Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptography and Network Security
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
Section 4.1: Primes, Factorization, and the Euclidean Algorithm Practice HW (not to hand in) From Barr Text p. 160 # 6, 7, 8, 11, 12, 13.
22C:19 Discrete Structures Integers and Modular Arithmetic
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Number Theory and Cryptography
Session 4 Asymmetric ciphers.
ENGG2013 Unit 11 Row-Rank Feb,
Congruence class arithmetic. Definitions: a ≡ b mod m iff a mod m = b mod m. a  [b] iff a ≡ b mod m.
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
Section 2.9 The Hill Cipher; Matrices
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
Introduction to Cryptography
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
BY MISS FARAH ADIBAH ADNAN IMK
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
© by Kenneth H. Rosen, Discrete Mathematics & its Applications, Sixth Edition, Mc Graw-Hill, 2007 Chapter 3 (Part 2): The Fundamentals: Algorithms, the.
CSE 504 Discrete Mathematics & Foundations of Computer Science
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Section 2.4 Transposition Ciphers Practice HW (not to hand in) From Barr Text p. 105 #
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
Mathematics of Cryptography Part I: Modular Arithmetic
MATH 224 – Discrete Mathematics
Section 4.3: Fermat’s Little Theorem Practice HW (not to hand in) From Barr Text p. 284 # 1, 2.
MAT 1000 Mathematics in Today's World Winter 2015.
Copyright © Cengage Learning. All rights reserved.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Systems of Equations as Matrices and Hill Cipher.
Chapter 4 Numeration and Mathematical Systems © 2008 Pearson Addison-Wesley. All rights reserved.
CompSci 102 Discrete Math for Computer Science February 16, 2012 Prof. Rodger.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Chapter The Integers and Division Division
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Symmetric-Key Cryptography
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
RSA Prepared by: SITI ZAINAH ADNAN
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
Traditional Symmetric-Key Ciphers
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Chapter 2 (Part 1): The Fundamentals: Algorithms, the Integers & Matrices The Integers and Division (Section 2.4)
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
Elements of Coding and Encryption 1. Encryption In the modern word, it is crucial that the information is transmitted safely. For example, Internet purchases,
Section 2.3: Substitution Ciphers
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Module #9 – Number Theory 1/5/ Algorithms, The Integers and Matrices.
Ch04-Number Theory and Cryptography 1. Introduction to Number Theory Number theory is about integers and their properties. We will start with the basic.
Dr. Saatchi, Seyed Mohsen 1 Arab Open University - AOU T209 Information and Communication Technologies: People and Interactions Sixth Session.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Chapter 4 With Question/Answer Animations 1. Chapter Motivation Number theory is the part of mathematics devoted to the study of the integers and their.
Chapter 3 The Fundamentals: Algorithms, the integers, and matrices Section 3.4: The integers and division Number theory: the part of mathematics involving.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Modular Arithmetic with Applications to Cryptography
CS 210 Discrete Mathematics The Integers and Division (Section 3.4)
Chapter 2 Basic Encryption and Decryption
Affine Cipher.
Computer and Data Security 4th Class
MATH301- DISCRETE MATHEMATICS Copyright © Nahid Sultana Dr. Nahid Sultana Chapter 4: Number Theory and Cryptography.
Presentation transcript:

Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical concepts we will need to implement the cryptographical techniques that we will study this semester. Afterwards, we will introduce basic concepts in cryptography and illustrate a basic cryptographic involving shift ciphers…

Section 2.1: Shift Ciphers and Modular Arithmetic Modular Arithmetic –In grade school, we first learned how to divide numbers. (Let div stand for division) –Example1: Consider 40 div 3. Determine the quotient and remainder and write the result as an equation. Answer: 40 div 3 = 13 * 3 R 1 where R stands for remainder or 13 * Basic Arithmetic Properties –In the previous example we used what is called the division algorithm to obtain the answer.division algorithm –The integers are the numbers {…-4, -3, -2, -1, 0, 1, 2, 3, 4, …} –A number of primary interest in this class will be the remainder r that we obtain when we divide two numbers. Definition: We say that r is equal to b MOD m, written r = b MOD m, if r is the integer remainder of b divided by m. We define the variable m as the modulus. Example 2: Determine 25 MOD 7, 31 MOD 5, 26 MOD 2, and 5 MOD 7Example 2 –Answers: 4, 1, 0, 5…

Section 2.1: Shift Ciphers and Modular Arithmetic Note: In the division algorithm, the remainder r is non-negative, that is r ≥ 0. This fact means that when doing modular arithmetic we will never obtain a negative remainder. To compute b MOD m when b < 0 correctly, we must always look for the largest number that m evenly divides that is less than b. The next example illustrates this fact. Example 3: Compare computing 23 MOD 9 and -23 MOD 9.Example 3 –Answers: 5, 4…

Section 2.1: Shift Ciphers and Modular Arithmetic Doing Modular Arithmetic For Larger Numbers With A Calculator: –For b MOD m calculate (int)(b div m), call this q. –On the TI-83 the int function is under MATH-NUM-5: compute b – qm. This gives r. Or in one step: r = b – int(b / m) * m Examples 4-6:Examples 4-6 –Compute 1024 MOD 37 answer: 25 –Compute MOD answer: 5786 –Compute MOD 107 answer: 32…

Section 2.1: Shift Ciphers and Modular Arithmetic Generalization of Modular Arithmetic –In number theory, modular arithmetic has a more formal representation. This idea can be expressed with an example: –Example 7: Find solutions b to the equation b MOD 7 = 4 (solution worked below) another words, what numbers when divided by 7 have a remainder of 4. The easiest one is 4 itself. All other answers are multiples of 7 away from these. The solution set is b = {…-10, -3, 4, 11, 18, …}…

Section 2.1: Shift Ciphers and Modular Arithmetic Definition: Let m be a positive integer (the modulus of our arithmetic). Two integers a and b are said to be congruent modulo m if a – b is divisible by m. We write a ≡ b mod m. (note the lower case mod) Example 8: Illustrate why 25 ≡ 11 mod 7 –answer: 11 mod 7 = 4 = 25 mod 7 When the uppercase MOD is used, we are interested in only the specific integer remainder r when a number is divide by a modulus. The lowercase mod notation with the ≡ is used when we are looking for a set of numbers that have the same integer remainder when divided by a modulus. In this class, we will primarily use the MOD notation…

Section 2.1: Shift Ciphers and Modular Arithmetic When considering b MOD m, since 0 ≤ r < m, the only possible remainders are 0, 1, 2, 3, …, m-1. This causes the remainders to “wrap” around when performing modular arithmetic. Example 9: Make a table of y-values for the equation: y = (x + 5) MOD 9Example 9 Rules: (if a ≡ b mod m) –1. a + k ≡ (b + k) mod m –2. a – k ≡ (b – k) mod m Example 10: Make a list of five solutions to x + 7 ≡ 2 MOD 8.Example 10 –Answer: The solutions are x = (-7 + 2) mod 8 ≡ -5 mod 8. Since 3 ≡ - 5 mod 8 (3 is the remainder) then 5 solutions are 3, 11, 19, -5, -13. All solutions are of the form 3 mod 8…

Section 2.1: Shift Ciphers and Modular Arithmetic Basic Concepts of Crytography –Cryptography - is the art of transmitting information in a secret manner. –Plaintext – the undisguised message that we want to send. –Ciphertext – the secret disguised message that is transmitted. –Encryption (encipherment) – the process of converting plaintext to ciphertext. –Decryption (decipherment) – the process of converting ciphertext back to plaintext. Notation: Z m = {0, 1, 2, … m-1}. (the remainders) –Z 26 = {0, 1, 2, 3, …, 25} –We use Z 26 to represent our alphabet. In setting up a one to one correspondence we have the Alphabet Assignment…Alphabet Assignment…

Section 2.1: Shift Ciphers and Modular Arithmetic Monoalphabetic Ciphers – Substitution ciphers. The correspondents (those sending messages) agree upon a rearrangement (permutation) of the alphabet. –We will consider 3 basic ciphers of this type: Shift cipher – section 2.1 Affine cipher – section 2.2 Substitution cipher – section 2.3…

Section 2.1: Shift Ciphers and Modular Arithmetic Shift Ciphers: All the plaintext letters are assigned a corresponding letter that has been shifted k units. –For example if k = 3 (the Caesar Cipher) then the plaintext letter A becomes the Ciphertext letter D, B becomes E, and so on. –The Shift Cipher Let x be a numerical plaintext letter (ex: x = 0 when the plaintext letter is A) Let k be an element of Z 26. k is called the key of the cipher and represents the shift amount. Then y = (x + k) mod 26, where y is the numerical ciphertext letter. –The Caesar Cipher tableCaesar Cipher table Encipher the message “Radford”.Radford –Note: In ASCII the letter A has an ASCII number of 65. We could write a program that does the shift cipher for us. The basic formula would be y = (x – ) MOD 26 (where x is the numerical ASCII value of the letter). Everything works great except for the letters X, Y, and Z. We would need a control structure to ensure that these last three letters become A, B, and C, respectively. –The Caesar Cipher is just a special case of the shift cipher with the key k = 3. In general k can be any number in the set {0, 1, 2, …, 25}. (Of course for k = 0, the cipher text and plaintext are the same.) –Example 12: Encipher the message SEINFELD using a 12 shift cipher. (link to solution below) Answer…Answer

Section 2.1: Shift Ciphers and Modular Arithmetic Deciphering Shift Ciphers –Given a key k, plaintext letter number x, and ciphertext letter number y: y = (x + k) MOD 26(note: y = y MOD 26) Subtract k from both sides (y – k) MOD 26 = x MOD 26 = x. Therefore, x = (y – k) MOD 26 Note: - k can be replaced with + m where m + k = 26. –Example 13: Suppose k = 3 and the ciphertext = “YLUJLQLD”. Decipher the message.Decipher the message –Example 14: Decipher the message “EVZCJZXDFE” that was enciphered using a 17 shift cipher…Decipher the message

Section 2.1: Shift Ciphers and Modular Arithmetic As the last two examples illustrate, one must know the key k used in a shift cipher when deciphering a message. This leads to an important question. How can we decipher a message in a shift cipher if we do not know the key k? Cryptanalysis is the process of trying to break a cipher by finding its key. Cryptanalysis in general is not an easy problem. The more secure a cipher is, the harder it is to cryptanalyze. We will soon see that a shift cipher is not very secure and is relatively easy to break. Methods for Breaking a Shift Cipher –Since x = (y – k) Mod 26, we can test all 26 possibilities. One of them will work. –Frequency analysis: Uses the fact that the most frequently occurring letters in ciphertext produced by shift cipher has a good chance of corresponding to the most frequently occurring letters in the standard English alphabet. The most frequently occurring letters in English are E, T, A, O, I, N, S. Frequency Table Two Letter Combinations Three Letter Combinations…!Three Letter Combinations