CRYPTOGRAPHY קריפטוגרפיה Thu 15:45-18:15.

Slides:



Advertisements
Similar presentations
Merkle Puzzles Are Optimal
Advertisements

Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Public Key Cryptosystem
CS555Spring 2012/Topic 171 Cryptography CS 555 Topic 17: Textbook RSA encryption.
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Network Security Hwajung Lee. What is Computer Networks? A collection of autonomous computers interconnected by a single technology –Interconnected via:
Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
Computers in Society Encryption. Shameless Plug Catch the kayak club trip to Glenwood on Saturday. Fun!
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
A Cryptography Tutorial Jim Xu College of Computing Georgia Tech
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
Lecture 6: Public Key Cryptography
Public Key Model 8. Cryptography part 2.
CIS 5371 Cryptography Introduction.
CS 4/585: Cryptography Tom Shrimpton FAB
Public-Key Cryptography CS110 Fall Conventional Encryption.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Midterm Review Cryptography & Network Security
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Chapter 21 Public-Key Cryptography and Message Authentication.
Darci Miyashiro Math 480 April 29, 2013
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Modern Cryptographic Topics
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Network Security7-1 Today r Reminders m Ch6 Homework due Wed Nov 12 m 2 nd exams have been corrected; contact me to see them r Start Chapter 7 (Security)
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Cryptography CS Lecture 19 Prof. Amit Sahai.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Network security Cryptographic Principles
Hash Functions Which of these problems is easier to solve:
Lesson 7: Public Key Cryptography Lesson 8: Rapid Research - Cybercrime Day 37.
What is network security?
Public Key Encryption and the RSA Algorithm
Public Key Infrastructure
Cryptographic Protocols
Network Security Basics
Recap unit 2 Review cipher systems, RSA Digital signatures
Cryptographic Protocols
The (post-quantum) future of data privacy
Chapter -8 Digital Signatures
Handbook of Applied Cryptography - CH11, from 11.5~11.8
New Direct Product results in Communication Complexity
Basic of Modern Cryptography
LAB 3: Digital Signature
Presentation transcript:

CRYPTOGRAPHY קריפטוגרפיה Thu 15:45-18:15

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAA

The Crypto “Race of Arms” (3761 BC - 1976) “Secure” System+ “Secure” System “Secure” System++ “Break” “Break++” “Break+” Traditional crypto: 8 attack 9defense Modern crypto: 9 defense 8attack

How is This possible? Rely on computational intractability. “problems that computers cannot solve” PROVE that “break” -> “solve hard problem” For example, FACTORING: Given: N = PQ Find: P,Q What are the factors of 15? What are the factors of 1763? (hint: 41,43)

Basis of EVERY electronic transaction on the web! What are the factors of 25195908475657893494 027183240048398571429282126204032027777137836043662020707595556264018525880784406918290641249515082189298559149176184502808489120072844992687392807287776735971418347270261896375014971824691165077613379859095700097330459748808428401797429100642458691817195118746121515172654632282216869987549182422433637259085141865462043576798423387184774447920739934236584823824281198163815010674810451660377306056201619676256133844143603833904414952634432190114657544454178424020924616515723350778707749817125772467962926386356373289912154831438167899885040445364023527381951378636564391212010397122822120720357 ? RSA-2048 (617 digits, $200K) Basis of EVERY electronic transaction on the web!

Alice and Bob – A Love Tale

Alice and Bob – A Love Tale Protocols Zero-knowledge proofs Secure computation Encryption Authentication Digital signatures

Is it a Hard Course? No Harder than Algorithms/Complexity. Basic math. Rich in (beautiful) concepts.