Cryptography at The University of South Carolina Douglas B. Meade

Slides:



Advertisements
Similar presentations
(ENCODING AND DECODING TECHNIQUES)
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Public Key Encryption Algorithm
hap8.html#chap8ex5.
An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy.
Announcements: We’ll attempt to grade Friday’s quizzes by end of day on Friday and leave outside my office We’ll attempt to grade Friday’s quizzes by end.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
COMP 170 L2 Page 1 Part 2 of Course Chapter 2 of Textbook.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
The Algebra of Encryption CS 6910 Semester Research and Project University of Colorado at Colorado Springs By Cliff McCullough 20 July 2011.
Announcements: Assignment 2 finalized Assignment 2 finalizedQuestions?Today: Wrap up Hill ciphers Wrap up Hill ciphers One-time pads and LFSR One-time.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
An Introduction to Hill Ciphers Using Linear Algebra Brian Worthington University of North Texas MATH /10/2010.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Computer Science 101 Cryptography Part II
MATH 224 – Discrete Mathematics
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
Applications  Computer Graphics,  Electronics,  Chemistry,  Biology,  Differential Equations,  Economics,
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
TMAT 103 Supplemental Chapter Cryptography. Sending messages that cannot be read if stolen –Been in use for centuries (wars) –Used to transmit data securely.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Systems of Equations as Matrices and Hill Cipher.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Coding Theory. p2. Why encode data? Three reasons to encode data that is about to be transmitted(through space) or stored(in a computer): 1. For efficiency.
Chapter 9 Matrices and Determinants Copyright © 2014, 2010, 2007 Pearson Education, Inc Multiplicative Inverses of Matrices and Matrix Equations.
Dan Boneh Public Key Encryption from trapdoor permutations Is RSA a one-way function? Online Cryptography Course Dan Boneh.
March 4, 2004 Cryptography and Computer Security for Undergraduates Suzanne E. Gladfelter Penn State York
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Announcements: Matlab tutorial linked to in syllabus Matlab tutorial linked to in syllabusQuestions?Today: Block ciphers, especially Hill Ciphers Modular.
Mathematical Concepts in Cryptography 355 Brian Tafel, Mark Shippy Raymond Fuller, and Mireya.
Lab 07: Caesar Cypher Intro to Computer Science CS1510, Section 2 Dr. Sarah Diesburg.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Chapter 11 Theory of Computation. © 2005 Pearson Addison-Wesley. All rights reserved 11-2 Chapter 11: Theory of Computation 11.1 Functions and Their Computation.
MAT 1000 Mathematics in Today's World Winter 2015.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography.
Cryptography and Coding Theory
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Notes Over 4.4 Finding the Inverse of 2 x 2 Matrix.
Chapter 11 Theory of Computation © 2007 Pearson Addison-Wesley. All rights reserved.
Cryptography Cryptography is the use of mathematics to encode messages and prevent them from being read by anyone who doesn’t know the code. One way that.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Warm UP: Review of Inequalities What do each of the symbols represent: 1. > 2. < Greater Than 2. Less than 3. Less than or equal to 4. Greater.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Future Middle School Teachers Janet Beissinger and Bonnie Saunders University of Illinois at Chicago
Copyright © Zeph Grunschlag, RSA Encryption Zeph Grunschlag.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 3. Mathematics of Cryptography.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
FATİH SULTAN MEHMET VAKIF UNIVERSITY Faculty of Engineering & Architecture Computer Engineering Department MAT217E - DİSCRETE STRUCTURES Slides for a.
Applications of Matrices
M3: Encryption r By Andrew Stringer.
Intro to Computer Science CS1510
Dynamical Systems in Linear Algebra and Differential Equations
PART VII Security.
Applications of Inverse Matrices
Simple Encryption- Lesson 5
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
CMPT 120 Lecture 9 – Unit 2 – Cryptography and Encryption –
APPLICATIONS OF LINEAR ALGEBRA IN INFORMATION TECHNOLOGY
Presentation transcript:

Cryptography at The University of South Carolina Douglas B. Meade

Cryptography as an application in …  Number Theory (M ATH 580)  Course homepage:  RSA Encryption Algorithm  (Numerical) Linear Algebra (M ATH 526 )  Course homepage:  Hill Substitution Cypher

Cryptography as its own course  Cryptography  Cross-listed as C SCE 557 and M ATH 587  Course homepage:  Syllabus:

Cross-listing between C SCE & M ATH  Computer science/engineering students …  see relevant and interesting applications of mathematics  learn some new mathematics  motivated to take more mathematics courses

Cross-listing between C SCE & M ATH  Mathematics students …  see cutting-edge application of mathematics  appreciate importance of computational mathematics  exposed to practical issues related to implementing mathematics (Gnu MultiPrecision library)  motivated to take more computer science courses

Hill Substitution Cypher  Reference: Linear Algebra and Its Applications, David C. Lay, Addison-Wesley, updated 3 rd edition,  Case Study (electronic supplement)

Hill Substitution Cypher  Preparation 1. Specify alphabet and cypher/decypher array p = # characters in alphabet 2. Select key matrix M invertible mod p: det M <> = mod p 3. Compute inverse key matrix M -1 M = I mod p 4. Share cypher/decypher array and M -1

Hill Substitution Cypher  Encryption 1. Convert message to numeric code + vectorize 2. Encode using key matrix e = Mv mod p 3. Convert numeric vector to string in alphabet

Hill Substitution Cypher  Decryption 1. Convert encoded string to numeric code + vectorize 2. Decode using inverse key matrix v = M -1 e mod p 3. Convert numeric vector to string in alphabet

Hill Substitution Cypher  Implementation  Maple supports modular linear algebra supports modular linear algebra embedded components eliminate need to know any Maple to use [worksheet] [MapleNet] embedded components eliminate need to know any Maple to use [worksheet] [MapleNet]worksheetMapleNetworksheetMapleNet  MATLAB does not support modular linear algebra does not support modular linear algebra