Download presentation

Presentation is loading. Please wait.

Published byJustin Buchanan Modified over 4 years ago

1
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod Function

2
Section 4.5The Mighty Mod Function1 We define the modulo n function as follows: If x = qn + r, 0 r n, then x mod n = r. In other words, x mod n is the nonnegative remainder (also called the residue of x modulo n) when x is divided by the positive integer n.

3
Section 4.5The Mighty Mod Function2 Hashing A hash function h: S T, where the domain S is a set of text strings or integer values and the codomain T is the set of integers {0, 1, …, t 1}, where t is some relatively small positive integer. If the domain S consists of text strings, we can imagine them encoded in some way into integer values. For example, an algorithm as simple as converting each individual letter of a text string into its position in the alphabet and adding up the resulting list. The function h therefore maps a potentially large set of values S into a relatively small window of integer values T. Consequently h isnt likely to be a one-to- one function.

4
Section 4.5The Mighty Mod Function3 Hashing A hash function is often used as part of a search algorithm. In a search using a hash function, n elements are stored in an array (a one-dimensional table) called a hash table, where the array is indexed from 0 through t 1; the table is of size t. The element x is passed as the argument to the hash function, and the resulting h(x) value gives the array index at which the element is then stored. Later, when a search is carried out, the target value is run through the same hash function, giving an index location in the hash table, which is where to look for the matching stored element.

5
Section 4.5The Mighty Mod Function4 Hashing However, because the hash function is not one-to-one, things are not quite that simple. Different values may hash to the same array index, producing a collision. Here are several collision resolution algorithms available. One is called linear probing. Keep going in the array and store element x in the next available empty slot. Another method, called chaining, builds a linked list for each array index.

6
Section 4.5The Mighty Mod Function5 Hashing The following are the desirable properties of a hash function: 1. Given an argument value x, h(x) can be computed quickly. 2. The number of collisions will be reduced because h(x) does a good job of distributing values throughout the hash table. Use of a modulo function as the hash function accomplishes goal 1. Goal 2 is harder to achieve, but distribution seems to work better on the average if the table size (the modulo value) is a prime number.

7
Section 4.5The Mighty Mod Function6 Hashing The average number of comparisons required to search for an element using hashing depends on the ratio of n to the total table size t. If this ratio is low, then (using linear probing) there are lots of empty slots, so you wont have to look very far to find a place to insert a new element into the table. If this ratio is low and chaining is used, the average length of any linked list you may have to (sequentially) search for a target element should be short. This ratio n/t is called the load factor of the hash table.

8
Section 4.5The Mighty Mod Function7 Computer Security The mod function plays a part in many aspects of security. Military information, financial information, and company proprietary information that must be transmitted securely uses some encoding/decoding scheme. The original information (called the plaintext) is encrypted using an encryption key, resulting in coded text called the ciphertext. The ciphertext is transmitted, and when it is received, it can be decoded using the corresponding decryption key. Encryption and decryption are inverse functions in the sense that: decryption(encryption(plaintext)) = plaintext

9
Section 4.5The Mighty Mod Function8 Computer Security Cryptography is the study of various encryption/decryption schemes. Military use of cryptographic techniques can be traced back to Julius Caesar, who sent messages to his generals in the field using a scheme now known as the Caesar cipher. Let us assume that plaintext messages use only the 26 capital letters of the alphabet, that spaces between words are suppressed, and that each letter is first mapped to its corresponding position in the alphabet.

10
Section 4.5The Mighty Mod Function9 Computer Security Well denote this mapping as the bijection g: {A, …, Z} {0, …, 25}. Then a positive integer key value k is chosen that shifts each number k positions to the right with a wrap-around back to the beginning if needed (this is the mod function). Finally, the function g 1 is applied to translate the resulting number back into a letter. The encoding function is given by: f(p) = g 1 ([g(p) + k] mod 26) The decoding function is: f 1 (c) = g 1 ([g(c) k] mod 26)

11
Section 4.5The Mighty Mod Function10 Computer Security The Caesar cipher is a simple substitution cipher, meaning that each plaintext character is coded consistently into the same single ciphertext character. Encryption techniques where a single plaintext character contributes to several ciphertext characters introduce diffusion. The advantage to diffusion is that it hides the frequency statistics of individual letters, making analysis of an intercepted ciphertext message much more difficult. DES (Data Encryption Standard) is an internationally standard encryption algorithm developed in 1976. DES was developed to safeguard the security of digital information, so we may consider the plaintext to be a string of bits.

12
Section 4.5The Mighty Mod Function11 Computer Security DES is a block cipher. A block of 64 plaintext bits is encoded as a unit using a 56-bit key. This results in a block of 64 ciphertext bits. Changing one bit in the plaintext or one bit in the key changes about half the resulting 64 ciphertext bits, so DES exhibits high diffusion. Because the DES algorithm is well known, the only secret part is the 56-bit key that is used.

13
Section 4.5The Mighty Mod Function12 Computer Security AES (Advanced Encryption Standard) is also a block encryption scheme, but it uses a key length of 128 bits or more. AES also uses a form of the Euclidean algorithm. Disadvantage of both DES and AES is that they are symmetric encryption (also called private key encryption) schemes. The same key is used to both encode and decode the message. In a private key encryption scheme, both the sender and receiver must know the key. The problem of securely transmitting a message turns into the problem of securely transmitting the key to be used for the encryption and decryption.

14
Section 4.5The Mighty Mod Function13 Computer Security Asymmetric encryption (public key encryption) schemes use different keys for encoding and decoding. The decryption key cannot be derived in any practical way from the encryption key, so the encryption key can be made public. Anyone can send a message to the intended receiver in encrypted form using the receivers public key, but only the intended receiver, who has the decryption key, can decode it. The best-known asymmetric encryption scheme is the RSA public key encryption algorithm.

15
Section 4.5The Mighty Mod Function14 Hashing for Password Encryption A cryptographic hash function is a form of encryption that does not require storing an encryption key. A hash function is often used to encrypt passwords. The ideal cryptographic hash function h has two characteristics: Given x, it is easy to compute the hashed value h(x). Given a hashed value z, it is difficult to find a value x for which h(x) = z. Because of these characteristics, a hash function is also called a one-way encryption.

16
Section 4.5The Mighty Mod Function15 Generating and Decomposing Integers The modulo function provides an easy way to generate integer values within some range 0 through n 1 for some positive integer n. Take any positive integer m and compute m mod n. If you have a function to generate a random (or pseudorandom) integer m, this process generates a random (or pseudorandom) integer within the desired range. You may also want to cycle through the integers in this range in a controlled fashion. Addition modulo n is defined on the set of integers {0, 1, 2, …, n - 1} by: x + n y = (x + y) mod n

Similar presentations

OK

1 Chapter 9 Maps and Dictionaries. 2 A basic problem We have to store some records and perform the following: add new record add new record delete record.

1 Chapter 9 Maps and Dictionaries. 2 A basic problem We have to store some records and perform the following: add new record add new record delete record.

© 2018 SlidePlayer.com Inc.

All rights reserved.

To make this website work, we log user data and share it with processors. To use this website, you must agree to our Privacy Policy, including cookie policy.

Ads by Google

Ppt on solar energy conservation Free pdf converter to ppt online Ppt on history of indian mathematics Ppt on waves tides and ocean currents map Ppt on responsive web design Ppt on op amp circuits examples Ppt on bluetooth architecture ppt Ppt on business entrepreneurship and management Ppt on urbanism as a way of life as opposed to rural ways of life Ppt on swami vivekananda books