Tractability & Cryptography Strange Symbiosis Points of Reference: Oskars Rieksts.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Computer Science 101 Data Encryption And Computer Networks.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Public Key Encryption Algorithm
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Classical Cryptography
Public Key Cryptography
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Codes, Ciphers, and Cryptography-RSA Encryption
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Lecture 5 Overview Does DES Work? Differential Cryptanalysis Idea – Use two plaintext that barely differ – Study the difference in the corresponding.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
RSA Ramki Thurimella.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
RSA By: Abhishek Naik Viswanath Chennuru CPSC 624.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Network Security7-1 Chapter 8: Network Security Chapter goals: r understand principles of network security: m cryptography and its many uses beyond “confidentiality”
Midterm Review Cryptography & Network Security
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Darci Miyashiro Math 480 April 29, 2013
1 Public-Key Cryptography and Message Authentication.
Public Key (RSA) Day 27. Objective Students will be able to… …understand how RSA is used for encryption and decryption. …understand some of the challenges.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
Web Tools for Classical Cryptology Tristan Beeble.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Cellular Encryption CREU Project Team: Alburn Brown Orkun Kaya Isaac Rieksts Eric Thorpe.
Lecture 4 Overview. Data Encryption Standard Combination of substitution and transposition – Repeated for 16 cycles – Provides confusion and diffusion.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Chapter 8: Network Security
Public Key Cryptosystem
Taehyung Kim HPC Lab. POSTECH
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 8: Network Security
Rivest, Shamir and Adleman
Analysis of the RSA Encryption Algorithm
Cryptography: Basics (2)
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Chapter 8: Network Security
Chapter 8: Network Security
Presentation transcript:

Tractability & Cryptography Strange Symbiosis Points of Reference: Oskars Rieksts

2005Kutztown University2 Overview  Keyspace & exhaustive search  One way functions  Hidden clues  Construction/Search Ratio

2005Kutztown University3 Keyspace & Exhaustive Search  What is a Key?  What is Key Space?  What is Exhaustive Search  Cost of Exhaustive Search

2005Kutztown University4 What Is a Key?  Simple Key – Caesar Cipher  More Complex – Vigenere Cipher  Public/Private Key Pair – RSA  Integer function encryption

2005Kutztown University5 Simple Key – Caesar Cipher  Example: shift forward by 3  Plaintext: “I have a dream”  Cipher text: “LKDYHDGUHDP”  Symmetric decryption: shift back by 3  Decoded: “IHAVEADREAM”

2005Kutztown University6 Vigenere Cipher  Le Chiffre Indechiffrable  Multiple Shifts  Example: [5,17,9]  Plaintext: “I have a dream I have”  Cipher text: “NYJAVJIIFDRMREJ”

2005Kutztown University7 Public/Private Key Pair – RSA  Diffie, Hellman, Merkle  Rivest, Shamir, Adelman  Ellis, Cocks, Williamson

2005Kutztown University8 RSA Basics  Encryption: f(p) = p e mod n  e is encryption key  n = p*q  p & q, two very large primes  Decryption: f -1 (c) = c d mod n  d is decryption key  e*d mod  (n) = 1   (n) is Euler totient function   (n) = (p-1)*(q-1)

2005Kutztown University9 Integer Function Encryption  1-1 and onto integer function  Example: f(0) = 2 f(0) = 2 f(1) = 0 f(1) = 0 f(2) = 3 f(2) = 3 f(3) = 1 f(3) = 1  Encryption: f(x) = y  Decryption: f -1 (y) = x

2005Kutztown University10 What Is Key Space?  Caesar – 26 shifts  keyspace = 26  Vigenere – [26, 26,.., 26] shifts  keyspace = 26 k, for k different shifts for k different shifts  RSA –  p relp(p,q) where p,q are prime where p,q are prime and relp is number of pairs relatively and relp is number of pairs relatively prime to  (p*q) prime to  (p*q)

2005Kutztown University11 What Is Key Space?  Integer function over [0, 1,.., n-1]  Key space = n!  Note: Every block cipher incorporates one of the integer functions in its range.

2005Kutztown University12 What Is Exhaustive Search?  Try every key in the keyspace  Apply deciphering function  Check result to see if it could be a plain text  Works for Caesar cipher  Does not work for others

2005Kutztown University13 Cost of Exhaustive Search  Keyspace of Vigenere with 10 shifts = 1.4 x = 1.4 x  Seconds in one year = 60 x 60 x 24 x 365 = 3.15 x 10 7 = 3.15 x 10 7  If we could test one key per second it would take 4.44 x 10 6 years or 4,444 millenia!  INTRACTABLE!

2005Kutztown University14 More on Integer Functions  Block Cipher = Integer Function  RSA misses many integer functions  How many integer functions?  Identity avoiding functions  How many identity avoiding integer functions?

2005Kutztown University15 Block Cipher = Integer Function An integer can represent any text string An integer can represent any text string Let p represent a given plaintext Let p represent a given plaintext Let c represent the corresponding ciphertext Let c represent the corresponding ciphertext Then f(p) = c represents the encryption Then f(p) = c represents the encryption And f -1 (c) = p represents the decryption And f -1 (c) = p represents the decryption Both f and f -1 are integer functions Both f and f -1 are integer functions

2005Kutztown University16 RSA Misses Many Integer Functions Cycle Length Cycle Length –m = cycle length if f m (x) = x –Example: »f 1 (0) = 2 »f 2 (0) = 3 »f 3 (0) = 1 »f 4 (0) = 0 So m = 4 = n So m = 4 = n For RSA m << n For RSA m << n

2005Kutztown University17 How Many Integer Functions? Consider all 1-1 and onto functions Consider all 1-1 and onto functions Let range be 0 to N-1. Let range be 0 to N-1. Each function is one arrangement of integers 0 to N-1, i.e., a permutation. Each function is one arrangement of integers 0 to N-1, i.e., a permutation. Number of functions = number of permutations Number of functions = number of permutations How many? N! How many? N!

2005Kutztown University18 Identity Avoiding Integer Functions Want to avoid: Want to avoid:  f(p) = p, for all p within the range We call such functions “identity avoiding” We call such functions “identity avoiding” How many such functions? How many such functions?

2005Kutztown University19 How Many Identity Avoiding? How many such functions? How many such functions?  1-1, onto, identity avoiding functions  Over the integers: 0 to N-1 N! / e N! / e e is a constant e is a constant Order of magnitude :: O (N!) Order of magnitude :: O (N!)

More to Come