Announcements: SHA due Tuesday SHA due Tuesday Last exam Thursday Last exam Thursday Available for project questions this week Available for project questions.

Slides:



Advertisements
Similar presentations
The Euler Phi-Function Is Multiplicative (3/3)
Advertisements

COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.
How to Collaborate between Threshold Secret Sharing Schemes Daoshun Wang, Ziwei YeXiaobo Li Tsinghua University, ChinaUniversity of Alberta, Canada.
Ch12. Secret Sharing Schemes
Announcements: 1. Congrats on reaching the halfway point once again! 2. DES graded soon 3. Short “pop” quiz on Ch 3. (Thursday at earliest) 4. Reminder:
Data encryption with big prime numbers
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
Announcements: SHA due tomorrow SHA due tomorrow Last exam Thursday Last exam Thursday Available for project questions this week Available for project.
Announcements: Please use pencil on quizzes if possible Please use pencil on quizzes if possible Knuth quotes, part 1 Knuth quotes, part 1Questions?Today:
Announcements: See schedule for weeks 8 and 9 See schedule for weeks 8 and 9 Project workdays, due dates, exam Project workdays, due dates, exam Projects:
Lecture 6 Intersection of Hyperplanes and Matrix Inverse Shang-Hua Teng.
Announcements: HW4 – DES due midnight HW4 – DES due midnight So far the record is less than 15 sec on 1 million iters Quiz on ch 3 postponed until after.
Announcements: 1. HW7 due next Tuesday. 2. Inauguration today! Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman,
Announcements: Homework 1 returned. Comments from Kevin? Homework 1 returned. Comments from Kevin? Matlab: tutorial available at
Announcements: 1. Short “pop” quiz on Ch 3 (today?) 2. Term project groups and topics due midnight 3. HW6 due Tuesday. Questions? This week: Primality.
Announcements: 1. Short “pop” quiz on Ch 3 (today?) 2. Term project groups and topics formed 3. HW6 due tomorrow. Questions? This week: Discrete Logs,
Curve-Fitting Polynomial Interpolation
Announcements: 1. HW6 due now 2. HW7 posted Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions.
Announcements: 1. Today: digital cash 2. Tomorrow: quiz on ch questions 3. Thursday: presentations Elliptic curves MD5 vulnerabilities 4. Friday:
Announcements: 1. Congrats on reaching the halfway point once again! 2. Reminder: HW5 due tomorrow, HW6 due Tuesday after break 3. Term project groups.
Secret Sharing Algorithms
Congruence of Integers
Announcements: HW3 updated. Due next Thursday HW3 updated. Due next Thursday Written quiz today Written quiz today Computer quiz next Friday on breaking.
Announcements: HW3 updated. Due next Thursday HW3 updated. Due next Thursday Written quiz tomorrow on chapters 1-2 (next slide) Written quiz tomorrow on.
Announcements: How was last Saturday’s workshop? How was last Saturday’s workshop? DES due now DES due now Chapter 3 Exam tomorrow Chapter 3 Exam tomorrow.
DTTF/NB479: Dszquphsbqiz Day 9 Announcements: Homework 2 due now Homework 2 due now Computer quiz Thursday on chapter 2 Computer quiz Thursday on chapter.
Announcements: 1. Term project groups and topics formed 2. HW6 due tomorrow. Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs,
Announcements: Homework 2 due now Homework 2 due now Quiz this Friday on concepts from chapter 2 Quiz this Friday on concepts from chapter 2 Practical.
1 OBJ: SWBAT Solve a system of equations by graphing on a coordinate plane.
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
Solving Systems of Equations. Rule of Thumb: More equations than unknowns  system is unlikely to have a solution. Same number of equations as unknowns.
Aggregation in Sensor Networks
Great Theoretical Ideas in Computer Science.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Monday, 4/30Tuesday, 5/1Wednesday, 5/2Thursday, 5/3Friday, 5/4 No classes Review for tomorrow’s test TEST!Quadratic graphs Quadratic Graphs Monday, 5/7Tuesday,
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Prentice Hall Antiderivatives and Slope Fields Section 6.1.
Announcements: HW4 – DES due Thursday HW4 – DES due Thursday I have installed, or will install: Java, C (gcc), Python. What other languages? Please make.
MA/CSSE 473 Day 11 Primality testing summary Data Encryption RSA.
Cryptography Inverses and GCD Piotr Faliszewski. GCD(a,b) gcd(a, 0) = a gcd(a, b) = gcd(b, a mod b) a = b*q + r Here: q =  a / b  r = a mod b (a –
Remaining course content Remote, fair coin flipping Remote, fair coin flipping Presentations: Protocols, Elliptic curves, Info Theory, Quantum Crypto,
9/18/14 Evaluating Expressions Textbook: 3-5 V & E p.124 DO NOW 1). What does it mean to substitute Solve if X = 3 and Y = 5 2). 3x3). Y - X 4). 2X/Y Simplify:
Chinese Remainder Theorem Dec 29 Picture from ………………………
1 Network and Computer Security (CS 475) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Secret Sharing for General Access Structure İlker Nadi Bozkurt, Kamer Kaya, and Ali Aydın Selçuk Information Security and Cryptology, Ankara, Turkey, May.
1 Section 5.3 Linear Systems of Equations. 2 THREE EQUATIONS WITH THREE VARIABLES Consider the linear system of three equations below with three unknowns.
Encryption on the Internet Jeff Cohen. Keeping Information Secret What information do we want to be secret? –Credit card number –Social security number.
28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
CIE Centre A-level Further Pure Maths
What happens if we graph a system of equations and the lines intersect? y = x-1 y = 2x-2.
Tuesday, June 4, 2013 Do Now : Evaluate when x = 6, y = -2 and z = 3.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
May 9, 2001Applied Symbolic Computation1 Applied Symbolic Computation (CS 680/480) Lecture 6: Multiplication, Interpolation, and the Chinese Remainder.
 First: Get books at station 4  When return, create calculator log in › Type first name, last name, username (lastnamefirst initial, ex. EixenbergerR)
Cryptographic Protocols Secret sharing, Threshold Security
Public Key Encryption Major topics The RSA scheme was devised in 1978
Great Theoretical Ideas in Computer Science
Ch12. Secret Sharing Schemes
Solve the equation for x. {image}
WEEK 1 HIGHER.
Symmetric-Key Cryptography
Solving equations Mrs. Hall.
Secret Sharing and Applications
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
Cryptology Design Fundamentals
Symmetric-Key Cryptography
Cryptographic Protocols Secret Sharing, Threshold Security
Homework #3 Consider a verifyable secret sharing scheme (VSS) based on Shamir's polynomial secret sharing as follows. A dealer has a secret S, a public.
Presentation transcript:

Announcements: SHA due Tuesday SHA due Tuesday Last exam Thursday Last exam Thursday Available for project questions this week Available for project questions this week You will evaluate each other’s presentations during 10 th week. You will evaluate each other’s presentations during 10 th week.Questions? Secret sharing DTTF/NB479: DszquphsbqizDay 31

What is secret splitting? 1 r M-r (mod n)

There are many applications of secret splitting and secret sharing 1.Inheritances 2.Military 3.Government 4.Information security What if I wanted a subset of the people to be able to reconstruct the secret? Secret splitting is trivial Secret sharing is not! 2

(t,w)-threshold schemes require t people from a set of w to compute the secret Knowing t or more pieces makes M easily computable t–1 or fewer pieces leaves M completely undetermined If (3,5) threshold scheme: {a,d,e} can figure out secret {a,d,e} can figure out secret {c,e} cannot {c,e} cannot {a,b,c,d} is redundant {a,b,c,d} is redundant Secret splitting (all participants required) is just a special case: Let t = w Let t = w a b c d e

Idea: we can use curve fitting to reconstruct a function, and thus a message Secret  3 The y-intercept of the line encodes the secret! Your quiz question is an example of a (2,3) scheme Here is a (2,4) scheme:

The Shamir threshold scheme uses curve-fitting with higher dimensions Secret  4-5 The y-intercept of the line encodes the secret! Derivation on board

Extensions to Shamir Secret  4-5 Multiple shares Multiple groups of people

In the Blakely scheme, we represent the secret as the y-coordinate of the intersection of hyperplanes 6

Back to Shamir Secret  7-8 The y-intercept of the line encodes the secret! Your quiz question is an example of a (4, 6) scheme Project workday tomorrow: quiz due at 2:00 pm.

Mignotte Method (t, n) threshold scheme Uses Chinese remainder theorem Solving a system of equations, mod n

Method Construct a Mignotte Sequence Conditions: Pairwise relatively prime Pairwise relatively prime sShares:

Reconstruction  Solve:  Using Chinese Remainder Theorem  Unique (mod m 1 *** m n )