BY CLAYTON PETTY Leonard Max Adleman. Background Born Dec. 31, 1945 in California Attended UC Berkeley  BA in Mathematics in 1968  Ph.D. in EECS in.

Slides:



Advertisements
Similar presentations
Public Key Cryptography The RSA Cryptosystem. by William M. Faucette Department of Mathematics State University of West Georgia.
Advertisements

IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Asymmetric-Key Cryptography
Public Key Encryption Algorithm
hap8.html#chap8ex5.
Abdullah Sheneamer CS591-F2010 Project of semester Presentation University of Colorado, Colorado Springs Dr. Edward RSA Problem and Inside PK Cryptography.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
R ICHARD M ANNING K ARP. R ICHARD M. K ARP Computer scientist and computational theorist Born: o January 3, 1935 (age 76) o Boston, Massachusetts Attended.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
Public Key Cryptography
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
RSA Encryption William Lu. RSA Background  Basic technique first discovered in 1973 by Clifford Cocks of CESG (part of British GCHQ)  Invented in 1977.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Cryptography Bryan Pearsaul. Outline What is Cryptology? Symmetric Ciphers Asymmetric Ciphers Diffie-Hellman RSA (Rivest/Shamir/Adleman) Moral.
RSA Encryption Caitlin O’Dwyer. What is an RSA Number? An RSA number n is a number s.t. n=pq Where p and q are distinct, large, prime integers.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
RSA Numbers by: Brandon Hacay & Conrad Allen. History of RSA Numbers The letters in “RSA” are simply the initials of the people who are credited as having.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
RSA Encryption & Cryptography
Group member: Philip, Gino, Yvonne, Phoena.  California's oldest private research university  Established: in 1880  Type: private and non-profit 
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
CS110: Computers and the Internet Encryption and Certificates.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
RSA Encryption System.
Shanna R. Simpson-Singleton Professor Kenneth Shiskowski, Ph.D. Mathematics Department.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Network Encryption Vince Ceccarelli Group 7 TC 200.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Darci Miyashiro Math 480 April 29, 2013
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
What is RSA RSA is a system employed to create the encrypted message in which the key used for encryption is different from that used to decrypt. It is.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
RSA The algorithm was publicly described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Partly used for PGP (Pretty Good Privacy) to encrypt.
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
Hard Problems Sanghyun Park Fall 2002 CSE, POSTECH.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
Encryption CS110: Computer Science and the Internet.
UNIVERSITY OF BIELSKO- BIALA AKADEMIA TECHNICZNO-HUMANISTYCZNA Faculty of Mechanical Engineering and Computer Science.
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
The RSA Cryptosystem The methods of encryption that we have studied so far have been historical methods that are not very useful for today’s computer age.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
David Luebke 1 2/18/2016 CS 332: Algorithms NP Completeness Continued: Reductions.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Chapter 11 Theory of Computation © 2007 Pearson Addison-Wesley. All rights reserved.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
DNA Computing Guided by: Ms. Leena Patel Computer Engineering Prepared by: Devharsh Trivedi
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Big Numbers: Mathematics and Internet Commerce
Real-world Security of Public Key Crypto
The Application of Elliptic Curves Cryptography in Embedded Systems
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
WELCOME TO ALL.
Presentation transcript:

BY CLAYTON PETTY Leonard Max Adleman

Background Born Dec. 31, 1945 in California Attended UC Berkeley  BA in Mathematics in 1968  Ph.D. in EECS in 1976 Co-inventor of the RSA cryptosystem Contributed to DNA Computing Received Turing Award in 2002

RSA and Cryptography Ron Rivest, Adi Shamir, Leonard Adleman (RSA)  Publicly described the algorithm in 1977  Public-key Encryption  Used for secure data transmissions Encrypt a message using a public key Only someone with the private key can feasibly decrypt it  Private key is the two large prime numbers  Example product of two primes: 

Viruses Coined the term “Computer Virus”  Describes self replicating programs  Credited by Adleman’s student, Fred Cohen Once the 80’s hit, found an interest in Biology  Developed a theory of CD4-cell depletion in AIDS Noticed similarity between how polymerase produces complementary strands of DNA and a turning machine  Now considered the “Father of DNA Computing”

DNA Computation Molecular Computation of Solutions To Combinatorial Problems  Written in 1994 Solved an NP-complete 7-node instance of the Hamiltonian Graph problem  Similar to the traveling salesman problem  Finding cycles in a graph that visit each node exactly once and First instance of using DNA as a computational system

Today and Reflection Professor of Computer Science and Molecular Biology  University of Southern California  Currently working on the mathematical theory of Strata Member of the National Academy of Engineering and National Academy of Sciences Adleman’s work is incredibly interesting  RSA is very important today  Correlation between Biology and Computer Science is incredible