Exercises 2013-02-28 Information Security Course Eric Laermans – Tom Dhaene.

Slides:



Advertisements
Similar presentations
Complex exponentials as input to LTI systems h(t) h[n] H(e j ) e j n e j t e j n H(j ) e j t Cos as input… use Euler formula.
Advertisements

Complex networked systems ICT LEIT H2020 InfoDay Mario Di Francesco, PhD Assistant professor – Aalto University Department of Computer Science and Engineering.
Ani Choudhury Why am I taking Dig-It?. Reasons why I am taking the Dig-It class: I’m taking the Dig-It class so that I can be efficient with computers.
RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.
Test practice Multiplication. Multiplication 9x2.
PA214 Waves and Fields Fourier Methods Blue book New chapter 12 Fourier sine series Application to the wave equation Fourier cosine series Fourier full.
Flowcharts Amir Haider Lecturer NFC IEFR. Introduction The flowchart is a means of visually presenting the flow of data through an information processing.
Cryptography and Network Security
Exercise Exercise3.1 8 Exercise3.1 9 Exercise
Introduction to Computers. Michael R. Izzo
Exercise Exercise Exercise Exercise
Exercise Exercise Exercise Exercise
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Exercise Exercise6.1 7 Exercise6.1 8 Exercise6.1 9.
Area-Time-Efficient Montgomery Modular Multiplication
Chapter 1 Computer Networks and the Internet. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 1-2.
Chapter 3 : Distributed Data Processing
M. Interleaving Montgomery High-Radix Comparison Improvement Adders CLA CSK Comparison Conclusion Improving Cryptographic Architectures by Adopting Efficient.
(a) (b) (c) (d). What is (1,2,3)  (3,4,2)? (a) (1, 2, 3, 4) (b) (1,2)  (3,4) (c) (1,3,4,2) (d) (3,1)  (4,2)
Dan Boneh Intro. Number Theory Modular e’th roots Online Cryptography Course Dan Boneh.
Digital Signal Processor Bryant Carroll Matthew Carroll Bobby Kluttz Ian Morris.
Consecutive Numbers Algebra I.
Number Theory – Introduction (1/22) Very general question: What is mathematics? Possible answer: The search for structure and patterns in the universe.
Montgomery multiplication Algorithm Mohammad Farmani Under supervision of : Dr. S. Bayat-sarmadi 2 nd. Semister, Sharif University of Technology.
Lightning Talk Fred Rodriguez Aakash Juneja CPSC 473 March 16, 2012.
Exercises Information Security Course Eric Laermans – Tom Dhaene.
Selecting Class Polynomials for the Generation of Elliptic Curves Elisavet Konstantinou joint work with Aristides Kontogeorgis Department of Information.
computer
Exercises Information Security Course Eric Laermans – Tom Dhaene.
The George Washington University School of Engineering and Applied Science Department of Electrical and Computer Engineering ECE122 – Lab 6 Multiplexers,
Exercises Information Security Course Eric Laermans – Tom Dhaene.
By : Fiona Minear. What is a networks ? A network is a group of two or more computer systems linked together.
1 Chapter 1 Introduction to Accounting Information Systems Chapter 6 Electronic Business (E-Business)
1 Computer Networking Dr. Mohammad Alhihi Communication and Electronic Engineering Department Philadelphia University Faculty of Engineering.
CSC 212 More Recursion, Stacks, & Queues. Linear Recursion Test for the bases cases  At least one base case needs to be defined If not at a base case,
Internet Literacy for Educators Course : ED 526 Sarah Jean Strunk.
Secure & Asymmetric Approach for Designing FUTURE INTERNET Presented by Md. Obaidur Rahman Networking Lab, Department of Computer Engineering, Kyung Hee.
9/22/15UB Fall 2015 CSE565: S. Upadhyaya Lec 7.1 CSE565: Computer Security Lecture 7 Number Theory Concepts Shambhu Upadhyaya Computer Science & Eng. University.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Distributed Spanning Tree Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Exercises Information Security Course Eric Laermans – Tom Dhaene.
Fermat’s Little Theorem The RSA Cryptosystem will require exponentiation to decrypt messages. Exponentiation Notation Example 1: Compute Exponentials Example.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
SN department.  You will find a job  You will find a good job  Since you will learn subjects  Ranging from programming to cutting-edge development.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Computer networks!!!. What is a computer network? Its a type of connection of communication or anything between people such as internet.
Strategy to solve complex problems Use number 1, 2, 3, 4, 5, 6, 7, 8, 9 only once so that sum of three numbers are Identical as shown below: __ + __ +
Data and Computer Communications Chapter 21 – Network SecurityChapter 21 – Network Security.
Mathematical Background for Cryptography: Modular arithmetic and gcd
COMP532 IT INFRASTRUCTURE
How Can You Make Money Fast Online?
CSE565: Computer Security Lecture 7 Number Theory Concepts
Exponential and Logarithmic Function
Consecutive Numbers Algebra I.
Possible Impact of quantum computing
BACK SOLUTION:
S Wireless Personal, Local, Metropolitan and Wire Area Networks - Exercises Mika Husso /
EFFICIENT ADDERS TO SPEEDUP MODULAR MULTIPLICATION FOR CRYPTOGRAPHY
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Networks and the Internet
Signals & Systems (CNET - 221) Chapter-4 Fourier Series
Section 10.3 Modular Arithmetic
Internet Connection Sharing

Signals & Systems (CNET - 221) Chapter-4
Oded Goldreich Weizmann Institute of Science
Section 9.3 Modular Arithmetic.
Presentation transcript:

Exercises Information Security Course Eric Laermans – Tom Dhaene

Information Security Department of Information Technology – Internet Based Communication Networks and Services (IBCN) p. 2 Addition (large numbers) Addition given: wanted: sum classical solution (full adder):  s 0 = a 0  b 0 c 1 = a 0  b 0  s i = a i  b i  c i c i+1 = (a i  b i )  (a i  c i )  (b i  c i )  s k = c k  time complexity?  parallellisation?

Information Security Department of Information Technology – Internet Based Communication Networks and Services (IBCN) p. 3 Addition (large numbers) Addition given: wanted: sum A + B + D better solution?  carry-save-adder:  s i = a i  b i  d i c i+1 = (a i  b i )  (a i  d i )  (b i  d i )  S + C = A + B + D  time complexity?  parallellisation?  drawbacks?

Information Security Department of Information Technology – Internet Based Communication Networks and Services (IBCN) p. 4 Addition modulo N Addition mod N given:  A < N and B < N wanted: sum S = A + B mod N required adaptations to traditional solution? with three numbers ( A, B and D )  adaptation using carry-save-adders possible?  issues?

Information Security Department of Information Technology – Internet Based Communication Networks and Services (IBCN) p. 5 Multiplication given: A and B wanted: product P classical solution? improved solutions?  Karatsuba-Comba –(2 m r + s) (2 m t + u) = 2 2m rt + 2 m ((r + s)(t + u) – rt – su) + su –time complexity?

Information Security Department of Information Technology – Internet Based Communication Networks and Services (IBCN) p. 6 Multiplication modulo N Multiplication mod N given: A < N and B < N wanted: product P = A B mod N required adaptation to traditional solution? possible issues  with improved solution?  with Karatsuba-Comba?

Information Security Department of Information Technology – Internet Based Communication Networks and Services (IBCN) p. 7 Multiplication modulo N Multiplication mod N ( N odd) given: A < N and B < N wanted: product P = 2 –k A B mod N  Montgomery multiplication solution u := 0 ; for i := 0 to (k-1) do u := u + a i B ; if odd(u) then u := u+ N fi; u := u/2 ; od advantages? drawbacks? how to compute A B ? carry-save-adders possible?

Information Security Department of Information Technology – Internet Based Communication Networks and Services (IBCN) p. 8 Exponentiation modulo N Exponentiation mod N given: A < N and e <  (N) wanted: A e mod N efficient solution?