MAT 1000 Mathematics in Today's World Winter 2015.

Slides:



Advertisements
Similar presentations
Mod arithmetic.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Math for Liberal Studies.  When we studied ID numbers, we found that many of these systems use remainders to compute the check digits  Remainders have.
Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
22C:19 Discrete Structures Integers and Modular Arithmetic
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
What is Elliptic Curve Cryptography?
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Congruence class arithmetic. Definitions: a ≡ b mod m iff a mod m = b mod m. a  [b] iff a ≡ b mod m.
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
An Introduction to Hill Ciphers Using Linear Algebra Brian Worthington University of North Texas MATH /10/2010.
Codes, Ciphers, and Cryptography-RSA Encryption
Introduction to Cryptography
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Section 3.6: An Introduction to Cryptography
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
CSE 504 Discrete Mathematics & Foundations of Computer Science
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Cryptography Programming Lab
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
Mathematics of Cryptography Part I: Modular Arithmetic
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Chapter 17: Information Science Lesson Plan
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Systems of Equations as Matrices and Hill Cipher.
Chapters 16 & 17 Sarah Cameron 18 March  Review of Modular Arithmetic  Identification Numbers ZIP Codes Bar Codes  Binary Codes  Encryption.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Chapter The Integers and Division Division
Symmetric-Key Cryptography
Cryptography and Secret Codes or one reason that linear equations are cool.
CRYPTOGRAPHY AND THE MATH MAJOR Dr. Mihai Caragiu Mathematics Department Ohio Northern University.
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Encryption on the Internet Eirik Albrigtsen. Encryption & Decryption Text Unreadable Text key + encryption method Unreadable Text Text key + decryption.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Traditional Symmetric-Key Ciphers
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Governor’s School for the Sciences Mathematics Day 5.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
MAT 1000 Mathematics in Today's World Winter 2015.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography and Coding Theory
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
An Introduction to Cryptology
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Future Middle School Teachers Janet Beissinger and Bonnie Saunders University of Illinois at Chicago
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Substitution Ciphers.
Modular Arithmetic with Applications to Cryptography
Encryption.
Affine Cipher.
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
FATİH SULTAN MEHMET VAKIF UNIVERSITY Faculty of Engineering & Architecture Computer Engineering Department MAT217E - DİSCRETE STRUCTURES Slides for a.
Encryption on the Internet
National Cipher Challenge
Cryptography Cryptography is derived from the Green word ‘kryptos’
Objective - To add and subtract decimals.
Fun with Cryptography The Science of Secrecy.
Digital Communications
Homophonic Substitution Cipher
Presentation transcript:

MAT 1000 Mathematics in Today's World Winter 2015

Last Time We looked at the number of issues a parity-check sums system can detect

Today We take a look at cryptography.

Cryptography Cryptography: The study of methods to make and break secret codes. The process of coding information to prevent unauthorized use is called encryption U

What do we do with Secret messages? Encrypt: Change the letters of the message so that it cannot be read Decrypt: Take an encrypted message and return the letters back to normal

Types of Ciphers Caesar Cipher Decimation Cipher Linear Cipher Vigenere Cipher

Caesar Cipher Used by Julius Caesar to send messages to the troops Shifts the letters of the alphabet by s units (Caesar used a shift of s=3) ABCDEFGHIJKLMNOPQRSTUVWXYZ DEFGHIJKLMNOPQRSTUVWXYZABC

To Encrypt Write the Alphabet down Under each letter write the letter of the alphabet that is s units later in the alphabet. Notice: If s=3, A will have a D below it since D is 3 letters after A. Take your message and change each letter to the associated letter below it (from above)

To Decrypt Use the grid from encryption and replace each letter with the letter above it Notice that A would encrypt as D and D would decrypt as A

Example

Modular Arithmetic Notice that s is just a number Each letter of the alphabet can also be given a number…A:0 B:1 C:2…Z:25 A shift of 3 would take A to D, but 0+3=3 which is the number associated to D. We could add the shift to each of the associated numbers to encrypt a Caesar shift Problem: What do we do with Y? 24+3=27

Modular Arithmetic Before, we just repeated the Alphabet 26 would go to A, 27 to B, 28 to C… Notice that we now have that A is associated to 0 and 26, B to1 and 27, C to 2 and 28 0 and 26 have remainder 0 when dividing by 26 (number of letters in the alphabet) 1 and 27 have remainder 1 when dividing by 26 2 and 28 have remainder 2

Modular Arithmetic Like the days of the week, we see that some things are cyclic To identify numbers, we compare their remainders when dividing by some number n We say that this is working mod n There are 7 days in the week, so we could work mod 7 15, 22, 29, 36 all have the same remainder when dividing by 7 (they have remainder 1) so we say that 15, 22, 29 and 36 are all the same mod 7. Notice that 15, 22, 29, 36 days from now it will be Tuesday…so they really are same The remainder measures how far past an even number of weeks 15, 22, 29, 36 went.

Caesar Shift For the Caesar shift we could work mod 26 Assign to each letter their respective numbers: A:0 F:5 K:10 P:15 U:20 Z:25 B:1 G:6 L:11 Q:16 V:21 C:2 H:7 M:12 R:17 W:22 D:2 I:8 N:13 S:18 X:23 E:4 J:9 O:14 T:19 Y:24

Caesar Shift To encrypt with a shift of s add s to the number associated to each letter and replace with the letter associated to the sum (mod 25). To decrypt: subtract s Notice, with decryption we can get negatives. The remainder must always be positive…To find the actual remainder for a negative number n: let r be the mod 26 representative of |n|, then the actual remainder is 26-r

Examples