Announcements: HW3 updated. Due next Thursday HW3 updated. Due next Thursday Written quiz today Written quiz today Computer quiz next Friday on breaking.

Slides:



Advertisements
Similar presentations
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Advertisements

Announcements: 1. Congrats on reaching the halfway point once again! 2. DES graded soon 3. Short “pop” quiz on Ch 3. (Thursday at earliest) 4. Reminder:
Data encryption with big prime numbers
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Announcements: Programming exam next Thursday on breaking codes from chapter 2 Programming exam next Thursday on breaking codes from chapter 2 Written.
Great Theoretical Ideas in Computer Science.
Announcements: See schedule for weeks 8 and 9 See schedule for weeks 8 and 9 Project workdays, due dates, exam Project workdays, due dates, exam Projects:
Announcements: Matlab: tutorial available at Matlab: tutorial available at
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Announcements: 1. Pass in Homework 5 now. 2. Term project groups and topics due by Friday 1.Can use discussion forum to find teammates 3. HW6 posted, due.
Announcements: Computer exam next class Computer exam next classQuestions? DTTF/NB479: DszquphsbqizDay 10.
Attacks on Digital Signature Algorithm: RSA
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Announcements: HW4 – DES due midnight HW4 – DES due midnight So far the record is less than 15 sec on 1 million iters Quiz on ch 3 postponed until after.
Announcements: 1. Short “pop” quiz on Ch 3 (today?) 2. Term project groups and topics due midnight 3. HW6 due Tuesday. Questions? This week: Primality.
Announcements: 1. Short “pop” quiz on Ch 3 (today?) 2. Term project groups and topics formed 3. HW6 due tomorrow. Questions? This week: Discrete Logs,
Announcements: 1. Short “pop” quiz on Ch 3 (not today) 2. Term project groups and topics due tomorrow midnight Waiting for posts from 22 of you. 3. HW6:
Pass in HW6 now Can use up to 2 late days Can use up to 2 late days But one incentive not to burn them all: teams will get to pick their presentation day.
Announcements: 1. HW6 due now 2. HW7 posted Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
Announcements: 1. Congrats on reaching the halfway point once again! 2. Reminder: HW5 due tomorrow, HW6 due Tuesday after break 3. Term project groups.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Public Encryption: RSA
Announcements: HW3 updated. Due next Thursday HW3 updated. Due next Thursday Written quiz tomorrow on chapters 1-2 (next slide) Written quiz tomorrow on.
CSE331: Introduction to Networks and Security Lecture 20 Fall 2002.
Cryptography & Number Theory
Announcements: How was last Saturday’s workshop? How was last Saturday’s workshop? DES due now DES due now Chapter 3 Exam tomorrow Chapter 3 Exam tomorrow.
Announcements: 1. Pass in worksheet on using RSA now. 2. DES graded soon 3. Short “pop” quiz on Ch 3 (Thursday at earliest) 4. Term project groups and.
Announcements: HW4 – DES due Friday midnight HW4 – DES due Friday midnight Any volunteers to help config C/C# later today? Who’s using Scheme? Quiz on.
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
Cryptography Prof. Seth D. Bergmann Rowan University Computer Science.
DTTF/NB479: Dszquphsbqiz Day 9 Announcements: Homework 2 due now Homework 2 due now Computer quiz Thursday on chapter 2 Computer quiz Thursday on chapter.
Announcements: 1. Pass in HW7 now. 2. Project rubrics posted (peruse together) 3. Teams choose presentation dates now Questions? This week: Birthday attacks,
Announcements: Homework 2 due now Homework 2 due now Quiz this Friday on concepts from chapter 2 Quiz this Friday on concepts from chapter 2 Practical.
Codes, Ciphers, and Cryptography-RSA Encryption
The RSA Algorithm Based on the idea that factorization of integers into their prime factors is hard. ★ n=p . q, where p and q are distinct primes Proposed.
CSE 321 Discrete Structures Winter 2008 Lecture 10 Number Theory: Primality.
The RSA Algorithm Rocky K. C. Chang, March
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
Section 4.3: Fermat’s Little Theorem Practice HW (not to hand in) From Barr Text p. 284 # 1, 2.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
Great Theoretical Ideas in Computer Science.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Announcements: HW4 – DES due Thursday HW4 – DES due Thursday I have installed, or will install: Java, C (gcc), Python. What other languages? Please make.
Cryptography Lecture 7: RSA Primality Testing Piotr Faliszewski.
CSC 386 – Computer Security Scott Heggen. Agenda Exploring that locked box thing from Friday?
MA/CSSE 473 Day 10 Primality testing summary Data Encryption RSA.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
Remaining course content Remote, fair coin flipping Remote, fair coin flipping Presentations: Protocols, Elliptic curves, Info Theory, Quantum Crypto,
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
The Euler-Fermat Theorem Our text calls this “Euler’s Formula”, but I prefer the above name, giving due credit to Fermat. Obvious question: Can Fermat’s.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Chapter 12: Cryptography MAT 320 Spring Cryptography: Basic Ideas We want to encode information so that no one other than the intended recipient.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Great Theoretical Ideas in Computer Science.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2014.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Diffie-Hellman Key-Exchange Algorithm
Practical Aspects of Modern Cryptography
DTTF/NB479: Dszquphsbqiz Day 19
Presentation transcript:

Announcements: HW3 updated. Due next Thursday HW3 updated. Due next Thursday Written quiz today Written quiz today Computer quiz next Friday on breaking codes from chapter 2 Computer quiz next Friday on breaking codes from chapter 2Today: Three-pass protocol Three-pass protocol Quiz QuizQuestions? DTTF/NB479: DszquphsbqizDay 12

Wrapping up Fermat and Euler We skipped the proof of Fermat’s Little Theorem in the text. Be sure to read it Be sure to read it You are also prepared to read the rest of chapter 3 at your own pace.

Three-pass protocol How can Alice get a secret message to Bob without an established key? Can do it with locks. First 2 volunteers get to do the live demo

Three-pass protocol Situation: Alice wants to get a short message to Bob, but they don’t have an established key to transmit it. Can do with locks:

Three-pass protocol Situation: Alice wants to get a short message to Bob, but they don’t have an established key to transmit it. Can do with locks:

Three-pass protocol Situation: Alice wants to get a short message to Bob, but they don’t have an established key to transmit it. Can do with locks:

Three-pass protocol Situation: Alice wants to get a short message to Bob, but they don’t have an established key to transmit it. Can do with locks: Note: it’s always secured by one of their locks

Now with “Fermat’s locks” K: the secret message p: a public prime number > K The two locks: a: Alice’s random #, gcd(a,p-1)=1 a: Alice’s random #, gcd(a,p-1)=1 b: Bob’s random #, gcd(b,p-1)=1 b: Bob’s random #, gcd(b,p-1)=1 To unlock their locks: a -1 mod (p-1) a -1 mod (p-1) b -1 mod (p-1) b -1 mod (p-1)

Now with “Fermat’s locks” K: the secret message p: a public prime number > K The two locks: a: Alice’s random #, gcd(a,p-1)=1 a: Alice’s random #, gcd(a,p-1)=1 b: Bob’s random #, gcd(b,p-1)=1 b: Bob’s random #, gcd(b,p-1)=1 To unlock their locks: a -1 mod (p-1) a -1 mod (p-1) b -1 mod (p-1) b -1 mod (p-1) Three-pass protocol: Alice computes K a (mod p) and sends to Bob Bob computes (K a ) b (mod p) and sends it back Alice computes ((K a ) b ) inv(a) (mod p) and sends it back Bob computes (((K a ) b ) inv(a) ) inv(b) (mod p) and reads K

Now with “Fermat’s locks” K: the secret message p: a public prime number > K The two locks: a: Alice’s random #, gcd(a,p-1)=1 a: Alice’s random #, gcd(a,p-1)=1 b: Bob’s random #, gcd(b,p-1)=1 b: Bob’s random #, gcd(b,p-1)=1 To unlock their locks: a -1 mod (p-1) a -1 mod (p-1) b -1 mod (p-1) b -1 mod (p-1) Three-pass protocol: Alice computes K a (mod p) and sends to Bob Bob computes (K a ) b (mod p) and sends it back Alice computes ((K a ) b ) inv(a) (mod p) and sends it back Bob computes (((K a ) b ) inv(a) ) inv(b) (mod p) and reads K Toy example: (mod 59) = (mod 59) = (mod 59) = (mod 59) = Why’s it work?

Recall the basic principle When dealing with numbers mod n, we can deal with their exponents mod _____ Only look at once you’ve thought about this… Given integers a and b, Given integers a and b, Since aa -1 =bb -1 =1(mod p-1) Since aa -1 =bb -1 =1(mod p-1) What’s K^(aba -1 b -1 ) (mod p)? What’s K^(aba -1 b -1 ) (mod p)?

Final thought Trappe and Washington say that it’s vulnerable to an “intruder-in-the-middle” attack. Think about this…

Some levity before the exam Thanks to Nathan for the link!

Quiz Closed book and computer Get out note sheet: 1 handwritten sheet of 8.5 x 11 paper, one side only. 1 handwritten sheet of 8.5 x 11 paper, one side only.