An Introduction to Cryptology and Coding Theory Sarah Spence Adams Olin College Gordon Prichett Babson College

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Secret Codes, CD players, and Missions to Mars: An Introduction to Cryptology and Coding Theory Sarah Spence Adams Associate Professor of Mathematics Franklin.
Secret Codes, CD players, and Missions to Mars: An Introduction to Cryptology and Coding Theory Sarah Spence Adams Associate Professor of Mathematics Franklin.
Computer Science 101 Data Encryption And Computer Networks.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
22C:19 Discrete Structures Integers and Modular Arithmetic
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Lecture 40 CSE 331 Dec 11, Announcements Solutions to HW 10 and graded HW 9 at end of the lecture Review session on Monday: see blog for details.
CSE 501 Research Overview Atri Rudra
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Chapter 5 Cryptography Protecting principals communication in systems.
An Introduction to Cryptology and Coding Theory Discrete Math 2006.
CS1001 Lecture 24. Overview Encryption Encryption Artificial Intelligence Artificial Intelligence Homework 4 Homework 4.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
Presentation Layer Network Format Local Format Information Transformation “few standards, but a lot of ideas”
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Public Key Model 8. Cryptography part 2.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
DIG 3563 – Information Management Cryptography Lecture 12 Based in part on a lecture by Sarah Adams (Olin College) and Gordon Prichett (Babson College)
Coding Theory. p2. Why encode data? Three reasons to encode data that is about to be transmitted(through space) or stored(in a computer): 1. For efficiency.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Midterm Review Cryptography & Network Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Symmetric-Key Cryptography
Public-Key Encryption
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Cryptography Lynn Ackler Southern Oregon University.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Elementary Coding Theory Including Hamming and Reed-Solomom Codes with Maple and MATLAB Richard Klima Appalachian State University Boone, North Carolina.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
CSCI-235 Micro-Computers in Science Privacy & Security.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Lecture 20 CSE 331 July 30, Longest path problem Given G, does there exist a simple path of length n-1 ?
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
8 Coding Theory Discrete Mathematics: A Concept-based Approach.
Attacks on Public Key Encryption Algorithms
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Lecture 3: Symmetric Key Encryption
Security through Encryption
Computer Security Chapter Two
Presentation transcript:

An Introduction to Cryptology and Coding Theory Sarah Spence Adams Olin College Gordon Prichett Babson College

Communication System Digital SourceDigital Sink Source Encoding Source Decoding EncryptionDecryption Error Control Encoding Error Control Decoding ModulationChannelDemodulation

Cryptology Cryptography  Inventing cipher systems; protecting communications and storage Cryptanalysis  Breaking cipher systems

Cryptography

Cryptanalysis

What is used in Cryptology? Cryptography:  Linear algebra, abstract algebra, number theory Cryptanalysis:  Probability, statistics, combinatorics, computing

Caesar Cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ Key = 3 DEFGHIJKLMNOPQRSTUVWXYZABC Example  Plaintext: OLINCOLLEGE  Encryption: Shift by KEY = 3  Ciphertext: ROLQFROOHJH  Decryption: Shift backwards by KEY = 3

Cryptanalysis of Caesar Try all 26 possible shifts Frequency analysis

Substitution Cipher Permute A-Z randomly: A B C D E F G H I J K L M N O P… becomes H Q A W I N F T E B X S F O P C… Substitute H for A, Q for B, etc. Example  Plaintext: OLINCOLLEGE  Key: PSEOAPSSIFI

Cryptanalysis of Substitution Ciphers Try all 26! permutations – TOO MANY! Bigger than Avogadro's Number! Frequency analysis

One-Time Pads Map A, B, C, … Z to 0, 1, 2, …25 A B … M N … T U 0 1 … … Plaintext: MATHISUSEFULANDFUN Key: NGUJKAMOCTLNYBCIAZ Encryption: “Add” key to message mod 26 Ciphertext: BGO….. Decryption: “Subtract” key from ciphertext mod 26

Modular Arithmetic

One-Time Pads Unconditionally secure Problem: Exchanging the key There are some clever ways to exchange the key – we will study some of them!

Public-Key Cryptography Diffie & Hellman (1976) Known at GCHQ years before Uses one-way (asymmetric) functions, public keys, and private keys

Public Key Algorithms Based on two hard problems  Factoring large integers  The discrete logarithm problem

WWII Folly: The Weather- Beaten Enigma

Need more than secrecy…. Need reliability! Enter coding theory…..

What is Coding Theory? Coding theory is the study of error- control codes Error control codes are used to detect and correct errors that occur when data are transferred or stored

What IS Coding Theory? A mix of mathematics, computer science, electrical engineering, telecommunications  Linear algebra  Abstract algebra (groups, rings, fields)  Probability&Statistics  Signals&Systems  Implementation issues  Optimization issues  Performance issues

General Problem We want to send data from one place to another…  channels: telephone lines, internet cables, fiber-optic lines, microwave radio channels, cell phone channels, etc. or we want to write and later retrieve data…  channels: hard drives, disks, CD-ROMs, DVDs, solid state memory, etc. BUT! the data, or signals, may be corrupted  additive noise, attenuation, interference, jamming, hardware malfunction, etc.

General Solution Add controlled redundancy to the message to improve the chances of being able to recover the original message Trivial example: The telephone game

The ISBN Code x 1 x 2 … x 10 x 10 is a check digit chosen so that S  x 1 + 2x 2 + … + 9x x 10  0 mod 11 Can detect all single and all transposition errors

ISBN Example Cryptology by Thomas Barr: ? Want 1(0) + 2(1) + 3(3) + 4(0) + 5(8) + 6(8) + 7(9) + 8(7) + 9(6) + 10(?) = multiple of 11 Compute 1(0) + 2(1) + 3(3) + 4(0) + 5(8) + 6(8) + 7(9) + 8(7) + 9(6) = 272 Ponder (?) = multiple of 11 Modular arithmetic shows that the check digit is 8!!

UPC (Universal Product Code) x 1 x 2 … x 12 x 12 is a check digit chosen so that S = 3x 1 + 1x 2 + … + 3x x 12  0 mod 10 Can detect all single and most transposition errors What transposition errors go undetected?

The Repetition Code Send 0 and 1 Noise may change 0 to 1 or change 1 to 0 Instead, send codewords and If noise corrupts up to 2 bits, decoder can use majority vote and decode received word as 00000

The Repetition Code The distance between the two codewords is 5, because they differ in 5 spots  Large distance between codewords is good! The “rate” of the code is 1/5, since for every bit of information, we need to send 5 coded bits  High rate is good!

When is a Code “Good”? Important Code Parameters (n, M, d)  Length (n)  Number of codewords (M)  Minimum Hamming distance (d): Directly related to probability of decoding correctly  Code rate: Ratio of information bits to codeword bits

How Good Does It Get? What are the ideal trade-offs between rate, error-correcting capability, and number of codewords? What is the biggest distance you can get given a fixed rate or fixed number of codewords? What is the best rate you can get given a fixed distance or fixed number of codewords?

1969 Mariner Mission We’ll learn how Hadamard matrices were used on the 1969 Mariner Mission to build a rate 6/32 code that is approximately 100,000x better at correcting errors than the binary repetition code of length 5

’s Voyager Missions Better pictures need better codes need more sophisticated mathematics… Picture transmitted via Reed-Solomon codes

Summary From Caesar to Public-Key…. from Repetition Codes to Reed-Solomon Codes….  More sophisticated mathematics  better ciphers/codes Cryptology and coding theory involve abstract algebra, finite fields, rings, groups, probability, linear algebra, number theory, and additional exciting mathematics!

Who Cares? You and me!  Shopping and e-commerce  ATMs and online banking  Satellite TV & Radio, Cable TV, CD players  Corporate/government espionage Who else?  NSA, IDA, RSA, Aerospace, Bell Labs, AT&T, NASA, Lucent, Amazon, iTunes…