This document discusses the use of probability in cryptography. It begins with introductions to cryptography and probability. Key probability terms and concepts like events, sample spaces, and Markov models are defined. Public key cryptography using Fermat's Little Theorem is explained. Applications of probability in cryptography are explored, including checksums and the birthday problem, pseudo-random number generators, and code breaking using the Metropolis-Hastings algorithm. The document concludes that probability and cryptography are important fields that help secure communications and protect society from cyber attacks.
Divide and Conquer Algorithms - D&C forms a distinct algorithm design technique in computer science, wherein a problem is solved by repeatedly invoking the algorithm on smaller occurrences of the same problem. Binary search, merge sort, Euclid's algorithm can all be formulated as examples of divide and conquer algorithms. Strassen's algorithm and Nearest Neighbor algorithm are two other examples.
Divide and Conquer Algorithms - D&C forms a distinct algorithm design technique in computer science, wherein a problem is solved by repeatedly invoking the algorithm on smaller occurrences of the same problem. Binary search, merge sort, Euclid's algorithm can all be formulated as examples of divide and conquer algorithms. Strassen's algorithm and Nearest Neighbor algorithm are two other examples.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Minmax Algorithm In Artificial Intelligence slidesSamiaAziz4
Mini-max algorithm is a recursive or backtracking algorithm that is used in decision-making and game theory. Mini-Max algorithm uses recursion to search through the game-tree.
Min-Max algorithm is mostly used for game playing in AI. Such as Chess, Checkers, tic-tac-toe, go, and various tow-players game. This Algorithm computes the minimax decision for the current state.
How can you deal with Fuzzy Logic. Fuzzy logic is a form of many-valued logic; it deals with reasoning that is approximate rather than fixed and exact. In contrast with traditional logic theory, where binary sets have two-valued logic: true or false, fuzzy logic variables may have a truth value that ranges in degree
between 0 and 1
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
Fuzzy logic is often heralded as a technique for handling problems with large amounts of vagueness or uncertainty. Since its inception in 1965 it has grown from an obscure mathematical idea to a technique used in a wide variety of applications from cooking rice to controlling diesel engines on an ocean liner.
This talk will give a layman's introduction to the topic and explore some of the real world applications in control and human decision making. Examples might include household appliances, control of large industrial plant, and health monitoring systems for the elderly. We will look at where the field might be going over the next ten years, highlighting areas where DMU's specialist expertise drives the way.
We will discuss the following: RSA Key generation , RSA Encryption , RSA Decryption , A Real World Example, RSA Security.
https://www.youtube.com/watch?v=x7QWJ13dgGs&list=PLKYmvyjH53q13_6aS4VwgXU0Nb_4sjwuf&index=7
A very clear presentation on Crytographic Alogotithms DES and RSA with basic concepts of cryptography. This presented by students of Techno India, Salt Lake.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Minmax Algorithm In Artificial Intelligence slidesSamiaAziz4
Mini-max algorithm is a recursive or backtracking algorithm that is used in decision-making and game theory. Mini-Max algorithm uses recursion to search through the game-tree.
Min-Max algorithm is mostly used for game playing in AI. Such as Chess, Checkers, tic-tac-toe, go, and various tow-players game. This Algorithm computes the minimax decision for the current state.
How can you deal with Fuzzy Logic. Fuzzy logic is a form of many-valued logic; it deals with reasoning that is approximate rather than fixed and exact. In contrast with traditional logic theory, where binary sets have two-valued logic: true or false, fuzzy logic variables may have a truth value that ranges in degree
between 0 and 1
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
Fuzzy logic is often heralded as a technique for handling problems with large amounts of vagueness or uncertainty. Since its inception in 1965 it has grown from an obscure mathematical idea to a technique used in a wide variety of applications from cooking rice to controlling diesel engines on an ocean liner.
This talk will give a layman's introduction to the topic and explore some of the real world applications in control and human decision making. Examples might include household appliances, control of large industrial plant, and health monitoring systems for the elderly. We will look at where the field might be going over the next ten years, highlighting areas where DMU's specialist expertise drives the way.
We will discuss the following: RSA Key generation , RSA Encryption , RSA Decryption , A Real World Example, RSA Security.
https://www.youtube.com/watch?v=x7QWJ13dgGs&list=PLKYmvyjH53q13_6aS4VwgXU0Nb_4sjwuf&index=7
A very clear presentation on Crytographic Alogotithms DES and RSA with basic concepts of cryptography. This presented by students of Techno India, Salt Lake.
Introduction to Cryptography Week4 Part1-ISrevisionSu.docxmariuse18nolet
Introduction to Cryptography
Week4 Part1-ISrevisionSu2013
Introduction to Cryptography
If you are implementing a secure environment and you do not implement encryption you
will not have a secure environment. You can implement routers, firewalls, intrusion
detection, virus protection, policies and procedures, but if there is no encryption you will
not have a secure environment.
Encryption is fundamental to a secure information environment. Passing data around a
system and over the network in a clear text form is very insecure. Systems and
communication lines can be monitored by unscrupulous individuals who make valuable
information vulnerable to viewing or modification. Encryption in a secure information
infrastructure is implemented at various levels in the architecture and in various
components. This is consistent with the idea of security in depth. Encryption technologies
are included as part of many products; applications, operating systems, network devices.
How (and if) the encryption technology is used is dependent on the organization and its
users.
Cryptography is the science of disguising messages. Disguising a readable message is
called encryption. Translating the disguised message back to a readable form is called
decryption.
Encryption has been used for centuries to disguise messages from adversaries. The
Romans used encryption in their military operations to protect sensitive messages. The
Germans during World War 2 used the enigma machine to encrypt messages about
military secrets so the allies would not be aware of strategy and tactics.
Nowadays in addition to protecting government secrets there are many uses for
encryption technology in commercial applications. The need to protect medical, financial
records or company trade secrets are a few of the areas that encryption is used.
Terminology
Cryptography is a field loaded with terminology, acronyms and concepts. Many of the
concepts are rooted in mathematics and computer science. Following are some common
terms you should become familiar with for understanding encryption.
Cryptosystem – A cryptosystem encrypts and decrypts messages allowing only
people (or processes) that possess the correct keys to read the messages.
Cryptography – The science of designing, developing and using cryptosystems.
Cryptanalysis – The science of breaking a cryptosystem, so that the content of
messages is no longer hidden.
Cryptology – The study of cryptography and cryptanalysis.
Cipher – another term used to describe an encryption or decryption algorithm.
Types of Encryption Technology
There are several technologies, tools and techniques we will be discussing that fall under
the category of encryption.
Encryption algorithms fall into two broad categories; symmetric and asymmetric
encryption. Let’s first look at the components that make up a symmetric encryption
system or symmetric crypt.
A Literature Review of Some Modern RSA Variantsijsrd.com
RSA cryptosystem is the most commonly used public key cryptosystem. It is the first public key cryptosystem. The strength of this cryptosystem is based on the larger key size. There are many algorithms and variants of RSA. But, it is steal a burning topic of research. Because the thrust to store data secret is never going to end. In this paper, we have proposed a literature review of some modern variants of the RSA algorithm. All the algorithms have been analyzed. Their merits and demerits are also discussed.
I presented this overview lecture at Computer Applications for the 21st century – Synergies and Vistas organized by Vidyasagar College, Kolkata in 2008
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftAlexanderCominsky
This Research Paper goes into the mathematics of computer networking hardware as well as encryption methods used to ensure data can safely and securely be transmitted from one point to another across a computer network and the web.
Cryptography and Symmetric Key Algorithms
Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.
OR
The art of creating and implementing secret codes and ciphers is known as cryptography.
A brief presentation on Position-Based, Device-Independent and Post Quantum Cryptographies. Detailing Position-Based QC, defining Device-Independent QC and discussing Post Device-Independent.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
1. CRYPTOGRAPHY – AND THE USE OF
PROBABILITY
Made By: Prankit Mishra(141CC00007)
Submitted To: Dr. Rakesh Pandey (Faculty- Mathematics)
2. Contents
1. Cryptography
2. Probability
3. Important Terms in Probability
4. Public Key Cryptography
5. Fermat’s Little Theorem
6. Use Of Fermat’s Little Theorem
7. Applications of Probability and Fermat’s Little Theorem in Cryptography
• Checksums and the Birthday Problem
• Pseudo Random Number Generators
• Code Breaking By Metropolis Hastings
8. Conclusions
3. Cryptography
Cryptography or cryptology is the practice and study of techniques for secure
communication in the presence of third parties called adversaries.
More generally, cryptography is about constructing and analyzing protocols that
prevent third parties or the public from reading private messages;various
aspects in information security such as data confidentiality, data
integrity, authentication, and non-repudiation are central to modern
cryptography.
Modern cryptography is heavily based on mathematical theory and computer
science practice; cryptographic algorithms are designed around computational
hardness assumptions, making such algorithms hard to break in practice by any
adversary.
4. Probability
Probability is the measure of the likelihood that an event will occur.
When dealing with experiments that are random and well-defined in a purely
theoretical setting (like tossing a fair coin), probabilities can be numerically
described by the number of desired outcomes divided by the total number of all
outcomes.
For example, tossing a fair coin twice will yield "head-head", "head-tail", "tail-
head", and "tail-tail" outcomes. The probability of getting an outcome of "head-
head" is 1 out of 4 outcomes or 1 divided by four or 1/4 (or 25%).
5. Important Terms
Event - A subset of the outcomes of a process. For instance, the set of
outcomes {2, 4, 6} when rolling a die is an event that one might call "rolling an
even number".
Sample space - The set S of all possible outcomes of an experiment, i.e. the
sample space for a die roll is {1, 2, 3, 4, 5, 6}.
Randomness - Randomness is the lack of pattern or predictability in events.A
random sequence of events, symbols or steps has no order and does not follow an
intelligible pattern or combination.
Markov model - In probability theory, a Markov model is a stochastic model used
to model randomly changing systems where it is assumed that future states
depend only on the current state and not on the events that occurred before it
(that is, it assumes the Markov property). Generally, this assumption enables
reasoning and computation with the model that would otherwise be intractable.
6. Public Key Cryptography
It is a public way to encrypt a message so that only you can decrypt them. The
way it's done, is that there are functions out there called trapdoor functions. It
means they only go one way, like a trapdoor - they are easy for a computer to do
but would take a very long time to reverse.
It is also known as Asymmetric Key Cryptography.
This type of cryptography widely uses the Fermat’s Little Theorem which is a
very important theorem and will be discussed in the further slides.
7. Fermat's Little Theorem
If p is a prime number, then for any integer a:
ap =a (mod p)
In words, this means that the remainder of ap when dividing by p is a. It's enough to
test it for a < p, if you think about the properties of remainders, you can
convince yourself that the general case will follow.
The statement can be modified to work for a product of two primes pq; as
follows:
a(p-1)(q-1)+1 = α ( mod pq)
8. Use of Fermat’s Little Theorem
If we try it out for p = 5; q = 7: Then pq = 35; (p 1) (q 1) + 1 = 25: So we're saying that for
any integer a, a25 a ( mod 35):
To use this in public key cryptography, we might announce our public key 5 and base 35.
Our private key is 5, so that if you raise something that was raised to power 5 again to
power 5, it's equivalent to raising it to power 25 in the first place. Then whoever sends us
a message, will raise it to power 5 and take the remainder modulo 35. Then we will use
our private key, to recover the message by raising what you received to power 5 and
taking the remainder mod 35 again. Exponentiations and taking remainders is an easy
task for a computer, it can be done in little computational time. But going the other way,
finding out what integer ‘a’ was used to get the encrypted message is difficult. Of course,
in real life the primes used in this procedure are very, very big and generated by the
computer.
This procedure based on Fermat's Little Theorem is called RSA. It ruled the cypher space
for many years, but by now, it is being gradually abandoned in favor of another type of
trapdoor function-based protocol, elliptic curve cryptography.
10. Checksums and the Birthday Problem
If you transmit a bunch of encrypted data, how do you check if it didn't get corrupted on
the way? You could do a simple calculation, and transmit the result along with the data.
Then whoever receives it, can do the calculation on the data again and if they get the
same result, they will know that the data is not corrupted. Or will they?
The result of that calculation is called a checksum and is often used to verify that data
was transmitted correctly. Depending on the nature of the calculation, it may be very
hard for an attacker to construct another stream of encrypted data that results in the
same checksum. However, there is a chance that in a collection of different encrypted
texts there will be two distinct ones that have the same checksum. Suppose that the
checksum is 8-bit long and roughly uniformly distributed over the space of 8-bit strings.
Then there are 28 = 256 possible checksums and according to the Birthday
Problem, there is a better than 50% chance that in a set of 19 different data streams two
will have the same checksum.
11. Pseudo Random Number Generators
Computers can't really generate random numbers. They instead try to generate
sequences of numbers with properties that approximate a random sequence, but
are not really random. If they approximate it well, a sequence of such numbers is
called pseudo-random.
Sometimes, a PRNG uses a random seed, a smaller amount of bits that are
assumed to be random, to extrapolate a much larger pseudo-random number.
A generator may use this seed and perform a calculation whose result may land
anywhere in some larger space. There are services that sell random bits, they
tend to use radioactive decay or atmospheric noise - that are believed to be truly
random.
The random package in Python uses a pseudo random number generator called
Mersenne Twister.
12. Code breaking by Metropolis-Hastings
The wheel pictured below was an invention
attributed to Julius Caesar, and assists in encoding
and decoding the Caesar cipher.
It simply replaces each letter with a letter k spots
further in the alphabet, for some k of your choice,
and by turning the inside wheel you get a helpful
that lets you check which letter corresponds to
which.
This is the simplest of the substitution ciphers, a class
of ciphers that replace a letter by another (for
example A by N, B by Q, C by E etc.) but not all of
them preserve the order, as the Caesar cipher does.
A modern, much more sophisticated descendant of
the Caesar wheel was the Enigma machine, and
while the Caesar wheel had only 26 settings, Enigma
had 158,962,555,217,826,360,000 (158 quintillion)
of them. And that's still less than one in two million
of all the possible permutations of the letters of the
alphabet.
13. Cont.….
What is the best way to break a substitution cypher? If the text is long, statistical analysis. By
Law of Large Numbers, if a letter appears a given percentage of the time in a given language, it
with high probability approach that proportion in any text that is sufficiently long. What
happens if the text is short? Checking one permutation per nanosecond would take 12 billion
years. But if the text is short, there are also relatively few possibilities as to what the original,
unencrypted text could have been. An in that case, any substitution cipher, from Caesar to
Enigma, can be broken using our recent acquaintance, the Metropolis-Hastings algorithm.
Let g be a permutation of the alphabet, and sg be the stationary distribution probability
associated to g. Consider a Markov chain on the space of permutations, defined by: pick two
entries in permutation g and swap them. What are the transition probabilities in this chain?
What is the stationary distribution?
If two permutations cannot be achieved from one another by swapping two entries, then the
transition probabilities are 0. Otherwise, they're each 1/(26
2). Since the transition matrix is
symmetric, the stationary distribution is uniform. Since the transition matrix is symmetric, the
stationary distribution is uniform. Since the transition matrix of the original chain is
symmetric, the probabilities aij in the Metropolis-Hastings procedure are:
aij = min(1, sjPji/siPij) = min(1, sj/si)
14. Conclusion
Probability and Cryptography is both a very vast fields and there are many more
things to be done in both the sectors of science. In todays world when there so
many cyber attacks and web hacking is going on which is dangerous and
harmful for this society these things are very important and cryptography using
probability indeed saves this society from many of such dangers.