This document provides an introduction to cryptography. It discusses how cryptography is essential for secure communication on the internet. It then covers the history of cryptography from its first documented uses in ancient Egypt through its importance in World War II. It defines cryptography terms and describes encryption and decryption. It also summarizes some classical cryptography techniques like the Caesar cipher and discusses concepts like prime numbers and the RSA encryption algorithm.
Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix graphy means “writing”.
Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix graphy means “writing”.
We will discuss the following: RSA Key generation , RSA Encryption , RSA Decryption , A Real World Example, RSA Security.
https://www.youtube.com/watch?v=x7QWJ13dgGs&list=PLKYmvyjH53q13_6aS4VwgXU0Nb_4sjwuf&index=7
This presentation will show you the basics of cryptography.
Main topics like basic terminology,goals of cryptography,threats,types of cryptography,algorithms of cryptography,etc. are covered in this presentation.If you like this presentation please do hit the like.
Cryptography is the practice and study of techniques for conveying information security.
The goal of Cryptography is to allow the intended recipients of the message to receive the message securely.
The most famous algorithm used today is RSA algorithm
The presentation describes basics of cryptography and information security. It covers goals of cryptography, history of cipher symmetric and public key cryptography
This PPT explains about the term "Cryptography - Encryption & Decryption". This PPT is for beginners and for intermediate developers who want to learn about Cryptography. I have also explained about the various classes which .Net provides for encryption and decryption and some other terms like "AES" and "DES".
A brief discussion of network security and an introduction to cryptography. We end the presentation with a discussion of the RSA algorithm, and show how it works with a basic example.
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
A detailed description about Cryptography explaining the topic from the very basics. Explaining how it all started, and how is it currently being applied in the real world. Mostly useful for students in engineering and mathematics.
We will discuss the following: RSA Key generation , RSA Encryption , RSA Decryption , A Real World Example, RSA Security.
https://www.youtube.com/watch?v=x7QWJ13dgGs&list=PLKYmvyjH53q13_6aS4VwgXU0Nb_4sjwuf&index=7
This presentation will show you the basics of cryptography.
Main topics like basic terminology,goals of cryptography,threats,types of cryptography,algorithms of cryptography,etc. are covered in this presentation.If you like this presentation please do hit the like.
Cryptography is the practice and study of techniques for conveying information security.
The goal of Cryptography is to allow the intended recipients of the message to receive the message securely.
The most famous algorithm used today is RSA algorithm
The presentation describes basics of cryptography and information security. It covers goals of cryptography, history of cipher symmetric and public key cryptography
This PPT explains about the term "Cryptography - Encryption & Decryption". This PPT is for beginners and for intermediate developers who want to learn about Cryptography. I have also explained about the various classes which .Net provides for encryption and decryption and some other terms like "AES" and "DES".
A brief discussion of network security and an introduction to cryptography. We end the presentation with a discussion of the RSA algorithm, and show how it works with a basic example.
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
A detailed description about Cryptography explaining the topic from the very basics. Explaining how it all started, and how is it currently being applied in the real world. Mostly useful for students in engineering and mathematics.
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...Scintica Instrumentation
Intravital microscopy (IVM) is a powerful tool utilized to study cellular behavior over time and space in vivo. Much of our understanding of cell biology has been accomplished using various in vitro and ex vivo methods; however, these studies do not necessarily reflect the natural dynamics of biological processes. Unlike traditional cell culture or fixed tissue imaging, IVM allows for the ultra-fast high-resolution imaging of cellular processes over time and space and were studied in its natural environment. Real-time visualization of biological processes in the context of an intact organism helps maintain physiological relevance and provide insights into the progression of disease, response to treatments or developmental processes.
In this webinar we give an overview of advanced applications of the IVM system in preclinical research. IVIM technology is a provider of all-in-one intravital microscopy systems and solutions optimized for in vivo imaging of live animal models at sub-micron resolution. The system’s unique features and user-friendly software enables researchers to probe fast dynamic biological processes such as immune cell tracking, cell-cell interaction as well as vascularization and tumor metastasis with exceptional detail. This webinar will also give an overview of IVM being utilized in drug development, offering a view into the intricate interaction between drugs/nanoparticles and tissues in vivo and allows for the evaluation of therapeutic intervention in a variety of tissues and organs. This interdisciplinary collaboration continues to drive the advancements of novel therapeutic strategies.
Multi-source connectivity as the driver of solar wind variability in the heli...Sérgio Sacani
The ambient solar wind that flls the heliosphere originates from multiple
sources in the solar corona and is highly structured. It is often described
as high-speed, relatively homogeneous, plasma streams from coronal
holes and slow-speed, highly variable, streams whose source regions are
under debate. A key goal of ESA/NASA’s Solar Orbiter mission is to identify
solar wind sources and understand what drives the complexity seen in the
heliosphere. By combining magnetic feld modelling and spectroscopic
techniques with high-resolution observations and measurements, we show
that the solar wind variability detected in situ by Solar Orbiter in March
2022 is driven by spatio-temporal changes in the magnetic connectivity to
multiple sources in the solar atmosphere. The magnetic feld footpoints
connected to the spacecraft moved from the boundaries of a coronal hole
to one active region (12961) and then across to another region (12957). This
is refected in the in situ measurements, which show the transition from fast
to highly Alfvénic then to slow solar wind that is disrupted by the arrival of
a coronal mass ejection. Our results describe solar wind variability at 0.5 au
but are applicable to near-Earth observatories.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.Sérgio Sacani
The return of a sample of near-surface atmosphere from Mars would facilitate answers to several first-order science questions surrounding the formation and evolution of the planet. One of the important aspects of terrestrial planet formation in general is the role that primary atmospheres played in influencing the chemistry and structure of the planets and their antecedents. Studies of the martian atmosphere can be used to investigate the role of a primary atmosphere in its history. Atmosphere samples would also inform our understanding of the near-surface chemistry of the planet, and ultimately the prospects for life. High-precision isotopic analyses of constituent gases are needed to address these questions, requiring that the analyses are made on returned samples rather than in situ.
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...University of Maribor
Slides from:
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Track: Artificial Intelligence
https://www.etran.rs/2024/en/home-english/
A brief information about the SCOP protein database used in bioinformatics.
The Structural Classification of Proteins (SCOP) database is a comprehensive and authoritative resource for the structural and evolutionary relationships of proteins. It provides a detailed and curated classification of protein structures, grouping them into families, superfamilies, and folds based on their structural and sequence similarities.
Nutraceutical market, scope and growth: Herbal drug technologyLokesh Patil
As consumer awareness of health and wellness rises, the nutraceutical market—which includes goods like functional meals, drinks, and dietary supplements that provide health advantages beyond basic nutrition—is growing significantly. As healthcare expenses rise, the population ages, and people want natural and preventative health solutions more and more, this industry is increasing quickly. Further driving market expansion are product formulation innovations and the use of cutting-edge technology for customized nutrition. With its worldwide reach, the nutraceutical industry is expected to keep growing and provide significant chances for research and investment in a number of categories, including vitamins, minerals, probiotics, and herbal supplements.
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Sérgio Sacani
We characterize the earliest galaxy population in the JADES Origins Field (JOF), the deepest
imaging field observed with JWST. We make use of the ancillary Hubble optical images (5 filters
spanning 0.4−0.9µm) and novel JWST images with 14 filters spanning 0.8−5µm, including 7 mediumband filters, and reaching total exposure times of up to 46 hours per filter. We combine all our data
at > 2.3µm to construct an ultradeep image, reaching as deep as ≈ 31.4 AB mag in the stack and
30.3-31.0 AB mag (5σ, r = 0.1” circular aperture) in individual filters. We measure photometric
redshifts and use robust selection criteria to identify a sample of eight galaxy candidates at redshifts
z = 11.5 − 15. These objects show compact half-light radii of R1/2 ∼ 50 − 200pc, stellar masses of
M⋆ ∼ 107−108M⊙, and star-formation rates of SFR ∼ 0.1−1 M⊙ yr−1
. Our search finds no candidates
at 15 < z < 20, placing upper limits at these redshifts. We develop a forward modeling approach to
infer the properties of the evolving luminosity function without binning in redshift or luminosity that
marginalizes over the photometric redshift uncertainty of our candidate galaxies and incorporates the
impact of non-detections. We find a z = 12 luminosity function in good agreement with prior results,
and that the luminosity function normalization and UV luminosity density decline by a factor of ∼ 2.5
from z = 12 to z = 14. We discuss the possible implications of our results in the context of theoretical
models for evolution of the dark matter halo mass function.
2. An Introduction
"The art of writing and solving codes"
Internet provides essential communication between tens of millions of
people and is being increasingly used as a tool for commerce, security
becomes a tremendously important issue to deal with.
There are many aspects to security and many applications, ranging from
secure commerce and payments to private communications and protecting
passwords. One essential aspect for secure communications is that of
cryptography. But it is important to note that while cryptography is
necessary for secure communications, it is not by itself sufficient.
3. Antiquity
The first documented use of cryptography in writing dates back to
Circa 1900 BC when an Egyptian scribe used non standard hieroglyphs
in an inscription. Some experts argue that cryptography appear
spontaneously sometimes after writing was invented with applications
ranging from diplomatic missives to war-time battle plans.
Its real era started from World War II when Germany was about to
take over Great Britain, Germany used a device named "Enigma" to
send their messages secretly to their war zones. In reply GBR created
a device named "Turing Machine" by Alan Turing to decrypt or break
Enigma which resulted in saving GBR.
4. Greek Etymology
Cryptography
- Crypto -----> "Kryptos" --------> Hidden
- Graphy -----> "Graphein" -------> To Write
Encryption: The translation of data into secret
code.
Decryption: The translation of secret code into
original data.
5. The Caesar Cipher!
Plaintext: THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG
Ciphertext: WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ
Encryption:
E(x) = (x + n) mod 26
Decryption:
D(x) = (x - n) mod 26
10. Prime Numbers!
How to find a Prime Number?
Immortal are Prime Numbers.
Prime Numbers and Cryptography.
New Prime Number??
11. Methods to find
Prime Numbers
A Multiplicative
Sieve
The Prime
Number Machine
The Sieve of
Erastothenes
12. The Sieve of Erastothenes
Let's consider a table of sequential numbers
start
2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21
,22,23,24,25,26,27,28,29,30,31,32....
13. The Sieve of Erastothenes
Cross out multiple of 2
2, 3, X, 5, X, 7, X, 9, X, 11, X, 13....
14. The Sieve of Erastothenes
The next non-overlined and non crossed out
number is three. Identify it as prime with an
overline, then cross out every third number
(every multiple of three).
2, 3, X, 5, XX, 7, X, X, X, 11, XX, 13 ...
15. The Sieve of Erastothenes
Continuing the process. Five is the next non-
overlined and non crossed out number. Overline
five and cross out every fifth number.
2, 3, X, 5, XX, 7, X, X, X, 11, XX, 13 ...
16. The Sieve of Erastothenes
The next prime number is then seven. Since
twice seven is greater than the largest visible
number in our list, all the remaining visible
numbers are prime.
2, 3, X, 5, XX, 7, X, XX, X, 11, XX, 13 ...
17. The Sieve of Erastothenes
Drawbacks
The process is too slow
Not efficient for finding huge primes.
18. Euclid’S Element
The statement says that
“There are more than any finite number n of prime
numbers. Suppose that a1, a2, ..., an are prime numbers. Let
m be the product of all considered prime numbers. Consider
the number m + 1. If it's prime, then there are at least n + 1
primes.”
So suppose m + 1 is not prime. Then, some prime g divides it.
But g cannot be any of the primes a1, a2, ..., an , since they
all divide m and do not divide m + 1. Therefore, there are at
least n + 1 primes.
Thus, there are not a finite number of primes.
20. RSA
How to make sure that my data is save on the internet?
How to make sure that only an authorized person gets
my secret message?
The RSA model is the correct choice!
RSA Stands for Ron Rivest, Adi Shamir , Leonard
Adleman.
21. RSA
RSA is a consequence of Fermat's little theorem:
"If 'a' is not divisible by 'p' , where p is prime,
then a^(p-1) -1 is divisible by 'p'.
22. The Work Flow
Generate two large random prime numbers p and q
Find n = p*q
Find phi = (p-1)*(q-1)
Choose an integer e, 1 < e < phi such that GCD (e, phi) = 1
Compute the secret exponent d, 1 < d < phi, such that e.d = 1
(mod phi)
The public key is (n, e) and the private key is (d, p, q)
All the values d, p, q and phi are kept secret.
23. The Work Flow
Select p
and q
n= p*q
phi= (p-1) *
(q-1)
e*d= 1
(mod phi)
C =
(msg)^e
mod n
Message =
(C)^d mod
n
24. Example
P = 3 and Q = 11
n = p*q = 33
Phi = (p-1) * (q-1) = (3-1) * (11-1) = 20
e = 7 and d =3 -------------> (3*7) mod 20 = 1
Public Key (7, 33) and Private Key (3, 33)
m = 13
Encrypt: c = m^e mod n -------> c = 13^7 mod 33 = 7
Decrypt: m = c^d mod n ---------> 7^8 mod 33 = 13
25. • How to break RSA?
• First we have to find p and q
• Solve the equation to find 'd'
26. Why is it difficult to get the decryption key?
Factoring the huge number to prime
number takes a lot of computation
Then there can be number of multiples of
N, so might be guessing on wrong number.