SlideShare a Scribd company logo
what engineers don’t know
  (but mathematicians probably do)

              Budi Rahardjo
 School of Electical Engineering & Informatics
          Institut Teknologi Bandung
engineers
     create
    products

[sorry, pictures deleted - unknown ipr]
security products
sometimes inefficient
• Longer time to boot or process stuff
• Only work for toy problems
• Even, … they just don’t work at all
• [failed products?]
[taken from a product somewhere]

There are 3 kinds of people
in this world:
– Those who can count and
– those who can’t
Need ways to improve
• Increase performance
• Less power
• Smaller in size
• Cost efficiency
• Always, not easy
Example
• Cryptographic applications, eg.
  public-key cryptography
         c=   me   mod n
• With large e and n (big num) integer
• Straight forward software
  implementation is difficult
Large (512-bit) numbers
• n = 81 5a d0 b9 0a ac 9f 4c da cc 57 6e ca a7
  6a c3 46 92 a7 81 68 ec 08 ec 77 dd 40 c2 ec
  97 52 cb 3b 34 2c b6 a6 e2 76 3a ed 42 84 fa
  55 ac 0d 6c 10 39 a2 7e a3 09 be 40 35 38 04
  7d 06 43 1f 6f
• e = 29 40 70 02 50 db 19 6b b1 f4 8a a7 b4 59
  6c 4b 66 b5 94 f6 15 ae e4 69 44 95 23 f3 d0
  fc ea 84 19 7c 55 e0 27 40 2d 19 18 15 08 05
  51 ac f5 98 91 f0 98 5f c4 17 05 eb 3b e8 a3
  04 32 d4 20 2f
• d = 59 f1 2f 29 73 d0 bc 8e 13 6e 2a 21 53 2c
  b7 4d 69 82 c9 54 92 6c 64 43 0d 69 15 83 e9
  44 a6 de 5e 30 e9 ae 48 f9 c8 84 a4 16 44 4d
  df 50 f2 0e 96 3e 24 df a4 f4 ec 3d c6 db 61
  a7 e6 dc ea cf
                                         [64 chunks]
Solutions, transformations,
          tricks, …
Mathematics        Programming
• Fast             • Loop unrolling
  exponentiation   •…
•…
Fast Exponentiation
Loop Unrolling
for (int x = 0; x < 100; x++) {
  do(x);} /* before loop unroll */

for (int x = 0; x < 100; x += 5) {
   do(x);
   do(x+1);
   do(x+2);
   do(x+3);
   do(x+4);} /* after - less loops */
hardware
• Implementation
  in constrained
  devices
  – Limitted memory &
    computing power
a short detour to crypto
Private-key crypto
            (secret key, symmetric)
Alice                                                              Bob

                    Shared (secret) key




            Encryption                     Decryption
Plaintext                  Ciphertext                    Plaintext

 My phone                  Y$3*@8nh                     My phone
 555-1234                  klq&ajbq                     555-1234
                                    Ev e
Problems
• Key exchange
• Number of keys explode
  exponentially
n       n * (n-1) / 2 ≈ n2/2
(# users)      (# of keys)
   10               50
   100             5000
  1000           500.000
 10.000        50.000.000
 100.000     5.000.000.000
New direction in cryptography
Public-key crypto
                        (asymmetric)
   Public key repository                            Public key
   Certificate Authority (CA)
                                                   Private key




               Encryption                    Decryption
Plaintext                       Ciphertext                 Plaintext

 My phone                       L)8*@Hgx                  My phone
 555-1234                       uqnrpGtZ                  555-1234
Concluding Remarks


… engineers taketh what
mathematicians giveth …
Thank You

More Related Content

Viewers also liked

Creativity and Innovation
Creativity and InnovationCreativity and Innovation
Creativity and Innovation
budi rahardjo
 
Blogging
BloggingBlogging
Blogging
budi rahardjo
 
Creativity 02
Creativity 02Creativity 02
Creativity 02
Fousiya O P
 
Bdg software uploaded
Bdg software uploadedBdg software uploaded
Bdg software uploaded
budi rahardjo
 
Creativity definition
Creativity definitionCreativity definition
Creativity definition
ktemaloney
 
To teach is ... (On Teaching)
To teach is ... (On Teaching)To teach is ... (On Teaching)
To teach is ... (On Teaching)
budi rahardjo
 

Viewers also liked (6)

Creativity and Innovation
Creativity and InnovationCreativity and Innovation
Creativity and Innovation
 
Blogging
BloggingBlogging
Blogging
 
Creativity 02
Creativity 02Creativity 02
Creativity 02
 
Bdg software uploaded
Bdg software uploadedBdg software uploaded
Bdg software uploaded
 
Creativity definition
Creativity definitionCreativity definition
Creativity definition
 
To teach is ... (On Teaching)
To teach is ... (On Teaching)To teach is ... (On Teaching)
To teach is ... (On Teaching)
 

Similar to what engineers don't know (but probably mathematicians do)

Computing on Encrypted Data
Computing on Encrypted DataComputing on Encrypted Data
Computing on Encrypted Data
New York Technology Council
 
Digital Fingerprinting
Digital FingerprintingDigital Fingerprinting
Digital Fingerprinting
santhu652
 
Class3
Class3Class3
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
Göktuğ Serez
 
"Practical Machine Learning With Ruby" by Iqbal Farabi (ID Ruby Community)
"Practical Machine Learning With Ruby" by Iqbal Farabi (ID Ruby Community)"Practical Machine Learning With Ruby" by Iqbal Farabi (ID Ruby Community)
"Practical Machine Learning With Ruby" by Iqbal Farabi (ID Ruby Community)
Tech in Asia ID
 
Rsa in CTF
Rsa in CTFRsa in CTF
Rsa in CTF
SoL ymx
 
Public_Key_Cryptography in crypto analysis.ppt
Public_Key_Cryptography in crypto analysis.pptPublic_Key_Cryptography in crypto analysis.ppt
Public_Key_Cryptography in crypto analysis.ppt
ImmanImman6
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Ferdin Joe John Joseph PhD
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
Kaya Ota
 
The str/bytes nightmare before python2 EOL
The str/bytes nightmare before python2 EOLThe str/bytes nightmare before python2 EOL
The str/bytes nightmare before python2 EOL
Kir Chou
 
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
SMART Infrastructure Facility
 
Java Core | Understanding the Disruptor: a Beginner's Guide to Hardcore Concu...
Java Core | Understanding the Disruptor: a Beginner's Guide to Hardcore Concu...Java Core | Understanding the Disruptor: a Beginner's Guide to Hardcore Concu...
Java Core | Understanding the Disruptor: a Beginner's Guide to Hardcore Concu...
JAX London
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
Dr. Rupa Ch
 
Cryptography 202
Cryptography 202Cryptography 202
Cryptography 202
UTD Computer Security Group
 
How Triton can help to reverse virtual machine based software protections
How Triton can help to reverse virtual machine based software protectionsHow Triton can help to reverse virtual machine based software protections
How Triton can help to reverse virtual machine based software protections
Jonathan Salwan
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
 
10 RSA
10 RSA10 RSA
10 RSA
Sam Bowne
 
CNIT 141: 10. RSA
CNIT 141: 10. RSACNIT 141: 10. RSA
CNIT 141: 10. RSA
Sam Bowne
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
Ahmed Mohamed Mahmoud
 
Ctf hello,world!
Ctf hello,world! Ctf hello,world!
Ctf hello,world!
Hacks in Taiwan (HITCON)
 

Similar to what engineers don't know (but probably mathematicians do) (20)

Computing on Encrypted Data
Computing on Encrypted DataComputing on Encrypted Data
Computing on Encrypted Data
 
Digital Fingerprinting
Digital FingerprintingDigital Fingerprinting
Digital Fingerprinting
 
Class3
Class3Class3
Class3
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
"Practical Machine Learning With Ruby" by Iqbal Farabi (ID Ruby Community)
"Practical Machine Learning With Ruby" by Iqbal Farabi (ID Ruby Community)"Practical Machine Learning With Ruby" by Iqbal Farabi (ID Ruby Community)
"Practical Machine Learning With Ruby" by Iqbal Farabi (ID Ruby Community)
 
Rsa in CTF
Rsa in CTFRsa in CTF
Rsa in CTF
 
Public_Key_Cryptography in crypto analysis.ppt
Public_Key_Cryptography in crypto analysis.pptPublic_Key_Cryptography in crypto analysis.ppt
Public_Key_Cryptography in crypto analysis.ppt
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
 
The str/bytes nightmare before python2 EOL
The str/bytes nightmare before python2 EOLThe str/bytes nightmare before python2 EOL
The str/bytes nightmare before python2 EOL
 
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
 
Java Core | Understanding the Disruptor: a Beginner's Guide to Hardcore Concu...
Java Core | Understanding the Disruptor: a Beginner's Guide to Hardcore Concu...Java Core | Understanding the Disruptor: a Beginner's Guide to Hardcore Concu...
Java Core | Understanding the Disruptor: a Beginner's Guide to Hardcore Concu...
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
Cryptography 202
Cryptography 202Cryptography 202
Cryptography 202
 
How Triton can help to reverse virtual machine based software protections
How Triton can help to reverse virtual machine based software protectionsHow Triton can help to reverse virtual machine based software protections
How Triton can help to reverse virtual machine based software protections
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
10 RSA
10 RSA10 RSA
10 RSA
 
CNIT 141: 10. RSA
CNIT 141: 10. RSACNIT 141: 10. RSA
CNIT 141: 10. RSA
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Ctf hello,world!
Ctf hello,world! Ctf hello,world!
Ctf hello,world!
 

More from budi rahardjo

How to train Electronics Rockstars
How to train Electronics RockstarsHow to train Electronics Rockstars
How to train Electronics Rockstars
budi rahardjo
 
Product development 2021
Product development 2021Product development 2021
Product development 2021
budi rahardjo
 
Security in COVID-19 Era
Security in COVID-19 EraSecurity in COVID-19 Era
Security in COVID-19 Era
budi rahardjo
 
Peluang IoT di Indonesia
Peluang IoT di IndonesiaPeluang IoT di Indonesia
Peluang IoT di Indonesia
budi rahardjo
 
IoT: Dari Hobby ke Profesi
IoT: Dari Hobby ke ProfesiIoT: Dari Hobby ke Profesi
IoT: Dari Hobby ke Profesi
budi rahardjo
 
The Joy of Programming (short version)
The Joy of Programming (short version)The Joy of Programming (short version)
The Joy of Programming (short version)
budi rahardjo
 
Technology-based Startup
Technology-based StartupTechnology-based Startup
Technology-based Startup
budi rahardjo
 
A very short Introduction to Software Security
A very short Introduction to Software SecurityA very short Introduction to Software Security
A very short Introduction to Software Security
budi rahardjo
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
budi rahardjo
 
Dealing with Hoax
Dealing with HoaxDealing with Hoax
Dealing with Hoax
budi rahardjo
 
Topik Penelitian Keamanan Informasi
Topik Penelitian Keamanan InformasiTopik Penelitian Keamanan Informasi
Topik Penelitian Keamanan Informasi
budi rahardjo
 
Network Sniffing
Network SniffingNetwork Sniffing
Network Sniffing
budi rahardjo
 
Keaslian Dokumen Digital
Keaslian Dokumen DigitalKeaslian Dokumen Digital
Keaslian Dokumen Digital
budi rahardjo
 
Strategi Industri Telematika Indonesia
Strategi Industri Telematika IndonesiaStrategi Industri Telematika Indonesia
Strategi Industri Telematika Indonesia
budi rahardjo
 
Klik and Modar: social engineering dengan menggunakan URL Bait
Klik and Modar: social engineering dengan menggunakan URL BaitKlik and Modar: social engineering dengan menggunakan URL Bait
Klik and Modar: social engineering dengan menggunakan URL Bait
budi rahardjo
 
How to Train Electronics Rockstars
How to Train Electronics RockstarsHow to Train Electronics Rockstars
How to Train Electronics Rockstars
budi rahardjo
 
Kronologis penganiayaan timmy
Kronologis penganiayaan timmyKronologis penganiayaan timmy
Kronologis penganiayaan timmy
budi rahardjo
 
Kesiapan Lulusan Perguruan Tinggi
Kesiapan Lulusan Perguruan TinggiKesiapan Lulusan Perguruan Tinggi
Kesiapan Lulusan Perguruan Tinggi
budi rahardjo
 
Pengantar Nama Domain
Pengantar Nama DomainPengantar Nama Domain
Pengantar Nama Domain
budi rahardjo
 
Secure Software Design
Secure Software DesignSecure Software Design
Secure Software Design
budi rahardjo
 

More from budi rahardjo (20)

How to train Electronics Rockstars
How to train Electronics RockstarsHow to train Electronics Rockstars
How to train Electronics Rockstars
 
Product development 2021
Product development 2021Product development 2021
Product development 2021
 
Security in COVID-19 Era
Security in COVID-19 EraSecurity in COVID-19 Era
Security in COVID-19 Era
 
Peluang IoT di Indonesia
Peluang IoT di IndonesiaPeluang IoT di Indonesia
Peluang IoT di Indonesia
 
IoT: Dari Hobby ke Profesi
IoT: Dari Hobby ke ProfesiIoT: Dari Hobby ke Profesi
IoT: Dari Hobby ke Profesi
 
The Joy of Programming (short version)
The Joy of Programming (short version)The Joy of Programming (short version)
The Joy of Programming (short version)
 
Technology-based Startup
Technology-based StartupTechnology-based Startup
Technology-based Startup
 
A very short Introduction to Software Security
A very short Introduction to Software SecurityA very short Introduction to Software Security
A very short Introduction to Software Security
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Dealing with Hoax
Dealing with HoaxDealing with Hoax
Dealing with Hoax
 
Topik Penelitian Keamanan Informasi
Topik Penelitian Keamanan InformasiTopik Penelitian Keamanan Informasi
Topik Penelitian Keamanan Informasi
 
Network Sniffing
Network SniffingNetwork Sniffing
Network Sniffing
 
Keaslian Dokumen Digital
Keaslian Dokumen DigitalKeaslian Dokumen Digital
Keaslian Dokumen Digital
 
Strategi Industri Telematika Indonesia
Strategi Industri Telematika IndonesiaStrategi Industri Telematika Indonesia
Strategi Industri Telematika Indonesia
 
Klik and Modar: social engineering dengan menggunakan URL Bait
Klik and Modar: social engineering dengan menggunakan URL BaitKlik and Modar: social engineering dengan menggunakan URL Bait
Klik and Modar: social engineering dengan menggunakan URL Bait
 
How to Train Electronics Rockstars
How to Train Electronics RockstarsHow to Train Electronics Rockstars
How to Train Electronics Rockstars
 
Kronologis penganiayaan timmy
Kronologis penganiayaan timmyKronologis penganiayaan timmy
Kronologis penganiayaan timmy
 
Kesiapan Lulusan Perguruan Tinggi
Kesiapan Lulusan Perguruan TinggiKesiapan Lulusan Perguruan Tinggi
Kesiapan Lulusan Perguruan Tinggi
 
Pengantar Nama Domain
Pengantar Nama DomainPengantar Nama Domain
Pengantar Nama Domain
 
Secure Software Design
Secure Software DesignSecure Software Design
Secure Software Design
 

Recently uploaded

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 

Recently uploaded (20)

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 

what engineers don't know (but probably mathematicians do)

  • 1. what engineers don’t know (but mathematicians probably do) Budi Rahardjo School of Electical Engineering & Informatics Institut Teknologi Bandung
  • 2. engineers create products [sorry, pictures deleted - unknown ipr]
  • 4. sometimes inefficient • Longer time to boot or process stuff • Only work for toy problems • Even, … they just don’t work at all • [failed products?]
  • 5. [taken from a product somewhere] There are 3 kinds of people in this world: – Those who can count and – those who can’t
  • 6. Need ways to improve • Increase performance • Less power • Smaller in size • Cost efficiency • Always, not easy
  • 7. Example • Cryptographic applications, eg. public-key cryptography c= me mod n • With large e and n (big num) integer • Straight forward software implementation is difficult
  • 8. Large (512-bit) numbers • n = 81 5a d0 b9 0a ac 9f 4c da cc 57 6e ca a7 6a c3 46 92 a7 81 68 ec 08 ec 77 dd 40 c2 ec 97 52 cb 3b 34 2c b6 a6 e2 76 3a ed 42 84 fa 55 ac 0d 6c 10 39 a2 7e a3 09 be 40 35 38 04 7d 06 43 1f 6f • e = 29 40 70 02 50 db 19 6b b1 f4 8a a7 b4 59 6c 4b 66 b5 94 f6 15 ae e4 69 44 95 23 f3 d0 fc ea 84 19 7c 55 e0 27 40 2d 19 18 15 08 05 51 ac f5 98 91 f0 98 5f c4 17 05 eb 3b e8 a3 04 32 d4 20 2f • d = 59 f1 2f 29 73 d0 bc 8e 13 6e 2a 21 53 2c b7 4d 69 82 c9 54 92 6c 64 43 0d 69 15 83 e9 44 a6 de 5e 30 e9 ae 48 f9 c8 84 a4 16 44 4d df 50 f2 0e 96 3e 24 df a4 f4 ec 3d c6 db 61 a7 e6 dc ea cf [64 chunks]
  • 9. Solutions, transformations, tricks, … Mathematics Programming • Fast • Loop unrolling exponentiation •… •…
  • 11. Loop Unrolling for (int x = 0; x < 100; x++) { do(x);} /* before loop unroll */ for (int x = 0; x < 100; x += 5) { do(x); do(x+1); do(x+2); do(x+3); do(x+4);} /* after - less loops */
  • 12. hardware • Implementation in constrained devices – Limitted memory & computing power
  • 13. a short detour to crypto
  • 14. Private-key crypto (secret key, symmetric) Alice Bob Shared (secret) key Encryption Decryption Plaintext Ciphertext Plaintext My phone Y$3*@8nh My phone 555-1234 klq&ajbq 555-1234 Ev e
  • 15. Problems • Key exchange • Number of keys explode exponentially
  • 16. n n * (n-1) / 2 ≈ n2/2 (# users) (# of keys) 10 50 100 5000 1000 500.000 10.000 50.000.000 100.000 5.000.000.000
  • 17. New direction in cryptography
  • 18. Public-key crypto (asymmetric) Public key repository Public key Certificate Authority (CA) Private key Encryption Decryption Plaintext Ciphertext Plaintext My phone L)8*@Hgx My phone 555-1234 uqnrpGtZ 555-1234
  • 19. Concluding Remarks … engineers taketh what mathematicians giveth …