The Art and Science of Solving Puzzles

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

RSA.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Cannonballs, Donuts, and Secrets
22C:19 Discrete Structures Integers and Modular Arithmetic
What is Elliptic Curve Cryptography?
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Toy Problem: Missionaries and Cannibals
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Intelligent agents Intelligent agents are supposed to act in such a way that the environment goes through a sequence of states that maximizes the performance.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Intelligent agents Intelligent agents are supposed to act in such a way that the environment goes through a sequence of states that maximizes the performance.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
1 Problem Solving We view many situations in life as problems we need to solve Also, much of human behavior can be considered problem solving, even if.
start 3 missionaries and 3 cannibals Cannibal & Cannibal Missionary & Missionary Cannibal & Missionary Which one we should move first You lose True.
Public Key Model 8. Cryptography part 2.
Rachana Y. Patil 1 1.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
Merkle-Hellman Knapsack Cryptosystem Merkle offered $100 award for breaking singly - iterated knapsack Singly-iterated Merkle - Hellman KC was broken by.
Great Theoretical Ideas in Computer Science.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Unit 1, Lesson 4 Line Math Puzzles We are going to learn to solve line math puzzles and then you will create your own.
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
Problem Solving Agents
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Cryptography CS Lecture 19 Prof. Amit Sahai.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Public Key Cryptosystem In Symmetric or Private Key cryptosystems the encryption and decryption keys are either the same or can be easily found from each.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
Digital Signatures.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Knowledge Representation
Public Key Cryptosystem
Problem solving by Searching
Public Key Encryption Systems
The Art and Science of Solving Puzzles
Big Numbers: Mathematics and Internet Commerce
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Roger Dingledine Jacob Appelbaum
Diffie-Hellman Secure Key Exchange 1976.
Code and detection Cryptography and Data hiding
The RSA public-key cryptosystem cse712 e-commerce
Diffie-Hellman Key-Exchange Algorithm
NET 311 Information Security
Cryptography: Basics (2)
Enigma, Cyphers and Encryption
Crypto #4 Encryption and Network Protocols
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
NET 311 Information Security
El Gamal and Diffie Hellman
Diffie-Hellman key exchange/agreement algorithm
El Gamal and Diffie Hellman
Public-Key, Digital Signatures, Management, Security
Diffie-Hellman Key Exchange
Public – Private Key Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Public Key Encryption Systems
Secure Diffie-Hellman Algorithm
missionaries-and-cannibals problem
Presentation transcript:

The Art and Science of Solving Puzzles Teasing your Brain to Think Critically The Art and Science of Solving Puzzles Pritam Bhattacharya (STCS, TIFR)

A Roadmap The River Crossing Problem The Mathematician’s Daughters Love in Kleptopia

The River Crossing Problem There are 3 cannibals & 3 missionaries, all standing on one bank of a river They need to get across a river There is a boat of capacity 2 If they are outnumbered, missionaries will be devoured by the cannibals How can all of them get to the other side of the river safely?

The River Crossing Problem (An Approach to a Solution) A Feasible Path Based Approach

The River Crossing Problem (Some Questions to Ponder) Is the solution we just saw the only possible solution? If not, how many other solutions exist? Among all possible solutions, did the solution we just saw use the least number of trips?

The Mathematician’s Daughters Mathematician has 3 daughters Product of their ages = 36 Sum of their ages = 13 Youngest daughter had a haircut What were the ages of the mathematician’s daughters? (Assume ages to be integers)

The Mathematician’s Daughters (The Path to the Solution) Product of their ages = 36 Sum of their ages = 13 Youngest daughter had a haircut (1,1,36) (1,6,6) (1,3,12) (1,4,9) (1,2,18) (3,3,4) (2,3,6) (2,2,9)

Love in Kleptopia How can Bob send the ring Kleptopia is a country full of thieves. Bob and Alice are citizens of Kleptopia. Bob plans to send an engagement ring to Alice. Needs to send it in a locked box to prevent theft. But then, Bob also needs to send the key to Alice. Key will get stolen if not sent in a locked box. How can Bob send the ring so that it does not get stolen and Alice can retrieve it?

BOB Alice

BOB Alice

BOB Alice

A Connection to Data Security Diffie-Hellman Key Exchange RSA Cryptosystem

The Hardness of Factorization Given 2 integers, it is easy to find their product. However, given an integer, it can be quite hard to find its prime factors, especially when it has large prime factors. For certain numbers with lots of digits, it can take even the fastest supercomputers a few years to come up with the prime factors of that integer. Can you tell me the prime factors of the number 667? Can you tell me the prime factors of the number 625? The security of the RSA cryptosystem is based on this very fact that factorization can be really hard.

THANK YOU! Take Home Message Solving logical puzzles can be loads of fun! They hone your critical thinking abilities. May lead to solution for a real-life problem. THANK YOU!