Announcements: Subscribe to Angel forums Subscribe to Angel forumsQuestions? Roll Call Today: affine ciphers DTTF/NB479: DszquphsbqizDay 2.

Slides:



Advertisements
Similar presentations
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Advertisements

Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
The Integers and Division. Outline Division: Factors, multiples Exercise 2.3 Primes: The Fundamental Theorem of Arithmetic. The Division Algorithm Greatest.
22C:19 Discrete Structures Integers and Modular Arithmetic
CSE 311 Foundations of Computing I Lecture 13 Number Theory Autumn 2012 CSE
Public Key Encryption Algorithm
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-224 y8534 (It should now be obvious whether or.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Announcements: Programming exam next Thursday on breaking codes from chapter 2 Programming exam next Thursday on breaking codes from chapter 2 Written.
Block ciphers 1 Session 3. Contents Design of block ciphers Non-linear transformations 2/25.
Announcements: Please use pencil on quizzes if possible Please use pencil on quizzes if possible Knuth quotes, part 1 Knuth quotes, part 1Questions?Today:
Announcements: We’ll attempt to grade Friday’s quizzes by end of day on Friday and leave outside my office We’ll attempt to grade Friday’s quizzes by end.
Announcements: Matlab: tutorial available at Matlab: tutorial available at
Classical Cryptography 1. Introduction: Some Simple Cryptosystems.
Announcements: Computer exam next class Computer exam next classQuestions? DTTF/NB479: DszquphsbqizDay 10.
Announcements: Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Assignment.
Cryptography Kinder Garden Number theory and Classical Cryptosystems Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/10/2010 INCS.
Announcements: Homework 1 returned. Comments from Kevin? Homework 1 returned. Comments from Kevin? Matlab: tutorial available at
Announcements: Assignment 2 finalized Assignment 2 finalizedQuestions?Today: Wrap up Hill ciphers Wrap up Hill ciphers One-time pads and LFSR One-time.
Announcements: 1. Short “pop” quiz on Ch 3 (not today) 2. Term project groups and topics due tomorrow midnight Waiting for posts from 22 of you. 3. HW6:
Announcements: 1. HW6 due now 2. HW7 posted Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions.
Announcements: Pass in Assignment 1 now Pass in Assignment 1 now Meet my assistant Kevin Reed Meet my assistant Kevin Reed Assignment 2 (tentative) posted.
Announcements: HW3 updated. Due next Thursday HW3 updated. Due next Thursday Written quiz tomorrow on chapters 1-2 (next slide) Written quiz tomorrow on.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-203 y8534 (It should now be obvious whether or.
Announcements: Assignment 1 due tomorrow in class. Assignment 1 due tomorrow in class.Questions? Roll Call Today: Vigenere ciphers Pronunciation? DTTF/NB479:
Announcements: Homework 1 coming Monday… Homework 1 coming Monday… Practical quiz during week 4 on putting your code to work Practical quiz during week.
Announcements: Quizzes graded, but not in gradebook. (Current grade gives 0 on the parts you shouldn’t have done .) Quizzes graded, but not in gradebook.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Announcements: Homework 2 due now Homework 2 due now Quiz this Friday on concepts from chapter 2 Quiz this Friday on concepts from chapter 2 Practical.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-222 y8534 (It should now be obvious whether or.
CSE 311 Foundations of Computing I Lecture 12 Primes, GCD, Modular Inverse Spring
CS555Spring 2012/Topic 61 Cryptography CS 555 Topic 6: Number Theory Basics.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Cryptography Inverses and GCD Piotr Faliszewski. GCD(a,b) gcd(a, 0) = a gcd(a, b) = gcd(b, a mod b) a = b*q + r Here: q =  a / b  r = a mod b (a –
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Symmetric-Key Cryptography
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Basic Number Theory Divisibility Let a,b be integers with a≠0. if there exists an integer k such that b=ka, we say a divides b which is denoted by a|b.
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
11 The evolution of cryptologic machines. TOP: The oldest known cipher wheel, of the type described by Francis Bacon as early as 1605 and later by Thomas.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Traditional Symmetric-Key Ciphers
Announcements: Matlab tutorial linked to in syllabus Matlab tutorial linked to in syllabusQuestions?Today: Block ciphers, especially Hill Ciphers Modular.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Chinese Remainder Theorem Dec 29 Picture from ………………………
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
MAT 1000 Mathematics in Today's World Winter 2015.
1 Section Congruences In short, a congruence relation is an equivalence relation on the carrier of an algebra such that the operations of the algebra.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
MA/CSSE 473 Day 08 Extended Euclid's Algorithm Modular Division Fermat's little theorem.
CSE 311 Foundations of Computing I Lecture 14 Euclid’s Algorithm Mathematical Induction Autumn 2012 CSE
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Chapter Applications of Number Theory Some Useful Results
CAP Cryptographic Analysis Program
Asad Gondal Ali Haider Mansoor
Introduction to Cryptography
Prelude to Public-Key Cryptography
Quick reviews / corrections
Classical Ciphers – 2 CSCI284 Spring 2004 GWU
Presentation transcript:

Announcements: Subscribe to Angel forums Subscribe to Angel forumsQuestions? Roll Call Today: affine ciphers DTTF/NB479: DszquphsbqizDay 2

Sherlock Holmes, The Adventure of the Dancing Men (1898) Who got it? In a letter: 2 weeks later: 2 mornings later: 3 days later: 4 days later:

Comments A simple substitution cipher Used knowledge of linguistics The letter E. The letter E. Used domain knowledge: Elsie Issues with ____________ and _________________: Sherlock masqueraded as Elsie. Sherlock masqueraded as Elsie. Others are integrity and non-repudiation. Others are integrity and non-repudiation. Read Section 2.5 in T&W for the solution

Affine ciphers Somewhat stronger since scale, then shift: x   x +  (mod 26) Say y = 5x + 3; x = ‘hellothere’; Then y = ‘mxggv…’

Affine ciphers: x   x + b (mod 26) Consider the 4 attacks: 1. How many possibilities must we consider in brute force attack?

Restrictions on  Consider y= 2x, y = 4x, or y = 13x What happens?

Basics 1: Divisibility Definition: Property 1: Property 2 (transitive): Property 3 (linear combinations): Q1

Basics 2: Primes Any integer p > 1 divisible by only p and 1. How many are there? Prime number theorem: Let  (x) be the number of primes less than x. Let  (x) be the number of primes less than x. Then Then Application: how many 319-digit primes are there? Application: how many 319-digit primes are there? Every positive integer is a unique product of primes. Every positive integer is a unique product of primes. Q2

Basics: 3. GCD gcd(a,b)=max j (j|a and j|b). Def.: a and b are relatively prime iff gcd(a,b)=1 gcd(14,21) easy…

Basics 4: Congruences Def: a≡b (mod n) iff (a-b) = nk for some int k Properties You can easily solve congruences ax≡b (mod n) if gcd(a,n) = 1 and the numbers are small. Example: 3x+ 6 ≡ 1 (mod 7) Example: 3x+ 6 ≡ 1 (mod 7) If gcd(a,n) isn’t 1, there are multiple solutions (next week) Q3

Restrictions on  Consider y= 2x, y = 4x, or y = 13x The problem is that gcd( , 26)  1. The function has no inverse. Q4

Finding the decryption key You need the inverse of y = 5x + 3 In Integer (mod 26) World, of course… y ≡ 5x + 3 (mod 26) Q5

Affine ciphers: x  ax + b (mod 26) Consider the 4 attacks: 1. Ciphertext only: How long is brute force? How long is brute force? 2. Known plaintext How many characters do we need? How many characters do we need? 3. Chosen plaintext Wow, this is easy. Wow, this is easy. 4. Chosen ciphertext Could be even easier! Could be even easier! Q6-7

Idea: the key is a vector of shifts The key and its length are unknown to Eve The key and its length are unknown to Eve Ex. Use a word like hidden ( ). Ex. Use a word like hidden ( ). Example: Example: The recent development of various methods of aph uiplvw giiltrsqrub ri znyqrxw zlbkrhf vnEncryption: Repeat the vector as many times as needed to get the same length as the plaintext Repeat the vector as many times as needed to get the same length as the plaintext Add this repeated vector to the plaintext. Add this repeated vector to the plaintext. Demo Demo Vigenere Ciphers Q1-2 Key