Cellular Encryption CREU Project Team: Alburn Brown Orkun Kaya Isaac Rieksts Eric Thorpe.

Slides:



Advertisements
Similar presentations
Asymmetric Digital Signatures And Key Exchange Prof. Ravi Sandhu.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Public Key Encryption Algorithm
By Claudia Fiorini, Enrico Martinelli, Fabio Massacci
Session 4 Asymmetric ciphers.
Attacks on Digital Signature Algorithm: RSA
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Public Key Cryptography
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
Public Encryption: RSA
RSA Exponentiation cipher
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography & Number Theory
Chapter 3 Encryption Algorithms & Systems (Part C)
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Governor’s School for the Sciences Mathematics Day 13.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Implementing RSA Encryption in Java
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Public Key (RSA) Day 27. Objective Students will be able to… …understand how RSA is used for encryption and decryption. …understand some of the challenges.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
Tractability & Cryptography Strange Symbiosis Points of Reference: Oskars Rieksts.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
RSA The algorithm was publicly described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Partly used for PGP (Pretty Good Privacy) to encrypt.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
CAP Cryptographic Analysis Program General Help Presentation Press Enter or click on your mouse button to continue.
Factoradics and Semi-dynamic Encryption Oskars Rieksts with Chris Mraovich & Jeremy Vaughan Kutztown University.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
DIGITAL SIGNATURE IMPLEMENTATION
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Public Key Encryption.
Rivest, Shamir and Adleman
Analysis of the RSA Encryption Algorithm
Where Complexity Finally Comes In Handy…
Where Complexity Finally Comes In Handy…
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
The RSA Public-Key Encryption Algorithm
Where Complexity Finally Comes In Handy…
Presentation transcript:

Cellular Encryption CREU Project Team: Alburn Brown Orkun Kaya Isaac Rieksts Eric Thorpe

2004Kutztown University2 Overview Construct software simulation Construct software simulation Compare 3 cellular encryption algorithms Compare 3 cellular encryption algorithms Choose the best one Choose the best one Implement it in hardware Implement it in hardware

2004Kutztown University3 Background :: Cellular Computation Cellular Automata Cellular Automata Cellular Automata with Shadow Cells Cellular Automata with Shadow Cells Hybrid Cellular Automata Hybrid Cellular Automata Integer Functions Integer Functions Cellular Encryption Cellular Encryption

2004Kutztown University4 Cellular Automata John von Neumann John von Neumann Uniform cells Uniform cells “Peer Pressure Automata” “Peer Pressure Automata” Uniform transition function Uniform transition function Turing Machine computing power Turing Machine computing power

2004Kutztown University5 Cellular Automata with Shadow Cells Need to compute integer functions Need to compute integer functions Limitation of classic CAs Limitation of classic CAs Shadow cells enable integer computation Shadow cells enable integer computation Wasted memory Wasted memory

2004Kutztown University6 Hybrid Cellular Automata Relaxing the uniform transition rule Relaxing the uniform transition rule Memory savings Memory savings All integer functions computable All integer functions computable

2004Kutztown University7 Integer Functions Block cipher = integer function Block cipher = integer function Example: RSA Example: RSA How many integer functions? How many integer functions? How many identity avoiding functions? How many identity avoiding functions?

2004Kutztown University8 Block Cipher = Integer Function An integer can represent any text string An integer can represent any text string Let p represent a given plaintext Let p represent a given plaintext Let c represent the corresponding ciphertext Let c represent the corresponding ciphertext Then f(p) = c represents the encryption Then f(p) = c represents the encryption And f -1 (c) = p represents the decryption And f -1 (c) = p represents the decryption Both f and f -1 are integer functions Both f and f -1 are integer functions

2004Kutztown University9 RSA is an integer function  Encryption: f(p) = p e mod n  e is encryption key  n = p*q  p & q, two very large primes  Decryption: f -1 (c) = c d mod n  d is decryption key  e*d mod  (n) = 1   (n) is Euler totient function   (n) = (p-1)*(q-1)  Clearly an integer function

2004Kutztown University10 How Many Integer Functions? Consider all 1-1 and onto functions Consider all 1-1 and onto functions Let range be 0 to N-1. Let range be 0 to N-1. Each function is one arrangement of integers 0 to N-1, i.e., a permutation. Each function is one arrangement of integers 0 to N-1, i.e., a permutation. Number of functions = number of permutations Number of functions = number of permutations How many? N! How many? N!

2004Kutztown University11 How Many Are Identity Avoiding? Want to avoid: Want to avoid:  f(p) = p, for all p within the range We call such functions “identity avoiding” We call such functions “identity avoiding” How many such functions? How many such functions?  1-1, onto, identity avoiding functions  Over the integers: 0 to N-1 N! / e N! / e

2004Kutztown University12 Identity Avoiding Integer Functions Over the integers 0 to M-1 Over the integers 0 to M-1 There are :: N! / e There are :: N! / e e is a constant e is a constant Order of magnitude :: O (N!) Order of magnitude :: O (N!)

2004Kutztown University13 Cellular Encryption Integers 0 to 2 k – 1 represent: Integers 0 to 2 k – 1 represent:  Plain text  Cipher text Choose at random from 2 k !/e possibilities Choose at random from 2 k !/e possibilities k cells of hybrid CA k cells of hybrid CA  Will encrypt  By computing chosen integer function Each cell computes one Boolean function Each cell computes one Boolean function

2004Kutztown University14 Encryption Cell Details Represent integer in binary Represent integer in binary 3 bit example 3 bit example  Base 10:: f(3) = 5  Binary:: f(011) = 101 Work is spread among 3 cells Work is spread among 3 cells  Cell 0 :: f 0 (011) = 1  Cell 1 :: f 1 (011) = 0  Cell 2 :: f 2 (011) = 1

2004Kutztown University15 Integer ► Boolean An integer function – base 10 & binary: An integer function – base 10 & binary:  f(0) = 3f(000) = 011  f(1) = 6f(001) = 110  f(2) = 7f(010) = 111  f(3) = 5f(011) = 101  f(4) = 2f(100) = 010  f(5) = 1f(101) = 001  f(6) = 0f(110) = 000  f(7) = 4f(111) = 100

2004Kutztown University16 Integer ► Boolean Cell by cell Cell by cell f(000) = 011 ► f 0 (000) = 0 f 1 (000) = 1 f 2 (000) = 1f(000) = 011 ► f 0 (000) = 0 f 1 (000) = 1 f 2 (000) = 1 f(001) = 110 ► f 0 (001) = 1 f 1 (001) = 1 f 2 (001) = 0f(001) = 110 ► f 0 (001) = 1 f 1 (001) = 1 f 2 (001) = 0 f(010) = 111 ► f 0 (010) = 1 f 1 (010) = 1 f 2 (010) = 1f(010) = 111 ► f 0 (010) = 1 f 1 (010) = 1 f 2 (010) = 1 f(011) = 101 ► f 0 (011) = 1 f 1 (011) = 0 f 2 (011) = 1f(011) = 101 ► f 0 (011) = 1 f 1 (011) = 0 f 2 (011) = 1 f(100) = 010 ► f 0 (100) = 0 f 1 (100) = 1 f 2 (100) = 0f(100) = 010 ► f 0 (100) = 0 f 1 (100) = 1 f 2 (100) = 0 f(101) = 001 ► f 0 (101) = 0 f 1 (101) = 0 f 2 (101) = 1f(101) = 001 ► f 0 (101) = 0 f 1 (101) = 0 f 2 (101) = 1 f(110) = 000 ► f 0 (110) = 0 f 1 (110) = 0 f 2 (110) = 0f(110) = 000 ► f 0 (110) = 0 f 1 (110) = 0 f 2 (110) = 0 f(111) = 100 ► f 0 (111) = 1 f 1 (111) = 0 f 2 (111) = 0f(111) = 100 ► f 0 (111) = 1 f 1 (111) = 0 f 2 (111) = 0

2004Kutztown University17 Hardware Implementation Plain text is k bits long Plain text is k bits long There are k cells There are k cells Each cell gets k bits of input Each cell gets k bits of input Each cell computes its own Boolean function Each cell computes its own Boolean function Together cells compute k-bit integer function Together cells compute k-bit integer function

THE END