[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
7. Asymmetric encryption-
Great Theoretical Ideas in Computer Science.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Attacks on Digital Signature Algorithm: RSA
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
No-Key Cryptography Nathan Marks Based on Massey-Omura US Patent # 4,567,600.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Cryptography Prof. Seth D. Bergmann Rowan University Computer Science.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Public Key Algorithms 4/17/2017 M. Chatterjee.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Lecture 6: Public Key Cryptography
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Great Theoretical Ideas in Computer Science.
RSA Ramki Thurimella.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Encryption Coursepak little bit in chap 10 of reed.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Midterm Review Cryptography & Network Security
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Diffie-Hellman Key Exchange Color Mixing Example Rick Stroud 21 September 2015 CSCE 522.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Great Theoretical Ideas in Computer Science.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Digital Signatures.
Public Key Cryptosystem
Public-key Cryptography
Big Numbers: Mathematics and Internet Commerce
Presentation transcript:

[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010

2 NSA HISTORY Founded in 1952 as part of Department of Defense National Intelligence Directorate Mission to Secure Nation’s Communication while Exploiting Foreign Signals Intelligence Located at Ft Meade, Maryland, halfway between Baltimore and Washington DC Largest Employer of Mathematicians in the United States “The ability to understand the secret communications of our foreign adversaries while protecting our own communications gives our nation a unique advantage.”

3 NSA’S MISSION AREAS Signals Intelligence (SIGINT) – Produce foreign signal intelligence information – Communications and data processing using high technology – Foreign language analysis and research – Cryptanalysis is decoding encrypted transmissions = codebreaking Information Assurance (IA) – Protect U.S. information systems by safeguarding classified/sensitive information stored on or sent by U.S. government equipment – Cryptography is developing codes and ciphers = codemaking

4 Mathematicians at NSA Work on math projects involving signals analysis, data mining, information retrieval, speech processing, data compression, supercomputing, biometrics, and more Use analysis, abstract algebra, number theory, graph theory, coding theory, probability, statistics Design systems, develop programs to protect sensitive U.S. information on long- term basis

5 Employment Opportunities Mathematics Summer Programs – Directors Summer Program (DSP) – Mathematics Summer Employment Program (MSEP) – Graduate Mathematics Program (GMP) Full-time Mathematics Positions – 3-year development program – 4-6 short-term assignments in different offices – Internal training curriculum Mathematics Sciences Program – Grants and Sabbaticals

6 Application Process Apply at website, Must be U.S. citizen Allow 6-12 months for application process Onsite interview/security screening Math Proficiency Exam

7 Benefits 10 Federal Holidays Annual Leave and Sick Leave earned per pay period Flexible Time Continuing Education Opportunities Internal Training Opportunities/Career Development

PUBLIC KEY CRYPTOGRAPHY Users who wish to communicate via secure means must share a cryptovariable (a.k.a., a key) Physical meeting or courier exchange keys ==inconvenient Need a secure way to transmit over a public line 8

General Idea 9 internet Alice Eve Bob

General Idea Alice and Bob agree on a public key (PK) system Bob sends Alice his public key Alice encrypts her message with Bob’s public key, and sends it to him Bob uses his private key to decrypt and read Alice’s message 10

Why Use Public Key Encrypt Messages Key Exchange Authentication Digital Signatures 11

RSA Public Key System Application of multiplication and factoring to public key cryptography Developed in 1977 by Rivest, Shamir, and Adelman 12

RSA Public Key System Select two large prime numbers, p and q Compute n = pq ( n is the modulus) Choose e such that e < n and e is relatively prime to (p-1) (q-1) Compute d, the inverse of e –i.e. ed = 1 mod (p-1)(q-1) –(x e ) d = x ( ed ) = x mod N whenever x is not divisible by p or q 13

RSA (cont’d) e = public exponent d = private exponent Public key is the pair (n, e) Private key = d Factors p and q are secret 14

How Secure is RSA? Need to be able to factor n into p and q to recover d, the private key But factoring products of large prime numbers is hard, and requires a lot of computational power 15

RSA Examples Let p = 61 and q = 53 Then, n = pq = 61*53 = 3233 Also, (p-1)(q-1) = (61-1)(53-1) = 3120 Now, choose e = 17 Notice that de = 1 mod 3120, so d = 2753 Public key = (n = 3233, e = 17) Private key = (n = 3233, d = 2753) 16

Diffie-Hellman public key system Application of exponentiation and logarithms to public key cryptography Exponentiation done over a large finite group, not over real numbers Developed in 1975 by W. Diffie and M. Hellman Invented by Malcolm Williamson at GCHQ before Diffie-Hellman 17

D-H key exchange (1) Pick some group G, with generator g Alice picks a random number a and calculates g a (in G ) Bob picks a random number b and calculates g b (in G ) Alice’s private key = a Alice’s public key = g a (Similarly for Bob) 18

D-H Key Exchange Eve will see g a and g b during transmission She can’t calculate the shared secret key unless she know (or can guess) either a or b Determining a, given g a (in G ) is called the discrete logarithm problem This is hard to solve for a sufficiently large group G Real world prime moduli can be very big – 256 to 2048 bits (256 bits is about ) 19

D-H Example G = M 17, with g = 3 Alice selects a = 12 Bob selects b = 7 Alice calculates 3 12 (mod 17) = 4 and sends it to Bob Bob calculates 3 7 (mod 17) = 11 and sends it to Alice 20

21 QUESTIONS

Contact Information NSA Website: My information: Jill Calhoun 22