alphabets, numbers and symbols for the purpose of encryption, and an important step forward, since it showed all its cipher alphabets at the same time.
Trithemius called his method the "square board" because the 24 letters of the alphabet were arranged in a square containing 24 lines. Part of this table is shown here.
The table is obtained by shifting the normal alphabet in each subsequent line one position to the left. Letters i And j, as well as And And v, were considered identical. This operation could rightfully be called the very first serial key, whereby each alphabet is used in turn before any of them appears again.
The cryptographic advantages of polyalphabetic ciphers and sequential keys contributed to the widespread adoption of this encryption method.
Slide 15:
Since 1991 Institute of Cryptography, Communications and Informatics of the FSB Academy
The Russian Federation holds annual Olympiads in cryptography and
mathematics for schoolchildren in Moscow and the Moscow region. We present to your attention one of the tasks of the Olympiad:
An encrypted message is given:
Find the original message if you know that the transformation cipher was as follows. Let the roots of the trinomial - . To the serial number of each letter in the standard Russian alphabet (33 letters), the value of the polynomial, calculated either at or at (in an order unknown to us), was added, and then the resulting number was replaced by the corresponding letter.
Slide 16: The solution of the problem.
It's easy to see that .
Hence the roots of the polynomial
We get
Answer: KEEP IT UP
Slide 17. THANK YOU FOR YOUR ATTENTION!
View document contents
"fundamentals of cryptography"
Cryptography (from ancient Greek κρυπτός - hidden and γράφω - I write) - the science of privacy practices (impossibility for outsiders to read information) and authenticity (integrity and authenticity of authorship, as well as the impossibility of renouncing authorship) information.
![](https://i1.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_2.jpg)
![](https://i0.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_3.jpg)
The cipher of the wanderer
Lycurgus - King of Sparta
from the genus Eurypontidae,
ruling
in 220 - 212 BC uh .
![](https://i2.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_4.jpg)
Caesar Cipher
Gaius Julius Caesar
(100 - 4 4 BC e.) -
ancient Roman
state and
political figure,
dictator . , commander,
writer.
![](https://i2.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_5.jpg)
Francois Viet
Francois Viet (1540 – 1603) -
French mathematician
founder
symbolic algebra.
![](https://i1.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_6.jpg)
John Wallis
1616 – 1703 yy .
English
mathematician, one of the predecessors
mathematical analysis
![](https://i0.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_7.jpg)
Leon Batista Alberti
1402 – 1470 yy .
Italian architect, sculptor, art theorist, painter and musician
![](https://i1.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_8.jpg)
William Friedman
18 9 1 G ., Chisinau – 1969 G ., Washington
American cryptographer, called the "father of American cryptology"
![](https://i1.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_9.jpg)
- monoalphabetic substitution
- polyalphabetic substitution
![](https://i1.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_10.jpg)
Mono-alphabetic substitution
Mono-alphabetic substitution is an encryption system in which a single alphabet cipher is used to hide the letters of a plaintext message.
![](https://i1.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_11.jpg)
- Plain text alphabet: A B C D E E F G H I J K L M N O P R S T U V H C CH W SQ Y Y Y Y
- Cipher alphabet: G D E E F G H I J K L M N O P R S T U V
![](https://i0.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_12.jpg)
Polyalphabetic replacement
Polyalphabetic substitution is a method of generating a cipher using multiple substitution alphabets.
![](https://i1.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_13.jpg)
![](https://i2.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_14.jpg)
![](https://i1.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_15.jpg)
The solution of the problem:
Letter sh.s.
Number
Number
Letter o.s
![](https://i2.wp.com/fsd.kopilkaurokov.ru/uploads/user_file_545bd5b605ebc/img_user_file_545bd5b605ebc_16.jpg)
Literature
1. Arshinov M.N. Sadovsky L.E. Codes and mathematics. - M.: Nauka, 1983. – 216 p.
2. Babash A.V., Shankin G.P. History of cryptography. Part 1. – M.: Helios ARV, 2002. – 240 p.
3. Babash A.V., Shankin G.P. Cryptography. / Edited by V.P. Sherstyuk, E.A. Primenko.
– M.: SOLON-R, 2007. – 512 p.
4. Barichev S.G., Goncharov V.V., Serov R.E. Fundamentals of modern cryptography. – M.: Hotline-Telecom, 2001. – 120 p.
5. Introduction to cryptography / Ed. ed. V.V. Yashchenko. - M.: MTsNMO: “CheRo”, 1999. – 317 p.
6. Werner M. Basics of coding. Textbook for universities. – M.: Tekhnosphere, 2006. – 288 p.
7. Gerasimenko V.A., Malyuk A.A. Fundamentals of information security. - M.: MEPhI, 1997. – 537 p.
8. Gribunin V.G., Okov I.N., Turintsev I.V. Digital steganography. – M.: SOLON-Press, 2002. – 272 p.
9. Domashev A.V. and others. Programming information security algorithms. Tutorial. – M.: Knowledge Publishing House, 2002. – 416 p.
10. Zhelnikov V. Cryptography from papyrus to computer. - M.: ABF, 1997. - 336 p.
11. Coutinho S. Introduction to number theory. Algorithm RSA. – M.: Postmarket, 2001. – 328 p.
12. Konakhovich G.F. Computer steganography: theory and practice. – M.: MK-Press, 2006.
– 221 p.
13. Moldovyan A.A., Moldovyan N.A., Sovetov B.Ya. Cryptography. - Series “Textbooks for universities. Special literature". - St. Petersburg: Lan Publishing House, 2000. – 224 p.
14. Nechaev V.I. Elements of cryptography (Fundamentals of information security theory): Textbook for un-tov and ped. universities / Ed. V.A. Sadovnichego - M.: Higher. school, 1999 – 109 p.
15. Novikov F.A. Discrete mathematics for programmers - St. Petersburg: Peter, 2001. - 304 p.
16. Peterson W., Weldon E. Error-Correcting Codes: Transl. from English - M.: Mir, 1986. - 594 p.
17. Romanets Yu.V., Timofeev P.A., Shangin V.F. Information protection in computer systems and networks / Ed. V.F. Shangina. - M.: Radio and communication, 1999. - 328 p.
18. Salomaa A. Public key cryptography. - M.: Mir, 1996 - 304 p.
19. Smart N. Cryptography. – M.: Tekhnosphere, 2006. – 528 p.
“... the history of cryptography... is the history of humanity”
V.G. Belinsky
“We interrogate the past so that it explains our present and hints about our future.”
Ways to protect secret messages
Physical
Cryptographic
Steganographic |
Physical protection
Protection of material media Selecting a communication channel that is difficult to intercept
Special courier
Cable communication lines
Special types of radio broadcasts
and so on.
Steganography
Described in the works of the ancient Greek historian Herodotus
The required message was written on the slave's head, which was shaved bald. When the slave's hair grew long enough, he was sent to the recipient, who again shaved the slave's head and read the message received.
Writing with sympathetic ink on items of clothing, handkerchiefs and so on.
Book of Changes
IN Symbolism was widely developed in ancient China.
IN The book of changes is based on 8 trigrams, each of which consists of three parallel lines, solid (light intensity - Yang) and intermittent (the power of darkness - Yin), denoting sky, earth, fire, water, air, mountain, thunder.