Shared Secrets Keeping secrets on the web. Encryption Goal : hidden in plain sight.

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
RSA and Public Key Cryptography Oct Nathanael Paul.
Computer Science 101 Data Encryption And Computer Networks.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Digital Signatures. Anononymity and the Internet.

Data encryption with big prime numbers
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
What is Elliptic Curve Cryptography?
Modern Cryptography.
Great Theoretical Ideas in Computer Science.
Public Key Algorithms …….. RAIT M. Chatterjee.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Public Key Cryptography
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Cryptography Prof. Seth D. Bergmann Rowan University Computer Science.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Great Theoretical Ideas in Computer Science.
Encryption Coursepak little bit in chap 10 of reed.
Systems of Equations as Matrices and Hill Cipher.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Computing Is Pretty Strange.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Tractability & Cryptography Strange Symbiosis Points of Reference: Oskars Rieksts.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
Cryptography and Network Security Public Key Cryptography and RSA.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
MAT 1000 Mathematics in Today's World Winter 2015.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
Fall 2002CS 395: Computer Security1 Chapter 9: Public Key Cryptography.
Diffie-Hellman Key Exchange Color Mixing Example Rick Stroud 21 September 2015 CSCE 522.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
RSA Encryption © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Great Theoretical Ideas in Computer Science.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
Digital Signatures.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Public Key Cryptography
Public Key Cryptography
Simple Encryption- Lesson 5
Cryptography a Presentation Prepared by Vytautas Kondratas.
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Diffie-Hellman Key Exchange
Modern Cryptography.
Encryption & Steganography: Amazing Things To Do with Bits
Diffie-Hellman Algorithm
Presentation transcript:

Shared Secrets Keeping secrets on the web

Encryption Goal : hidden in plain sight

Encryption Goal : hidden in plain sight – Internet is plain sight

Encryption Goal : hidden in plain sight – Internet is plain sight – Encryption is only form of privacy

Caesar Cipher Shift each letter in a message a certain amount:

Caesar Cipher Right shift of three: – Key: is +3 Encrypted message:

Breaking a Cipher Guess and check

XOR XOR with 0 = don't change XOR with 1 = change In0In1Out In0In1Out

Binary Keys 1 or 0 with XOR = 1 bit encryption – 1 or 0 is key… 2 possibilities

Binary Keys 1 or 0 with XOR = 1 bit encryption – 1 or 0 is key… 2 possibilities For stronger key, need more bits: – 32 bit key = 4 billion possibilities – Real encryption uses 128/256/512/1025/2048 bits!

Binary Keys XOR key with message to produce encrypted message W i k i ??? Ä ý w

XOR key with encrypted message to reproduce message ??? Ä ý w W i k i More info: Binary Keys

Shared Keys Need to share a key – How do we do it if someone is always listening?

Secret Colors Deriving a secret color:

Secret Colors Deriving a secret color: – Pick a public color

Secret Colors Deriving a secret color: – Pick private colors

Secret Colors Deriving a secret color: – Make public mixtures with private colors

Secret Colors Deriving a secret color: – Mix other person's public with your private

Secret Colors Eve can't reproduce color – too much red

Attempting with Math Not so secret…

Attempting with Math Not so secret…

One Way Function One way function: – Can not be reversed Multiplication two way x ∙ 7 = 42

Clock Math

Modulo Modulo ( mod or % ) – Divide and keep remainder 14 mod 12 = 2 8 mod 12 = 8 19 mod 12 = 7 24 mod 12 = 0 26 mod 12 = 2

Calculating Mods Wolfram Alpha

One Way Math Clock Math/Modulo is One Way X mod 12 = 2 …what is X???

One Way Math Clock Math/Modulo is One Way X mod 12 = 2 …what is X??? 14 mod 12 = 2 26 mod 12 = 2 38 mod 12 = 2 …

Hard Math Some problems are relatively slow to solve: – Factoring numbers – Taking logarithms

Hard Math Some problems are relatively slow to solve: – Factoring numbers – Taking logarithms Slow is good for encryption – Avoid brute force attacks

Diffie Hellman Derive a secret number

Diffie Hellman Derive a secret number – Pick two public numbers – clock size and base Clock size: 11 Base : 2

Powers of 2 Mod 11 Powers of 2 mod 11: Mod 11 means 10 possible values then cycle… Power of 2ValueMod

Powers of 2 Mod 4 Powers of 2 mod 4: Prime clock sizes work better… Power of 2ValueMod

Diffie Hellman Derive a secret number – Pick two public numbers – clock size and base Clock size: 11 Base : 2

Diffie Hellman Derive a secret number – Pick private numbers

Diffie Hellman Derive a secret number – Calculate public-private numbers…

Public Private Number

Diffie Hellman

Derive a secret number – Use other ppn as base to calculate shared secret

Shared Secret Number

Diffie Hellman

Sue's dilemma Sue knows: 2 x mod 11 = 6 2 y mod 11 = 3 6 y mod 11 = ssn 3 x mod 11 = ssn Where y = your private number And x = Arnolds

Sue's dilemma Sue knows: 2 x mod 11 = 6 2 y mod 11 = 3 6 y mod 11 = ssn 3 x mod 11 = ssn Mod is one way – must guess and check

Sue's dilemma Sue knows: 2 x mod 11 = 6 2 y mod 11 = 3 6 y mod 11 = ssn 3 x mod 11 = ssn Solving for x or y involves logarithms – very slow for computers

What is our secret? Calculate our shared secret: clock size = 13, base = 4 Then go to: faculty.chemeketa.edu/ascholer/SSN.html Your Private Number: 8 My Private Number: ?? Your PPN: 4 8 mod 13 = 3 My PPN: 4 ?? mod 13 = 10 SSN = (myPPN) (your private number) mod (clock size)