1 Codes, Ciphers, and Cryptography-Ch 3.2 Michael A. Karls Ball State University.

Slides:



Advertisements
Similar presentations
390 Codes, Ciphers, and Cryptography
Advertisements

Ciphers and Permutations. Monoalphabetic Cipher is simply a permutation abcdefghijklmnopqrstuvwxyz SATBUCVDWEXFYGZRQPONMLKJIH Cycle Form (ASOZHDB) (CTNGVLF)
Solving Equations (Multiplication & Division) Grade Seven & Eight Mathematics M. M. Couturier.
22C:19 Discrete Structures Integers and Modular Arithmetic
Enigma? Several Images from Wikipedia (an online encyclopedia)
Enigma Meghan Emilio Faculty Sponsor: Ralph Morelli (Computer Science)
Secure communication Informatics for economists II Jan Přichystal
Enigma Machine - Design Presentation Group M1 Adithya Attawar Shilpi Chakrabarti Zavo Gabriel Michael Sokolsky Digital World War II Enigma Cipher Wed.
Inner Workings of the German Enigma. History of the Enigma The concept was invented by a German named Albert Scherbius in 1918 Scherbius tried to take.
Solving Multiplication and Division Equations Lesson 2-7.
1 Codes, Ciphers, and Cryptography-Ch 3.1 Michael A. Karls Ball State University.
Codes, Ciphers, and Cryptography-RSA Encryption
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Thinking Mathematically Algebra: Graphs, Functions and Linear Systems 7.3 Systems of Linear Equations In Two Variables.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Dan Boneh Introduction History Online Cryptography Course Dan Boneh.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
SOLVING EQUATIONS BY ADDING
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall. Chapter 11 Systems of Equations.
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
5.3: Solving Addition Equations Goal #1: Solving Addition Problems Goal #2: Writing Addition Equations.
MAT 1000 Mathematics in Today's World Winter 2015.
One-Step Addition and Subtraction Equations We are learning to…use inverse operations to solve for a variable in an equation. Tuesday, December 15, 2015.
3.2 Solving Equations by Using Addition and Subtraction Addition Property of Equality –If the same number is added to each side of an equation, the resulting.
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Solving Systems of Linear Equations by Addition.
Lesson 1 Chapter 3. Objectives Solve equations using addition and subtraction.
Lesson 1-8 Solving Addition and Subtraction Equations.
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
Solving One Step Equations Algebra I. Addition and Subtraction One Step Equations A solution of an equation is the value or values of the variable that.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
By, Amanda Rydzynski O’Brien Computer Skills
Solving Addition and Subtraction Equations Lesson 2.3 and 2.4.
Solving Equations By Adding or Subtracting. Key Terms Inverse Operations: –You can use inverse operations to solve equations. –“Undo” each other by performing.
Solve Equations With Variables on Both Sides. Steps to Solve Equations with Variables on Both Sides  1) Do distributive property  2) Combine like terms.
TODAY IN ALGEBRA…  Warm Up: Review solving Multi-step equations  15 minutes: Finish Mid-Ch.3 Test  Learning Goal: 3.4 You will solve equations with.
The Mathematics Behind
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Solving Equations with Addition or Subtraction Medina1.
Solving Equations with Variables on Both Sides. Review O Suppose you want to solve -4m m = -3 What would you do as your first step? Explain.
Holt McDougal Algebra Solving Equations by Adding or Subtracting Warm Up Evaluate. 1.   (0.29) Give the opposite of each number.
SOLVING EQUATIONS WITH VARIABLES ON BOTH SIDES Wednesday Sept. 9, 2015 Algebra.
One-Step Addition and Subtraction Equations We are learning to…use inverse operations to solve for a variable in an equation.
Solving Addition and Subtraction Equations
Warm Up 1/14 Balanced or not? = =
7-3 Solving Subtraction and Addition Equations
Matt Salamone and Pete McIlwee
Rotor Ciphers.
Solving Equations by Factoring and Problem Solving
Solving Algebraic Equations
Do Now 1) t + 3 = – 2 2) 18 – 4v = 42.
ALGEBRA Lesson #31.
Write your agenda message No warm-up today Turn in:
National Cipher Challenge
Equations and Inequalities
SECTION 10-4 : RADICAL EQUATIONS
Solving a System of Equations in Two Variables by the Addition Method
Solving 1-Step Integer Equations
SECTION 2-4 : SOLVING EQUATIONS WITH THE VARIABLE ON BOTH SIDES
Solving Equations with Variables on Both Sides
Solving Equations with Variables on Both Sides
Solving Equations by 1-2 Adding or Subtracting Warm Up
Do Now Evaluate 9h + h if h = 2.1 Evaluate 2 (4 + g) 2 If g = 6.
WORLD OF WONDERS : THE ENIGMA MACHINE
Section 2.6 Solve Equations by Multiplying or Dividing
Solving Equations by 2-1 Adding or Subtracting Warm Up
Algebraic Expressions & Solving Equations
Presentation transcript:

1 Codes, Ciphers, and Cryptography-Ch 3.2 Michael A. Karls Ball State University

2 Main Ingredients of the Enigma Keyboard (with A-Z) Light bulbs (with A-Z) Plugboard (with A-Z) Rotors (with 0-25) Reflector (with 0-25)

3 User Interface The keyboard and light bulbs were the user interface for entering and reading messages. The plugboard was used to increase the number of keys (settings).

4 Rotors Each rotor was connected with a series of wires that created a permutation cipher. An electric signal would enter the rotor at one position and the permutation would cause the signal to leave at a different position on the far side of the rotor.

5 Reflector The reflector rotor at the end was a fixed product of disjoint two-cycles (i.e. a permutation), such as  = (0, 12)(1, 9)(2, 3) (4, 24)(5, 18)(6, 23)(7, 8) (10, 25)(11, 13)(14, 21) (15, 17)(16, 19)(20, 22) Note that  -1 = , so x  = x for all x.

6 Mathematics of the Enigma If we ignore the plugboard settings, the Enigma is a product of permutations! x plain yz w a b c d cipher reflectorrotor 3rotor 2rotor 1

7 Mathematics of the Enigma (cont.)

8 Equation (1) is a model for the Enigma if we encrypt one letter! Recall that the rotors move like an odometer, with rotor 2 changing when rotor 1 changes from 25 to 0 and rotor 3 changing in a similar fashion.

9 Mathematics of the Enigma (cont.) To account for the rotation of the rotors, we introduce a “shift” variable for each rotor, which keeps track of how far a rotor has shifted from its initial position! Shift variables:  s 1  rotor 1  s 2  rotor 2  s 3  rotor 3 Note: For s 2 to increase, we need s 1 to change from 25 to 0 and for s 3 to increase, we need s 2 to change from 25 to 0.

10 Mathematics of the Enigma (cont.) To account for the shift s 1, instead of computing we compute Instead of computing the inverse of to get x, i.e. we need to solve (2) for x in terms of y.

11 Mathematics of the Enigma (cont.) Applying  1 -1 to both sides of (2) yields: Adding - s 1 mod 26 to both sides of (3), We will use functions of form (2) and (4) to account for the moving rotors! To encrypt, we actually compute the following:

12 Mathematics of the Enigma (cont.)

13 Mathematics of the Enigma (cont.) After each letter, check shift variables (mod 26): s 1 = (s 1 + 1) mod 26 If s 1 = 0, then s 2 = (s 2 + 1) mod 26 If s 2 = 0, then s 3 = (s 3 + 1) mod 26

14 Example 1 Suppose we are given  1,  2,  3, and  as follows:  1 = (0, 15, 7, 8, 19, 23) (1, 4, 17, 2) (3, 13, 25, 5, 21, 12) (6, 9, 10, 22, 11, 14, 24, 16, 18, 20)  2 = (0, 5, 9) (1, 2, 3, 7, 6, 8, 4) (10, 11, 12, 15, 18, 13, 14, 16, 19, 17) (20, 25, 22, 21, 24, 23)  3 = (0, 10, 20, 3, 13, 23, 7, 17, 5, 15, 25, 1, 11, 21) (2, 12, 22, 4, 14, 24, 8, 18, 9, 19, 6, 16)  = (0, 12) (1, 9) (2, 3) (4, 24) (5, 18) (6, 23) (7, 8) (10, 25) (11, 13) (14, 21) (15, 17) (16, 19) (20, 22), with s 1 = 24, s 2 = 10, and s 3 = 5. Use these initial settings to encipher the message “Get your forces ready”.

15 Example 1 (cont.) Solution: Take x = 6 for G and compute with (5).

16 Example 1 (cont.)

17 Example 1 (cont.)

18 Example 1 (cont.)

19 Example 1 (cont.) Thus, d = 15, which implies G is encrypted as P. Finally, update shift variables. s 1 = (s 1 + 1) mod 26 = (24+1) mod 26 = 25 s 2 = 10 s 3 = 5 Repeat with x = 4 for E, … Homework: Finish enciphering message!

20 References for Enigma Notes and Photos D. W. Hardy and C. L. Walker, Applied Algebra, Codes, Ciphers, and Discrete Algorithms, Prentice Hall, New Jersey,