CRYPTOGRAPHY AND THE MATH MAJOR Dr. Mihai Caragiu Mathematics Department Ohio Northern University.

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
The Integers and Division. Outline Division: Factors, multiples Exercise 2.3 Primes: The Fundamental Theorem of Arithmetic. The Division Algorithm Greatest.
22C:19 Discrete Structures Integers and Modular Arithmetic
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
What is Elliptic Curve Cryptography?
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Session 4 Asymmetric ciphers.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ENGG2013 Unit 10 n  n determinant and an application to cryptography Feb, 2011.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
 8 groups of 2  5 rounds  Basic Definitions  Substitution Cryptosystems  Math  Tricky Questions  Comparing Cryptosystems  10 questions per round.
Electronic Payment Systems. Transaction reconciliation –Cash or check.
An Introduction to Hill Ciphers Using Linear Algebra Brian Worthington University of North Texas MATH /10/2010.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Introduction to Cryptography
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
The RSA Algorithm Rocky K. C. Chang, March
Mathematics of Cryptography Part I: Modular Arithmetic, Congruence,
CSE 504 Discrete Mathematics & Foundations of Computer Science
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
Mathematics of Cryptography Part I: Modular Arithmetic
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
MAT 1000 Mathematics in Today's World Winter 2015.
Copyright © Cengage Learning. All rights reserved.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Systems of Equations as Matrices and Hill Cipher.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Governor’s School for the Sciences Mathematics Day 5.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
MAT 1000 Mathematics in Today's World Winter 2015.
Diffie-Hellman Key Exchange Color Mixing Example Rick Stroud 21 September 2015 CSCE 522.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Fermat’s Little Theorem The RSA Cryptosystem will require exponentiation to decrypt messages. Exponentiation Notation Example 1: Compute Exponentials Example.
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2014.
Dr. Saatchi, Seyed Mohsen 1 Arab Open University - AOU T209 Information and Communication Technologies: People and Interactions Sixth Session.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 3. Mathematics of Cryptography.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
week 8Complexity of Algorithms1 Elementary Number Theory Given positive integers a and b, we use the notation a¦b to indicated that a divides b, i.e.,
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Modular Arithmetic with Applications to Cryptography
Taehyung Kim HPC Lab. POSTECH
Foundations of Network and Computer Security
National Cipher Challenge
Public Key vs. Private Key Cryptosystems
Presentation transcript:

CRYPTOGRAPHY AND THE MATH MAJOR Dr. Mihai Caragiu Mathematics Department Ohio Northern University

Cryptography: the art or science of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form…

Mathematics plays a crucial role in cryptography!

2000 years ago Julius Caesar used a simple substitution cipher (replace each letter of message by a letter a fixed distance – k – away) Say, for example, k = 3. Then SCIENCE transforms into: VFLHQFH This is not a secure cryptosystem! Still, there is some mathematics hidden here which is indeed very useful for the design of more reliable cryptosystems…

MODULAR ARITHMETIC First let us associate numbers from 0 through 25 to the twenty six letters of the English alphabet: A  0 B  1 C  2 D  3 E  4 … X  23 Y  24 Z  25 Now, let us learn how to compute “modulo 26”. This means computing within a “universe” in which the only available numbers are those from 0 through 25: U = {0, 1, 2, …, 25}

U = {0, 1, 2, …, 25} What about the other numbers? 26, 27, … Well, 26 is 0 in disguise! 27 is 1 in disguise! … 531 is 11 in disguise! – 17 is 9 in disguise! To “see” the “real face” of an integer modulo 26, divide it by 26 and take the remainder. What about 2001? 2001 = 26 · Technically we denote this by 2001 (mod 26) = 25 Therefore 2002 will be simply… 0 (modulo 26) !

How to add mod 26, then? Well, add as usual, then take the remainder! = = 14 … How to multiply? Multiply as usual, then take the remainder! 15 · 17 = · 5 = 3 … Caesar’s cipher in modular arithmetic: X  X + 3 (mod 26) Decryption: X  X – 3 (mod 26)

VARIATIONS OF THE CAESAR’S CIPHER AFFINE SUBSTITUTIONS X  a · X + b ( mod 26 ) a,b are elements of U, and a is relatively prime to 26 EXAMPLE: a = 7, b = 5 gives the following letter-by- letter encryption : X  7·X + 5 ( mod 26 ) A(0)F(5) B(1)M(12) C(2)T(19) D(3)A(0) E(4)H(7) F(5)Q(14) G(6)V(21) H(7)C(2) I(8)J(9) Q(16) K(10)X(23) L(11)E(4) M(12)L(11) N(13)S(18) O(14)Z(25) P(15)G(6) Q(16)N(13) R(17)U(20) S(18)B(1) T(19)I(8) U(20)P(15) V(21)W(22) D(3) X(23)K(10) Y(24)R(17) Z(25)Y(24)

INVERTING THE AFFINE CIPHER X  7·X + 5 ( mod 26 ) (encryption formula) THE “INVERSE TRANSFORMATION” X  15·X + 3 (mod 26) (decryption formula) EXAMPLE Say, by using the encryption formula Alice encrypts “11” into 7· = 4 ( mod 26 ) and sends “4” over to Bob… Bob gets the “4” and wants to decrypt it by using the decryption formula. He computes: 4· = 63 = = 11 (mod 26) and thus he recovers the “11”.

UNFORTUNATELY, letter-by-letter encryption is easy to break (for example, by using a frequency analysis) EXAMPLE: Assume a smart eavesdropper Q suspects that Alice and Bob use an encryption of the type described above, that is, X  a·X+b (mod 26). But Q does not know the values of a and b. Well, Q keeps listening, and after a few moments realizes that the letter that has the highest frequency in the (otherwise unintelligible) cyphertext that Alice is sending over is H (7). Moreover, Q realizes that the letter coming next in the order of frequency is I (8). At this moment Q quickly opens a linguistics book and finds out that the letters having the two highest frequencies in English are E (4) (highest) and T (19) (second highest frequency). Finding a and b is not difficult: indeed, the encryption of 4 must be 7 and the encryption of 19 must be 8: a·4+b =7 (mod 26) a·19+b =8 (mod 26) This is a system of two equations with two unknowns (in modular arithmetic though), which is not difficult to solve.

a·4+b =7 (mod 26) a·19+b =8 (mod 26) Substract the first equation out of the second to get 15·a = 1 (mod 26) from where a follows to be 7 [just check: 15·7=105 = 26·4+1=1 (mod 26); as a math major you will find out efficient ways of solving such equations of degree one in modular arithmetic). Once we know a=7, replace this value back into one of the two equations and you will find b=7 – a·4= 7 –7·4 = –21 = 5 (mod 26).

TOPICS CRUCIAL TO CRYPTOGRAPHY A MATH MAJOR WILL GET TO KNOW: BBasic modular arithmetic.  PPrime numbers and factoring large integers.  AAlgorithms in number theory.  AAlgebra of matrices and polynomials.