Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Graham Farr Second Reader: Dianne Hagan.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Cryptosystem
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Public Key Encryption Algorithm
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Attacks on Digital Signature Algorithm: RSA
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
COMP 170 L2 Page 1 Part 2 of Course Chapter 2 of Textbook.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
EEC-484/584 Computer Networks Lecture 16 Wenbing Zhao
Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.
Public Key Cryptography
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
CPE5021 Advanced Network Security --- Advanced Cryptography: RSA and its implementation --- Lecture 1.1 Last lecture we saw the data encryption standard.
Public Key Cryptography Bryan Pearsaul. Outline What is Cryptology? Symmetric Ciphers Asymmetric Ciphers Diffie-Hellman RSA (Rivest/Shamir/Adleman) Moral.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Public Key Model 8. Cryptography part 2.
The RSA Algorithm Based on the idea that factorization of integers into their prime factors is hard. ★ n=p . q, where p and q are distinct primes Proposed.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Rachana Y. Patil 1 1.
Introduction to Modular Arithmetic and Public Key Cryptography.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Chapter 21 Public-Key Cryptography and Message Authentication.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Darci Miyashiro Math 480 April 29, 2013
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
P1. Public-Key Cryptography and RSA 5351: Introduction to Cryptography Spring 2013.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Elliptic Curve Cryptography
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
Elliptic Curve Cryptography Lawrence Fallow 19 April 2007.
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
UNIVERSITY OF BIELSKO- BIALA AKADEMIA TECHNICZNO-HUMANISTYCZNA Faculty of Mechanical Engineering and Computer Science.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
Security. Cryptography (1) Intruders and eavesdroppers in communication.
CS/COE 1501 Recitation RSA Encryption/Decryption Extended Euclidean Algorithm Digital Signatures.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Public Key Cryptosystem
Public Key Encryption Systems
Public Key Encryption Systems
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
How to Use Charm Crypto Lib
Presentation transcript:

Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Graham Farr Second Reader: Dianne Hagan

Background Need to securely transmit information between two or more parties. Methods have been devised to meet this need. Cryptography is the study of these methods.

Cryptography Plain textOriginal Plain text Cipher text

Cryptography (cont…) A very long history… Recent emergence of public key cryptography spurred interest in researching it.

Public-key cryptography Alice Bob message public key private key Eve

Public key cryptography (cont…) Cryptosystems involving use of public and private keys for encryption and decryption. Some types of public-key cryptosystems: RSA, Diffie Hellman and Shamir. *Cryptosystem is a collection of algorithms

Learning & Teaching Cryptography Success of public-key cryptosystems Growing popularity of cryptography leads to Interest in learning cryptography promotes Effective ways of teaching cryptography encourages

General Aim Automated Cryptographic Teaching Tools As an aid to teaching and learning several public key cryptosystems NOT writing secure implementations of cryptosystems.

Correct RSA calculation N=77, e=7, p=11, q=7, c=5(Encrypted msg) Decryption Extended Euclidean algorithm d=e^(-1) mod ((p-1)(q-1)) Msg, m=c^d mod N *RSA: a public-key cryptosystem

Error paths in RSA exercise *RSA is a type of public-key cryptosystem Decryption key d N=77, e=7, p=11, q=7, c=5(Encrypted msg) correct path wrong path

Doing exercises by hand An important part of learning cryptography is doing exercises by hand. However… It is difficult to construct exercises by hand with the following properties: a.Good examples b.Diagnostic examples

Good/Diagnostic examples Good example: Wrong path leads to wrong answer. Student must do correct calculation to arrive at the right answer. Diagnostic example: All paths give different answers. Student’s answer indicates the type of mistake made.

Existing work Example generators built by Laura Frost and Simon Hawley (2002-3) for the following cryptosystems: RSA Diffie-Helman Shamir ElGamal Chaum’s e-cash

RSA example generator random keys All paths Diagnostic? correct path

Project Goals 1. Refine existing programs. 2. Implement example generators for other public- key cryptosystems (E.g. knapsack, elliptic curve cryptosystems, etc). 3. Experiment with data sets to study good/diagnostic examples. 4. Examine the possibility of quantifying the quality of an example. 5. Construct web interfaces.

Project Review Project Timeline 12 th May16 th Jun14 th Jul21 st Jul28 th Jul4 th Aug Example Generators Web Interface Testing *Implementation scheduled to take a period of 3 months

Summary of current work 1. Analysed existing programs. 2. Identified limitations of existing programs. 3. Identified modules that can be reused. E.g. Extended Euclidean Algorithm.

Summary of current work (cont…) Currently building example generators for other cryptosystems. Includes: 1. Identifying all possible paths in an exercise. (Similar to RSA paths shown earlier). 2. Building command line version of generator that could later be incorporated into the GUI.

The End Many Thanks to everyone for being here!