SQL Clone
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 


The Basics of Cryptology


The Basics of Cryptology

Author
Message
Mike C
Mike C
SSCertifiable
SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)

Group: General Forum Members
Points: 6659 Visits: 1172
Comments posted to this topic are about the content posted at http://www.sqlservercentral.com/columnists/mcoles/thebasicsofcryptology.asp
dec_obrien
dec_obrien
SSC Veteran
SSC Veteran (231 reputation)SSC Veteran (231 reputation)SSC Veteran (231 reputation)SSC Veteran (231 reputation)SSC Veteran (231 reputation)SSC Veteran (231 reputation)SSC Veteran (231 reputation)SSC Veteran (231 reputation)

Group: General Forum Members
Points: 231 Visits: 137
Nice article.
An excellent book on the whole subject is "The Code Book" by Simon Singh ISBN: 0385495323. (I think he also presented a four-part miniseries on Channel4 UK on the subject). It is more of a history book than a techie book but does explain how all of the codes/ ciphers work including the Enigma (with diagrams!)



Michael Lysons
Michael Lysons
SSCrazy
SSCrazy (2.2K reputation)SSCrazy (2.2K reputation)SSCrazy (2.2K reputation)SSCrazy (2.2K reputation)SSCrazy (2.2K reputation)SSCrazy (2.2K reputation)SSCrazy (2.2K reputation)SSCrazy (2.2K reputation)

Group: General Forum Members
Points: 2235 Visits: 1453
Great article. Nice to see a not so SQL-intensive article, but still showing how SQL can be used in this context. Good stuff :-)
Chris D
Chris D
Grasshopper
Grasshopper (14 reputation)Grasshopper (14 reputation)Grasshopper (14 reputation)Grasshopper (14 reputation)Grasshopper (14 reputation)Grasshopper (14 reputation)Grasshopper (14 reputation)Grasshopper (14 reputation)

Group: General Forum Members
Points: 14 Visits: 1

Good Read.

I don't know much on the subject and found it very interesting, think you've inspired me to find out abit more.

Thanks,

Chris.


Craig720
Craig720
Grasshopper
Grasshopper (14 reputation)Grasshopper (14 reputation)Grasshopper (14 reputation)Grasshopper (14 reputation)Grasshopper (14 reputation)Grasshopper (14 reputation)Grasshopper (14 reputation)Grasshopper (14 reputation)

Group: General Forum Members
Points: 14 Visits: 1
The title of the article mentions the word "cryptology," yet the article discusses "cryptography." Similar yet distinctly different words.

I got confused, so I did some quick web searching. For those who desire further illucidation, this is what I found:

From Google:

The science of cryptology is the science of secure communications.

From Wikipedia:

The study of how to circumvent the use of cryptography is called cryptanalysis, or codebreaking. Cryptography and cryptanalysis are sometimes grouped together under the umbrella term cryptology, encompassing the entire subject.

Craig



Mike C
Mike C
SSCertifiable
SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)

Group: General Forum Members
Points: 6659 Visits: 1172

Yes, I forgot to add a title when I submitted it, so Cryptology was added to the title afterwards. Cryptology includes both Cryptography (securing messages) and Cryptanalysis (defeating cryptography/"codebreaking"). I think the title was probably chosen because it covers both Cryptography and Cryptanalysis, although I do focus more on the Cryptography side.

Thanks!


Mike C
Mike C
SSCertifiable
SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)

Group: General Forum Members
Points: 6659 Visits: 1172

Thanks for the reference! I read Singh's book myself a few years ago and found it very entertaining and informative. If I recall correctly, he also discusses the future of cryptology: 'quantum cryptology'. Unfortunately I've lost my copy (I think I loaned it to someone and never got it back), so I didn't reference it for this article; but I'd definitely recommend it to anyone who wants to know more about the history of cryptology. Here's a link to it at Amazon: http://www.amazon.com/exec/obidos/tg/detail/-/0385495323/qid=1123680339/sr=8-2/ref=pd_bbs_sbs_2/103-0153168-7501472?v=glance&s=books&n=507846

He also has another book, "Fermat's Enigma", about how one of the world's hardest mathematical problems was solved. It's very good as well. Here's that link: http://www.amazon.com/exec/obidos/tg/detail/-/0385493622/qid=1123680339/sr=8-3/ref=pd_bbs_sbs_3/103-0153168-7501472?v=glance&s=books&n=507846

Thanks again!


Mike C
Mike C
SSCertifiable
SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)SSCertifiable (6.7K reputation)

Group: General Forum Members
Points: 6659 Visits: 1172

A typo was discovered by Douglas Chrystall in the article. In the section on Asymmetric Encryption, I wrote:

"You encrypt a message with your public key, and it can be decrypted by the receiver using your publicly available public key and their private key."

I meant to write:

"You encrypt a message with the receiver's public key, and it can be decrypted by the receiver using their private key."

Thanks for the catch Douglas!


Peter Evans
Peter Evans
SSC Veteran
SSC Veteran (247 reputation)SSC Veteran (247 reputation)SSC Veteran (247 reputation)SSC Veteran (247 reputation)SSC Veteran (247 reputation)SSC Veteran (247 reputation)SSC Veteran (247 reputation)SSC Veteran (247 reputation)

Group: General Forum Members
Points: 247 Visits: 18

Nice intro to a very complex field.
I particularly enjoyed your timeline image.

Another further reading book I would add for those who love details is

Making, Breaking CODES: An Introduction to Cryptology. ISBN 0-13-030369-0
http://vig.prenhall.com/catalog/academic/product/0,1144,0130303690,00.html

Another good book like the The Code Book mention in an earlier post is:

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age.

I find it goes into more details about the break through of Asymmetric Encryption how its relevant to the key distribution problem.


Kenneth Lee
Kenneth Lee
SSC Veteran
SSC Veteran (299 reputation)SSC Veteran (299 reputation)SSC Veteran (299 reputation)SSC Veteran (299 reputation)SSC Veteran (299 reputation)SSC Veteran (299 reputation)SSC Veteran (299 reputation)SSC Veteran (299 reputation)

Group: General Forum Members
Points: 299 Visits: 1

If Douglas hadn't caught it, I would have mentioned your public/private error. In your image, (Figure 4) you have "Marian Rejewski beings work...1932" That would be "...begins work..."

OK SSL (Secure Sockets Layer) doesn't involve SQL directly, but I'm a little surprised you didn't include that in your Asymmetric Key section, because it is a heavy user of this technology to encript client data that may eventually be stored in a SQL DB.


Go


Permissions

You can't post new topics.
You can't post topic replies.
You can't post new polls.
You can't post replies to polls.
You can't edit your own topics.
You can't delete your own topics.
You can't edit other topics.
You can't delete other topics.
You can't edit your own posts.
You can't edit other posts.
You can't delete your own posts.
You can't delete other posts.
You can't post events.
You can't edit your own events.
You can't edit other events.
You can't delete your own events.
You can't delete other events.
You can't send private messages.
You can't send emails.
You can read topics.
You can't vote in polls.
You can't upload attachments.
You can download attachments.
You can't post HTML code.
You can't edit HTML code.
You can't post IFCode.
You can't post JavaScript.
You can post emoticons.
You can't post or upload images.

Select a forum

































































































































































SQLServerCentral


Search