There will be between 20.4 billion and 31
billion IoT devices online by 2020.
-Source: Gartner, Statista
Sage Report - Globally, 48% of small and
mid-size businesses have experienced a cyber security incident in the past
year.
What is Cryptography?
•
Cryptography,
or cryptology - kryptos - Meaning - hidden, secret"; It is a technique for
secure communication.
•
This
is synonymous with “encryption”, which is basically concealing information.
This is usually an Encryption is a mathematical process that encodes and
modifies the data using an encryption algorithm and an allied key.
•
Cryptography is the first-line shield and an ammunition
for data protection.
The World History
The first recorded use of
cryptography in the world history was by the Spartans in 400 BC. They had a cipher
device called the scytale for secret communication. (https://www.britannica.com/topic/cryptology/History-of-cryptology)
How old in Cryptography in Bharath?
•
Ciphers,
Enigmas and enciphering techniques and practices had been prevalent throughout
history in every civilization in some form.
•
In Mahabharata, there is a reference that Vidhuran and King Yudishtra used a
cyphered language to converse so as To prevent non-authorized people from
understanding messages using the jargon of the Mlechchaas – This is the chapter
Adi Parva
•
“Mlecchita
Vikalpa” (म्लेच्छिता विकास) is one of the 64 arts described in Vatsyayana's
Kamasutra (Chapter.3). Which Is a study of pictographic writing. There are also
references to other methods for secret communications like Gudhayojya,
Gudhapada and Gudhavarna (Mleccha in Sanskrit refers to 'copper – copper age.)
•
In the south, during the medieval period ,
Moolabhadri – was
employed by the spies of the erstwhile of the Travancore samasthaanam(
Kingdom) - (Raja Marthanda varma-1706–1758) - The mnemonic was very similar
to Sanskrit slokams and these were one time usable codes.
•
The rest of the world do have evidences of
Cryptographic writings starting for the Pyramid tops in Egypt, The cuneiform
writing in Sumerian civilization, The Spartan crypto graphic messages- simple
scytale messages, the Steganographic messages of the Greek, to Name a few.
•
Some of the German Machines in the world war
time, had elaborative encoding, communication, storage and retrieval
options.
•
1970's,
IBM formed a "crypto group" headed by a a German-American, Horst-Feistel designed a cipher
called Lucifer.
•
Cryptanalysis
– A method to break cryptographic security systems and read the encrypted
messages
Quantum Mechanics
and Encryption.
Quantum Cryptography –
Most sought-after technique nowadays is an encryption method that uses the
inherent properties of quantum mechanics to transmit data.
The quantum key
distribution (QKD) uses a series of photons which have uncertain states,
multiple forms and exist everywhere. These key when disturbed alerts immediately.
Here are some points noted as potential synergy between Vedic
Mathematics and quantum cryptography.
- Responsive
and Fast Arithmetic Calculations: Vedic Mathematics entails techniques
for speed arithmetic calculations, which helps in optimizing the
mathematical operations required for quantum cryptography algorithms. The mathematical bureaus and
principles such as Number Theory, linear algebra, probability theory is
well defined in Vedic Mathematics.
- Algorithm
Simplification: The problem-solving methods in Vedic Maths are simple
and fast. Drawing upon these principles, implementing in quantum
cryptography algorithms will route to potent, more precise and efficacious,
streamlined processes.
- Parallel
Computation: Vedic
Mathematics provides a unique and a atypical technique of solving
algebraic and linear Equations on parallel platforms. This
will be a pragmatic scheme in the development of more secure encryption
algorithms which will be hostile and resistant to cyber-attacks.
- Error
Detection and Emendation: Quantum cryptography heavily relies on error
detection and correction techniques. Vedic Mathematics can offer insights
into efficient error correction methods that can further enhance the
reliability of quantum communication.
- Build
Explainable Models: Construct processes, workflows and methods
which introduces human comprehension and thereby trust on results and
output gotten from Intelligent systems and software
Thirukkural a classic Tamil literary treatise on day-to-day
existence of common man, statecraft, politics, kingship, economics and military
strategy.
The Epigram, Kural 590 is referred
here to exhibit the law for a high hold of secrecy to be preserved and maintained
by a ruler
சிறப்பறிய ஒற்றின்கண் செய்யற்க செய்யின்
புறப்படுத்தான் ஆகும் மறை.
sirappariya otrrinkan
seiyatrka seiyin
purappaduththaan aakum
marai
Meaning-Reward not
trusty spy in others' sight,
Or all the mystery will come to light.
Referred from https://thirukkural.io/kural/590
Vedic Maths – Pranams to HH Shankaracharya
Jagathguru Sri Bharathi Krishna Tirtha Maharaj – Govardhan Mutt
https://www.academia.edu/125671904/About_Cryptography_How_ancient_the_practice_is
#Thaitrusts #Dr.PradhikaRavi #Adhavravi #Adhiaravi


Comments
Post a Comment