Professional Documents
Culture Documents
I. INTRODUCTION
Since ancient times, the human being has created different
kinds of methods in order to preserve the privacy of the
information of some communications ensuring that only the
recipient of the message is able to decode it; so by this way,
an unauthorized receptor (a person, a machine, etc.) will not
be able to read the message.
The cryptography (this concept comes from the Greek
words "kryptos" and "graphein", which each means hidden or
secret and writing, respectively) initially was the science of
writing and solving those encrypted messages but at modern
times (after the 80s), this definition is a little bit short because nowadays the field of cryptography encompasses much
more than secret communication. The modern cryptography
deals with the problems of message authentication, digital
signatures, or digital cash (due to money transactions, for
example) and much more.
A more accurate definition of the concept "cryptography"
is provided by Jonathan Katz, who defines it as the study
of techniques for securing digital information, transactions,
and distributed computations [2]. This new definition is made
because at the present, ordinary people use it all around the
world and not only military or intelligence organizations like
it used to be before.
This document presents a brief history of cryptography describing some ancient, middle and modern technologies and
how encryption-related technologies have evolved through
time and will continue evolving as well as the measures
Internet users should consider when implementing modern
encryptions.
The example takes for the letter "P" the third row and the
fifth column, in other words, the C row and the E column to
translate "P" into "CE"; for the letter "O" just have to match
the C row and the D column to create a "CD", and so on.
A
B
C
D
E
A
F
L
Q
V
B
G
M
R
W
C
H
N
S
X
D
I/J
O
T
Y
E
K
P
U
Z
A. Classic Cryptography
The early begin of cryptography was made by a simple
writing of a message, and was only concerned about converting messages into an unreadable group of characters;
and there were found registers of the earliest forms of
cryptography took place in the cradle of civilization like
Egypt, Rome and Greece. At this section some of the method
used before are described.
First, at 1900 B.C. Egyptians used hieroglyphs (pictograms) in a stele and this method was not considered
impossible to read until at 19th century the discovery and
study of the Rosetta Stone provide background to read them.
Other huge problems (treats) cannot be restored or protected, for example, the accidental destruction or overwriting of data is an issue that cryptography. Also, another
problem is the masquerading, it occurs when an intruder
gain accesses to data files or other information to a system
by using another users credentials o account.
In order to protect data in the computer and through
communications systems, the data security is the science
and study of this methods. There are two basic techniques
for encrypting information: symmetric encryption and asymmetric encryption.
A. Symmetric Encryption (Secret Key Encryption)
It is an old and best-known technique (described by the
examples of the classical techniques of cryptography) that
used a secret key (a number, a word, string of characters,
etc.) which was applied to the content of the information that
wanted to be protected. It consists on changing or shifting
a letter or a group of letters by a number of places in the
alphabet. As said before, both sender and receiver knew the
secret key and they used to encrypt and decrypt the message.
The figure 6 shows the method.
(1)
(2)
The equations 1 and 2 shows the encryption and decryption made for some plaintext block M and ciphertext
(encoded message) block C. The letters e and d are a value
known by the sender and a value known only by the receiver,
respectively. A public key es denoted by PU = {e, n} and a
private key of PR = {d, n} Both sender and receiver must
know the n value.