ACM International Collegiate Programming Contest Banff Springs, Alberta April 6 – 10, 2008 Sep. 22 (local) Oct. 6 (Oswego – preliminary) Nov. 10 (RIT –

Slides:



Advertisements
Similar presentations
RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
Advertisements

Data encryption with big prime numbers
Announcements:Questions? This week: Digital signatures, DSA Digital signatures, DSA Secret sharing Secret sharing DTTF/NB479: DszquphsbqizDay 29.
Swim Lessons Fall 2008 Please call for private lessons or lessons for children with special needs. We will do our best to accommodate your requests and.
Welcome to MAT 142 TTh. Basic Course Information Instructor Office Office Hours Beth Jones PSA 725 Tuesday 10:30 am – 11:30 am Wednesday 11:45 am – 12:45.
*Don’t forget to sign in!* What model of division does this comic illustrate? What is the rate?
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
COMS W1004 Introduction to Computer Science June 24, 2009.
Welcome to MAT 170 MWF 9:40 SLN Basic Course Information Instructor Office Office Hours Beth Jones PSA 725 9:15 am – 10: 15 am Tuesday and Thursday.
8.4 Public Key Cryptography (1970) The Key made public because an unrealistic computer time is required to find a decrypting transformation D from the.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Welcome to MAT 170. Basic Course Information Instructor Office Office Hours Beth Jones PSA 725 Tuesday and Thursday 10:30 am – 11:30 am Wednesday 9:40.
Announcements: HW4 – DES due midnight HW4 – DES due midnight So far the record is less than 15 sec on 1 million iters Quiz on ch 3 postponed until after.
COMS W1004 Introduction to Computer Science June 25, 2008.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
Administrative HW1 due Th, Sep. 20, before class HW2 due Today, before class QUIZ1 Tu, Sep. 18 number theory/cryptography, pages 1-44 of DPV problem session:
Welcome to MAT 210. Basic Course Information Instructor Office Office Hours Beth Jones PSA 725 Tuesday and Thursday 12 noon - 1 pm Wednesday 8:30 am –
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Welcome to MAT 142. Basic Course Information Instructor Office Office Hours Beth Jones PSA 725 Tuesday 10:30 am – 12 noon Thursday 10:30 am – 12 noon.
Announcements: HW3 updated. Due next Thursday HW3 updated. Due next Thursday Written quiz today Written quiz today Computer quiz next Friday on breaking.
Public Key Cryptography
Public Encryption: RSA
Welcome to MAT 142 MWF 7:40 SLN Basic Course Information Instructor Office Office Hours Beth Jones PSA 725 9:15 am – 10: 15 am Tuesday and Thursday.
CSE331: Introduction to Networks and Security Lecture 20 Fall 2002.
Announcements: How was last Saturday’s workshop? How was last Saturday’s workshop? DES due now DES due now Chapter 3 Exam tomorrow Chapter 3 Exam tomorrow.
Administrative Issues ICS 151 Fall 2007 Instructor: Eli Bozorgzadeh.
Math 115a– Section 4  Instructor: Kerima Ratnayaka   Phone :  Office : MTL 124B.
Saturday May 02 PST 4 PM. Saturday May 02 PST 10:00 PM.
Announcements: 1.Labs start in the second week of classes. 2.Diagnostic test on Friday, August No class on Monday, September 1, Labor Day 4.PreClass.
Welcome to MAT 170. Basic Course Information Instructor Office Office Hours Beth Jones PSA 725 Tuesday and Thursday 12 noon - 1 pm Wednesday 8:30 am –
Announcements:Questions? This week: Digital signatures, DSA Digital signatures, DSA DTTF/NB479: DszquphsbqizDay 29.
Welcome to MAT 142. Basic Course Information Instructor Office Office Hours Beth Jones PSA 725 Tuesday and Thursday 10:30 am – 11:30 am Wednesday 9:40.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Announcements: 1. Pass in HW7 now. 2. Project rubrics posted (peruse together) 3. Teams choose presentation dates now Questions? This week: Birthday attacks,
1 OBJ: SWBAT Solve a system of equations by graphing on a coordinate plane.
Codes, Ciphers, and Cryptography-RSA Encryption
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Public Key Model 8. Cryptography part 2.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
BA271 Week 9 Lecture Three topics: o Upcoming schedule o Query Quiz review o Normalizing a database.
Great Theoretical Ideas in Computer Science.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Administrative Issues ICS 151 Winter 2010 Instructor: Eli Bozorgzadeh.
ALGEBRA 2; AGENDA; DAY 47; MON. OCT. 29, 2012 OBJECTIVE: Solve systems of linear equations and inequalities in two and three variables using graphical,
Public-Key Cryptography CS110 Fall Conventional Encryption.
CNS 4450 Syllabus. Context Language is a tool of thought. We rarely think without words. In solving problems by computer, we eventually get to the point.
CompSci 6 Introduction to Computer Science October 20, 2011 Prof. Rodger.
CSC 386 – Computer Security Scott Heggen. Agenda Exploring that locked box thing from Friday?
MA/CSSE 473 Day 10 Primality testing summary Data Encryption RSA.
Reviewing for Gateway #2 The second Gateway Quiz will be given at the next class session, after we review for Quiz 2 on sections If you have already.
1 Daily Announcements CS 202, Spring 2007 Aaron Bloomfield.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
1 CSE20 Lecture 6: Number Systems 5. Residual Numbers (cont) & 6. Cryptography CK Cheng UC San Diego.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
ITK 168 Structured Problem-Solving Using the Computer Fall, 2006.
Great Theoretical Ideas in Computer Science.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
ICS 151 Digital Logic Design Spring 2004 Administrative Issues.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Administrative Issues
Administrative Issues
Administrative Issues
Oblivious Transfer.
Presentation transcript:

ACM International Collegiate Programming Contest Banff Springs, Alberta April 6 – 10, 2008 Sep. 22 (local) Oct. 6 (Oswego – preliminary) Nov. 10 (RIT – regional final) Sep. 11, CBS 601, 4:15pm

Office hours Instructor office hours (CSB 620) Monday 12noon-1pm Thursday - after class TA office hours (CSB 728) Monday 4pm - 5pm Wednesday 4pm - 5pm Problem sessions Friday 8am – 9am, CSB 601

Homework #1 1) you should receive saying which parts do you need to solve (A,C,I) 2) if you do not receive the by today evening – send me 3) has to be typeset on a computer, turn in 2 copies by Sep. 20

Quiz #1 – Number Theory and Cryptography Sep 6 Sep 11 Sep 13 Sep 18 pages 1-44

Cryptography ALICE BOB EVE

ALICE BOB EVE Cryptography – private key K=secret key y=encode(x,K)x’=decode(y,K)

ALICE BOB EVE Cryptography – public key A= public key B= private key y=ENCODE(x,A) x=DECODE(y,B)

Cryptography – public key - RSA 1. pick two large primes p,q, let N=pq 2. pick e such that gcd(e,p-1)=1, gcd(e,q-1)=1 3. find d such that e.d  1 mod (p-1)(q-1) 4. announce e,N, keep p,q,d secret ENCODE(x) = x e mod N DECODE(y) = y d mod N