Big Numbers: Mathematics and Internet Commerce

Slides:



Advertisements
Similar presentations
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Advertisements

1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Lecture 6: Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Encryption Coursepak little bit in chap 10 of reed.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Encryption.
Introduction to Quantum Key Distribution
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Cryptography – Test Review
Public Key Cryptography
Digital Signatures.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Lesson 2-18 AP Computer Science Principles
CS480 Cryptography and Information Security
Public Key Encryption Major topics The RSA scheme was devised in 1978
Basics of Cryptography
RSA Slides by Kent Seamons and Tim van der Horst
Key Exchange References: Applied Cryptography, Bruce Schneier
Cryptography Much of computer security is about keeping secrets
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Public-Key Cryptography and RSA
Public-key Cryptography
Public Key Encryption and the RSA Algorithm
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
Network Security Basics
Code and detection Cryptography and Data hiding
Quantum Cryptography Alok.T.J EC 11.
NET 311 Information Security
Appendix 5: Cryptography p
Bishop: Chapter 10 Key Management: Digital Signature
CS 115: COMPUTING FOR The Socio-Techno Web
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
NET 311 Information Security
Cryptography Reference: Network Security
Public-Key, Digital Signatures, Management, Security
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
Chapter 29 Cryptography and Network Security
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Class 36: Public-Key Cryptography
Fluency with Information Technology Lawrence Snyder
Modern Cryptography.
Secure Diffie-Hellman Algorithm
ITIS 6200/8200 Chap 5 Dr. Weichao Wang.
Presentation transcript:

Big Numbers: Mathematics and Internet Commerce Dr. David Singer (Dept. of Mathematics, CWRU)

Public Key Cryptography Bob (receiver) Alice (sender) Eve (eavesdropper) Alice and Bob have never met before. Yet they are able to carry on a private conversation on an insecure communications channel and not worry about eavesdroppers. How is this possible?

Carol and David are flipping a coin over the telephone, and each is confident the other is not cheating. How is this possible?

Ethel has a secret. She wants to convince Fred that she knows the secret, but without revealing anything about the secret to him. How is this possible?

Cryptography Cryptography (secret writing), is the art and science of secure transmission of confidential information. It also allows secure storage of data. Only someone with the key can get access.

“Classical” Cryptography Dates back to antiquity Alice and Bob agree on a method of encryption and a shared secret key. Alice uses the key to encrypt the message she sends. Bob uses the same key to decrypt the message.

Classical Cryptanalysis Oscar attempts to determine the contents of an encrypted message without the key. He may try all possible keys (Brute force) Or he may use more subtle techniques, such as analysis of statistical anomalies.

Modern Cryptography New Directions in Cryptography, by Whitfield Diffie and Martin Hellman, 1976. (Also classified publication by James Ellis in 1970, declassified in 1997.) Introduced the essential idea: Public Keys and Private Keys.

Alice has two keys: a public key, which is available to anyone, and a private key. Bob uses the public key to lock (encrypt); Alice uses the private key to unlock (decrypt).

Advantages Alice can communicate without having previously contacted Bob. No one but Bob can decrypt the message. Major reduction in the number of keys required for a large group.

Public key v.s. Private key Private key: 20 users need 190 key pairs Public key: 20 users need 21 key pairs

Mathematics Disadvantages Public-Key Cryptography tends to be slower May be harder to implement in a secure way Big question: How can it be made To work?? Mathematics

Creating a mathematical secret It is easy to multiply numbers. There are usually many ways to get the same product: But if two primes are multiplied together there is only one way to ‘unmultiply’ (factor) them

Creating a mathematical secret Multiplying numbers is “easy” But factoring numbers is “hard” Basis for RSA cryptosystem: L.M. Adleman, R.L. Rivest and A. Shamir, 1978

The RSA Cryptosystem Generate two large prime numbers p and q. Multiply them together to get very large number N. Compute Euler Totient T=(p-1)(q-1) Choose numbers e and d for which the product e times d leaves remainder 1 when divided by T. Publish (N, e) (this is the public key). Keep the rest secret.

The Encryption algorithm Turn message into a large number m (encoding) Compute (this is the remainder left when th is divided by N). The number c is the encryption of the message! Ari, these next slides are maybe too technical! (Don’t Panic!)

The Decryption Algorithm Compute Decode m to get the message. Mathematical principle: If you know the values of m, e, and N, you can compute c. If you know the values of c, d, and N, you can compute m. BUT if you know c, e, and N and can’t factor N, you (probably) can’t get m.

A Small Example: N=33

Big Primes

Big Primes

Factoring into Big Numbers

Factoring into Big Primes In 2009 a team led by Thorsten Kleinjung factored the challenge number RSA 768. The 232-digit number was factored using the equivalent of 2000 years of computing on a single core 2.2 GHz AMD Opteron.

Digital Signatures RSA can also be used to allow Alice to sign a document. She decrypts the document with her secret key. Anyone else can use her public key to see that she signed it.

Digital Signatures Only Alice can use her key to sign a message:

Secure Hash Function In practice, Alice does not sign the message itself; she signs a hash (a compressed version). This makes electronic forgery much more difficult.

Mathematical tools Number theory –for encryption algorithms. Computational complexity – to know what is hard and what is easy to compute. Probability theory – randomness is needed for implementing algorithms securely.

Mathematical Tools Computational Mathematics – to know how to make calculations quickly and accurately. Other mathematics: linear algebra, geometry,…

Challenge-response To prove identity, you possess a secret (password). But you don’t want to give up the secret! (Remember Ethel and Fred) So you must give a “proof of knowledge.”

Ali Baba’s Cave

Ali Baba’s Cave

Ali Baba’s Cave

Zero-Knowledge Proof Using challenge-response techniques, Alice demonstrates she knows the password (with high probability) but does not reveal the password. She may have to respond to many challenges in order to convince Bob. Key idea for solving many problems (e.g., coin-flip over telephone)

Why Use Cryptography? We are protecting data and there is a lot of data to protect!

What are we protecting against? Well known stuff like Laptop loss or theft Data center compromise Viruses Hackers Snooping of e-mail and personal data And lesser known stuff like Electronically modifying sensor data in a factory My neighbor changing the temperature on my refrigerator