An Introduction to Cryptology and Coding Theory Discrete Math 2006.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Secret Codes, CD players, and Missions to Mars: An Introduction to Cryptology and Coding Theory Sarah Spence Adams Associate Professor of Mathematics Franklin.
Secret Codes, CD players, and Missions to Mars: An Introduction to Cryptology and Coding Theory Sarah Spence Adams Associate Professor of Mathematics Franklin.
Computer Science 101 Data Encryption And Computer Networks.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Chapter 5 Cryptography Protecting principals communication in systems.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
CS1001 Lecture 24. Overview Encryption Encryption Artificial Intelligence Artificial Intelligence Homework 4 Homework 4.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
An Introduction to Cryptology and Coding Theory Sarah Spence Adams Olin College Gordon Prichett Babson College
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Public Key Model 8. Cryptography part 2.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 2 Overview.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Network Security Section 1: Introduction to security.
DIG 3563 – Information Management Cryptography Lecture 12 Based in part on a lecture by Sarah Adams (Olin College) and Gordon Prichett (Babson College)
Midterm Review Cryptography & Network Security
Public-Key Encryption
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
CSCI-235 Micro-Computers in Science Privacy & Security.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Lecture 20 CSE 331 July 30, Longest path problem Given G, does there exist a simple path of length n-1 ?
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
8 Coding Theory Discrete Mathematics: A Concept-based Approach.
Attacks on Public Key Encryption Algorithms
Cryptography CS Principles January 19, 2017.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSCI-235 Micro-Computer Applications
Cryptography Survey.
Cryptography Survey.
Computer Security Chapter Two
Presentation transcript:

An Introduction to Cryptology and Coding Theory Discrete Math 2006

Communication System Digital SourceDigital Sink Source Encoding Source Decoding EncryptionDecryption Error Control Encoding Error Control Decoding ModulationChannelDemodulation

Cryptology Cryptography  Inventing cipher systems; protecting communications and storage Cryptanalysis  Breaking cipher systems

Cryptography

Cryptanalysis

What is used in Cryptology? Cryptography:  Linear algebra, abstract algebra, number theory Cryptanalysis:  Probability, statistics, combinatorics, computing

Caesar Cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ Key = 3 DEFGHIJKLMNOPQRSTUVWXYZABC Example  Plaintext: OLINCOLLEGE  Encryption: Shift by KEY = 3  Ciphertext: ROLQFROOHJH  Decryption: Shift backwards by KEY = 3

Cryptanalysis of Caesar Try all 26 possible shifts Frequency analysis

Substitution Cipher Permute A-Z randomly: A B C D E F G H I J K L M N O P… becomes H Q A W I N F T E B X S F O P C… Substitute H for A, Q for B, etc. Example  Plaintext: OLINCOLLEGE  Key: PSEOAPSSIFI

Cryptanalysis of Substitution Ciphers Try all 26! permutations (?) Frequency analysis

One-Time Pads Map A, B, C, … Z to 0, 1, 2, …25 Plaintext: MATHISUSEFULANDFUN Key: NGUJKAMOCTLNYBCIAZ Encryption: “Add” key to message mod 26 Decryption: “Subtract” key from ciphertext mod 26

One-Time Pads Unconditionally secure Problem: Exchanging the key There are some clever ways to exchange the key….

Public-Key Cryptography Diffie & Hellman (1976) Known at GCHQ years before Uses one-way (asymmetric) functions, public keys, and private keys

Public Key Algorithms Based on two hard problems  Factoring large integers (Duc and Andrew)  The discrete logarithm problem

WWII Folly: The Weather- Beaten Enigma

Need more than secrecy…. Need reliability! Enter coding theory…..

What is Coding Theory? Coding theory is the study of error- control codes Error control codes are used to detect and correct errors that occur when data are transferred or stored

What IS Coding Theory? A mix of mathematics, computer science, electrical engineering, telecommunications  Linear algebra  Abstract algebra (groups, rings, fields)  Probability&Statistics  Signals&Systems  Implementation issues  Optimization issues  Performance issues

General Problem We want to send data from one place to another…  channels: telephone lines, internet cables, fiber-optic lines, microwave radio channels, cell phone channels, etc. or we want to write and later retrieve data…  channels: hard drives, disks, CD-ROMs, DVDs, solid state memory, etc. BUT! the data, or signals, may be corrupted  additive noise, attenuation, interference, jamming, hardware malfunction, etc.

General Solution Add controlled redundancy to the message to improve the chances of being able to recover the original message Trivial example: The telephone game

How Good Does It Get? What are the ideal trade-offs between rate, error-correcting capability, and number of codewords? What is the biggest distance you can get given a fixed rate or fixed number of codewords? What is the best rate you can get given a fixed distance or fixed number of codewords?

Who Cares? You and me!  Shopping and e-commerce  ATMs and online banking  Satellite TV & Radio, Cable TV, CD players  Corporate/government espionage Who else?  NSA, IDA, RSA, Aerospace, Bell Labs, AT&T, NASA, Lucent, Amazon, iTunes…