SCB – A Secret Sharing Program Brian M. Fleming Laurence T. Grant.

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

Chapter 8 Improving the User Interface
Mainframe-caliber tools for UNIX Treehouse Software, Inc.
User Training. Step 1 Press Ctrl-I or choose File > Login, this will open the Login window. Figure 1-1 shows the Login window. Figure 1-1 Login Window.
Numbers Prime Factors: Every number can be broken down into the smallest numbers which when multiplied together will eventually make that number...
Inequalities MCC7.EE4: Solving and Graphing Inequalities
Prototyping. Horizontal Prototyping Description of Horizontal Prototyping A Horizontal, or User Interface, Prototype is a model of the outer shell of.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
Chapter 5 Cryptography Protecting principals communication in systems.
Prototyping By Greg Rogers. Agenda For Today  What is a prototype  Why prototype  What to prototype.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
Secret Sharing Algorithms
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
Texas Instruments TI-83 Plus Graphing Calculator Basic Operations.
Key Recovery and Secret Sharing -- Towards balancing the interests of individuals and those of governments --
United States Department of Agriculture Office of Procurement and Property Management Effective Negotiation Refresher August 2008 Exhibit 1.
Writing Number Sentences Created by Mr. Hemmert. ARMT 9 Write number sentences for word problems that involve multiplication or division.
Introduction to Public Key Cryptography
8. INPUT, OUTPUT and storage DEVICES i/o units
Chapter 12 Cryptography (slides edited by Erin Chambers)
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Java Beans.
Mathematics of Cryptography Modular Arithmetic, Congruence,
System Analysis and Design
Welcome back! It’s spring…or supposed to be MAT199: Math Alive Cryptography Ian Griffiths Mathematical Institute, University of Oxford, Department of.
Division by One Digit Divisors Dividing these 16 apples into 4 equal groups, gives you 4 groups that have 4 apples in each of the groups:      
Lesson 6C – Loops 3 – Advanced File Processing By John B. Owen All rights reserved ©2011.
Introduction to Matlab & Data Analysis
Solving Using Matrices By Helen Chin Kitty Luo Anita La.
GUI development with Matlab: GUI Front Panel Components 1 GUI front panel components In this section, we will look at -GUI front panel components -Programming.
Stem-and-Leaf Plots Chapter 6 Algebra 1 Ms. Mayer.
1 Public-Key Cryptography and Message Authentication.
Warm-up. Warm-up Answers Dividing Polynomials: Objectives: ◦Determine the best method to factor rational expressions. ◦Divide rational expressions using.
Example Template for Project Presentation
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Name of Presenter Project Members.  Introduce the problem, the areas or services affected, who was involved on the team, and how it came together Need.
Performing Calculations—1 of 2 In addition to using queries to retrieve, update, sort, and filter data in a database, you can use a query to perform calculations.
Based on Bruce Schneier Chapter 8: Key Management Dulal C Kar.
1 User Interface Design Components Chapter Key Definitions The navigation mechanism provides the way for users to tell the system what to do The.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Computer Graphics: Programming, Problem Solving, and Visual Communication Steve Cunningham California State University Stanislaus and Grinnell College.
The Design and Implementation of a tutorial to illustrate the Kerberos protocol Presenter : Lindy Carter Supervisors : Peter Wentworth John Ebden.
Fair Division Lone Divider Method.
Page 46a Continued Advanced Engineering Mathematics by Erwin Kreyszig
Calculus, 8/E by Howard Anton, Irl Bivens, and Stephen Davis Copyright © 2005 by John Wiley & Sons, Inc. All rights reserved. Chapter Integration.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Events Programming with Alice and Java First Edition by John Lewis.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Create the cover page by inserting clip art, WordArt, and text. Triple-click and enter your name here. Do not press the delete key! Triple-click and enter.
2 Digit Quotients Math Lesson 5-6. Remember back to yesterday’s lesson… 1.What should be your first step when dividing? Why is this important? 2.How do.
28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.
10.1Retrieving a Database File – In the last chapter, we have created a database file and several tables for that database. – In order to view and modify.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
MATLAB and SimulinkLecture 61 To days Outline Graphical User Interface (GUI) Exercise on this days topics.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
AS Computer Studies Finite State Machines 2.
Big Numbers: Mathematics and Internet Commerce
PART VII Security.
Re(AC)t Reputation and Anonymous Credentials for Access Control (t=2)
Tests of Divisibility 1 - All integers can be divided by 1
NET 311 Information Security
Using Lists and Functions to Create Dialogue
Function Notation.
Presentation transcript:

SCB – A Secret Sharing Program Brian M. Fleming Laurence T. Grant

Problem Posed Imagine a situation where you were on a team with a common goal, but you didn’t trust your team members. This leads to problems. To leave project unlocked, allows team members to cheat, and to lock with one password gives only one complete power.

Solution Create a program to divide the password (or key) into X-many pieces, so each group member has an equal share of the password. Alternately, create a program which creates N pieces of the key, and only requires M to put it back together.

Implementation The user inputs the key (which can either be a 9 digit number for equal sharing, or a 3 digit number for (2, n) splitting), and chooses a mode. The result is put into a corresponding text box. To retrieve the key, you put the necessary pieces in the appropriate boxes, and choose the proper mode.

Results Program works as expected. Implementation of the Secret Sharing (M,N) was made more difficult, and take more time, in Eiffel due to a lack of readily available advance math classes (e.g.. – classes which can solve matrices in finite prime fields).

Division of Work Laurence –Handled most of the behind the scenes math (e.g. – “math major stuff”). –Got external graphics to display in the program. Brian –Built GUI. –Handled manipulating input strings from user. –Built menu system, help and about boxes.

The Future of SCB Possible extensions include: –Writing a good, free, and available finite field class to handle larger numbers when using Secret Sharing (M,N) scheme. –Letting the secret number be entered by a trusted third party so it is unviewable by those who are receiving the pieces. –Allowing the output of more pieces.

(Brief) References Applied Cryptography, Bruce Schneier; John Wiley & Sons, Inc., “How to Share a Secret”, Ami Shamir; Communications of the ACM, vol. 24, no. 11, 1979.How to Share a Secret Introductory Modern Algebra, Saul Stahl; John Wiley & Sons, Inc., See paper for rest...