Professional Documents
Culture Documents
Literature Review - Akeeb Kalam
Literature Review - Akeeb Kalam
Research Log
Akeeb Kalam
What is Cryptography and its origins?
About:
With cybersecurity being an ever growing field that is constantly evolving with the increase in
malware and security breaches, new ways and measures have to be put in place in order to ensure
data is encrypted and secure. This is where cryptography comes in as it is the process that
encrypts data and keeps it secure to reach the right people before it is then decrypted.
Point:
● Cryptography can be broken down into the words crypto meaning “secret” and graphy
meaning “writing” essentially being secret writing
● Cryptography can be first traced back before the modern era to 1900 BC where
information special hieroglyphic symbols were used instead of regular ones
○ At the time this was more so to make the message more dignified rather than
secret, but demonstrated a transformation of a piece of writing
○ Various early civilizations used cryptography such as espionage service in India
giving spies “secret writing”
○ One of the most well known instances of cryptography can be seen in 100 BC
when Julius Caesar was alive. He encrypted (To convert into a code that is
unable to be read by outside sources) messages to his generals using a substitution
cipher (an algorithm used for encryption or decryption.) Basically he would swap
each letter with the letter three places ahead of it so A would be D and B would be
E…
■ This system works until the secrecy of the system is found out and then
becomes heavily flawed. This is because the frequency of letters showing
up can give away certain letters. For example, the letter X may be in place
of E, but E is one of the most common letters. By seeing X repeatedly
people are able to decrypt (opposite of encryption the ability to convert
code into regular writing) the message and assume the letter to be E.
○ In the 1500s, a man known as Blaise de Vigenere made the first cipher that used
an encryption key allegedly. The encryption key was repeated multiple times
using a modulo 26 character key. While also able to be decrypted easily, it
indoduced the basic idea of encryption keys to ciphers. It also changed the idea of
the secrecy of the message depending on the secrecy of the encryption rather than
the secrecy of the system.
○ The 1800s came in which Edward Hebern designed a rotor machine that
embedded a secret key in a rotating disc. The key had a substitution table and
each press of the key resulted in the output for the the cipher text. However like
the previous two ciphers, it was very easy to decipher.
○ Later, the enigma machine would be invented by Arthur Scherbius at the end of
World War I and would be used going into World War II. The device used 3 to 4
more rotors that roated at differnt rates. However, the machine would eventually
be broken by Poland and British Cryptographers got ahold of it to obtain the key
○ Cryptography at this point had primarily been used for military purposes, but after
World War II, it started seeing some commercial attention.
○ When computers were just entering the scene to consumers in the 1970s, IBM
formed a “crypto group” in response to the demand of encryption. Lucifer was a
cipher that was designed as a block cipher to become the national standard. It
would later become the Data Encryption Standard (DES), but would later be
broken by a search attack in 1997. The issue this time was that the size of its
encryption key was very small. Computing power wasn’t accounted for when
creating Lucifer.
○ 3 years later, a new block cipher was accepted being named Rijndael which then
went on to become the Advanced Encryption Standard (AES)
○ Kerckhoff’s principle: The security of the message should be determined by the
secrecy of the key and not the actual encryption system.
What are the applications of cryptography?
About:
Well after learning about what cryptography is and its origins. What are some possible
applications of cryptography used. In this article it discusses the implementation of an electronic
voting infrastructure to reduce voting fraud.
Point:
● In the United States, voting is the very foundation of our country, yet it holds almost next
to nothing on security in electronic voting. It is important that such a system has integrity,
confidentiality, and availability of votes.
○ The United States electronic voting environment in the United States fails to meet
the cybersecurity standards of NIST (National Institute of Standards and
Technology). This is an issue because elections are how this country is run
making this a great concern
○ Issues include physical access with limited to no security on voting machines,
unprotected backend servers, and no redundancy or backups
○ Some dangers could be the deletion and changing of votes as well as a loss of
integrity and and public confidence.
○ In the Untied States alone, there have been 1,328 instance of voter fraud
○ Homomorphism - a special correspondence between the members of two
systems, groups, or fields
○ The third party can generate messages with the same key, so it would be hard to
authenticate the message if the key were to be leaked.
● Types of encryption
○ Stream ciphers - encrypt information one bit/byte at a time and is a quick format
of encryption. The data is converted to binary digits and encrypted sequentially.
Popular algorithms would be RC4, Salsa 20
○ Block Ciphers - information is broken down into chunks of fixed size. Their size
is dependent on the key. They are encrypted and then chained together. They are
much slower than streams, but harder to tamper. Popular algorithms would be
○ Peppering is the process of adding the same random value at the end of the
plaintext.
References