cryptography and mary queen of scots alice yuyen chang spring 2004 at chang gung university a...

55
Cryptography and Cryptography and Mary Queen of Scots Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gun g University A Lecture Given in Freshm an English Courses

Upload: edward-blake

Post on 11-Jan-2016

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Cryptography and Cryptography and Mary Queen of ScotsMary Queen of Scots

Alice Yuyen ChangSpring 2004 at Chang Gu

ng UniversityA Lecture Given in Fresh

man English Courses

Page 2: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Think before you read . .

What will be the best methods to guarantee the security of classified documents or your love letters?

What are the functions of languages?

What is the relationship between communication and decipherment?

Page 3: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Essay questions: Please give five examples of the secret

communication in ancient times and analyze and compare their advantages and disadvantages.

What is the difference between steganography and cryptography? What functions are they expected to achieve? What technology, science, or human knowledge will be required behind both skills?

Page 4: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Briefly define the concept of plain text and cipher text. Based on your definitions, please comment on the following statements:– 1. Human languages tend to hide the

true meanings.– 2. There is always secret behind the

words.– 3. Sometimes, the plain text will

convey the most mysterious secret.

Page 5: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Which of the following factors will best prompt the breakthroughs in code-breaking: politics, economy, technology, education, religion, or others? Please give examples to back your viewpoints.

Page 6: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

CodeCode

cipher, cryptograph, symbolcipher, cryptograph, symbol canon, charter, codex, canon, charter, codex,

constitution, convention, constitution, convention, custom, digest, discipline, custom, digest, discipline, ethics, etiquette, manners, ethics, etiquette, manners, maxim, method, regulation, maxim, method, regulation, rule, systemrule, system

Page 7: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

decodedecodebreak, calculate, clear up, co

mpute, count, decipher, estimate, figure, reckon, resolve, solve, unravel

analyze, break, break down, cipher, construe, crack, deduce, disentangle, dope out, elucidate, explain, expound, figure out, make out, puzzle out, solve, spell, unfold, unravel, unriddle

Page 8: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

http://www.dvnet.com/extra/education/cryptography_history.asp

Page 9: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses
Page 10: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

2 2

Page 11: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

To be or not to To be or not to be!be!

That’s the answer- - -That’s the answer- - -

Page 12: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Egyptian Hieroglyphs

The earliest hieroglyphics date back to 3000 BC, and this form of ornate writing endured for the next three and a half thousand years.

the Greek word hieroglyphica means "sacred carvings"

Page 13: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Picture and phoneticsPicture and phonetics

http://www.nku.edu/~anthro/awards.html

Page 14: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Rosetta StoneRosetta Stone

The Rosetta Stone was used by scholars to decipher ancient Egyptian hieroglyphics using "homology" with the Demotic and Greek languages. Can three-dimensional protein structures be used like the Rosetta Stone to decode the functions of genes identified in the various genome projects?

Page 15: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

ROSETTA STONE (replica).

Original of black basalt.45" high x 28.5" wide x 11" thick.

http://mcclungmuseum.utk.edu/permex/egypt/eg-rose1.jpg

Page 16: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

British Museum http://users.bigpond.net.au/mbirse/ris/photos/page07.htm

A VERY famous stone tablet - The Rosetta Stone. This tablet was discovered by Napoleon during his conquest of Egypt.

                                                

                                    

Page 17: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Three languages

At the top -- 14 lines of hieroglyphs In the center -- 32 lines of demotic

(a simpler,cursive, form of hieroglyphic characters whichis much easier to write, and which thereforebecame the popular form of writing)

At the bottom -- 54 lines of Greek

Page 18: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

http://www.bgst.edu.sg/realia/o17top.jpg

Page 19: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

http://www.bgst.edu.sg/realia/o17mid.jpg

Page 20: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

The Science of Secrecy/ BBCThe Science of Secrecy/ BBC

The correspondence between Mary Queen of Scots and Anthony Babington was encrypted with a substitution cipher.

http://www.channel4.com/science/microsites/S/secrecy/page1c.html

Page 21: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses
Page 22: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Plaintext/ ciphertex

The original message is called a plaintext. The disguised message is called a ciphertext.

Encryption means any procedure to convert plaintext into ciphertext. Decryption means any procedure to convert ciphertext into plaintext.

Page 23: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

http://library.wustl.edu/units/spec/rarebooks/semeiology/arnold3.gif

JOHANNES TRITHEMIUS (1462-1516)Polygraphique et Vniverselle Escriture Cabalistique.

Paris, Jacques Kerver, 1561.

Page 24: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Title Page from Cryptomenytices Cryptographia There is some remarkable evidence in that mysterious book on Cryptography published on the Continent at Luneburg in 1624, and attributed to Gustavus Selenus, alias Trithemius, alias Man in the Moon.

Page 25: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Giovanni Battista Porta, De Furtivis Literarum Notis (1563), p. 73.

A working set of rococo cipher discs was packaged with it. The work was reprinted in 1591, '93, 1602 {x2}, '03, and '06.http://fly.hiwaay.net/~paul/cryptology/portadisc.html

Page 26: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

An Example of a Bi-literarie Alphabet.

Page 27: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

The Second Cryptographic Shakespeare by Penn Leary

http://home.att.net/~mleary/index.htm

Non semper ea sunt quae videntur.(Things are not always what they seem).--Phaedrus, A.D. 8

Shakespeare is a voice merely; who and what he was that sang, that sings, we know not. --Emerson

You would play upon me; you would seem to know my stops; you would pluck out the heart of my mystery... --Shakespeare

Page 28: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

A Brief History of Cryptography

The use of cryptography is as old as the art of communication. In times of war, Julius Caesar employed a shift cipher to secure his transmissions to his generals:

By deriving a cipher text alphabet from the plain text alphabet through the use of a secret key, Caesar was able to transmit sensitive information to his generals securely.

Page 29: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

2.

The generals would in turn decrypt the cipher text message into plain text form by employing the same secret key.

Cryptography became a serious issue during the Second World War as both axis and allied forces employed cryptography to secure national secrets.

Page 30: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

versusversus

Page 31: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

The Scottish Heritage

She was the quintessential queen: She was the quintessential queen: statuesque, regal, dazzlingly statuesque, regal, dazzlingly beautiful. Her royal birth gave her beautiful. Her royal birth gave her claim to the thrones of two claim to the thrones of two nations; her marriage to the nations; her marriage to the young French dauphin promised young French dauphin promised to place a third glorious crown on to place a third glorious crown on her noble head.her noble head.

» http://www.mcgrorty.com/scottish_heritage.htm

Page 32: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses
Page 33: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

8 December 1542 Mary is born at Linlithgow Palace in West Lothian.

8 February 1587 Mary is executed in 8 February 1587 Mary is executed in the Great Hall of Fotheringhay betwthe Great Hall of Fotheringhay between the hours of nine and ten in the een the hours of nine and ten in the morning.morning.http://www.marie-stuart.co.uk/timeline.htmhttp://www.marie-stuart.co.uk/timeline.htm

Page 34: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses
Page 35: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Linlithgow Palace

Page 36: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

http://go.supereva.it/europamedievale/gallery11/pagine/Linhttp://go.supereva.it/europamedievale/gallery11/pagine/LinlithgowPalace.htmlithgowPalace.htm

Page 37: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

http://www.geo.ed.ac.uk/scotgaz/features/moregpix98.html

Page 38: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

http://www.nale.pwp.blueyonder.co.uk/recent/pictures/linpalace.html

A view of Linlithgow Palace across the loch. A view of Linlithgow Palace across the loch.

Page 39: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Portcullis gate, Edinburgh Portcullis gate, Edinburgh CastleCastle

Mary, Queen of SMary, Queen of Scotscots

Page 40: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

THE PORTCUTHE PORTCULLIS GATELLIS GATE

http://www.nonvi.com/sm/edin16.html

Page 41: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Source of the folloSource of the following pictures:wing pictures:

http://www.caledoniancastles.co.uk/castles/lothian/edinburgh/rock.htm#port

Page 42: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses
Page 43: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses
Page 44: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses
Page 45: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses
Page 46: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses
Page 47: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

The Last Letter of Mary, Queen of Scots

Queen of Scotland  8 Feb.

1587   http://www.nls.uk/digitallibra

ry/mqs/trans1.htm

                                                   

Page 48: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

ExecutionExecution8 February 1587 Mary is exe8 February 1587 Mary is exe

cuted in the Great Hall of Focuted in the Great Hall of Fotheringhay between the hotheringhay between the hours of nine and ten in the murs of nine and ten in the morning.orning.

Page 49: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

http://www.marie-stuart.co.uk/Execution.htm

Page 50: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

http://www.marie-stuart.co.uk/execution2.htm

Page 51: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

Castle of Fotheringhay

Her heart and organs were buried deep witHer heart and organs were buried deep within the hin the Castle of Fotheringhay but the exact but the exact spot was never revealed.  The body was thspot was never revealed.  The body was then embalmed and incarcerated in a heavy len embalmed and incarcerated in a heavy lead coffin which remained unburied in the ead coffin which remained unburied in the Castle until 30th July 1587, where it was taCastle until 30th July 1587, where it was taken at the dead of night for fear of public pken at the dead of night for fear of public protest, to Peterborough Cathedral.rotest, to Peterborough Cathedral.

Page 52: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

http://www.marie-stuart.co.uk/Castles/Fotheringhay.htm

Page 53: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses
Page 54: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses
Page 55: Cryptography and Mary Queen of Scots Alice Yuyen Chang Spring 2004 at Chang Gung University A Lecture Given in Freshman English Courses

references

http://www.soi.wide.ad.jp/class/20000009/slides/05/index_3.html

http://www.dvnet.com/extra/education/cryptography_history.asp

Important Events in Computing History http://www.rit.edu/~xyg8720/comphistory.html