Announcements: SHA due tomorrow SHA due tomorrow Last exam Thursday Last exam Thursday Available for project questions this week Available for project.

Slides:



Advertisements
Similar presentations
The Euler Phi-Function Is Multiplicative (3/3)
Advertisements

COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.
How to Collaborate between Threshold Secret Sharing Schemes Daoshun Wang, Ziwei YeXiaobo Li Tsinghua University, ChinaUniversity of Alberta, Canada.
Ch12. Secret Sharing Schemes
Announcements: 1. Congrats on reaching the halfway point once again! 2. DES graded soon 3. Short “pop” quiz on Ch 3. (Thursday at earliest) 4. Reminder:
Data encryption with big prime numbers
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
Solving Equations = 4x – 5(6x – 10) -132 = 4x – 30x = -26x = -26x 7 = x.
Announcements: Programming exam next Thursday on breaking codes from chapter 2 Programming exam next Thursday on breaking codes from chapter 2 Written.
Announcements: Please use pencil on quizzes if possible Please use pencil on quizzes if possible Knuth quotes, part 1 Knuth quotes, part 1Questions?Today:
Announcements: See schedule for weeks 8 and 9 See schedule for weeks 8 and 9 Project workdays, due dates, exam Project workdays, due dates, exam Projects:
Announcements: Computer exam next class Computer exam next classQuestions? DTTF/NB479: DszquphsbqizDay 10.
Announcements: HW4 – DES due midnight HW4 – DES due midnight So far the record is less than 15 sec on 1 million iters Quiz on ch 3 postponed until after.
Announcements: 1. HW7 due next Tuesday. 2. Inauguration today! Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman,
Announcements: Homework 1 returned. Comments from Kevin? Homework 1 returned. Comments from Kevin? Matlab: tutorial available at
Announcements: 1. Presentations start Friday 2. Cem Kaner presenting O th block today. Questions? This week: DSA, Digital Cash DSA, Digital Cash.
Announcements: 1. Short “pop” quiz on Ch 3 (today?) 2. Term project groups and topics due midnight 3. HW6 due Tuesday. Questions? This week: Primality.
Announcements: 1. Short “pop” quiz on Ch 3 (today?) 2. Term project groups and topics formed 3. HW6 due tomorrow. Questions? This week: Discrete Logs,
Curve-Fitting Polynomial Interpolation
Announcements: 1. HW6 due now 2. HW7 posted Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions.
Announcements: 1. Today: digital cash 2. Tomorrow: quiz on ch questions 3. Thursday: presentations Elliptic curves MD5 vulnerabilities 4. Friday:
Secret Sharing Algorithms
Announcements: HW3 updated. Due next Thursday HW3 updated. Due next Thursday Written quiz today Written quiz today Computer quiz next Friday on breaking.
Announcements: HW3 updated. Due next Thursday HW3 updated. Due next Thursday Written quiz tomorrow on chapters 1-2 (next slide) Written quiz tomorrow on.
Announcements: How was last Saturday’s workshop? How was last Saturday’s workshop? DES due now DES due now Chapter 3 Exam tomorrow Chapter 3 Exam tomorrow.
DTTF/NB479: Dszquphsbqiz Day 9 Announcements: Homework 2 due now Homework 2 due now Computer quiz Thursday on chapter 2 Computer quiz Thursday on chapter.
Announcements: 1. Term project groups and topics formed 2. HW6 due tomorrow. Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs,
Announcements: Homework 2 due now Homework 2 due now Quiz this Friday on concepts from chapter 2 Quiz this Friday on concepts from chapter 2 Practical.
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Great Theoretical Ideas in Computer Science.
Announcements: SHA due Tuesday SHA due Tuesday Last exam Thursday Last exam Thursday Available for project questions this week Available for project questions.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Prentice Hall Antiderivatives and Slope Fields Section 6.1.
Announcements: HW4 – DES due Thursday HW4 – DES due Thursday I have installed, or will install: Java, C (gcc), Python. What other languages? Please make.
MA/CSSE 473 Day 11 Primality testing summary Data Encryption RSA.
Slope Fields and Euler’s Method
Slope Fields and Euler’s Method
Remaining course content Remote, fair coin flipping Remote, fair coin flipping Presentations: Protocols, Elliptic curves, Info Theory, Quantum Crypto,
Chinese Remainder Theorem Dec 29 Picture from ………………………
Slide 3- 1 Quick Quiz Sections 3.4 – Implicit Differentiation.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Secret Sharing for General Access Structure İlker Nadi Bozkurt, Kamer Kaya, and Ali Aydın Selçuk Information Security and Cryptology, Ankara, Turkey, May.
Secret Sharing and Key Escrow Supplemental Information for Cryptology Class Lecture slides by Richard Newman.
Review 2-1 and 2-2. Quiz Overview (non-calculator) 2-1a) graph power functions (4 points, 8 matching) b) solve radical equations (4 points, 2 equations)
28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
CIE Centre A-level Further Pure Maths
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
May 9, 2001Applied Symbolic Computation1 Applied Symbolic Computation (CS 680/480) Lecture 6: Multiplication, Interpolation, and the Chinese Remainder.
Number-Theoretic Algorithms
Cryptographic Protocols Secret sharing, Threshold Security
Public Key Encryption Major topics The RSA scheme was devised in 1978
PRODUCTS OF GROUPS If F and H are groups then their product F x H is the group defined as follows: Example If F = H = {0,1} with + mod 2.
DTTF/NB479: Dszquphsbqiz Day 26
Ch12. Secret Sharing Schemes
AP Calculus Honors Ms. Olifer
Solve the equation for x. {image}
Analysis of the RSA Encryption Algorithm
WEEK 1 HIGHER.
Symmetric-Key Cryptography
Solving equations Mrs. Hall.
DTTF/NB479: Dszquphsbqiz Day 27
Secret Sharing and Applications
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
Cryptology Design Fundamentals
Symmetric-Key Cryptography
WEEK 2 HIGHER.
Cryptographic Protocols Secret Sharing, Threshold Security
Homework #3 Consider a verifyable secret sharing scheme (VSS) based on Shamir's polynomial secret sharing as follows. A dealer has a secret S, a public.
Presentation transcript:

Announcements: SHA due tomorrow SHA due tomorrow Last exam Thursday Last exam Thursday Available for project questions this week Available for project questions this week Next week you will evaluate each other’s presentations. Next week you will evaluate each other’s presentations.Questions? Secret sharing DTTF/NB479: DszquphsbqizDay 33

What is secret splitting? I have a secret I want to share To figure it out, you’ll need teamwork. r, M-r (mod n) r 1, r 2, …r i-1, M-Σ i (r i ) (all mod n) 1

There are many applications of secret splitting and secret sharing 1.Inheritances 2.Military 3.Government 4.Information security What if I wanted a subset of the people to be able to reconstruct the secret? Secret splitting is trivial Secret sharing is not! 2

Threshold schemes require t people of a set of w to compute the secret (t, w) – threshold Scheme If t = w, then all participants are required If t = w, then all participants are required Knowing t or more pieces makes M easily computable t–1 or fewer pieces leaves M completely undetermined

Idea: we can use curve fitting to reconstruct a function, and thus a message Secret  3 The y-intercept of the line encodes the secret! Your quiz question is an example of a (2,3) scheme

The Shamir threshold scheme uses curve-fitting with higher dimensions Secret  4-5 The y-intercept of the line encodes the secret! Derivation on board

Extensions to Shamir Secret  4-5 Multiple shares Multiple groups of people

In the Blakely scheme, we represent the secret as the y-coordinate of the intersection of hyperplanes 6

Back to Shamir Secret  7-9 The y-intercept of the line encodes the secret! Your quiz question is an example of a (4, 6) scheme Solve it and see you Thursday!

Mignotte Method (t, n) threshold scheme Uses Chinese remainder theorem Solving a system of equations, mod n

Method Construct a Mignotte Sequence Conditions: Pairwise relatively prime Pairwise relatively prime sShares:

Reconstruction  Solve:  Using Chinese Remainder Theorem  Unique (mod m 1 *** m n )