East High School Math Week Jeff Kinne UW Computer Science.

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

Cryptography encryption authentication digital signatures
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
What is Elliptic Curve Cryptography?
Lecture 3.3: Public Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptography The science of writing in secret code.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Computers in Society Encryption. Shameless Plug Catch the kayak club trip to Glenwood on Saturday. Fun!
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Classic Cryptography: Caesar Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
 8 groups of 2  5 rounds  Basic Definitions  Substitution Cryptosystems  Math  Tricky Questions  Comparing Cryptosystems  10 questions per round.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Codes, Ciphers, and Cryptography-RSA Encryption
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
MAT 1000 Mathematics in Today's World Winter 2015.
CS110: Computers and the Internet Encryption and Certificates.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Systems of Equations as Matrices and Hill Cipher.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Midterm Review Cryptography & Network Security
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Darci Miyashiro Math 480 April 29, 2013
Modern Cryptographic Topics
CSC 386 – Computer Security Scott Heggen. Agenda Exploring that locked box thing from Friday?
Encryption.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
Encryption CS110: Computer Science and the Internet.
Encryption on the Internet Jeff Cohen. Keeping Information Secret What information do we want to be secret? –Credit card number –Social security number.
Breaking RSA Encryption Nick Manners. History of Cryptography  Used to be strictly in the domain of governments… state secrets.  Particularly important.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Cryptography CS Lecture 19 Prof. Amit Sahai.
Homework #2 J. H. Wang Oct. 31, 2012.
Part 1  Cryptography 1 Integrity Part 1  Cryptography 2 Data Integrity  Integrity  detect unauthorized writing (i.e., modification of data)  Example:
Security. Cryptography (1) Intruders and eavesdroppers in communication.
INCS 741: Cryptography Overview and Basic Concepts.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Key Wrap Algorithm.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
CSC 386 – Computer Security Scott Heggen. Agenda Cryptography.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Recap unit 2 Review cipher systems, RSA Digital signatures
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Presentation transcript:

East High School Math Week Jeff Kinne UW Computer Science

Math and Computer Science My job – “research”, i.e. think about cool Math and CS stuff My job – “research”, i.e. think about cool Math and CS stuff Today – one example of “cool stuff” Today – one example of “cool stuff” –Cryptography – sending secret messages –History and basic ideas involved –Where are the numbers? –RSA

Sending a Message AliceBob “What a bad Teacher!”“Yep”

Sending a Message - Problems Teacher can read the note Teacher can read the note Teacher can stop note from being sent Teacher can stop note from being sent Other Problems? Other Problems?

Sending Messages Assume: can send notes, but Teacher can read. Assume: can send notes, but Teacher can read. Goal of cryptography: prevent Teacher learning the secret! Goal of cryptography: prevent Teacher learning the secret!

What can we do? AliceBob “What a bad Teacher!”“Yep”

Secret coded language AliceBob “The Mouse defies the Hawk!” “Roger”

Foreign Language AliceBob “Qué mal profesor!”“Sí”

Pig Latin AliceBob “Atwhay away adbay eachertay!”“Epyay”

Better – Shift Cipher Take each letter and shift by 3 (aka Caesar Cipher) Take each letter and shift by 3 (aka Caesar Cipher) Alice: instead of “What a bad teacher”, Alice: instead of “What a bad teacher”, Write “Zkdw D Edg Whdfkhu”. Bob: receive “Zkdw D Edg Whdfkhu”, and undo the shift. Bob: receive “Zkdw D Edg Whdfkhu”, and undo the shift. Secret key: amount to shift by Secret key: amount to shift by

Shift Cipher What can teacher do to understand message? What can teacher do to understand message? Message: “Aerx xs womt gpeww”

Encryption schemes

How much is enough?

Defining “security”

Crypto uses

Security

Cryptosystem