Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.




David Zwart

on 17 February 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Tryout

RSA The cryptographic system of the 21th century Muhabbat Komil David Zwart Modern
Symmetric Asymmetric Public Key Cryptography RSA Diffie-Hellman Cryptography > computers History Modern cryptography Comparison of two cryptosystems Programming cryptography Comparison of two cryptosystems Speed

Hacking speed


Integrity End of presentation Any questions? Iterations Transpositions 1,3,4,5,2 "Hello" "Hlloe" DES Data Encryption Standard Fast Middleperson attack Slow Future threats Diffie-Hellman RSA Public Key Private Key "Message" "Code" "Message" Outdated One key: symmetric cryptography First symmetric cryptosystem Slow Future threat(no problem yet) Created by Rivest, Shamir and Adleman Key Key "Message" "Code" "Message" Two keys: assymmetric cryptography Vocabulary Public Key Private Key "Message" "Code" "Message" encryption decryption Encryption Cryptography Cryptology Cryptanalysis Decryption Plaintext Ciphertext Public key Private key Variable speed. Created by Diffie and Hellman Intended for sharing keys. key exchange Message --> split --> numbers "Hello" He-ll-o 14-24-15 Classic The Codes of the Wars Medieval Hieroglyphs History Vigenère cipher key: LEW "and" "lrz" Trench codes
The Tableau de Concordance
Trithemius cipher
Morse Code

Caesar cipher
Programming RSA No identification Mathematical overflow No standard
encryption Hacking Brute Force Attack Breaking order: Public Key
Private Key numbers
Full transcript