Post on 16-Apr-2017
ENCRYPTION & CRYPTOGRAPHY
Sean, Josh, James and Tom
What’s the difference?
Encryption
Cryptography Method
Cryptography Method
Cryptography Method
What is Encryption Translation of information/data into secret
code Exercised heavily in ecommerce systems
(such as online stores and authorization) Used more and more as technology
improves
Cryptography Overview Thousands of years old (Classic
Cryptography) Typically utilises secret keys or passwords
Uses of Cryptography Internet (Online Stores, Authentication
Logins) Web SSL Certificates (Secure Browsing
https) Governments – Classified Documents Digital Watermarking Images within Images (Steganography) Terrorist Attacks and other illegal
activities
Classic CryptographyOld Kingdom of Egypt – Circa 1900BC
Classic Cryptography Substitution ciphers
letter replacement Caesar Cipher
3 Point Shift
H E L L O
K H O O R
IJ
FG
MN
MN
PQ
Classic Cryptography Cont’ Transposition ciphers
Letters Unchanged Letters Reordered E.g. “Hello my name is” could encrypt to..
“si eman ym olleH”
Modern CryptographyWorld War II
Modern Cryptography Enigma Machine – Invented 1918
Used until 1939 Then modified in the war and latter
called the M4 Heavily regarded as helping to win the
war
…So how does it work?
Enigma MachineCode to Encrypt: “Permission to attack”
Stage 1 CryptographyABCDEFGHIJKLMNOPQRSTUVWXYZDEMIJKVWXYLQRSTUABCZNOPFGH
Resulting Code: “Wjbrxccxus zu dzzdml”
Enigma Machine cont’Original Code: “Permission to attack”stage 1 Code: “Wjbrxccxus zu dzzdml”
Stage 2 CryptographyABCDEFGHIJKLMNOPQRSTUVWXYZRSXNOPYLQFMIZKVWGHUATDEBCJ
Resulting Code: “Efshbxxbau ja njjnzm”
Enigma Machine cont’Original Code: “Permission to attack”Stage 1 Code: “Wjbrxccxus zu dzzdml”Stage 2 Code: “Efshbxxbau ja njjnzm”
Stage 3 Cryptography (Caesar Cipher)Efshbxxbau ja njjnzm
Resulting Code: “Hivkeaaedx md qmmqcp”
Enigma Machine cont’Original Code: “Permission to attack”Stage 1 Code: “Wjbrxccxus zu dzzdml”Stage 2 Code: “Efshbxxbau ja njjnzm”Stage 3 Code: “Hivkeaaedx md qmmqcp”
Stage 4 Cryptography (Reflector)Swapped in pairs.Resulting Code: “Ihkvaeeaxd dm mqmqpc”
Enigma Machine cont’Original Code: “Permission to attack”
….…Stage 4 Code: “Ihkvaeeaxd dm mqmqpc”
…This is then put back through the Caesar Cipher, followed by 2 random substitution layers
Resulting in “Cwzbhllhiu Ut xaxake”
Web Encryption
“In my role as Wikileaks editor, I've been involved in fighting off many legal attacks. To do that, and keep our sources safe, we have had to spread assets, encrypt everything, and move telecommunications and people around the world to activate
protective laws in different national jurisdictions.”Julian Assange, WikiLeaks
Web Encryption: MD5 Most common form of encryption Widely used on the web Used to also check data integrity Produces a 128bit (16-byte) hash
value Cannot be Decrypted (One way hash)
Hello = md5(8b1a9953c4611296a827abf8c47804d7)
Web Encryption: Salt Adds a string of characters before an
cryptography process takes place.
Salt Key = 1083Result = 1083HelloMD5(21326fad24a68107521358e4cfa8535f)
MD5 Hash Databasehttp://md5decrypter.co.uk/
Web Encryption: SSL/ TLS Secure Communications over the
internet SSL = Secure Socket Layer TLS = Transport Layer Security Main way of achieving this is via
HTTPS
Future Of Encryption Encryption has developed greatly over
the last 10 years and will continue… Hackers become more wise Technology becomes more personal
…Encryption needs to keep up with technology
Any Questions?
…thank you!