Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Announcements: Programming exam next Thursday on breaking codes from chapter 2 Programming exam next Thursday on breaking codes from chapter 2 Written.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
Public Key Cryptography
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Programming Lab
Cryptography Lecture 1: Introduction Piotr Faliszewski.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
Introduction to Information Security Chapter II : Classical Ciphers.
MAT 1000 Mathematics in Today's World Winter 2015.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Network Security7-1 Chapter 8: Network Security Chapter goals: r understand principles of network security: m cryptography and its many uses beyond “confidentiality”
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
NUMBER THEORY Chapter 5: Cryptology. Era of Electronic Electronic communication Electronic Banking.
Symmetric-Key Cryptography
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Section 2.3: Substitution Ciphers
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Encryption CS110: Computer Science and the Internet.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Chapter 2 Basic Encryption and Decryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Asad Gondal Ali Haider Mansoor
Taehyung Kim HPC Lab. POSTECH
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PART VII Security.
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University

The Course MATH 135: The Art of Secret Writing Cornell University, Spring 2005 Humanities students fulfilling a math/computer science requirement. No prerequisites Invitation to Cryptology by Thomas H. Barr

The Book Shift Ciphers, Affine Ciphers Substitution Ciphers Transposition Ciphers Vigenère Ciphers Hill Ciphers Chapter 1: History and Examples Chapter 2: Classical Ciphers

The Book Chapter 1: History and Examples Chapter 2: Classical Ciphers Chapter 3: Computer Cryptology Chapter 4: Public-Key Cryptography (RSA, Diffie-Hellman, zero-knowledge proofs) Chapter 5: Additional Topics

Why Spreadsheets? Goals: Emphasize numeracy and computer literacy. Similar to programming, but easier to work with and debug. Useful—spreadsheets are the primary mathematical software available on most PC’s.

Example: Shift Cipher Simple alphabetic shift: y = x + c (mod 26) MOD(A1, B1): computes the remainder when A1 is divided by B1 CODE(A1): returns the ASCII code for the character in cell A1 CHAR(A1): returns the character whose ASCII code is the value in cell A1 Useful Commands:

Example: Shift Cipher MOD(A1, B1): computes the remainder when A1 is divided by B1 CODE(A1): returns the ASCII code for the character in cell A1 CHAR(A1): returns the character whose ASCII code is the value in cell A1 Shift by 5: CHAR( MOD( CODE(A1) – CODE(“A”) + 5, 26) + CODE(“A”) )

Homework 1 Problem 1: The ciphertext: ZSZKV DPKYL DSRKP FLJZI was obtained using a shift cipher. Use a spreadsheet to try all possible keys and decipher the message.

Homework 1

Problem 2: Similar, but the students must decode an affine cipher, i.e. y = ax + b (mod 26)

Later Projects 1.Decode a Substitution Cipher Determine the letter frequencies for a 993-character ciphertext.

Later Projects 1.Decode a Substitution Cipher Determine the letter frequencies for a 993-character ciphertext. Find common digraphs and trigraphs.

Later Projects 1.Decode a Substitution Cipher Determine the letter frequencies for a 993-character ciphertext. Find common digraphs and trigraphs. Decode the message.

Later Projects 1.Decode a Substitution Cipher 2.Decode a Vigenère Cipher Figure out how to import a 6,351-character ciphertext into Excel. Use the Friedman test to estimate the length of the keyword. Use the Kasiski test to find the keyword length. Determine the key.

Later Projects 1.Decode a Substitution Cipher 2.Decode a Vigenère Cipher 3.Statistical analysis of the English language. Copy 100,000 characters from the internet. Figure out how to remove spaces and punctuation. Count the letter frequencies and digraph frequencies.

Later Projects 1.Decode a Substitution Cipher 2.Decode a Vigenère Cipher 3.Statistical analysis of the English language. 4.RSA-related: Find the prime factorization of 43,428,539,417. Compute MOD Use the Fermat primality test. Implement the Euclidean algorithm. Break RSA.