SlideShare a Scribd company logo
1 of 50
Download to read offline
Cryptology
Day 4: Going public
MAT 140: Introduction to the
Mathematical Sciences
24 September 2008

Robert Talbert, PhD
Associate Professor of Mathematics
and Computing Science
rtalbert@franklincollege.edu
Recap of Day 3

• Bits, bytes, and binary representation of text using ASCII

• The XOR operation

• The Simple XOR cipher

• Perfect security and one-time pads
Alice
Alice   Bob
Alice   Bob
Plaintext
  Dear Bob - The
meeting will be at
   the embassy.




     Alice           Bob
Encryption
                      function
   Plaintext
  Dear Bob - The
meeting will be at
   the embassy.




     Alice                        Bob
Encryption
                      function
   Plaintext                      Ciphertext
  Dear Bob - The                   Qrne Obo - Gur
meeting will be at                zrrgvat jvyy or
   the embassy.                   ng gur rzonffl.




     Alice                                          Bob
Encryption
                      function
   Plaintext                      Ciphertext
  Dear Bob - The                   Qrne Obo - Gur
meeting will be at                zrrgvat jvyy or
   the embassy.                   ng gur rzonffl.




     Alice                                          Bob
Decryption
                     Encryption
                      function




                                                     function
   Plaintext                      Ciphertext
  Dear Bob - The                   Qrne Obo - Gur
meeting will be at                zrrgvat jvyy or
   the embassy.                   ng gur rzonffl.




     Alice                                                       Bob
Decryption
                     Encryption
                                                                  Original




                      function




                                                     function
   Plaintext                      Ciphertext                      plaintext
  Dear Bob - The                   Qrne Obo - Gur
meeting will be at                zrrgvat jvyy or                 Dear Bob - The
   the embassy.                   ng gur rzonffl.                meeting will be
                                                                 at the embassy.




     Alice                                                            Bob
Decryption
                     Encryption
                                                                  Original




                      function




                                                     function
   Plaintext                       Ciphertext                     plaintext
  Dear Bob - The                   Qrne Obo - Gur
meeting will be at                zrrgvat jvyy or                 Dear Bob - The
   the embassy.                   ng gur rzonffl.                meeting will be
                                                                 at the embassy.




     Alice                                                            Bob




                                   How are these
                                  communicated?
The key distribution problem
The key distribution problem
The key distribution problem
The key distribution problem
The key distribution problem




                    Insecure channel
The key distribution problem




                    Insecure channel
The key distribution problem




                    Insecure channel
The key distribution problem




                    Insecure channel
The key distribution problem




                    Insecure channel

   CENSORED
The key distribution problem




                    Insecure channel

   CENSORED




  Anonymity
The key distribution problem




                    Insecure channel

   CENSORED




  Anonymity
The key distribution problem




                    Insecure channel

   CENSORED




  Anonymity
The key distribution problem




                    Insecure channel

   CENSORED




  Anonymity
The key distribution problem




                    Insecure channel

   CENSORED




  Anonymity
The key distribution problem




                    Insecure channel

   CENSORED




  Anonymity
The key distribution problem




                    Insecure channel

   CENSORED




  Anonymity
                  Many-to-many
                  communication
Activity: A “public-key” cipher
Why does Kid Crypto work?
Can an adversary find the private key from the
public key?
How does this solve the key distribution problem?
Alice   Bob
Alice   Bob
Alice   Bob
Alice                       Bob




One-way trapdoor function
Alice                                Bob




                            Public     Private
One-way trapdoor function    (e,n)        d
Plaintext
  Dear Bob - The
meeting will be at
   the embassy.




     Alice                                Bob




                                 Public     Private
     One-way trapdoor function    (e,n)        d
Plaintext
  Dear Bob - The
meeting will be at
   the embassy.




     Alice                                Bob




                                 Public     Private
     One-way trapdoor function    (e,n)        d
Encryption

                     (ex) mod n
                       function
   Plaintext
  Dear Bob - The
meeting will be at
   the embassy.




     Alice                                 Bob




                                  Public     Private
     One-way trapdoor function     (e,n)        d
Encryption

                     (ex) mod n
                       function
   Plaintext                      Ciphertext
  Dear Bob - The                   Qrne Obo - Gur
meeting will be at                zrrgvat jvyy or
   the embassy.                   ng gur rzonffl.




     Alice                                                   Bob




                                                    Public     Private
     One-way trapdoor function                       (e,n)        d
Encryption

                     (ex) mod n
                       function
   Plaintext                      Ciphertext
  Dear Bob - The                   Qrne Obo - Gur
meeting will be at                zrrgvat jvyy or
   the embassy.                   ng gur rzonffl.




     Alice                                                   Bob




                                                    Public     Private
     One-way trapdoor function                       (e,n)        d
Decryption

                                                    (dy) mod n
                     Encryption

                     (ex) mod n
                       function




                                                      function
   Plaintext                      Ciphertext
  Dear Bob - The                   Qrne Obo - Gur
meeting will be at                zrrgvat jvyy or
   the embassy.                   ng gur rzonffl.




     Alice                                                                Bob




                                                                 Public     Private
     One-way trapdoor function                                    (e,n)        d
Decryption

                                                    (dy) mod n
                     Encryption

                     (ex) mod n
                                                                  Original




                       function




                                                      function
   Plaintext                      Ciphertext                      plaintext
  Dear Bob - The                   Qrne Obo - Gur
meeting will be at                zrrgvat jvyy or                 Dear Bob - The
   the embassy.                   ng gur rzonffl.                meeting will be
                                                                 at the embassy.




     Alice                                                                Bob




                                                                 Public     Private
     One-way trapdoor function                                    (e,n)        d
RSA

              Choose two large prime numbers p, q
               Calculate n = pq and m = (p-1)(q-1)
             Choose e such that gcd(e, (p-1)(q-1)) = 1
             Choose d such that ed = 1 mod (p-1)(q-1)
 Alice            Publicize e, n. Keep d private.

         To encrypt x: calculate y =   xe   mod n

         To decrypt y: calculate z = yd mod n.

               Fermat’s Little Theorem:
 Bob               xed = x mod n.
This number is a product of two primes:

74037563479561712828046796097
42957314259318888923128908493
62326389727650340282662768919
96419625117843995894330502127
58537011896809828673317327310
89309005525051168770632990723
96380786710086096962537934650
          563796359
Modulus (1024 bits):
9d 88 94 32 62 30 a3 3b
0f 5b 30 7c d5 69 75 21
25 99 0f e1 a8 c2 7d 5b
2b e9 24 72 48 fa 13 47
7c 53 8b 6a 56 be 66 5a
93 7c 3b bb 84 d4 90 4e
ab d5 aa f1 33 de 93 2a
1c 80 e3 f5 19 25 a8 69
d3 55 44 fd 7f 76 bb 28
f5 90 62 69 57 eb 82 ba
dd 73 40 c0 dd fb 7e 2b
ea 86 8e 83 eb e1 5f cc
f4 a5 a4 be 99 4f 90 ff
66 79 b1 44 d4 13 60 96
80 00 3d f8 49 b5 e7 82
54 b3 9d 17 56 cc 90 bb

  Exponent (24 bits):
        01 00 01
Cutting edge




Design/analysis of   Elliptic curve     Quantum
  block ciphers      cryptography     cryptography
Cryptology at Franklin College

                        MAT 135                     CMP 141
                        MAT 140                    Computing I




                    MAT 142
                    Calculus II




         MAT 240                                           MAT 300
                                     MAT 233
        Methods of                                         Topics in
                                  Linear Algebra
      Problem Solving                                     Mathematics




        MAT 361
      Modern Algebra                                     Careers: NSA and other
                                                       government; network security
                    MAT 490                              and CISSP license; more
                  Individualized
                      Study
For more information
        http://delicious.com/robert.talbert/crypto
             http://www.slideshare.net/rtalbert
      http://en.wikipedia.org/wiki/Portal:Cryptography
Mat 140 Cryptology Day 4

More Related Content

Viewers also liked

Changes to Mathematics Programs at Franklin College
Changes to Mathematics Programs at Franklin CollegeChanges to Mathematics Programs at Franklin College
Changes to Mathematics Programs at Franklin CollegeRobert Talbert
 
Presentation for WCHS dual-enrollment students
Presentation for WCHS dual-enrollment studentsPresentation for WCHS dual-enrollment students
Presentation for WCHS dual-enrollment studentsRobert Talbert
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩idpeie
 
The inverted classroom and peer instruction: designing classes for meaningful...
The inverted classroom and peer instruction: designing classes for meaningful...The inverted classroom and peer instruction: designing classes for meaningful...
The inverted classroom and peer instruction: designing classes for meaningful...Robert Talbert
 
Deconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersDeconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersRobert Talbert
 
Publishing Your Study
Publishing Your StudyPublishing Your Study
Publishing Your StudyTeresa Pask
 
Using The Master Genealogist - Basics
Using The Master Genealogist - BasicsUsing The Master Genealogist - Basics
Using The Master Genealogist - BasicsTeresa Pask
 
Introduction to The Master Genealogist
Introduction to The Master GenealogistIntroduction to The Master Genealogist
Introduction to The Master GenealogistTeresa Pask
 
Learning matlab in the inverted classroom
Learning matlab in the inverted classroom Learning matlab in the inverted classroom
Learning matlab in the inverted classroom Robert Talbert
 
Inverting the classroom, improving student learning
Inverting the classroom, improving student learningInverting the classroom, improving student learning
Inverting the classroom, improving student learningRobert Talbert
 

Viewers also liked (10)

Changes to Mathematics Programs at Franklin College
Changes to Mathematics Programs at Franklin CollegeChanges to Mathematics Programs at Franklin College
Changes to Mathematics Programs at Franklin College
 
Presentation for WCHS dual-enrollment students
Presentation for WCHS dual-enrollment studentsPresentation for WCHS dual-enrollment students
Presentation for WCHS dual-enrollment students
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩
 
The inverted classroom and peer instruction: designing classes for meaningful...
The inverted classroom and peer instruction: designing classes for meaningful...The inverted classroom and peer instruction: designing classes for meaningful...
The inverted classroom and peer instruction: designing classes for meaningful...
 
Deconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition CiphersDeconstructing Columnar Transposition Ciphers
Deconstructing Columnar Transposition Ciphers
 
Publishing Your Study
Publishing Your StudyPublishing Your Study
Publishing Your Study
 
Using The Master Genealogist - Basics
Using The Master Genealogist - BasicsUsing The Master Genealogist - Basics
Using The Master Genealogist - Basics
 
Introduction to The Master Genealogist
Introduction to The Master GenealogistIntroduction to The Master Genealogist
Introduction to The Master Genealogist
 
Learning matlab in the inverted classroom
Learning matlab in the inverted classroom Learning matlab in the inverted classroom
Learning matlab in the inverted classroom
 
Inverting the classroom, improving student learning
Inverting the classroom, improving student learningInverting the classroom, improving student learning
Inverting the classroom, improving student learning
 

More from Robert Talbert

Followup activities for Module 1A
Followup activities for Module 1AFollowup activities for Module 1A
Followup activities for Module 1ARobert Talbert
 
In-Class Activities for MTH 201 Calculus Module 1A
In-Class Activities for MTH 201 Calculus Module 1AIn-Class Activities for MTH 201 Calculus Module 1A
In-Class Activities for MTH 201 Calculus Module 1ARobert Talbert
 
Better Learning Through Voting: Using classroom response systems to improve s...
Better Learning Through Voting: Using classroom response systems to improve s...Better Learning Through Voting: Using classroom response systems to improve s...
Better Learning Through Voting: Using classroom response systems to improve s...Robert Talbert
 
Classroom response systems in mathematics: Learning math better through voting
Classroom response systems in mathematics: Learning math better through votingClassroom response systems in mathematics: Learning math better through voting
Classroom response systems in mathematics: Learning math better through votingRobert Talbert
 
Making proofs click: Classroom response systems in transition-to-proof courses
Making proofs click: Classroom response systems in transition-to-proof coursesMaking proofs click: Classroom response systems in transition-to-proof courses
Making proofs click: Classroom response systems in transition-to-proof coursesRobert Talbert
 
Mat 140 Cryptology Day 3 Presentation
Mat 140 Cryptology Day 3 PresentationMat 140 Cryptology Day 3 Presentation
Mat 140 Cryptology Day 3 PresentationRobert Talbert
 
Mat 140 Cryptology Day 2 Presentation
Mat 140 Cryptology Day 2 PresentationMat 140 Cryptology Day 2 Presentation
Mat 140 Cryptology Day 2 PresentationRobert Talbert
 
Mat 140 Cryptology Day 1 Presentation
Mat 140 Cryptology Day 1 PresentationMat 140 Cryptology Day 1 Presentation
Mat 140 Cryptology Day 1 PresentationRobert Talbert
 
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital SignaturesRobert Talbert
 

More from Robert Talbert (9)

Followup activities for Module 1A
Followup activities for Module 1AFollowup activities for Module 1A
Followup activities for Module 1A
 
In-Class Activities for MTH 201 Calculus Module 1A
In-Class Activities for MTH 201 Calculus Module 1AIn-Class Activities for MTH 201 Calculus Module 1A
In-Class Activities for MTH 201 Calculus Module 1A
 
Better Learning Through Voting: Using classroom response systems to improve s...
Better Learning Through Voting: Using classroom response systems to improve s...Better Learning Through Voting: Using classroom response systems to improve s...
Better Learning Through Voting: Using classroom response systems to improve s...
 
Classroom response systems in mathematics: Learning math better through voting
Classroom response systems in mathematics: Learning math better through votingClassroom response systems in mathematics: Learning math better through voting
Classroom response systems in mathematics: Learning math better through voting
 
Making proofs click: Classroom response systems in transition-to-proof courses
Making proofs click: Classroom response systems in transition-to-proof coursesMaking proofs click: Classroom response systems in transition-to-proof courses
Making proofs click: Classroom response systems in transition-to-proof courses
 
Mat 140 Cryptology Day 3 Presentation
Mat 140 Cryptology Day 3 PresentationMat 140 Cryptology Day 3 Presentation
Mat 140 Cryptology Day 3 Presentation
 
Mat 140 Cryptology Day 2 Presentation
Mat 140 Cryptology Day 2 PresentationMat 140 Cryptology Day 2 Presentation
Mat 140 Cryptology Day 2 Presentation
 
Mat 140 Cryptology Day 1 Presentation
Mat 140 Cryptology Day 1 PresentationMat 140 Cryptology Day 1 Presentation
Mat 140 Cryptology Day 1 Presentation
 
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital Signatures
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Mat 140 Cryptology Day 4

  • 1. Cryptology Day 4: Going public MAT 140: Introduction to the Mathematical Sciences 24 September 2008 Robert Talbert, PhD Associate Professor of Mathematics and Computing Science rtalbert@franklincollege.edu
  • 2. Recap of Day 3 • Bits, bytes, and binary representation of text using ASCII • The XOR operation • The Simple XOR cipher • Perfect security and one-time pads
  • 3.
  • 5. Alice Bob
  • 6. Alice Bob
  • 7. Plaintext Dear Bob - The meeting will be at the embassy. Alice Bob
  • 8. Encryption function Plaintext Dear Bob - The meeting will be at the embassy. Alice Bob
  • 9. Encryption function Plaintext Ciphertext Dear Bob - The Qrne Obo - Gur meeting will be at zrrgvat jvyy or the embassy. ng gur rzonffl. Alice Bob
  • 10. Encryption function Plaintext Ciphertext Dear Bob - The Qrne Obo - Gur meeting will be at zrrgvat jvyy or the embassy. ng gur rzonffl. Alice Bob
  • 11. Decryption Encryption function function Plaintext Ciphertext Dear Bob - The Qrne Obo - Gur meeting will be at zrrgvat jvyy or the embassy. ng gur rzonffl. Alice Bob
  • 12. Decryption Encryption Original function function Plaintext Ciphertext plaintext Dear Bob - The Qrne Obo - Gur meeting will be at zrrgvat jvyy or Dear Bob - The the embassy. ng gur rzonffl. meeting will be at the embassy. Alice Bob
  • 13. Decryption Encryption Original function function Plaintext Ciphertext plaintext Dear Bob - The Qrne Obo - Gur meeting will be at zrrgvat jvyy or Dear Bob - The the embassy. ng gur rzonffl. meeting will be at the embassy. Alice Bob How are these communicated?
  • 18. The key distribution problem Insecure channel
  • 19. The key distribution problem Insecure channel
  • 20. The key distribution problem Insecure channel
  • 21. The key distribution problem Insecure channel
  • 22. The key distribution problem Insecure channel CENSORED
  • 23. The key distribution problem Insecure channel CENSORED Anonymity
  • 24. The key distribution problem Insecure channel CENSORED Anonymity
  • 25. The key distribution problem Insecure channel CENSORED Anonymity
  • 26. The key distribution problem Insecure channel CENSORED Anonymity
  • 27. The key distribution problem Insecure channel CENSORED Anonymity
  • 28. The key distribution problem Insecure channel CENSORED Anonymity
  • 29. The key distribution problem Insecure channel CENSORED Anonymity Many-to-many communication
  • 31. Why does Kid Crypto work? Can an adversary find the private key from the public key? How does this solve the key distribution problem?
  • 32. Alice Bob
  • 33. Alice Bob
  • 34. Alice Bob
  • 35. Alice Bob One-way trapdoor function
  • 36. Alice Bob Public Private One-way trapdoor function (e,n) d
  • 37. Plaintext Dear Bob - The meeting will be at the embassy. Alice Bob Public Private One-way trapdoor function (e,n) d
  • 38. Plaintext Dear Bob - The meeting will be at the embassy. Alice Bob Public Private One-way trapdoor function (e,n) d
  • 39. Encryption (ex) mod n function Plaintext Dear Bob - The meeting will be at the embassy. Alice Bob Public Private One-way trapdoor function (e,n) d
  • 40. Encryption (ex) mod n function Plaintext Ciphertext Dear Bob - The Qrne Obo - Gur meeting will be at zrrgvat jvyy or the embassy. ng gur rzonffl. Alice Bob Public Private One-way trapdoor function (e,n) d
  • 41. Encryption (ex) mod n function Plaintext Ciphertext Dear Bob - The Qrne Obo - Gur meeting will be at zrrgvat jvyy or the embassy. ng gur rzonffl. Alice Bob Public Private One-way trapdoor function (e,n) d
  • 42. Decryption (dy) mod n Encryption (ex) mod n function function Plaintext Ciphertext Dear Bob - The Qrne Obo - Gur meeting will be at zrrgvat jvyy or the embassy. ng gur rzonffl. Alice Bob Public Private One-way trapdoor function (e,n) d
  • 43. Decryption (dy) mod n Encryption (ex) mod n Original function function Plaintext Ciphertext plaintext Dear Bob - The Qrne Obo - Gur meeting will be at zrrgvat jvyy or Dear Bob - The the embassy. ng gur rzonffl. meeting will be at the embassy. Alice Bob Public Private One-way trapdoor function (e,n) d
  • 44. RSA Choose two large prime numbers p, q Calculate n = pq and m = (p-1)(q-1) Choose e such that gcd(e, (p-1)(q-1)) = 1 Choose d such that ed = 1 mod (p-1)(q-1) Alice Publicize e, n. Keep d private. To encrypt x: calculate y = xe mod n To decrypt y: calculate z = yd mod n. Fermat’s Little Theorem: Bob xed = x mod n.
  • 45. This number is a product of two primes: 74037563479561712828046796097 42957314259318888923128908493 62326389727650340282662768919 96419625117843995894330502127 58537011896809828673317327310 89309005525051168770632990723 96380786710086096962537934650 563796359
  • 46. Modulus (1024 bits): 9d 88 94 32 62 30 a3 3b 0f 5b 30 7c d5 69 75 21 25 99 0f e1 a8 c2 7d 5b 2b e9 24 72 48 fa 13 47 7c 53 8b 6a 56 be 66 5a 93 7c 3b bb 84 d4 90 4e ab d5 aa f1 33 de 93 2a 1c 80 e3 f5 19 25 a8 69 d3 55 44 fd 7f 76 bb 28 f5 90 62 69 57 eb 82 ba dd 73 40 c0 dd fb 7e 2b ea 86 8e 83 eb e1 5f cc f4 a5 a4 be 99 4f 90 ff 66 79 b1 44 d4 13 60 96 80 00 3d f8 49 b5 e7 82 54 b3 9d 17 56 cc 90 bb Exponent (24 bits): 01 00 01
  • 47. Cutting edge Design/analysis of Elliptic curve Quantum block ciphers cryptography cryptography
  • 48. Cryptology at Franklin College MAT 135 CMP 141 MAT 140 Computing I MAT 142 Calculus II MAT 240 MAT 300 MAT 233 Methods of Topics in Linear Algebra Problem Solving Mathematics MAT 361 Modern Algebra Careers: NSA and other government; network security MAT 490 and CISSP license; more Individualized Study
  • 49. For more information http://delicious.com/robert.talbert/crypto http://www.slideshare.net/rtalbert http://en.wikipedia.org/wiki/Portal:Cryptography