Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Digital Signatures and Hash Functions. Digital Signatures.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Public Key Encryption Algorithm
7. Asymmetric encryption-
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Attacks on Digital Signature Algorithm: RSA
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Graham Farr Second Reader: Dianne Hagan.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Public Key Cryptography and the RSA Algorithm
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
CPE5021 Advanced Network Security --- Advanced Cryptography: RSA and its implementation --- Lecture 1.1 Last lecture we saw the data encryption standard.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Rachana Y. Patil 1 1.
The RSA Algorithm Rocky K. C. Chang, March
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Prime Numbers Prime numbers only have divisors of 1 and self
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Great Theoretical Ideas in Computer Science.
RSA Ramki Thurimella.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Midterm Review Cryptography & Network Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Chapter 21 Public-Key Cryptography and Message Authentication.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
P1. Public-Key Cryptography and RSA 5351: Introduction to Cryptography Spring 2013.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
Cryptography and Network Security Public Key Cryptography and RSA.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
NET 311 Information Security
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Presentation transcript:

Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan

Background Need to securely transmit information between two or more parties. Methods have been devised to meet this need. Cryptography is the study of these methods.

Cryptography Plain textOriginal Plain text Cipher text

Cryptography (cont…) A very long history… Recent emergence of public key cryptography spurred interest in it.

Public-key cryptography Alice Bob message public key private key

Public key cryptography (cont…) Cryptosystems which involve use of public and private keys for encryption and decryption. Some types of public-key cryptosystems: RSA, Diffie Hellman and Shamir.

Learning & Teaching Cryptography Success of public-key cryptosystems Growing popularity of cryptography leads to Interest in learning cryptography promotes Effective ways of teaching cryptography creates need for

General Aim Automated Cryptographic Teaching Tools As an aid to teaching and learning several public key cryptosystems NOT writing secure implementations of cryptosystems.

Correct RSA calculation N=77, e=7, p=11, q=7, c=5(Encrypted msg) Decryption Extended Euclidean algorithm d=e^(-1) mod ((p-1)(q-1)) Msg, m=c^d mod N *RSA: a public-key cryptosystem Fast modular exponentiation

Error paths in RSA exercise *RSA is a type of public-key cryptosystem Decryption key d N=77, e=7, p=11, q=7, c=5(Encrypted msg) correct path wrong path

Doing exercises by hand An important part of learning cryptography is doing exercises by hand. However… It is difficult to construct exercises by hand with the following properties: a.Sound examples b.Diagnostic examples

Sound/Diagnostic examples Sound example: Wrong path leads to wrong answer. Student must do the correct calculation to arrive at the right answer. Diagnostic example: All paths give different answers. Student’s answer indicates the type of mistake made.

Existing work Example generators have been built by Laura Frost and Simon Hawley (2002-3) for the following cryptosystems: RSA Diffie-Hellman Shamir ElGamal Chaum’s e-cash

RSA example generator random keys All paths Diagnostic? correct path

Project Justification A fair question to ask would be: How useful are these example generators? Useful for the person constructing examples. Provides guidance to person doing examples. Statistics are helpful for researching in the properties of examples. Answer: Useful!!!

Deliverables 1. Refining of existing programs to enhance structure and usability. 2. Support for additional cryptosystems. 3. Experimentation with data sets to study sound/diagnostic examples. 4. Construction of web interfaces.

Results Overview 1. System Functionalities. 2. Additional example generators. 3. Web-based interface. 4. Example probabilities table. 5. Evaluation of table results.

1. System Functionalities Three main modes of operation: Random mode Interactive mode Calculate mode

Main modes: Random Generates example without tweaking parameters. How this works?  Select parameters to be small enough for pen and paper.  Parameters must have suitable mathematical characteristics. ( e.g. not self-inverses in RSA)  Extra options: displaying working or path tree.

Main modes: Interactive Requires information from user for individual keys. How this works? Show user appropriate inputs i.e. small with suitable properties. Let user select from inputs. Generate example with those inputs Display output depending on extra options.

Main modes: Calculate Functionality Loops over existing examples to calculate probabilities Determines percentage of sound/diagnostic examples. How it works ? User specifies parameters to be fixed or looped. Several examples are generated and compared. Program outputs example types, probabilities.

Display: Path Selection Selection of paths that users want considered. Rationale: Some error paths are more probable than others. Students become expert with parts of cryptosystems over time.

Path Select Interface

Display: Path Tree Display A visual representation of path table.

2. Additional example generators The additional generators are: Knapsack RSA signature scheme

Design considerations How is an example generator built? 1. Work out possible paths by pen and paper. 2. Determine characteristics unique to cryptosystem. 3. Implement with some code reuse.

3. Web interface Consistent input layout for all cryptosystems

Input Interface: Key Input Dialog Figure: RSA Calc. Mode Input dialog

Generated Output Web output scrollpane

4. Probabilities table N.B. Probabilities table similar for other cryptosystems

Evaluation of probabilities It is hard to generate examples that are diagnostic. Probabilities of sound/diagnostic examples increase as input size increases.

Demonstration Looking at everything we have talked about… Main website:

Discussion of results In short, this project contributes significantly in the following ways: Web interface lets users interact with the tool easily. It is easy to generate examples with suitable properties. Students can learn by example (steps through en/decryption).

Future Work Project provides a basis for further work: A generic path tree representation. Better visualization of output. Allowing output of encryption to be given to decryption. A progress indicator. Support for additional generators.

Q & A Any Questions?