MAT 302: Algebraic Cryptography LECTURE 1 Jan 2, 2012.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Chapter 9
Advertisements

1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
22C:19 Discrete Structures Integers and Modular Arithmetic
MAT 302: Algebraic Cryptography LECTURE 1 Jan 7, 2013.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Great Theoretical Ideas in Computer Science.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Introduction to Modern Cryptography Lecture 5 Number Theory: 1. Quadratic residues. 2. The discrete log problem. Intro to Public Key Cryptography Diffie.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CRYPTOGRAPHY WHAT IS IT GOOD FOR? Andrej Bogdanov Chinese University of Hong Kong CMSC 5719 | 6 Feb 2012.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
ASYMMETRIC CIPHERS.
Lecture 6: Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
The RSA Algorithm Based on the idea that factorization of integers into their prime factors is hard. ★ n=p . q, where p and q are distinct primes Proposed.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Homomorphic Encryption: WHAT, WHY, and HOW
Prime Numbers Prime numbers only have divisors of 1 and self
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Cryptography Lecture 1: Introduction Piotr Faliszewski.
Great Theoretical Ideas in Computer Science.
RSA Ramki Thurimella.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Applied Cryptography Spring 2015 Asymmetric ciphers.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Midterm Review Cryptography & Network Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Secrets & Lies, Knowledge & Trust. (Modern Cryptography) COS 116 4/17/2007 Guest Lecturer: Ari Feldman.
Overview of Cryptography & Its Applications
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
Cryptography RSA Algorithm BY : Wesam Fadheel Computer science department - WMU CS-6800 Advanced Theory of Computation Instructor: Dr. Elise De Doncker.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
week 8Complexity of Algorithms1 Elementary Number Theory Given positive integers a and b, we use the notation a¦b to indicated that a divides b, i.e.,
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Asymmetric-Key Cryptography
RSA Slides by Kent Seamons and Tim van der Horst
Practical Aspects of Modern Cryptography
Appendix 5: Cryptography p
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Presentation transcript:

MAT 302: Algebraic Cryptography LECTURE 1 Jan 2, 2012

MAT 302: Cryptography from Euclid to Zero-Knowledge Proofs LECTURE 1 Jan 2, 2012

Administrivia (see course info sheet) InstructorVinod Vaikuntanathan Location & Hours M 1-2pm, IB 370 W 1-3pm, IB 379 (Tut: F 10-11am, IB 360) Teaching Asst 3073 CCT Building (Office hours: W 3-4pm) Ali Mousavidehshikh

Administrivia (see course info sheet) Website: Recommended: Christof Paar and Jan Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners, Springer-Verlag. available online from UofT libraries Pre-Requisites (Check often!) Textbook MAT 223 Linear Algebra I MAT 224 Linear Algebra II MAT 301 Groups and Symmetries

Administrivia (see course info sheet) Grading: 5 Problem Sets + Midterm + Final Problem Sets35% Typically, due in two weeks Due in the beginning of class on Mondays! Late submission (Wed): -25% Late submission (Fri): -50% Midterm20% Tentative: Wed, Feb 29 (right after the reading week) Final40% TBD Class Participation 5% Ask (many!) questions during class and attend tutorials

… now, on to the course …

I) Historical Ciphers

Euclid (~ 300 BC) Wrote the “Elements” Euclidean algorithm to find the greatest common divisor of two numbers – one of the earliest non-trivial algorithms!

A Classical Cryptographic Goal: Secure Communication DWWDFN DW GDZQ ATTACK AT DAWN Solution: Encrypt the message!Decrypt the ciphertext!

A Classical Cryptographic Goal: Secure Communication DWWDFN DW GDZQ ATTACK AT DAWN Three Characters: 1) A sender, 2) A receiver and 3) An eavesdropper (adversary)

Lesson 1: Asymmetry of Information The sender and receiver must know something that the adversary doesn’t. This is called a cryptographic key

The Scytale Device Secret key: Circumference of the cylinder Ciphertext: KMIOILMDLONKRIIRGNOHGWT

The Scytale Device EASY TO BREAK! Can you recover the message in TSCRHNITIOPESTHXIAET

The Caesar Cipher Julius Ceasar ( BC) Message: ATTACK AT DAWN

The Caesar Cipher Julius Ceasar ( BC) Message: ATTACK AT DAWN Secret key: A random number from {1,…,26}, say 3

The Caesar Cipher Julius Ceasar ( BC) Message: ATTACK AT DAWN Key: + 3 Ciphertext: ↓↓↓↓↓↓ ↓↓ ↓↓↓↓ DWWDFN DW GDZQ Encryption Secret key: A random number from {1,…,26}, say 3

The Caesar Cipher Julius Ceasar ( BC) Ciphertext: DWWDFN DW GDZQ Key: - 3 Message: ↓↓↓↓↓↓ ↓↓ ↓↓↓↓ ATTACK AT DAWN DWWDFN DW GDZQ Decryption Secret key: A random number from {1,…,26}, say 3

The Caesar Cipher ALSO EASY TO BREAK! Can you recover the message in IXEVZUMXGVNE

Symmetric Encryption Scheme All these are examples of symmetric (also called secret-key) encryption Sender and Receiver use the same key Problem: How did they come up with the shared key to begin with?!

Other Symmetric Encryption Schemes VigenereEnigma ( ) (Polyalphabetic Substitution) (Unknown Method)

Lesson 2: Kerckhoff’s Principle Security of a Cryptographic Algorithm should rely ONLY on the secrecy of the KEYS, and NOT on the secrecy of the METHOD used. “Do not rely on security through obscurity”

A Mathematical Theory of Secrecy Perfect Secrecy and the One-time Pad Claude Shannon (late 1940s) THE GOOD : Unbreakable regardless of the power of the adv. THE BAD : Impractical! Needs very, very long shared keys. THE UGLY: length of key ≥ total length of all messages you ever want to send

Lesson 3: Perfect Secrecy is not necessary “Computational Secrecy”: It is enough to achieve secrecy against adversaries running in “reasonable” time! Horst Feistel (early 1970s) Data Encryption Standard (DES) Now superceded by the Advanced Encryption Standard (AES)

II) Modern Cryptography

Public-Key (Asymmetric) Cryptography Symmetric Encryption needs prior setup! Let’s agree on a key: OK

Public-Key (Asymmetric) Cryptography Symmetric Encryption just doesn’t scale! (A slice of) the internet graph

Public-Key (Asymmetric) Cryptography Bob encrypts to Alice using her Public Key… Alice’s Public Key Alice’s Secret Key *&%&(!%^(! Hello!

Public-Key (Asymmetric) Cryptography Alice decrypts using her Secret Key… Alice’s Public Key Alice’s Secret Key *&%&(!%^(! Hello!

Two Potent Ingredients Complexity Theory (the hardness of computational problems) Number Theory +

Complexity Theory + Number Theory 1) Multiply two 10-digit numbers 2) Factor a 20-digit number (which is a product of two 10-digit primes) X ???? One of these is easy and the other hard. Which is which?

Public-key Crypto from Number Theory Merkle, Hellman and Diffie (1976)Shamir, Rivest and Adleman (1978) Discrete Logarithms Factoring Diffie-Hellman Key Exchange RSA Encryption Scheme

RSA Encryption RSA: The first and the most popular public-key encryption (Let n be a product of two large primes, e is a public key and d is the secret key)

Number Theory Fermat’s Little Theorem Chinese Remainder Theorem Quadratic Reciprocity

Number Theoretic Algorithms Euclid’s GCD algorithm: Efficient Algorithms for Exponentiation: Algorithms to Compute Discrete Logarithms:

Number Theoretic Algorithms Primality Testing: How to tell if a number is prime? Turns out to be “polynomial time” (i.e., easy) Solovay-Strassen and Miller-Rabin algorithms Factoring: How to factor a number into its prime factors? Dixon’s Algorithm and the “Quadratic Sieve” Conjectured to be hard Euclid’s GCD algorithm: Efficient Algorithms for Exponentiation: Algorithms to Compute Discrete Logarithms:

Number Theoretic Algorithms Euclid’s GCD algorithm: Efficient Algorithms for Exponentiation: Algorithms to Compute Discrete Logarithms: efficient Primality Testing: How to tell if a number is prime? Factoring: How to factor a number into its prime factors? Not so efficient

Lesson 4: The Importance of being Precise What does it mean for a crypto-system to be “secure”?

New Cryptographic Goals: Zero Knowledge I know the proof of the Reimann hypothesis That’s nonsense! Prove it to me I don’t want to, because you’ll plagiarize it!!! Can Bob convince Alice that RH is true, without giving Alice the slightest hint of how he proved RH? Applications: Secure Identification Protocols (e.g., in an ATM)

New Cryptographic Goals: Homomorphic Encryption Can you compute on encrypted data? Many applications: Electronic Voting (how to add encrypted votes) Secure “Cloud Computing”

New Math: Elliptic Curves Weierstrass Equation: y 2 = x 3 + ax + b

Exercise for this week: Watch Prof. Ronald Rivest’s lecture on “The Growth of Cryptography” (see the course webpage for the link)

Welcome to MAT 302! Looking forward to an exciting semester!