CRYPTOGRAPHY "Ayşe Tatile Çıksın" Is there any one to have you ever heard these words? İn 1974, The Turkish Foreign Minister Turan Güneş had said to the Prime Minister Bülent Ecevit, When I say "Ayşe is going on vacation" ("Ayşe Tatile Çıksın") it will mean that our armed forces are ready to go into action. And he said that was simple crypto and Turkish armed forces attack to Cyprus. After they won. We can see that crypto has very key point in our life. So what is the crypto? Lets look what is the crypto? Crypto is ancient art with this art people try to keep knowledge from 3rd person. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Who need Cryptography? Militaries Companies Universites Banks Encryption is the manipulation of data, based on a password (also known as a key), for security purposes. Once your data has been encrypted, a person can not make sense of your data without knowing the password (or figuring it out).To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. For example, if we take HAL and add 1 to each of the letters, we get IBM (betcha didn't know that!). In this case, the password is simply "1". If we use "123456" as our password, then we add 1 to the first letter, 2 to the second, ..., 6 to the sixth, then we start over at 1 and add 1 to the seventh leGer.Now our encrypted data is, "ICN". To decrypt, the password "123456" is "subtracted" from our data. In cryptography, Caesar's code or Caesar shift, is one of the simplest and most known encryption techniques. The rule of cesar is each letter will encrypted from the previous letter but it is easy to solve the Ceaser rule. For example, with a left shift of 3, B would be replaced by Y, E would become B, and so on. A person looks up each letter of the message in the "plain" line and writes down the corresponding letter in the "cipher" line. They used it with a shift of three to protect messages of military significance. Now I will ask a question about this. Due to Ceaser chipper, what should be the basis form for the this word?-it means DENEME. Deneme means try in English. His nephew, Augustus, also used the cipher, but with a right shift of one, and it did not wrap around to the beginning of the alphabet. Whenever he wrote in cipher, he wrote B for A, C for B. Enigma is milestone to cryptography.. Enigma was invented by the German engineer Arthur Scherbius at the end of World War I.. in world war 2 Germany’s use the enigma for encryption and decryption.. it was used between 1928 1945 and it was 12 kilogram. Polish government was close the crack it but they did not. In 1942 Alan Turing cracked enigma with turingismus method. Because of this Turing is widely considered to be the father of computer science and artificial intelligence. In 1954 he committed suicide with poison apple. More complex ciphers use a secret key to control a long sequence of complicated substitutions (14) and transpositions (15). There are two general categories of cryptographic keys: Private key and public key systems. Private key systems use a single key. The single key is used both to encrypt and decrypt the information. Both sides of the transmission need a separate key and the key must be kept secret from. The security of the transmission will depend on how well the key is protected. The US Government developed the Data Encryption Standard ("DES"), which operates on this basis, and it is the actual US standard. DES keys are 56 bits (16) long. In the public key system there are two keys: a public and a private key. Each user has both keys and while the private key must be kept secret the public key is publicly known. Both keys are mathematically related. If A encrypts a message with his private key then B, the recipient of the message can decrypt it with public key. Similarly anyone who knows A's public key can send him a message by encryp'ng it with his public key. A will than decrypt it with his private key. Public key cryptography was developed in 1977 by Rivest, Shamir and Adleman ("RSA") in the US. Where do we use cryptography? Nowadays, we use cryptography in everywhere but the most important usage of place is ATM machines. HOW ?- You can use your password or hand to access your account. Our passwords are encrypted on our ATM cards or computers. And only we can access our accounts because we know what the secret codes . THEN. How we use hand? You can access with your fingerprint or palm. ıf you want to use this way, you must go to bank and you will define your fingerprint on your card. If you are using your hands to passwords, you don’t have to carry the card on your side. Without card you can access your account easily thanks to this way. No one except you cannot access your account with fingerprint. The study of a cryptographic system for the purpose of finding weaknesses in the system and breaking the code used to encrypt the data without knowing the code’s key. Governments use cryptanalysis in military and diplomatic surveillance, by enterprises in testing the strength of security procedures, and by malicious hackers in exploi'ng weaknesses in Web sites. To sum up the every single one that needs keeping some information with crypto. For example, especially banks need to crypto their customers’ information because hacker can access customers’ account easily. In the past we heard lots of news like this. So crypto is significant for banks especially for customers because they don’t want to lose their money. Thanks to crypto , banks can protect the account in secret. Veysel Olgac Muhammed Burak Şahin Muhammed Kılınç