An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy.

Slides:



Advertisements
Similar presentations
Using Matrices in Real Life
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Chapter 4 Systems of Linear Equations; Matrices
Computer Science 101 Data Encryption And Computer Networks.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
Cryptography The science of writing in secret code.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Principles of Information Security, 2nd edition1 Cryptography.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Cryptography & Encryption Secret Codes & The Advance of Technology.
Cryptography at The University of South Carolina Douglas B. Meade
An Introduction to Hill Ciphers Using Linear Algebra Brian Worthington University of North Texas MATH /10/2010.
Copyright © Cengage Learning. All rights reserved. 7.8 Applications of Matrices and Determinants.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
4-6 3x3 Matrices, Determinants, & Inverses
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Section 3.6: An Introduction to Cryptography
2.4 Inverse of Linear Transformations For an animation of this topic visit: Is the transformation.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
TMAT 103 Supplemental Chapter Cryptography. Sending messages that cannot be read if stolen –Been in use for centuries (wars) –Used to transmit data securely.
a connection between language and mathematics
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Systems of Equations as Matrices and Hill Cipher.
LIS508 last lecture: Cryptography & Security Thomas Krichel
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Using Inverse Matrices in Real Life
What you will learn 1. What an identity matrix is
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Governor’s School for the Sciences Mathematics Day 5.
MAT 1000 Mathematics in Today's World Winter 2015.
4.4 Identity and Inverse Matrices
Learning Objectives for Section 4.5 Inverse of a Square Matrix
Copyright © Cengage Learning. All rights reserved. 7 Linear Systems and Matrices.
Cryptography and Coding Theory
Chapter 12: Cryptography MAT 320 Spring Cryptography: Basic Ideas We want to encode information so that no one other than the intended recipient.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
Notes Over 4.4 Finding the Inverse of 2 x 2 Matrix.
Some of these PowerPoint pages were created by my friend Shawna Haider.
Cryptography Cryptography is the use of mathematics to encode messages and prevent them from being read by anyone who doesn’t know the code. One way that.
Warm UP: Review of Inequalities What do each of the symbols represent: 1. > 2. < Greater Than 2. Less than 3. Less than or equal to 4. Greater.
Investigating Identity and Inverse Matrices QUESTION: What are some properties of identity and inverse matrices? 1 Let A =, B =, and C=. Consider the 2.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Security Using Armstrong Numbers and Authentication using Colors
Encryption.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Warm-up 1. Find A-1 , A = 2. Solve AX = B when B =
Cryptography.
Applications of Matrices
M3: Encryption r By Andrew Stringer.
Chapter 3:Cryptography (16M)
Applications of Inverse Matrices
Simple Encryption- Lesson 5
Learning Objectives for Section 4.5 Inverse of a Square Matrix
DISSERTATION ON CRYPTOGRAPHY.
SLOT Week 9 – Day 1.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Fluency with Information Technology Lawrence Snyder
APPLICATIONS OF LINEAR ALGEBRA IN INFORMATION TECHNOLOGY
Chapter 4 Systems of Linear Equations; Matrices
Presentation transcript:

An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy

Applications of cryptography include: ATM cards Computer passwords Electronic commerce Early cryptographers encoded messages using transposition ciphers (rearranging the letters) or substitution ciphers (replacing letters with other letters).transposition ciphers substitution ciphers Examples: Loleh tuedssnt Transposition cipher Lzsg hr etm Substitution cipher Key

Encryption is the transformation of data into some unreadable form. Its purpose is to ensure privacy by keeping the information hidden from anyone for whom it is not intended, even those who can see the encrypted data. Decryption is the reverse of encryption; it is the transformation of encrypted data back into some intelligible form.

W HERE DOES MATH FIT IN ? We can use matrix algebra to encrypt data! If we use large matrices to encrypt our message, the code is extremely difficult to break. However, the receiver of the message can simply decode the data using the inverse of the matrix.

“A TTACK AT DAWN ” Let’s choose our message to be ATTACK AT DAWN and we’ll choose for our encoding matrix

“A TTACK AT DAWN ” We’ll assign a numeric value to each letter of the alphabet: We’ll also assign the value 27 to represent a space between two words.

“A TTACK AT DAWN ” Assigning these numeric values, our message becomes A T T A C K * A T * D A W N Since we are using a 3x3 matrix, we break our message into a collection of 3x1 vectors:

“A TTACK AT DAWN ” We can now encode our message by multiplying our 3x3 encoding matrix by the 3x5 matrix formed from the vectors formed from the message:

C OMPUTER TIME ! Log on as “visitor” Password is “winthrop” Open the program “Wolfram Mathematica 8” Click on the option: (Create New) Notebook

“A TTACK AT DAWN ” Using Mathematica, we see the product of the encoding matrix and our message is:

In order to decipher this code, we need to re- form our 3x1 vectors: and multiply by the inverse of the encoding matrix… The string of numbers we would send in our message is: 17, 40, 144, 32, 14, 57, -4, 21, 191, -89, 5, 124, - 3, 41, 242

Using our key: we can decode the message A T T A C K * A T * D A W N * When we multiply my the inverse of the encoding matrix, we get the vectors:

Y OUR T URN ! With the same key as before: and the encoding matrix: decode the message: 211, 605, 310, 1355, 246, 1970, 692, 379, 204, 1136, 488, 259, 318, 2125, 730, 1493, 349, 2632, 953, 1641, 162, 1466, 350, 977, 406, 1905, 712, 1977

C O N G R A T U L A T I O N S * Y O U * D I D * I T * *

N OW YOU GIVE IT A TRY ! Come up with your own secret message and trade with your neighbor!