Mechanising Cryptography

19
Mechanising Cryptography Professor Richard Walton CB

description

Mechanising Cryptography. Professor Richard Walton CB. Cryptography is concerned with the application of technology to the problem of encrypting and decrypting a message. The Mathematics is subordinate to the technology. 20 th Century Cryptography. Development of Crypt in the 1900s - PowerPoint PPT Presentation

Transcript of Mechanising Cryptography

Page 1: Mechanising Cryptography

Mechanising Cryptography

Professor Richard Walton CB

Page 2: Mechanising Cryptography

Cryptography is concerned with the application of technology to the problem of encrypting and decrypting a message.

The Mathematics is subordinate to the technology

Page 3: Mechanising Cryptography

20th Century Cryptography

Development of Crypt in the 1900s Manual Methods

– Slow– Laborious– Error-Prone

Need to mechanise Importance of technology for design Nature of technological constraints

Page 4: Mechanising Cryptography

CRYPTOGRAPHYSecurity

Usability Cost

Page 5: Mechanising Cryptography

Cryptanalysis 1918

Knowledge of language Frequency Analysis Key Re-use (Depth)

Skill Requirement:To solve crossword puzzles

in foreign languages

Page 6: Mechanising Cryptography

Rotor Machines

Page 7: Mechanising Cryptography

Rotors

Page 8: Mechanising Cryptography

Commercial Enigma

Page 9: Mechanising Cryptography

Enigma

Page 10: Mechanising Cryptography

Enigma

Army

Navy

Navy – 4 wheel

Page 11: Mechanising Cryptography
Page 12: Mechanising Cryptography
Page 13: Mechanising Cryptography

Early Machine Cryptography

Limitations of Security Design Balance Security against Cost Usability – Human Factors

Page 14: Mechanising Cryptography

Electronics – 1960-1980

Shift Registers and Simple Logic Gates Linear Algebra Galois Theory Rich Mathematical structure Rigorous Analysis Expensive Components

Page 15: Mechanising Cryptography

Large Scale Integration

Application Specific Integrated Circuits Complex Algorithms Tailored to purpose Standard Cryptographic Primitives Software and Firmware

Page 16: Mechanising Cryptography

Public Key Cryptography

Key Management Non-Secret Encryption

– Ellis, Cocks & Williamson– Beyond 1970’s technology

Widespread after 1985 Search for easier solutions

– Elliptic Curve Cryptography

Page 17: Mechanising Cryptography

Next Challenge

Quantum Computers destroycurrent Public Key algorithms

Find new algorithms to resist Quantum Computer attacks

Page 18: Mechanising Cryptography
Page 19: Mechanising Cryptography

Mechanising Cryptography

Acknowledgement

Illustrations concerning Enigma in this presentation have been taken from the user manual for Enigma – E

by Paul Reuvers & Marc Simons.

For details of Enigma-E, which is available for purchase from Bletchley Park Museum, see www.xat.nl/enigma-e/