<img src='images/tatemono_hakubutsukan.png' alt='Museum' > Welcome to All About Encryption! The Long Story Short Version Click on a topic to learn more about it: [[What is Encryption?]] [[History]] [[Limitations]] [[Debates]] [[Sources]] Encryption is the process of concealing information by altering it so it looks like random and/or unintelligible data. ''Primary Functions'' |== <img src='images/bouhan_camera_man.png' alt='No one likes being watched 24/7'> <br> <img src='images/mark_checkbox2_green.png' alt='Checkmark'> ====|| ''Privacy'' * No one reads the information except the intended receiver * Authentication * Proving identity <br> ''Integrity'' * Assuring that the received message hasn’t been altered in any way from the original * Non-repundiation * Proving that the sender really sent the message * Key exchange * Keys are shared between sender and receiver |== [[Types of Encryption]] [[Intro]] ''History of Encryption'' |=| Despite encryption's current use in technology nowadays, encryption has been used for centuries, going back as far as Ancient Greece! [[Ancient History (~3000 BC - 500 CE)]] [[Post-Classical History (~500 CE - 1500 CE)]] [[Modern History (~1500 CE - Present)]] [[Intro]] ||== <img src='https://upload.wikimedia.org/wikipedia/commons/9/99/Large-pigeon-message.png' alt='Message carried by pigeon' width='270' height='480'> (text-size:0.5)[A currently undeciphered message found with a skeleton of a carrier pigeon from WW2] ====|| <img src='https://www.nationalarchives.gov.uk/wp-content/uploads/2016/08/page-of-cyphers-sp-53-22.jpg' alt='A page of ciphers' width='359' height='480'> (text-size:0.5)[A page of ciphers used by Queen Mary of Scots in 1586 that was found after searching through her things after the discovery of the Babington Plot]''Limitations of Encryption'' |== <img src='images/character_program_shock.png' alt='Program sulking' width='250' height='250'> <br> <img src='images/computer_ryoushi_quantum.png' alt='Quantum Computer' width='250' height='250'> ====|| ''Length'' * The shorter the key, the more vulnerable it is to brute force attacks * The longer it is, the more difficult and expensive the encryption will be <br> ''Quantum Computing'' * Achieves computing speeds thousands of times faster than today’s supercomputers, providing a challenge to today’s encrypted data * Although currently it’s quite limited and not commercially available * It seems to be in its early stages of development * And the US government is already trying to make encrytion methods with it [[Intro]] ''The Modern Encryption Debate'' ||||||= The debate on encryption as it currently is struggles to find a balance between the need for national security and right to privacy. The debate was ignited in the '90s when the US government tried to ban encryption and cryptography because "it would threaten national security." In 2014, Big Tech companies decided to have encryption on by default on their devices, putting the debate in the center stage once more. Some believe that strong encryption should be banned because it makes it easier for criminals to hide illegal activity. ((text-size:0.5)[If they're already committing crimes, what’s stopping them from doing more in order to cover their tracks?] Some believe that it helps people protect their personal data from being accessed by unwanted eyes. ====|||| <img src='images/kaigi_shinken_businessmen.png' alt='Meeting' width='300' height='350'> [[The Snowden Disclosures]] [[Intro]] All my sources! (link: "Encryption - Wikipedia")[(open-url: "https://en.wikipedia.org/wiki/Encryption")] (link: "What is encryption? By Cloudflare")[(open-url: 'https://www.cloudflare.com/learning/ssl/what-is-encryption')] (link: "An Overview of Cryptography By Gary C. Kessler")[(open-url: 'https://www.garykessler.net/library/crypto.html')] (link: "A History of Cryptography From the Spartans to the FBI by Panos Louridas at The MIT Press Reader")[(open-url: 'https://thereader.mitpress.mit.edu/a-history-of-cryptography-from-the-spartans-to-the-fbi/')] (link: "A brief history of cryptography: Sending secret messages throughout time by Josh Schneider at IBM Think")[(open-url:): 'https://www.ibm.com/think/topics/cryptography-history')] (link: "The Limitations of Data Encryption by Liam Winters at Millennium Tech USA")[(open-url: 'https://www.mtechusa.us/cybersecurity-101/the-limitations-of-data-encryption/')] (link: "The Modern Encryption Debate: What's at Stake? by Simone Catania at CircleID")[(open-url: 'https://circleid.com/posts/20221102-the-modern-encryption-debate-whats-at-stake')] (link: "The Snowden Disclosures - Wikipedia")[(open-url: 'https://en.wikipedia.org/wiki/Snowden_disclosures')] [[Intro]] ''Ancient History'' |== <img src='https://figures.academia-assets.com/62034835/figure_006.jpg' alt='A scytale' width='400' height='100'> (text-size:0.5)[Scytale (or a skytale)] <img src='https://miro.medium.com/0*Z04NmKT-jlcj_Pak' alt='A basic caesar cipher' width='300' height='294'> (text-size:0.5)[Basic caesar cipher. Used in Ancient Rome & Spy Island on Proptropica, among many, many other uses] ====|| * A tomb in Egypt was found to have the earliest implementation of cryptography to date * Clay tablets in Mesopotamia had encrypted writing for secret recipes for ceramic glazes <br>(text-size:0.5)[they didn’t want the competition to know their secrets??] * The Spartans used a tool called a scytale * Julius Caesar used the aptly named caesar cipher, a substitution cipher [[History]] [[Intro]] ''Post-Classical History'' |== <img src='https://upload.wikimedia.org/wikipedia/commons/7/7d/Stamp_IQ_1962_6f.jpg' alt='al-Kindi on an Iraqi stamp from 1962' width='250' height='400'> * Arab scholar and scientist Abu Yūsuf Yaʻqūb ibn ‘Isḥāq aṣ-Ṣabbāḥ al-Kindī (Al-Kindi for short) described the frequency analysis, a fundamental decryption method that’s much better than brute force; one of the most important breakthrough in the history of encryption ====|| <img src='https://upload.wikimedia.org/wikipedia/commons/3/34/Leon_Battista_Alberti%2C_Self-Portrait%2C_c._1435%2C_NGA_43845.jpg' alt='al-Kindi on an Iraqi stamp from 1962' width='250' height='400'> * Leon Battista Alberti is considered to be the father of modern cryptography * He explored using ciphers with multiple alphabets, creating early polyalphabetic ciphers, the strongest form of encryption of the time [[History]] [[Intro]] ''Modern History'' |== <img src='https://upload.wikimedia.org/wikipedia/commons/3/3d/Hebern_electric_code_machine_1.jpg' alt='Electric code machine' width='320' height='240'> (text-size:0.5)[Herbern's electric code machine] <img src='https://upload.wikimedia.org/wikipedia/commons/b/bd/Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg' alt='Enigma Machine' width='240' height='280'> (text-size:0.5)[An Enigma Machine] ====|| * Encryption as we know it today started during WW1 * American Edward Herbern invented one of the first rotor machines * Rotor machines are used to encrypt and decrypt text * WW2 had the Enigma Machine made by the Germans, giving their opponents one of the biggest challenges in the war, decipher and break it * That was such a huge deal and achievement, you could make multiple books and a movie out of it. [[History]] [[Intro]] ''Types of Encryption'' |== <img src='https://www.garykessler.net/library/images/crypto_types.gif' alt='Types of Encryption' width='450' height='365'> ====|| * Symmetric(secret key) ** Symmetric methods use one key for encryption and decryption * Asymmetric(public key) ** Asymmetric methods use two keys, one for encryption and one for decryption * Hash(one-way) ** Uses math to encrypt it in a way that it can’t be recovered [[What is Encryption?]] [[Intro]] ''The Snowden Disclosures'' In 2013, Edward Snowden, a former USA NSA intelligence contractor leaked documents revealing global surveillance by US, UK, Canada, Australia, New Zealand, Netherlands, Sweden, France, and Germany’s governments. To say it was a big deal would be an understatement. It was the biggest theft of U.S. secrets in the history of the US (so far) according to the Pentagon. ''It helped the general public understand the role of encrypted communications'' Despite attempts by the government to pressure companies to add abackdoor to devices and computers, they haven't been successful due to backlash from millions on why that is a very bad idea. Why is it a bad idea? If it's implemented,// anyone// can access private information worldwide, causing so much harm in so many ways The images below are some of many that were leaked: <img src='https://upload.wikimedia.org/wikipedia/commons/thumb/3/32/Lesson-4-job-aid-usp-info.pdf/page1-1280px-Lesson-4-job-aid-usp-info.pdf.jpg' alt='What is a privacy violation slide'> <img src='https://upload.wikimedia.org/wikipedia/commons/f/f3/PRISM_Collection_Details.jpg' alt='PRISM Collection Details'> (text-size:0.5)[I don't think graphic design is their passion] [[Debates]] [[Intro]]