C1 - Unrestricted Version 1.0 Group R&D 1CMS / EPSRC – Steve Babbage25 th March 2009 Some maths from the telecommunications industry Presented by Dr Steve.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Conventional Encryption: Algorithms
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Block Ciphers and the Data Encryption Standard
Information Security Teaching, training, research.
Principles of Information Security, 2nd edition1 Cryptography.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Mechanising Cryptography Professor Richard Walton CB.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
CS470, A.SelcukIntroduction1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security Chapter
ASYMMETRIC CIPHERS.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Chapter 12 Cryptography (slides edited by Erin Chambers)
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Midterm Review Cryptography & Network Security
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Classical Encryption techniques
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Elliptic Curve Cryptography
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Intro to Cryptography Lesson Introduction
Cryptology aka Cryptography Tim Cahill Ryan Church.
STRATEGIC ENCRYPTION 2. TECHNOLOGY FEATURES Future proof – available today Encryption with ANY key length Authentication with ANY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
Network Security Celia Li Computer Science and Engineering York University.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Computer Security (CS4800)
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
6b. Practical Constructions of Symmetric-Key Primitives.
Cryptography and Network Security
STRATEGIC ENCRYPTION
Symmetric Key Block Ciphers
Security through Encryption
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
Computer Security Chapter Two
Information and Computer Security CPIS 312 Lab 4 & 5
Presentation transcript:

C1 - Unrestricted Version 1.0 Group R&D 1CMS / EPSRC – Steve Babbage25 th March 2009 Some maths from the telecommunications industry Presented by Dr Steve Babbage 25 March 2009

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage225th March 2009 Purpose of this presentation To illustrate some industrial applications that require and inspire mathematical research Optimisation Data security And underpinning both of those: Complexity

C1 - Unrestricted Version 1.0 Group R&D 3CMS / EPSRC – Steve Babbage25 th March 2009 Optimisation

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage425th March 2009 Frequency planning

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage525th March 2009 Frequency planning

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage625th March 2009 Frequency planning

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage725th March 2009 Frequency planning

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage825th March 2009 Site selection

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage925th March 2009 Radial network planning

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage1025th March 2009 Mesh network planning

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage1125th March 2009 Traffic scheduling / queueing

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage1225th March 2009 Traffic routing

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage1325th March 2009 Multi-layered networks

C1 - Unrestricted Version 1.0 Group R&D 14CMS / EPSRC – Steve Babbage25 th March 2009 Cryptography and data security

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage1525th March 2009 Types of encryption algorithm Steve Babbage

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage1625th March 2009 Block ciphers and stream ciphers Key (128 bits) Plaintext (128 bits) Ciphertext (128 bits) Key Plaintext Key (128 bits) Plaintext (any length) Ciphertext = Key (128 bits) = Plaintext

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage1725th March 2009 Digital signature Steve Babbage This is an extremely long document which could go on for pages and pages and pages and pages and pages and pages and pages and pages and pages and pages and pages and pages and pages and pages and pages and pages and pages and pages and pages and pages 5A90CB38 20FB2744 E11C4957 2C0D3919 Hash function

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage1825th March 2009 Theory – and lack of theory Block ciphers Linear cryptanalysis Differential cryptanalysis Hash functions ??? Lots of insight still needed Symmetric ciphers Algebraic cryptanalysis Gröbner bases Public key algorithms Factoring Discrete logarithm Elliptic curve Others Quantum computers What can they do? What can't they do?

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage1925th March 2009 Complexity

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage2025th March 2009 Closing thoughts

C1 - Unrestricted Version 1.0 Group R&D CMS / EPSRC – Steve Babbage2125th March 2009 Thanks to: Terry Lyons – Oxford / WIMCS Bart Preneel – Leuven Robert Leese – Oxford / Smith Institute Peter Grindrod – Reading John McWhirter – Cardiff Thank you Further input taken from: Zuse Institute Berlin