Mathematics in the Modern World
Cryptography
https://www.youtube.com/watch?v=CwdUwevayRU
Cryptography
• Cryptography is the science of encrypting and
decrypting written communication.
• It comes from the Greek word “kryptos”,
meaning hidden and “graphia”, meaning writing.
• It is an effective way of protecting sensitive
information as it is stored on media or transmitted
through network communication paths.
(Wikipedia)
Cryptography (or Cryptology) is concerned with
security, privacy or confidentiality of communication
over an insecure channel.
• People have always had fascination with keeping information
away from others.
• History is filled with examples where people tried to keep
information secret from adversaries.
• Kings and generals communicated with their troops using basic
cryptographic methods to prevent the enemy from learning
sensitive military information.
• Julius Caesar reportedly used a simple cipher which has been
named after him. In World War II, cryptography was a very
important tool. https://study.com/academy/lesson/importance-of-julius-caesar-to-history.html
In this information age, the need to protect data is more pronounced than ever.
As the world becomes more connected, the demand for information and
electronic devices is growing and with the increased demand comes increased
dependency on electronic systems.
Already the exchange of sensitive information such as credit card number
over the internet is common practice. Protecting data and electronic systems is
crucial to our way of life.
Cryptography
Applications of cryptography include ATM
cards, computer passwords, and electronic
commerce.
Encryption
Encryption is the process of
1. Transforming data
2. Using an algorithm
3. To make it unreadable to
anyone
4. Except those bossessing
the key
Cipher text is the encrypted or encoded information that contains a
form of the original plaintext that is unreadable by a human or computer
without the proper cipher to decrypt it.
What is Cryptography?
What is Cryptography?
• Decryption is the process of taking encoded
or encrypted text or other data and converting it
back into text that you or the computer can read
and understand.
• A cipher is an algorithm for performing
encryption or decryption—a series of well-
defined steps that can be followed as a
procedure.
Goals of Cryptography
What is Cryptanalysis?
•Cryptanalysis is the science and sometimes art of breaking cryptosystems.
• Cryptology the Scientific study of cryptography and cryptanalysis.
Cryptology Cryptography + Cryptanalysis
History of Cryptography
The history of cryptography dates back
several thousands of years.
“A man is born without any languages and yet is capable of all”.
-Bishop Wilkins
History of Cryptography
• Cryptography was used as early as the
time of Ancient Greece through their
secret writing called Scytale.
• Around 400BC, the Spartans would write
a message on a strip of paper (to
communicate during military campaigns) that it
wound around a wooden stick or rod, the
Scytale.
• The strip was delivered and then the
recipient will wrap it a round different
rod. The message is only readable when
the rod is the same size as the original.
Enigma Machine
During World War II, Nazi Germany encoded its transmitted
messages using an Enigma machine, first patented in 1919. Each
letter of the plaintext message was substituted with a different
letter, but the machine changed the substitutions throughout the
message so that the ciphertext appeared more random and would
be harder to decipher if the message were intercepted. The
Enigma machine accomplished its task by using three wheels of
letters (chosen from a box of five) that rotated as letters were
typed. In addition, electrical sockets corresponding to letters were
connected in pairs with wires. The choice and order of the three
wheels, their starting positions, and the arrangement of the
electrical wires determined how the machine would encode a
message. The receiver of the message needed to know the setup
of the wheels and wires; with the receiver’s Enigma machine
configured identically, the ciphertext could be decoded.
Enigma Machine
There are a staggering 150 quintillion different ways to
configure the Enigma machine, making it very difficult to
decode messages without knowing the setup that was used. A
team of mathematicians and other code breakers, led by Alan
Turing, was assembled by the British government in an attempt
to decode the German messages. The team was eventually
successful, and their efforts helped change the course of World
War II. One aspect of the Enigma machine that aided the code
breakers was the fact that the machine would never substitute a
letter with itself.
As part of its Nova series, PBS aired an excellent account of the breaking of the Enigma codes
during World War II entitled Decoding Nazi Secrets. Information is available at
http://www.pbs.org/wgbh/nova/decoding/.
Enigma Machine
https://www.youtube.com/watch?v=CspaXNkC2ec
Substitution Ciphers
Substitution Cipher is a method of encryption by which
unit of plain text are replaced by cipher text according to
regular systems.
Monoalphabetic cipher is a type of substitution cipher
that replaces each letter in the message with a different
letter.
The most famous type of this are
1. Caesar cipher
2. Athbat cipher
3. Affine cipher
4. ROT13 cipher
Caesar Cipher
• Julius Caesar allegedly used cyclical
alphabet encrypting code to communicate
with generals.
• In this approach each letter is replaced with
a letter with a fixed number of position
later in the alphabet. another one further
in the alphabet.
By shifting 3 positions, A will be replaced
by D, B by E, C by F,
and the entire mapping looks like this.
XYZABCDEFGHIJKLMNOPQRSTUVWXYZ
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Caesar Cipher
XYZABCDEFGHIJKLMNOPQRSTUVWXYZ
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Example:
1. Use the Caesar cipher with a shift of 3 to encrypt the message.
I WILL SEE YOU LATER
Using the above mapping, we get the encrypted message:
L ZLOO VHH BRX ODWHU
In the encrypted message, we can see a single letter which we
can assume to be either an “A” or an “I”.
Thus, to hide the message, we often rearrange the letters into
equal block size. The new encrypted message is
LZLO OVHH BRXO DWHU
Caesar Cipher
Example:
2. Decrypt the message: IGRR EUAX SUSA
if it was encrypted using a shift cipher with shift of 6:
Shift the alphabet by mapping A to G, 6 positions in the alphabet.
Original: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Maps to: G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
Working backward to decrypt the message, the first letter I is
mapped to C, then G is mapped to A, and so on. We get
CALL YOUR MOMU
Removing the unnecessary letter, the original message is
Call your mom