SlideShare a Scribd company logo
Chapter 4
Algebra and Number theory
in Cryptography
• The Modern cryptography is heavily dependent on:
abstract algebra and number theory.
Modular Arithmetic
• 3= 5(mod 2)
• Mod2 {0,1}
• Mod 3 { 0,1,2}
• Mod 9 {0,1,2,3,4,5,6,7,8}
Remember
10X10
‫تعود‬ ‫اليومية‬ ‫الساعة‬
‫رقم‬ ‫الى‬ ‫تصل‬ ‫عندما‬
‫ال‬ ‫حال‬ ‫وهذا‬ ‫معين‬
Modulus
1----12
‫اخذت‬ ‫وحدة‬ ‫لفة‬
10
‫وبقيت‬
25
‫مكافئة‬
‫هنا‬
10
‫تقسيم‬
6
=
1
‫والباقي‬
4
‫مش‬
2
‫على‬ ‫قسمنا‬ ‫انا‬ ‫فرضنا‬ ‫لو‬
12
‫واالجابة‬
2
‫و‬
2
‫في‬
12
‫تساوي‬
24
‫من‬
38
=
14
‫بين‬ ‫الفرق‬
30
‫وا‬
‫ال‬
23
‫هو‬
7
-
23<30
31/30 =1 the
remainder
31 > 30
‫السابقة‬ ‫تساوي‬ ‫هذه‬
‫ال‬ ‫طرح‬ ‫هنا‬
1
-
‫من‬
243
‫كررت‬
7
‫مرات‬
‫الجواب‬ ‫كان‬ ‫هنا‬
-
2
‫الرقم‬ ‫الن‬
11
‫من‬ ‫اقل‬
13
‫تم‬ ‫واذا‬
‫الناتج‬ ‫الطرح‬
=
-
2
‫تقسم‬ ‫لما‬
12
‫صفر‬ ‫الباقي‬ ‫عليهم‬
METHOD 1
‫الرقم‬ ‫يوضع‬ ‫هنا‬
‫االكبر‬
33 ‫االصغر‬ ‫الرقم‬
12
‫كوشن‬
‫صفر‬ ‫ليست‬ ‫طالما‬
‫الحل‬ ‫نكرر‬ ‫نبقى‬
3 is the biggest number can be divided by 12 and 33
HW
GCD Method 2
STOP
83 and 19 are relatively prime
Relatively Prime (Co-Prime) Numbers
‫النها‬
3
‫مش‬
1
‫ايضا‬ ‫الوقت‬ ‫نفس‬ ‫في‬ ‫برايم‬ ‫يكونوا‬ ‫ريليتد‬ ‫رقمين‬ ‫كل‬ ‫بالضرورة‬ ‫ليس‬
‫االرقام‬ ‫من‬ ‫من‬ ‫لمعرفة‬
1
‫و‬
2
‫و‬
3
‫و‬
4
‫تعتبر‬
relatively prime
‫ال‬ ‫نحسب‬
GCD
‫رقم‬ ‫لكل‬
‫مع‬
5
‫ليست‬
1
Solved examples
‫للحفظ‬ ‫قوانين‬
‫بالقو‬ ‫السابق‬ ‫المثال‬ ‫حل‬
‫انين‬
‫هناك‬ ‫ان‬ ‫اي‬
24
‫من‬ ‫اقل‬ ‫رقم‬
35
‫وتحوي‬
relative prime numbers
‫يعتبر‬ ‫ال‬ ‫رقم‬ ‫على‬ ‫المثال‬ ‫هذا‬prime number
‫للحب‬ ‫وقت‬ ‫سيستغرق‬ ‫كان‬ ‫كم‬ ‫قانةن‬ ‫من‬ ‫تتخيل‬ ‫ان‬ ‫لك‬
‫قوانين‬ ‫غير‬ ‫من‬ ‫يدوي‬ ‫الحل‬ ‫هذا‬ ‫تخيل‬
• Quantum cryptography is different from traditional cryptographic
systems in that it relies on physics, rather than mathematics, as the
key aspect of its security model.
Multiplicative Cipher
Encryption in the Multiplicative Cipher algorithm is done by :
- multiplying the message by the encryption key,
- and decryption is done by multiplying the cipher by the inverse of the
encryption key.
Multiplicative group: The group whose elements have the greatest common divisor and the group number is 1,
and all of whose elements are less than the group number.
Group number means the number below the letter Z, such as multiplication groups.
• The inverse of a number (Inverse): which is symbolized by the number raised to the
power of negative one, the inverse of the number.
• The inverse of p is the smallest number that makes the remainder of (p * a) ÷ b equal
to 1.
• Attention: the combination of the multiple of 5 and the remainder of the division of 5
are the same.
• Important: for an inverse to exist, the greatest common divisor of the number and the
divisor for the remainder must be 1.
• As following examples:
The inverse of p is the smallest number that makes the remainder of the division of (p * a) ÷ p 1.
Try to understand the writing here do not make algebraic and mathematical.
(1) Inverse of 3 remainder of division by 5.
a = 3, b = 5. The inverse of p is the smallest number that makes (p * a)% b = 1.
If inverse of 3 = 2.
(2) Inverse of 4 remainder of division by 5.
a = 4, b = 5.
Find p where (p * 4)% 5 = 1.
You find the number = 4, where 16% 5 = 1.
And so on ..
Note that the inverse is just the smallest number that satisfies the equation
How Multiplicative Cipher works?
• By multiplying the message by the encryption key, and decryption is done by multiplying the
cipher by the inverse of the encryption key.
Let's take an example that TX wants to send the number the word hello to RX, and the agreed encryption key was 7
The first step is :
1) to convert hello into numbers using the encoding table below so they are the numbers to be encoded
7, 4, 11, 11, 14
Encrypt numbers using an encryption algorithm
(7 * 7) % 26 = 23
(4*7) % 26 = 2
(11 * 7) % 26 = 25
(11 * 7) % 26 = 25
(14 * 7) % 26 = 20
Convert numbers to letters using the cipher table
23 = x
2 = c
25 = z
20 = u
The encrypted message becomes xczzu
• Example of decryption using the multiplex encryption algorithm
• We find the inverse of the encryption key, 7, which is 15. Why?
• Because 15 is the smallest number, the remainder of 7*15/26 equals 1.
• We convert the characters of the xczzu code into numbers
• 23 = x
• 2 = c
• 25 = z
• 20 = u
• We perform the decoding algorithm
• (23 * 15) % 26 = 7
• (2 * 15) % 26 = 4
• (25 * 15) % 26 = 11
• (20 * 15) % 26 = 14
• Convert the numbers into letters 7, 4, 11, 11, 14 and the word is hello.
Affine Cipher
• combining more than one encryption algorithm might result in a
more secure code: Avini coding algorithm applies this important
concept.
• applying the algorithm more than once always increases the strength
of the cipher, and that applying more than one encryption algorithm
on the message will increase the strength of the cipher. The code
always.
• Avini encryption algorithm have two ways,
• 1) direct encryption
• 2) detailed encryption:
• Detailed encryption is that you use your knowledge that the affine
algorithm consists of the addition encryption algorithm and the
Multiplicative encryption algorithm, and you apply the Multiplacteive
encryption first and then the addition encryption, and thus you have
produced a code by the affine algorithm. However, when decoding, you
must take into account that it reverses the order of application of the
two algorithms, that is, you apply the addition decoding algorithm first,
and then the multiplication algorithm decoding.
• Direct encryption is to use a single algorithm that combines both the
addition encryption algorithm and the multiplex encryption algorithm,
as shown below.
• Avene coding algorithm
• The number of keys in the affine encryption algorithm
• You will not miss that there are two encryption keys K1 and k2,
because the algorithm uses two algorithms, the first key is used in the
Multiplactive
• encryption algorithm and the second is used in the addition
encryption algorithm. And the existence of the key does not mean
that they are related to each other in any way. The first key may be
any number, and the second key may also be any number.
• But if you wondered about what is the inverse of the encryption key
K^-1, it is the inverse of the encryption key, which explained the
encryption method by Multiplicative.
•An example of encoding with the Avini algorithm
• You and I will encrypt oolom using encryption keys 3 and 5.
• We convert the word oolom into numbers using the coding table (if you don't know it, you will find it
here) to be
• 14, 14, 11, 14, 12.
• We encode these values ​​using direct encoding and converting the encoding value through the coding table
• cipher 14 = 21 = v.
• cipher 11 = 12 = m.
• cipher 12 = 15 = p.
• The code becomes vvmvp.
An example of decoding with the Avini algorithm
• Well, you got the code that your friend sent you in the name of the blog where he found this
algorithm, and the code was vvmp, and you know that the key is 3 and 5.
• The first step is to get the inverse of the first key (3), (how to get the inverse is explained here)
• Inverse of 3 = 9.
• Convert letters to numbers using the encoding and decoding table
• v = 21, decoding = ( (21 - 5) * 9) % 26 = 14 = o.
• m = 12, decoder = 11 = o.
• p = 15, decoder = 12 = p.
• The original message becomes oolum.
• https://www.oolom.com/1897/%D8%AE%D9%88%D8%A7%D8%B1%
D8%B2%D9%85%D9%8A%D8%A9-
%D8%A7%D9%84%D8%AA%D8%B4%D9%81%D9%8A%D8%B1-
%D8%A8%D8%A7%D9%84%D9%85%D8%B6%D8%A7%D8%B9%D9%8
1%D8%A9-multiplicative-cipher/
• ‫للتشفير‬ ‫رائع‬ ‫مثال‬

More Related Content

Similar to CH4__crypto.pptx

6th grade math notes
6th grade math notes6th grade math notes
6th grade math noteskonishiki
 
Real numbers system
Real numbers systemReal numbers system
Real numbers system
Pradeep Agrawal
 
1.Digital Electronics overview & Number Systems.pptx
1.Digital Electronics overview & Number Systems.pptx1.Digital Electronics overview & Number Systems.pptx
1.Digital Electronics overview & Number Systems.pptx
LibanMohamed26
 
Assignment 2 (1) (1).docx
Assignment 2 (1) (1).docxAssignment 2 (1) (1).docx
Assignment 2 (1) (1).docx
pinstechwork
 
Lecture 2 ns
Lecture 2 nsLecture 2 ns
Lecture 2 ns
Rabiul Sarker
 
RSA
RSARSA
Unit 1 Whole Numbers
Unit 1 Whole NumbersUnit 1 Whole Numbers
Unit 1 Whole Numbers
mdonham
 
Introduction Combined Number And Dp
Introduction Combined Number And DpIntroduction Combined Number And Dp
Introduction Combined Number And DpAwais Khan
 
Chapter 1 Study Guide
Chapter 1  Study  GuideChapter 1  Study  Guide
Chapter 1 Study Guide♥Moriah♥
 
Chapter 1 Study Guide
Chapter 1  Study  GuideChapter 1  Study  Guide
Chapter 1 Study Guide♥Moriah♥
 
Python Programming unit4.pdf
Python Programming unit4.pdfPython Programming unit4.pdf
Python Programming unit4.pdf
jamvantsolanki
 
1. Digital Electronics - Number System PART 1.pptx
1. Digital Electronics - Number System PART 1.pptx1. Digital Electronics - Number System PART 1.pptx
1. Digital Electronics - Number System PART 1.pptx
vsigncontents
 
1. Digital Electronics Number System.pdf
1. Digital Electronics Number System.pdf1. Digital Electronics Number System.pdf
1. Digital Electronics Number System.pdf
Nehachandran2
 
IS 139 Lecture 4
IS 139 Lecture 4IS 139 Lecture 4
IS 139 Lecture 4
wajanga
 
IS 139 Lecture 4 - 2015
IS 139 Lecture 4 - 2015IS 139 Lecture 4 - 2015
IS 139 Lecture 4 - 2015
Aron Kondoro
 
chapter1.pdf ......................................
chapter1.pdf ......................................chapter1.pdf ......................................
chapter1.pdf ......................................
nourhandardeer3
 
computer architecture organization in Ece
computer architecture organization in Ececomputer architecture organization in Ece
computer architecture organization in Ece
Bayesayohannis
 

Similar to CH4__crypto.pptx (20)

6th grade math notes
6th grade math notes6th grade math notes
6th grade math notes
 
Marh algebra lesson
Marh algebra lessonMarh algebra lesson
Marh algebra lesson
 
Real numbers system
Real numbers systemReal numbers system
Real numbers system
 
1.Digital Electronics overview & Number Systems.pptx
1.Digital Electronics overview & Number Systems.pptx1.Digital Electronics overview & Number Systems.pptx
1.Digital Electronics overview & Number Systems.pptx
 
Assignment 2 (1) (1).docx
Assignment 2 (1) (1).docxAssignment 2 (1) (1).docx
Assignment 2 (1) (1).docx
 
Lecture 2 ns
Lecture 2 nsLecture 2 ns
Lecture 2 ns
 
RSA
RSARSA
RSA
 
Unit 1 Whole Numbers
Unit 1 Whole NumbersUnit 1 Whole Numbers
Unit 1 Whole Numbers
 
Introduction Combined Number And Dp
Introduction Combined Number And DpIntroduction Combined Number And Dp
Introduction Combined Number And Dp
 
Chapter 1 Study Guide
Chapter 1  Study  GuideChapter 1  Study  Guide
Chapter 1 Study Guide
 
Chapter 1 Study Guide
Chapter 1  Study  GuideChapter 1  Study  Guide
Chapter 1 Study Guide
 
Python Programming unit4.pdf
Python Programming unit4.pdfPython Programming unit4.pdf
Python Programming unit4.pdf
 
1. Digital Electronics - Number System PART 1.pptx
1. Digital Electronics - Number System PART 1.pptx1. Digital Electronics - Number System PART 1.pptx
1. Digital Electronics - Number System PART 1.pptx
 
1. Digital Electronics Number System.pdf
1. Digital Electronics Number System.pdf1. Digital Electronics Number System.pdf
1. Digital Electronics Number System.pdf
 
IS 139 Lecture 4
IS 139 Lecture 4IS 139 Lecture 4
IS 139 Lecture 4
 
IS 139 Lecture 4 - 2015
IS 139 Lecture 4 - 2015IS 139 Lecture 4 - 2015
IS 139 Lecture 4 - 2015
 
Writing algorithms
Writing algorithmsWriting algorithms
Writing algorithms
 
4
44
4
 
chapter1.pdf ......................................
chapter1.pdf ......................................chapter1.pdf ......................................
chapter1.pdf ......................................
 
computer architecture organization in Ece
computer architecture organization in Ececomputer architecture organization in Ece
computer architecture organization in Ece
 

Recently uploaded

1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 

Recently uploaded (20)

1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 

CH4__crypto.pptx

  • 1. Chapter 4 Algebra and Number theory in Cryptography
  • 2.
  • 3. • The Modern cryptography is heavily dependent on: abstract algebra and number theory.
  • 4.
  • 5. Modular Arithmetic • 3= 5(mod 2) • Mod2 {0,1} • Mod 3 { 0,1,2} • Mod 9 {0,1,2,3,4,5,6,7,8}
  • 6.
  • 7.
  • 8.
  • 10. 10X10
  • 11.
  • 12.
  • 13. ‫تعود‬ ‫اليومية‬ ‫الساعة‬ ‫رقم‬ ‫الى‬ ‫تصل‬ ‫عندما‬ ‫ال‬ ‫حال‬ ‫وهذا‬ ‫معين‬ Modulus 1----12
  • 15.
  • 16. ‫هنا‬ 10 ‫تقسيم‬ 6 = 1 ‫والباقي‬ 4 ‫مش‬ 2 ‫على‬ ‫قسمنا‬ ‫انا‬ ‫فرضنا‬ ‫لو‬ 12 ‫واالجابة‬ 2 ‫و‬ 2 ‫في‬ 12 ‫تساوي‬ 24 ‫من‬ 38 = 14
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 24. ‫السابقة‬ ‫تساوي‬ ‫هذه‬ ‫ال‬ ‫طرح‬ ‫هنا‬ 1 - ‫من‬ 243
  • 25. ‫كررت‬ 7 ‫مرات‬ ‫الجواب‬ ‫كان‬ ‫هنا‬ - 2 ‫الرقم‬ ‫الن‬ 11 ‫من‬ ‫اقل‬ 13 ‫تم‬ ‫واذا‬ ‫الناتج‬ ‫الطرح‬ = - 2
  • 26.
  • 27.
  • 29.
  • 30. ‫الرقم‬ ‫يوضع‬ ‫هنا‬ ‫االكبر‬ 33 ‫االصغر‬ ‫الرقم‬ 12 ‫كوشن‬ ‫صفر‬ ‫ليست‬ ‫طالما‬ ‫الحل‬ ‫نكرر‬ ‫نبقى‬ 3 is the biggest number can be divided by 12 and 33
  • 31.
  • 32. HW
  • 34. STOP
  • 35. 83 and 19 are relatively prime
  • 37.
  • 38.
  • 40. ‫ايضا‬ ‫الوقت‬ ‫نفس‬ ‫في‬ ‫برايم‬ ‫يكونوا‬ ‫ريليتد‬ ‫رقمين‬ ‫كل‬ ‫بالضرورة‬ ‫ليس‬
  • 41.
  • 42. ‫االرقام‬ ‫من‬ ‫من‬ ‫لمعرفة‬ 1 ‫و‬ 2 ‫و‬ 3 ‫و‬ 4 ‫تعتبر‬ relatively prime ‫ال‬ ‫نحسب‬ GCD ‫رقم‬ ‫لكل‬ ‫مع‬ 5
  • 43.
  • 48.
  • 49. ‫هناك‬ ‫ان‬ ‫اي‬ 24 ‫من‬ ‫اقل‬ ‫رقم‬ 35 ‫وتحوي‬ relative prime numbers ‫يعتبر‬ ‫ال‬ ‫رقم‬ ‫على‬ ‫المثال‬ ‫هذا‬prime number ‫للحب‬ ‫وقت‬ ‫سيستغرق‬ ‫كان‬ ‫كم‬ ‫قانةن‬ ‫من‬ ‫تتخيل‬ ‫ان‬ ‫لك‬
  • 50. ‫قوانين‬ ‫غير‬ ‫من‬ ‫يدوي‬ ‫الحل‬ ‫هذا‬ ‫تخيل‬
  • 51.
  • 52.
  • 53.
  • 54. • Quantum cryptography is different from traditional cryptographic systems in that it relies on physics, rather than mathematics, as the key aspect of its security model.
  • 55.
  • 56.
  • 57. Multiplicative Cipher Encryption in the Multiplicative Cipher algorithm is done by : - multiplying the message by the encryption key, - and decryption is done by multiplying the cipher by the inverse of the encryption key. Multiplicative group: The group whose elements have the greatest common divisor and the group number is 1, and all of whose elements are less than the group number. Group number means the number below the letter Z, such as multiplication groups.
  • 58. • The inverse of a number (Inverse): which is symbolized by the number raised to the power of negative one, the inverse of the number. • The inverse of p is the smallest number that makes the remainder of (p * a) ÷ b equal to 1. • Attention: the combination of the multiple of 5 and the remainder of the division of 5 are the same. • Important: for an inverse to exist, the greatest common divisor of the number and the divisor for the remainder must be 1. • As following examples: The inverse of p is the smallest number that makes the remainder of the division of (p * a) ÷ p 1. Try to understand the writing here do not make algebraic and mathematical. (1) Inverse of 3 remainder of division by 5. a = 3, b = 5. The inverse of p is the smallest number that makes (p * a)% b = 1. If inverse of 3 = 2. (2) Inverse of 4 remainder of division by 5. a = 4, b = 5. Find p where (p * 4)% 5 = 1. You find the number = 4, where 16% 5 = 1. And so on .. Note that the inverse is just the smallest number that satisfies the equation
  • 59. How Multiplicative Cipher works? • By multiplying the message by the encryption key, and decryption is done by multiplying the cipher by the inverse of the encryption key. Let's take an example that TX wants to send the number the word hello to RX, and the agreed encryption key was 7 The first step is : 1) to convert hello into numbers using the encoding table below so they are the numbers to be encoded 7, 4, 11, 11, 14
  • 60. Encrypt numbers using an encryption algorithm (7 * 7) % 26 = 23 (4*7) % 26 = 2 (11 * 7) % 26 = 25 (11 * 7) % 26 = 25 (14 * 7) % 26 = 20 Convert numbers to letters using the cipher table 23 = x 2 = c 25 = z 20 = u The encrypted message becomes xczzu
  • 61. • Example of decryption using the multiplex encryption algorithm • We find the inverse of the encryption key, 7, which is 15. Why? • Because 15 is the smallest number, the remainder of 7*15/26 equals 1. • We convert the characters of the xczzu code into numbers • 23 = x • 2 = c • 25 = z • 20 = u • We perform the decoding algorithm • (23 * 15) % 26 = 7 • (2 * 15) % 26 = 4 • (25 * 15) % 26 = 11 • (20 * 15) % 26 = 14 • Convert the numbers into letters 7, 4, 11, 11, 14 and the word is hello.
  • 62. Affine Cipher • combining more than one encryption algorithm might result in a more secure code: Avini coding algorithm applies this important concept. • applying the algorithm more than once always increases the strength of the cipher, and that applying more than one encryption algorithm on the message will increase the strength of the cipher. The code always.
  • 63. • Avini encryption algorithm have two ways, • 1) direct encryption • 2) detailed encryption: • Detailed encryption is that you use your knowledge that the affine algorithm consists of the addition encryption algorithm and the Multiplicative encryption algorithm, and you apply the Multiplacteive encryption first and then the addition encryption, and thus you have produced a code by the affine algorithm. However, when decoding, you must take into account that it reverses the order of application of the two algorithms, that is, you apply the addition decoding algorithm first, and then the multiplication algorithm decoding. • Direct encryption is to use a single algorithm that combines both the addition encryption algorithm and the multiplex encryption algorithm, as shown below. • Avene coding algorithm
  • 64. • The number of keys in the affine encryption algorithm • You will not miss that there are two encryption keys K1 and k2, because the algorithm uses two algorithms, the first key is used in the Multiplactive • encryption algorithm and the second is used in the addition encryption algorithm. And the existence of the key does not mean that they are related to each other in any way. The first key may be any number, and the second key may also be any number. • But if you wondered about what is the inverse of the encryption key K^-1, it is the inverse of the encryption key, which explained the encryption method by Multiplicative.
  • 65. •An example of encoding with the Avini algorithm • You and I will encrypt oolom using encryption keys 3 and 5. • We convert the word oolom into numbers using the coding table (if you don't know it, you will find it here) to be • 14, 14, 11, 14, 12. • We encode these values ​​using direct encoding and converting the encoding value through the coding table • cipher 14 = 21 = v. • cipher 11 = 12 = m. • cipher 12 = 15 = p. • The code becomes vvmvp.
  • 66. An example of decoding with the Avini algorithm • Well, you got the code that your friend sent you in the name of the blog where he found this algorithm, and the code was vvmp, and you know that the key is 3 and 5. • The first step is to get the inverse of the first key (3), (how to get the inverse is explained here) • Inverse of 3 = 9. • Convert letters to numbers using the encoding and decoding table • v = 21, decoding = ( (21 - 5) * 9) % 26 = 14 = o. • m = 12, decoder = 11 = o. • p = 15, decoder = 12 = p. • The original message becomes oolum.