Cryptography the method of applying protocols to information to make it seem like nonsense to hurt those who do not know the protocols. Cryptology is used to encrypt messages and create secure codes; the earliest known use of Cryptographs was in Egyptian times but over time several different types of cryptographs were made today we use it to keep information secure and to create registration numbers.
Focus:
This IA will focus on the math involved in certain ciphers, these ciphers are.
The classic cipher
Substitution cipher
ISBN codes
Public Key
Credit Card codes
Aim
My aim is to understand the ciphers and see if I can make some of my own
Investigation
Transition/Classic Cipher
This was a simple cipher and one of the earliest established. It was said that Julius Caesar used this cipher to protect messages of military importance, it is also known as the Caesar shift. The reason it is simple is because during the time not many people could read.
# 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Plain a b c d e f g h i j k l m n o p q r s t u v w x y z cipher C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
In this example each letter is given a corresponding numerical value, add 2 to that number then turn it back into a letter . It can be represented by the mathematical formula f(x)=x+2 and to change it back it would be the inverse of the function (x)^(-1)=x-2 . Using this formula a phrase like “Hello my name is” would become “jgkkqoaqcogku”. It seems like complete nonsense there are also no spaces in between words to make it harder to decrypt, to anyone who saw it and didn’t know that it was would just leave that information alone but knowing the cipher it is easily deciphered so it isn’t used ...
... middle of paper ...
...ple
Choose two distinct prim numbers p and q. p=2 , q =13
Work out n, n= pq n = 26
Work out S, S= (p-1)(p-2) S = (2-1)(13-1) = 1 x 12 = 12
Choose a number A which is smaller than S and has no common factors. A = 5
Find H, HA-1 is a multiple of S 5H-1 is a multiple of 12
H = 5
To encrypt Find N by working out V=NA (mod n) Calculated below
To decrypt Find V by working out N= VS (mod n)
V N
1 15 (mod 26) =1
2 25 (mod 26) = 32 (mod 26) = 6
3 35 (mod 26) = 243 (mod 26) = 9
4 45 (mod 26) = 1024 (mod 26) = 10
Once again the numbers refer to letters in the alphabet. The only number that needs to remain secret is S because only it can decipher the code.
As it can be seen the number for S is 12 which is a very high number to use as an exponent and can be difficult to calculate but using math we can figure it out. Using the formula ab(mod n) = ((a mod n)(b mod n)) mod n
One of Great Britain’s most important naval developments was the founding of the top-secret Office of Naval Intelligence, better known as Room 40. Specializing in cryptography, “the science of writing in secret code” in order to hide sensitive information, Room 40’s cryptanalysts worked around the clock to break the secret code. Decryption is vital in secret transmissions concerning strategic war movements, as the enemy will be looking to intercept information concerning movements and positioning. Great Britain was aided in that the German Navy started the war with three primary codes, and within four months the British Admiralty possessed physical copies of all three of them.
The sender would type the message in plaintext (not encrypted) and the letters would be illuminated on a glass screen. With the press of each typewriter key the rotor would shift 1/26 of a revolution giving each letter a different encryption each time, which made the code so difficult to crack. Due to the complexity of the code the enigma became very useful for the Germans for radioing messages to u-boats. The cipher was finally broken when the British were able to capture some key documents from a German warship.
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
The RSA encryption is related to the cipher of Julius Caesar (1300s) that shifts three letters to encode messages. The cipher of Julius Caesar was used in war to send messages securely. Here is how Caesar encodes his message using the cipher. First Caesar assigned A through Z to 0 through 25. For instance A is zero. Second, add three to each numbers.
Before 1919, four different men, from four different countries, created very similar ciphering machines all using a rotor or wired code wheel. Edward H. Hebern, United States; Arthur Scherbius, Germany; Hugo Alexander Koch, Netherlands; and Arvid Gerhard Damm, Sweden. Three of the four inventors were unable to complete their machines due to lack of funds. Only Scherbius, an electrical engineer from Germany, was able to complete his ciphering machine. He named the successful creation The Enigma.
Codes, on their surface, reveal little. While they may take the form of numbers, letters, bytes, or symbols, the primary goal of most codes is either to conceal or condense information. In the context of codebreaking, the codes that pique the most interest are, of course, the ones that hide a message from unauthorized eavesdroppers. The role of the codebreaker is not always the honest one, for it is his/her job to undo the careful manipulations of the sender to uncover, without the key for the lock, what the message contains. To do this, he/she must rely on intuition, on reasoning, and sometimes on “luck,” to get his/her way.
The enigma code was first broken in 1933 by Polish mathematician and cryptologist Marian Rejewski, with the help of his two fellow colleagues Henryk Zygalski and Jerzy Rózyki. While studying at Poznań University in 1929, Rejewski began attending a cryptology course held by the Polish General Staff ’s Cipher Bureau which was only available to the university’s most advanced mathematics students.
The code assigned letters in the alphabet and numbers a set of dots (short marks) and dashes (long marks) based on the frequency of use. The code used the English alphabet but they would make the more frequently used letters into the less complex dots and dashes, such as E or A. While the Less frequently used letters such as D or Z got a lot more complex code of dots and dashes. Initially, the code, when transmitted over the telegraph system, was rendered as marks on a piece of paper that the telegraph operator would then translate back into English. Rather quickly. But then the operators became so good at translating the
Cipher can be compared to the prisoner or the Athenian in Ancient Greece who would resist the see to the truth. They felt extremely comfortable
Shift ciphers are the most basic form of cipher that can be used, the only problem is, they are not very secure ciphers. The only time a shift cipher can be secure, it is also perfectly secure. This “perfect security” only happens when a shift cipher is used on a single letter of plaintext and no more. If practicality is being considered, then this is not an efficient use of enciphering a message. It simply isn’t practical to send a single encrypted letter. In order to understand the insecure encryption of a shift cipher, it must first be understood how a shift cipher encrypts a message.
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.
Cryptography was first used long before the invention of computers. One well-known system was attributed to the reign of Julius Caesar (Klein ix). Another example is the famous Zimmerman telegraph, which was sent from Germany to Mexico during World War I (ix). In a more modern setting, cryptology was mainly used by the government until the late 1970s (Simpson 1). This is largely due to the fact that computers were too expensive, so not many households or businesses had them (1). However, after the computer revolution, cryptology became more public, especially in the business industry where there was a greater need to secure things like transactions (1).
Digital Evidence is electronic data, materials, objects, property, documents, or records that are presented in court to prove or disprove allegations made against an arrestee. It takes the form of electronic data or information stored in bits and bytes on magnetic media. The examples of devices that can contain digital evidence include; cellular phones or similar all in one devices, pagers, digital voice recorders.
...ing the first half of 2007 has revealed that the study found the banking industry as soft target for phishing scams in India.