SlideShare a Scribd company logo
1 of 67
Chapter 4
Algebra and Number theory
in Cryptography
• The Modern cryptography is heavily dependent on:
abstract algebra and number theory.
Modular Arithmetic
• 3= 5(mod 2)
• Mod2 {0,1}
• Mod 3 { 0,1,2}
• Mod 9 {0,1,2,3,4,5,6,7,8}
Remember
10X10
‫تعود‬ ‫اليومية‬ ‫الساعة‬
‫رقم‬ ‫الى‬ ‫تصل‬ ‫عندما‬
‫ال‬ ‫حال‬ ‫وهذا‬ ‫معين‬
Modulus
1----12
‫اخذت‬ ‫وحدة‬ ‫لفة‬
10
‫وبقيت‬
25
‫مكافئة‬
‫هنا‬
10
‫تقسيم‬
6
=
1
‫والباقي‬
4
‫مش‬
2
‫على‬ ‫قسمنا‬ ‫انا‬ ‫فرضنا‬ ‫لو‬
12
‫واالجابة‬
2
‫و‬
2
‫في‬
12
‫تساوي‬
24
‫من‬
38
=
14
‫بين‬ ‫الفرق‬
30
‫وا‬
‫ال‬
23
‫هو‬
7
-
23<30
31/30 =1 the
remainder
31 > 30
‫السابقة‬ ‫تساوي‬ ‫هذه‬
‫ال‬ ‫طرح‬ ‫هنا‬
1
-
‫من‬
243
‫كررت‬
7
‫مرات‬
‫الجواب‬ ‫كان‬ ‫هنا‬
-
2
‫الرقم‬ ‫الن‬
11
‫من‬ ‫اقل‬
13
‫تم‬ ‫واذا‬
‫الناتج‬ ‫الطرح‬
=
-
2
‫تقسم‬ ‫لما‬
12
‫صفر‬ ‫الباقي‬ ‫عليهم‬
METHOD 1
‫الرقم‬ ‫يوضع‬ ‫هنا‬
‫االكبر‬
33 ‫االصغر‬ ‫الرقم‬
12
‫كوشن‬
‫صفر‬ ‫ليست‬ ‫طالما‬
‫الحل‬ ‫نكرر‬ ‫نبقى‬
3 is the biggest number can be divided by 12 and 33
HW
GCD Method 2
STOP
83 and 19 are relatively prime
Relatively Prime (Co-Prime) Numbers
‫النها‬
3
‫مش‬
1
‫ايضا‬ ‫الوقت‬ ‫نفس‬ ‫في‬ ‫برايم‬ ‫يكونوا‬ ‫ريليتد‬ ‫رقمين‬ ‫كل‬ ‫بالضرورة‬ ‫ليس‬
‫االرقام‬ ‫من‬ ‫من‬ ‫لمعرفة‬
1
‫و‬
2
‫و‬
3
‫و‬
4
‫تعتبر‬
relatively prime
‫ال‬ ‫نحسب‬
GCD
‫رقم‬ ‫لكل‬
‫مع‬
5
‫ليست‬
1
Solved examples
‫للحفظ‬ ‫قوانين‬
‫بالقو‬ ‫السابق‬ ‫المثال‬ ‫حل‬
‫انين‬
‫هناك‬ ‫ان‬ ‫اي‬
24
‫من‬ ‫اقل‬ ‫رقم‬
35
‫وتحوي‬
relative prime numbers
‫يعتبر‬ ‫ال‬ ‫رقم‬ ‫على‬ ‫المثال‬ ‫هذا‬prime number
‫للحب‬ ‫وقت‬ ‫سيستغرق‬ ‫كان‬ ‫كم‬ ‫قانةن‬ ‫من‬ ‫تتخيل‬ ‫ان‬ ‫لك‬
‫قوانين‬ ‫غير‬ ‫من‬ ‫يدوي‬ ‫الحل‬ ‫هذا‬ ‫تخيل‬
• Quantum cryptography is different from traditional cryptographic
systems in that it relies on physics, rather than mathematics, as the
key aspect of its security model.
Multiplicative Cipher
Encryption in the Multiplicative Cipher algorithm is done by :
- multiplying the message by the encryption key,
- and decryption is done by multiplying the cipher by the inverse of the
encryption key.
Multiplicative group: The group whose elements have the greatest common divisor and the group number is 1,
and all of whose elements are less than the group number.
Group number means the number below the letter Z, such as multiplication groups.
• The inverse of a number (Inverse): which is symbolized by the number raised to the
power of negative one, the inverse of the number.
• The inverse of p is the smallest number that makes the remainder of (p * a) ÷ b equal
to 1.
• Attention: the combination of the multiple of 5 and the remainder of the division of 5
are the same.
• Important: for an inverse to exist, the greatest common divisor of the number and the
divisor for the remainder must be 1.
• As following examples:
The inverse of p is the smallest number that makes the remainder of the division of (p * a) ÷ p 1.
Try to understand the writing here do not make algebraic and mathematical.
(1) Inverse of 3 remainder of division by 5.
a = 3, b = 5. The inverse of p is the smallest number that makes (p * a)% b = 1.
If inverse of 3 = 2.
(2) Inverse of 4 remainder of division by 5.
a = 4, b = 5.
Find p where (p * 4)% 5 = 1.
You find the number = 4, where 16% 5 = 1.
And so on ..
Note that the inverse is just the smallest number that satisfies the equation
How Multiplicative Cipher works?
• By multiplying the message by the encryption key, and decryption is done by multiplying the
cipher by the inverse of the encryption key.
Let's take an example that TX wants to send the number the word hello to RX, and the agreed encryption key was 7
The first step is :
1) to convert hello into numbers using the encoding table below so they are the numbers to be encoded
7, 4, 11, 11, 14
Encrypt numbers using an encryption algorithm
(7 * 7) % 26 = 23
(4*7) % 26 = 2
(11 * 7) % 26 = 25
(11 * 7) % 26 = 25
(14 * 7) % 26 = 20
Convert numbers to letters using the cipher table
23 = x
2 = c
25 = z
20 = u
The encrypted message becomes xczzu
• Example of decryption using the multiplex encryption algorithm
• We find the inverse of the encryption key, 7, which is 15. Why?
• Because 15 is the smallest number, the remainder of 7*15/26 equals 1.
• We convert the characters of the xczzu code into numbers
• 23 = x
• 2 = c
• 25 = z
• 20 = u
• We perform the decoding algorithm
• (23 * 15) % 26 = 7
• (2 * 15) % 26 = 4
• (25 * 15) % 26 = 11
• (20 * 15) % 26 = 14
• Convert the numbers into letters 7, 4, 11, 11, 14 and the word is hello.
Affine Cipher
• combining more than one encryption algorithm might result in a
more secure code: Avini coding algorithm applies this important
concept.
• applying the algorithm more than once always increases the strength
of the cipher, and that applying more than one encryption algorithm
on the message will increase the strength of the cipher. The code
always.
• Avini encryption algorithm have two ways,
• 1) direct encryption
• 2) detailed encryption:
• Detailed encryption is that you use your knowledge that the affine
algorithm consists of the addition encryption algorithm and the
Multiplicative encryption algorithm, and you apply the Multiplacteive
encryption first and then the addition encryption, and thus you have
produced a code by the affine algorithm. However, when decoding, you
must take into account that it reverses the order of application of the
two algorithms, that is, you apply the addition decoding algorithm first,
and then the multiplication algorithm decoding.
• Direct encryption is to use a single algorithm that combines both the
addition encryption algorithm and the multiplex encryption algorithm,
as shown below.
• Avene coding algorithm
• The number of keys in the affine encryption algorithm
• You will not miss that there are two encryption keys K1 and k2,
because the algorithm uses two algorithms, the first key is used in the
Multiplactive
• encryption algorithm and the second is used in the addition
encryption algorithm. And the existence of the key does not mean
that they are related to each other in any way. The first key may be
any number, and the second key may also be any number.
• But if you wondered about what is the inverse of the encryption key
K^-1, it is the inverse of the encryption key, which explained the
encryption method by Multiplicative.
•An example of encoding with the Avini algorithm
• You and I will encrypt oolom using encryption keys 3 and 5.
• We convert the word oolom into numbers using the coding table (if you don't know it, you will find it
here) to be
• 14, 14, 11, 14, 12.
• We encode these values ​​using direct encoding and converting the encoding value through the coding table
• cipher 14 = 21 = v.
• cipher 11 = 12 = m.
• cipher 12 = 15 = p.
• The code becomes vvmvp.
An example of decoding with the Avini algorithm
• Well, you got the code that your friend sent you in the name of the blog where he found this
algorithm, and the code was vvmp, and you know that the key is 3 and 5.
• The first step is to get the inverse of the first key (3), (how to get the inverse is explained here)
• Inverse of 3 = 9.
• Convert letters to numbers using the encoding and decoding table
• v = 21, decoding = ( (21 - 5) * 9) % 26 = 14 = o.
• m = 12, decoder = 11 = o.
• p = 15, decoder = 12 = p.
• The original message becomes oolum.
• https://www.oolom.com/1897/%D8%AE%D9%88%D8%A7%D8%B1%
D8%B2%D9%85%D9%8A%D8%A9-
%D8%A7%D9%84%D8%AA%D8%B4%D9%81%D9%8A%D8%B1-
%D8%A8%D8%A7%D9%84%D9%85%D8%B6%D8%A7%D8%B9%D9%8
1%D8%A9-multiplicative-cipher/
• ‫للتشفير‬ ‫رائع‬ ‫مثال‬

More Related Content

Similar to CH4__crypto.pptx

6th grade math notes
6th grade math notes6th grade math notes
6th grade math noteskonishiki
 
1.Digital Electronics overview & Number Systems.pptx
1.Digital Electronics overview & Number Systems.pptx1.Digital Electronics overview & Number Systems.pptx
1.Digital Electronics overview & Number Systems.pptxLibanMohamed26
 
Assignment 2 (1) (1).docx
Assignment 2 (1) (1).docxAssignment 2 (1) (1).docx
Assignment 2 (1) (1).docxpinstechwork
 
Unit 1 Whole Numbers
Unit 1 Whole NumbersUnit 1 Whole Numbers
Unit 1 Whole Numbersmdonham
 
Introduction Combined Number And Dp
Introduction Combined Number And DpIntroduction Combined Number And Dp
Introduction Combined Number And DpAwais Khan
 
Chapter 1 Study Guide
Chapter 1  Study  GuideChapter 1  Study  Guide
Chapter 1 Study Guide♥Moriah♥
 
Chapter 1 Study Guide
Chapter 1  Study  GuideChapter 1  Study  Guide
Chapter 1 Study Guide♥Moriah♥
 
Python Programming unit4.pdf
Python Programming unit4.pdfPython Programming unit4.pdf
Python Programming unit4.pdfjamvantsolanki
 
IS 139 Lecture 4 - 2015
IS 139 Lecture 4 - 2015IS 139 Lecture 4 - 2015
IS 139 Lecture 4 - 2015Aron Kondoro
 
IS 139 Lecture 4
IS 139 Lecture 4IS 139 Lecture 4
IS 139 Lecture 4wajanga
 
chapter1.pdf ......................................
chapter1.pdf ......................................chapter1.pdf ......................................
chapter1.pdf ......................................nourhandardeer3
 
computer architecture organization in Ece
computer architecture organization in Ececomputer architecture organization in Ece
computer architecture organization in EceBayesayohannis
 
Number system by ammar nawab
Number system by ammar nawabNumber system by ammar nawab
Number system by ammar nawabAmmar_n
 

Similar to CH4__crypto.pptx (20)

6th grade math notes
6th grade math notes6th grade math notes
6th grade math notes
 
Marh algebra lesson
Marh algebra lessonMarh algebra lesson
Marh algebra lesson
 
Real numbers system
Real numbers systemReal numbers system
Real numbers system
 
1.Digital Electronics overview & Number Systems.pptx
1.Digital Electronics overview & Number Systems.pptx1.Digital Electronics overview & Number Systems.pptx
1.Digital Electronics overview & Number Systems.pptx
 
Assignment 2 (1) (1).docx
Assignment 2 (1) (1).docxAssignment 2 (1) (1).docx
Assignment 2 (1) (1).docx
 
Lecture 2 ns
Lecture 2 nsLecture 2 ns
Lecture 2 ns
 
RSA
RSARSA
RSA
 
Unit 1 Whole Numbers
Unit 1 Whole NumbersUnit 1 Whole Numbers
Unit 1 Whole Numbers
 
Introduction Combined Number And Dp
Introduction Combined Number And DpIntroduction Combined Number And Dp
Introduction Combined Number And Dp
 
Chapter 1 Study Guide
Chapter 1  Study  GuideChapter 1  Study  Guide
Chapter 1 Study Guide
 
Chapter 1 Study Guide
Chapter 1  Study  GuideChapter 1  Study  Guide
Chapter 1 Study Guide
 
Python Programming unit4.pdf
Python Programming unit4.pdfPython Programming unit4.pdf
Python Programming unit4.pdf
 
IS 139 Lecture 4 - 2015
IS 139 Lecture 4 - 2015IS 139 Lecture 4 - 2015
IS 139 Lecture 4 - 2015
 
IS 139 Lecture 4
IS 139 Lecture 4IS 139 Lecture 4
IS 139 Lecture 4
 
Writing algorithms
Writing algorithmsWriting algorithms
Writing algorithms
 
4
44
4
 
chapter1.pdf ......................................
chapter1.pdf ......................................chapter1.pdf ......................................
chapter1.pdf ......................................
 
computer architecture organization in Ece
computer architecture organization in Ececomputer architecture organization in Ece
computer architecture organization in Ece
 
Number system by ammar nawab
Number system by ammar nawabNumber system by ammar nawab
Number system by ammar nawab
 
PEA305 workbook.pdf
PEA305 workbook.pdfPEA305 workbook.pdf
PEA305 workbook.pdf
 

Recently uploaded

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 

Recently uploaded (20)

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 

CH4__crypto.pptx

  • 1. Chapter 4 Algebra and Number theory in Cryptography
  • 2.
  • 3. • The Modern cryptography is heavily dependent on: abstract algebra and number theory.
  • 4.
  • 5. Modular Arithmetic • 3= 5(mod 2) • Mod2 {0,1} • Mod 3 { 0,1,2} • Mod 9 {0,1,2,3,4,5,6,7,8}
  • 6.
  • 7.
  • 8.
  • 10. 10X10
  • 11.
  • 12.
  • 13. ‫تعود‬ ‫اليومية‬ ‫الساعة‬ ‫رقم‬ ‫الى‬ ‫تصل‬ ‫عندما‬ ‫ال‬ ‫حال‬ ‫وهذا‬ ‫معين‬ Modulus 1----12
  • 15.
  • 16. ‫هنا‬ 10 ‫تقسيم‬ 6 = 1 ‫والباقي‬ 4 ‫مش‬ 2 ‫على‬ ‫قسمنا‬ ‫انا‬ ‫فرضنا‬ ‫لو‬ 12 ‫واالجابة‬ 2 ‫و‬ 2 ‫في‬ 12 ‫تساوي‬ 24 ‫من‬ 38 = 14
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 24. ‫السابقة‬ ‫تساوي‬ ‫هذه‬ ‫ال‬ ‫طرح‬ ‫هنا‬ 1 - ‫من‬ 243
  • 25. ‫كررت‬ 7 ‫مرات‬ ‫الجواب‬ ‫كان‬ ‫هنا‬ - 2 ‫الرقم‬ ‫الن‬ 11 ‫من‬ ‫اقل‬ 13 ‫تم‬ ‫واذا‬ ‫الناتج‬ ‫الطرح‬ = - 2
  • 26.
  • 27.
  • 29.
  • 30. ‫الرقم‬ ‫يوضع‬ ‫هنا‬ ‫االكبر‬ 33 ‫االصغر‬ ‫الرقم‬ 12 ‫كوشن‬ ‫صفر‬ ‫ليست‬ ‫طالما‬ ‫الحل‬ ‫نكرر‬ ‫نبقى‬ 3 is the biggest number can be divided by 12 and 33
  • 31.
  • 32. HW
  • 34. STOP
  • 35. 83 and 19 are relatively prime
  • 37.
  • 38.
  • 40. ‫ايضا‬ ‫الوقت‬ ‫نفس‬ ‫في‬ ‫برايم‬ ‫يكونوا‬ ‫ريليتد‬ ‫رقمين‬ ‫كل‬ ‫بالضرورة‬ ‫ليس‬
  • 41.
  • 42. ‫االرقام‬ ‫من‬ ‫من‬ ‫لمعرفة‬ 1 ‫و‬ 2 ‫و‬ 3 ‫و‬ 4 ‫تعتبر‬ relatively prime ‫ال‬ ‫نحسب‬ GCD ‫رقم‬ ‫لكل‬ ‫مع‬ 5
  • 43.
  • 48.
  • 49. ‫هناك‬ ‫ان‬ ‫اي‬ 24 ‫من‬ ‫اقل‬ ‫رقم‬ 35 ‫وتحوي‬ relative prime numbers ‫يعتبر‬ ‫ال‬ ‫رقم‬ ‫على‬ ‫المثال‬ ‫هذا‬prime number ‫للحب‬ ‫وقت‬ ‫سيستغرق‬ ‫كان‬ ‫كم‬ ‫قانةن‬ ‫من‬ ‫تتخيل‬ ‫ان‬ ‫لك‬
  • 50. ‫قوانين‬ ‫غير‬ ‫من‬ ‫يدوي‬ ‫الحل‬ ‫هذا‬ ‫تخيل‬
  • 51.
  • 52.
  • 53.
  • 54. • Quantum cryptography is different from traditional cryptographic systems in that it relies on physics, rather than mathematics, as the key aspect of its security model.
  • 55.
  • 56.
  • 57. Multiplicative Cipher Encryption in the Multiplicative Cipher algorithm is done by : - multiplying the message by the encryption key, - and decryption is done by multiplying the cipher by the inverse of the encryption key. Multiplicative group: The group whose elements have the greatest common divisor and the group number is 1, and all of whose elements are less than the group number. Group number means the number below the letter Z, such as multiplication groups.
  • 58. • The inverse of a number (Inverse): which is symbolized by the number raised to the power of negative one, the inverse of the number. • The inverse of p is the smallest number that makes the remainder of (p * a) ÷ b equal to 1. • Attention: the combination of the multiple of 5 and the remainder of the division of 5 are the same. • Important: for an inverse to exist, the greatest common divisor of the number and the divisor for the remainder must be 1. • As following examples: The inverse of p is the smallest number that makes the remainder of the division of (p * a) ÷ p 1. Try to understand the writing here do not make algebraic and mathematical. (1) Inverse of 3 remainder of division by 5. a = 3, b = 5. The inverse of p is the smallest number that makes (p * a)% b = 1. If inverse of 3 = 2. (2) Inverse of 4 remainder of division by 5. a = 4, b = 5. Find p where (p * 4)% 5 = 1. You find the number = 4, where 16% 5 = 1. And so on .. Note that the inverse is just the smallest number that satisfies the equation
  • 59. How Multiplicative Cipher works? • By multiplying the message by the encryption key, and decryption is done by multiplying the cipher by the inverse of the encryption key. Let's take an example that TX wants to send the number the word hello to RX, and the agreed encryption key was 7 The first step is : 1) to convert hello into numbers using the encoding table below so they are the numbers to be encoded 7, 4, 11, 11, 14
  • 60. Encrypt numbers using an encryption algorithm (7 * 7) % 26 = 23 (4*7) % 26 = 2 (11 * 7) % 26 = 25 (11 * 7) % 26 = 25 (14 * 7) % 26 = 20 Convert numbers to letters using the cipher table 23 = x 2 = c 25 = z 20 = u The encrypted message becomes xczzu
  • 61. • Example of decryption using the multiplex encryption algorithm • We find the inverse of the encryption key, 7, which is 15. Why? • Because 15 is the smallest number, the remainder of 7*15/26 equals 1. • We convert the characters of the xczzu code into numbers • 23 = x • 2 = c • 25 = z • 20 = u • We perform the decoding algorithm • (23 * 15) % 26 = 7 • (2 * 15) % 26 = 4 • (25 * 15) % 26 = 11 • (20 * 15) % 26 = 14 • Convert the numbers into letters 7, 4, 11, 11, 14 and the word is hello.
  • 62. Affine Cipher • combining more than one encryption algorithm might result in a more secure code: Avini coding algorithm applies this important concept. • applying the algorithm more than once always increases the strength of the cipher, and that applying more than one encryption algorithm on the message will increase the strength of the cipher. The code always.
  • 63. • Avini encryption algorithm have two ways, • 1) direct encryption • 2) detailed encryption: • Detailed encryption is that you use your knowledge that the affine algorithm consists of the addition encryption algorithm and the Multiplicative encryption algorithm, and you apply the Multiplacteive encryption first and then the addition encryption, and thus you have produced a code by the affine algorithm. However, when decoding, you must take into account that it reverses the order of application of the two algorithms, that is, you apply the addition decoding algorithm first, and then the multiplication algorithm decoding. • Direct encryption is to use a single algorithm that combines both the addition encryption algorithm and the multiplex encryption algorithm, as shown below. • Avene coding algorithm
  • 64. • The number of keys in the affine encryption algorithm • You will not miss that there are two encryption keys K1 and k2, because the algorithm uses two algorithms, the first key is used in the Multiplactive • encryption algorithm and the second is used in the addition encryption algorithm. And the existence of the key does not mean that they are related to each other in any way. The first key may be any number, and the second key may also be any number. • But if you wondered about what is the inverse of the encryption key K^-1, it is the inverse of the encryption key, which explained the encryption method by Multiplicative.
  • 65. •An example of encoding with the Avini algorithm • You and I will encrypt oolom using encryption keys 3 and 5. • We convert the word oolom into numbers using the coding table (if you don't know it, you will find it here) to be • 14, 14, 11, 14, 12. • We encode these values ​​using direct encoding and converting the encoding value through the coding table • cipher 14 = 21 = v. • cipher 11 = 12 = m. • cipher 12 = 15 = p. • The code becomes vvmvp.
  • 66. An example of decoding with the Avini algorithm • Well, you got the code that your friend sent you in the name of the blog where he found this algorithm, and the code was vvmp, and you know that the key is 3 and 5. • The first step is to get the inverse of the first key (3), (how to get the inverse is explained here) • Inverse of 3 = 9. • Convert letters to numbers using the encoding and decoding table • v = 21, decoding = ( (21 - 5) * 9) % 26 = 14 = o. • m = 12, decoder = 11 = o. • p = 15, decoder = 12 = p. • The original message becomes oolum.