Related Ideas: DHM Key Mechanics

Similar documents
MA 111, Topic 2: Cryptography

Drill Time: Remainders from Long Division

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography

The number theory behind cryptography

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator.

Diffie-Hellman key-exchange protocol

Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

L29&30 - RSA Cryptography

Cryptography Made Easy. Stuart Reges Principal Lecturer University of Washington

Math 319 Problem Set #7 Solution 18 April 2002

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

Public Key Cryptography

Assignment 2. Due: Monday Oct. 15, :59pm

Linear Congruences. The solutions to a linear congruence ax b (mod m) are all integers x that satisfy the congruence.

Cryptography, Number Theory, and RSA

1 Introduction to Cryptology

Number Theory and Security in the Digital Age

Cryptography. 2. decoding is extremely difficult (for protection against eavesdroppers);

MA/CSSE 473 Day 9. The algorithm (modified) N 1

EE 418: Network Security and Cryptography

Application: Public Key Cryptography. Public Key Cryptography

Number Theory and Public Key Cryptography Kathryn Sommers

Data security (Cryptography) exercise book

Xor. Isomorphisms. CS70: Lecture 9. Outline. Is public key crypto possible? Cryptography... Public key crypography.

CHAPTER 2. Modular Arithmetic

Algorithmic Number Theory and Cryptography (CS 303)

CS70: Lecture 8. Outline.

Introduction to Cryptography CS 355

DUBLIN CITY UNIVERSITY

Public Key Encryption

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1

Final exam. Question Points Score. Total: 150

Public-key Cryptography: Theory and Practice

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

Security Enhancement and Speed Monitoring of RSA Algorithm

Introduction to Cryptography

Fermat s little theorem. RSA.

Synthesis and Analysis of 32-Bit RSA Algorithm Using VHDL

The Chinese Remainder Theorem

MAT 302: ALGEBRAIC CRYPTOGRAPHY. Department of Mathematical and Computational Sciences University of Toronto, Mississauga.

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

Solution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result.

Knights, Spies, Games and Social Networks

Distributed Settlers of Catan

Secure Distributed Computation on Private Inputs

Sheet 1: Introduction to prime numbers.

אני יודע מה עשית בפענוח האחרון: התקפות ערוצי צד על מחשבים אישיים

#27: Number Theory, Part II: Modular Arithmetic and Cryptography May 1, 2009

Classical Cryptography

Cryptography s Application in Numbers Station

TMA4155 Cryptography, Intro

MAT199: Math Alive Cryptography Part 2

Secure Function Evaluation

Math 1111 Math Exam Study Guide

Cryptography Lecture 1: Remainders and Modular Arithmetic Spring 2014 Morgan Schreffler Office: POT 902

Block Ciphers Security of block ciphers. Symmetric Ciphers

CPSC 467: Cryptography and Computer Security

Successful Implementation of the Hill and Magic Square Ciphers: A New Direction

Keeping secrets secret

Cryptanalysis on short messages encrypted with M-138 cipher machine

The $1,000,000 MathPickle Problems

Pseudorandom Number Generation and Stream Ciphers

Information Security Theory vs. Reality

Random Bit Generation and Stream Ciphers

Merkle s Puzzles. c Eli Biham - May 3, Merkle s Puzzles (8)

The Chinese Remainder Theorem

EFFICIENT ASIC ARCHITECTURE OF RSA CRYPTOSYSTEM

Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol

Math 1111 Math Exam Study Guide

ElGamal Public-Key Encryption and Signature

Colored Image Ciphering with Key Image

Solutions for the Practice Final

DUBLIN CITY UNIVERSITY

DTTF/NB479: Dszquphsbqiz Day 30

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2

Grade 7 & 8 Math Circles October 12, 2011 Modular Arithmetic

PART2. Theinsecurityofamonoalphabeticcodeisduetothefactthateachtimeagivenletteroccursintheoriginalmessage,itisencodedusingthesameletterintheencrypted

Table 1: Vignere cipher with key MATH.

Classical Cryptography

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR

Asynchronous vs. Synchronous Design of RSA

Concealing Data for Secure Transmission and Storage

Midterm practice super-problems

Free Downloads Introduction To Cryptography With Coding Theory

CARRY SAVE COMMON MULTIPLICAND MONTGOMERY FOR RSA CRYPTOSYSTEM

Historical cryptography 2. CSCI 470: Web Science Keith Vertanen

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

What are Career Opportunities if You Are Good in Math? Rafal Kulik Department of Mathematics and Statistics

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Research Paper on Detection of Multiple Selfish Attack Nodes Using RSA in Cognitive Radio

DIY Pencil-and-Paper Encryption

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

Introduction. and Z r1 Z rn. This lecture aims to provide techniques. CRT during the decription process in RSA is explained.

Stream Ciphers And Pseudorandomness Revisited. Table of contents

Codes and Nomenclators

Network Security: Secret Key Cryptography

Transcription:

Related Ideas: DHM Key Mechanics Example (DHM Key Mechanics) Two parties, Alice and Bob, calculate a key that a third person Carl will never know, even if Carl intercepts all communication between Alice and Bob. First o, Alice & Bob agree on numbers n and M (not secret). What Alice does: 1 Choose a secret value a. 2 Compute = M a (mod n). 3 Sends to Bob. 4 Receives from Bob. 5 Key is K = a (mod n). What Bob does: 1 Choose a secret value b. 2 Compute = M b (mod n). 3 Sends to Alice. 4 Receives from Alice. 5 Key is K = b (mod n).

DHM Practice 3, Part 1 Example (DHM Practice 3) Bob and Alice are trying to send a key over unsecured communication lines. They agree to use M = 10 and n = 41. Compute M 2 (mod n) = 10 2 (mod 41). Compute M 5 (mod n) = 10 5 (mod 41). Can you use your answers above to easily calculate = M 17 (mod 41)?

DHM Practice 3, Part 2 Example (DHM Practice 3) Bob and Alice are trying to send a key over unsecured communication lines. They agree to use M =6andn = 23. Alice receives = 18(mod 41) from Bob. Her secret value is a = 13. Calculate 4 (mod 41) = 18 4 (mod 41). Use your answer above to quickly calculate 12 (mod 41) = (18 4 (mod 41)) 3. What is the key for this exchange?

Master Spy 1 Example (Master Spy 1) You ve been promoted to the highest rank in the Spy Agency! It s now time to learn about a modern and sophisticated code. See if you can handle the following questions: How long does it take you to factor 2173 as a product of two primes 2173 = p q? How long does it take you to multiply the numbers 41 and 53? If n is a big number, is it easy to factor? If p and q are big numbers, is it easy to multiply them?

Encryption: RSA Cipher Definition (Encryption: RSA Cipher) The RSA Cipher is a public key cipher publicly discovered in the 1970s. The RSA cipher uses a form of multiplication for encryption and is secure because factoring large numbers is (currently) very di cult to do. RSA stands for Rivest, Shamir, and Adleman, the people responsible for first publicizing the RSA cipher. The British and US governments may have known about RSA prior to the 1970s, but did not announce their discovery. Even though this is the basis for most modern cryptography, there is current speculation that the US government (specifically the NSA) has the ability to break this code.

Related Idea: RSA Encryption Step 1 Example (RSA Encryption: Step 1) Here is how Alice and Bob can do to share a secret from Carl: What Alice Does 1. Alice chooses two (large) prime numbers p and q, which she keeps secret. 2. She then multiplies to find n = p q. This can be done quickly because multiplication is easy. 3. Alice also calculates a value m =(p 1)(q 1). 4. She selects a value e(mod m) thatisaunit. So any choice of e with gcd(e, m) =1willwork. Thevaluee is called the encryption exponent.

Related Idea: RSA Encryption Step 2 Example (RSA Encryption: Step 2) 5. Next, Alice tells Bob (and anyone else) the values for n and e. The fact that Alice can publicly state n and e is what makes RSA a public key cipher. What Bob Does To Send Alice a Message 6. Bob converts letters (or blocks of letters) into numbers. We can do this is the standard way, but in real-life this gets done by a computer. 7. For each letter,he uses the rule e (mod n) = to find the ciphertext. He sends this ciphertext to Alice.

Master Spy 2 Example (Master Spy 2) You ve been promoted to the highest rank in the Spy Agency! It s now time to learn about a modern and sophisticated code. See if you can handle the following questions: If p = 71 and q = 59, find n = p q. If p = 71 and q = 59, find m =(p 1) (q 1). If p = 101 and q = 103, find n = p q. If p = 101 and q = 103, find m =(p 1) (q 1).

Master Spy 3 Example (Master Spy 3) You ve been promoted to the highest rank in the Spy Agency! It s now time to learn about a modern and sophisticated code. See if you can handle the following questions: If p = 41 and q = 53, find n and m. If p = 101 and q = 107, find n and m. If p = 521 and q = 641, find n and m.

Master Spy 4 Example (Master Spy 4) You ve been promoted to the highest rank in the Spy Agency! It s now time to learn about a modern and sophisticated code. See if you can handle the following questions: If p = 17 and q = 19, find n and m. If p =7andm = 132, find q and n. If p =3andq = 5, find all units (mod m). If p =5andq = 11, what is 27 3(mod m)?

Master Spy 5 Example (Master Spy 5) A fellow agent wants you to send her a message. She broadcasts the numbers n = 33 and e = 3, expecting that these will be intercepted. Use this RSA cipher to encrypt the letter H as a number. Use this RSA cipher to encrypt the letter I as a number. Use this RSA cipher to encrypt the letter J as a number. The letters H, I and J are consecutive. Does RSA encrypt these letters as consecutive numbers?

Master Spy 6 Example (Master Spy 6) You want a fellow agent to send you a secret message. You decide on the numbers n = 77 and e = 7 and publish these to an open webpage. What number will the letter B be encrypted as? What number will the letter C be encrypted as? Encrypt the number 0203? Is this connected to the answers above in any way?