Download compatible-development-of

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts

Quantum key distribution wikipedia, lookup

Mobile security wikipedia, lookup

Post-quantum cryptography wikipedia, lookup

Cryptography wikipedia, lookup

Cryptanalysis wikipedia, lookup

Web of trust wikipedia, lookup

History of cryptography wikipedia, lookup

Block cipher wikipedia, lookup

One-time pad wikipedia, lookup

Japanese cryptology from the 1500s to Meiji wikipedia, lookup

Magic (cryptography) wikipedia, lookup

Diffie–Hellman key exchange wikipedia, lookup

Index of cryptography articles wikipedia, lookup

Room 40 wikipedia, lookup

Public-key cryptography wikipedia, lookup

Grill (cryptology) wikipedia, lookup

Secret sharing wikipedia, lookup

Enigma machine wikipedia, lookup

Cryptanalysis of the Lorenz cipher wikipedia, lookup

Cryptanalysis of the Enigma wikipedia, lookup

Transcript
Section 1.2
Development of Cryptography
Task: Research on the development of cryptography and fill up the table below
with the major events that occurred during each period of time.
Read up on the ciphers you come across in your research and other
classical ciphers.
1900 BC
600 BC
500 BC
50 BC
800
1500
It started in the Egypt town called Menet Khufu near the river Nil. Khnumhotep II was
an architect of Pharao Amenemhet II. He built some monuments for the Pharao which
had to be documented. Khnumhotep II had the idea to exchange some words and text
parts within the document (substitution). In case the document would been stolen,
the thief would not find the correct way to the gold treasure.
Hebrew scribes writing down the book of Jeremiah used a reversed-alphabet simple
substitution cipher known as ATBASH. (Jeremiah started dictating to Baruch in 605 BC
but the chapters containing these bits of cipher are attributed to a source labeled ``C''
(believed not to be Baruch) which could be an editor writing after the Babylonian exile
in 587 BC, someone contemporaneous with Baruch or even Jeremiah himself.)
ATBASH was one of a few Hebrew ciphers of the time (SANS).
Thucydides tells of orders delivered to the Spartan prince and general Pasanius in 475
BCE via what could be the earliest system of military cryptography, the skytale. As a
device for conveying ciphers, the skytale consists of a staff of wood around which a
strip of papyrus is tightly wound. Writing the message down the length of the staff,
the parchment is unwound to conceal the message. Since the message appears to be
nothing more than a series of disconnected letters, its true meaning remains
concealed. However, it seems unlikely that such a technique was ever used in this
way. Ancient texts by Aeneas the Tactician, Polybius, and others describe further
methods for concealing messages but none of these actually seem to have been used
either (Glikman). The secret key of the text is the circumference of the wood. With
the wrong circumference, the message is unusable. If the wood matches, you are able
to read the message. Attacking the skytale was no big thing, this at least when you
understood the principle of the algorithm.
The Caesar Cipher was developed during the roman empire. The code was based on
the replacement of each plaintext character with a new shifted character in the
alphabet. The secret key of the shift between the plaintext and the ciphertext. As
example, if the shift is 5 and the plaintext is
SECRET FOR YOU
the ciphertext would look as in the example below.
XJHWJY KTW DTZ
This because you calculate plaintext + shift (Secret Key) = ciphertext which is
S + Shift (5) = X.
Cryptanalysis and frequency analysis leading to techniques for breaking
monoalphabetic substitution ciphers are developed in A Manuscript on Deciphering
Cryptographic Messages by the Muslim mathematician, Al-Kindi (Alkindus), who may
have been inspired by textual analysis of the Qur'an. He also covers methods of
encipherments, cryptanalysis of certain encipherments, and statistical analysis of
letters and letter combinations in Arabic.
1518 - Johannes Trithemius' book on cryptology
1553 - Bellaso invents Vigenère cipher
1585 - Vigenère's book on ciphers
1600
1800
1900
1920
1940
1586 - Cryptanalysis used by spy master Sir Francis Walsingham to implicate Mary
Queen of Scots in the Babington Plot to murder Queen Elizabeth I of England. Queen
Mary was eventually executed.
1641 - Wilkins' Mercury (English book on cryptology)
1809 - 14 George Scovell's work on Napoleonic ciphers during the Peninsular War
1831 - Joseph Henry proposes and builds an electric telegraph
1835 - Samuel Morse develops the Morse code
1854 - Wheatstone invents Playfair cipher
1854 - Babbage's method for breaking polyalphabetic ciphers (pub 1863 by Kasiski)
1855 - For the English side in Crimean War, Charles Babbage broke Vigenère's autokey
cipher (the 'unbreakable cipher' of the time) as well as the much weaker cipher that is
called Vigenère cipher today. Due to secrecy it was also discovered and attributed
somewhat later to the Prussian Friedrich Kasiski.
1883 - Auguste Kerckhoffs' La Cryptographie militare published, containing his
celebrated laws of cryptography
1885 - Beale ciphers published
1894 - The Dreyfus Affair in France involves the use of cryptography, and its misuse, in
regard to false documents.
1915 - William Friedman applies statistics to cryptanalysis (coincidence counting, etc)
1917 - Zimmermann telegram intercepted and decrypted, advancing U.S. entry into
World War I.
1919 - Edward Hebern invents/patents first rotor machine design a rotor machine is
an electro-mechanical device used for encrypting and decrypting secret messages. A
rotor machine is an electro-mechanical device used for encrypting and decrypting
secret messages
1921 - Washington Naval Conference - U.S. negotiating team aided by decryption of
Japanese diplomatic telegrams. The message revealed the lowest naval ratio that
would be acceptable to Tokyo; U.S. negotiators used this knowledge to push the
Japanese to giving in.
1924 - MI8 (Herbert Yardley, et al) provide breaks of assorted traffic in support of US
position at Washington Naval Conference; aiding other cryptanalysts to break more
codes.
1932 - first break of German Army Enigma by Marian Rejewski in Poland, giving them
a jumpstart British reading of the Enigma- a rotor machine used to generate ciphers
for the encryption and decryption of secret messages.
1931 - The American Black Chamber (cryptography headquarters) by Herbert O.
Yardley is published, revealing much about American cryptography, giving people an
opportunity to learn more about it.
1940 - break of Japan's PURPLE machine cipher by SIS team. However, U.S. Naval base
at Pearl Harbor surprised by Japanese attack, despite U.S. breaking of Japanese codes.
U.S. enters World War II
April 1943 - Admiral Yamamoto, architect of Pearl Harbor attack, is assassinated by
U.S. forces who know his itinerary from decoded messages. This shows that the lives
of cryptographers are fragile.
December 1943 - The Colossus computer was built, by Thomas Flowers at The Post
Office Research Laboratories in London, to crack the German Lorenz cipher (SZ42). It
was so advanced that the computer had to be destroyed, lest it fell into the wrong
hands.
1968
1976
1991
2000
2010
1946 - VENONA's first break into Soviet espionage traffic from early 1940s
Navajo codetalkers were Navajo people who were employed to transmit and deliver
secret messages in the battlefield. It was extremely useful as their language was
completely differently structured as compared to the commonly used ones. Up till
today, the Navajo language cannot be cracked without the knowledge of the language
itself.
1968 - John Anthony Walker walks into the Soviet Union's embassy in Washington and
sells information on KL-7 cipher machine. The Walker spy ring operates until 1985.
1974 - Horst Feistel develops Feistel network block cipher design.
1976 - the Data Encryption Standard was published as an official Federal Information
Processing Standard (FIPS) for the United States.
The Data Encryption Standard was published as an official Federal Information
Processing Standard (FIPS) for the United States. The Data Encryption Standard (DES)
is a cipher (a method for encrypting information) selected as an official Federal
Information Processing Standard (FIPS) for the United States in 1976 and which has
subsequently enjoyed widespread use internationally. The algorithm was initially
controversial with classified design elements, a relatively short key length, and
suspicions about a National Security Agency (NSA) backdoor. DES consequently came
under intense academic scrutiny which motivated the modern understanding of block
ciphers and their cryptanalysis.
Diffie and Hellman publish New Directions in Cryptography.
Phil Zimmermann releases the public key encryption program PGP along with its
source code, which quickly appears on the Internet. Pretty Good Privacy (PGP) is a
computer program that provides cryptographic privacy and authentication. PGP is
often used for signing, encrypting and decrypting e-mails to increase the security of email communications.
RSA Security Inc. released their RSA algorithm into the public domain, a few days in
advance of their U.S. Patent 4,405,829 expiring. Following the relaxation of the U.S.
government export restrictions, this removed one of the last barriers to the worldwide distribution of much software based on cryptographic systems
Quantum cryptography, or quantum key distribution (QKD), uses quantum mechanics
to guarantee secure communication. It enables two parties to produce a shared
random bit string known only to them, which can be used as a key to encrypt and
decrypt messages. An important and unique property of quantum cryptography is the
ability of the two communicating users to detect the presence of any third party
trying to gain knowledge of the key. This results from a fundamental part of quantum
mechanics: the process of measuring a quantum system in general disturbs the
system. A third party trying to eavesdrop on the key must in some way measure it,
thus introducing detectable anomalies. By using quantum superpositions or quantum
entanglement and transmitting information in quantum states, a communication
system can be implemented which detects eavesdropping. If the level of
eavesdropping is below a certain threshold a key can be produced which is
guaranteed as secure (i.e. the eavesdropper has no information about), otherwise no
secure key is possible and communication is aborted. The security of quantum
cryptography relies on the foundations of quantum mechanics, in contrast to
traditional public key cryptography which relies on the computational difficulty of
certain mathematical functions, and cannot provide any indication of eavesdropping
or guarantee of key security.