Modern Cryptography - People MIT CSAIL

2y ago
42 Views
3 Downloads
2.10 MB
37 Pages
Last View : 3d ago
Last Download : 3m ago
Upload by : Randy Pettway
Transcription

Modern CryptographyIntroductionModern CryptographyDaryl DeFord and David FreundDartmouth CollegeDepartment of MathematicsJohns Hopkins University - Center for Talented YouthScience and Technology SeriesNational Cyber Security Awareness Month

Modern CryptographyIntroductionAbstractAbstractFrom the simple substitution methods of the ancient Greeks totoday’s computerized elliptic curve algorithms, various codes andciphers have been used by both individuals and governments to sendsecure messages. As an increasing amount of our personalcommunications and data have moved online, understanding theunderlying ideas of internet security has become increasinglyimportant. In this workshop we will present the mathematical basisof public-key cryptography; providing hands-on experience with someof the most common encryption algorithms that are used on theinternet today.

Modern torical CryptographyCaesar CipherPublic–Key CryptographyNumber Theory56AlgorithmsRSA AlgorithmDiscrete LogElliptic CurvesKnaspack AlgorithmConclusion

Modern CryptographyIntroductionWhat is cryptography? Study of secret writing A means of protecting or hiding information Techniques for analyzing encoding and decoding ages/1004.jpg

Modern CryptographyIntroductionBasic Definitions Plaintext Ciphertext Encryption Decryption Keys Cryptanalysis

Modern CryptographyIntroductionStandard Setup Alice wants to send a message to Bob Eve, a cryptanalyst, wants to intercept/decode the htm

Modern CryptographyHistorical CryptographySymmetric Cryptography A single key for both encryption and decryption Initialization must be done privately Not reusable

Modern CryptographyHistorical CryptographyCaesar CipherCaesar Cipher Simple substitution cipher Broken about 800 A.D. Vigenère ciphers

Modern CryptographyHistorical CryptographyCaesar CipherActivity 1: Caesar CiphersThis cipher disk was used in theAmerican Civil War.texttthttp://ciphermachines.com/

Modern CryptographyPublic–Key CryptographyPublic–Key CryptographyPublic–Key Cryptography

Modern CryptographyPublic–Key CryptographyAsymmetric Cryptography Problems with symmetric cryptosystems: Transmitting the key Number of keys needed Computational feasibility Asymmetric functions What does security mean?

Modern CryptographyPublic–Key CryptographyHistory Whitfield Diffie, Martin Hellman, and Ralph rg/wiki/index.php/Oral-History:Martin pdate43.4.html

Modern CryptographyPublic–Key Cryptography“Key” Ideas Sending secure messages Every individual generates a public and private key Alice encrypts her message using Bob’s public key and sends theciphertext to Bob Bob recovers the plaintext from the ciphertext by using his public key. Authenticating messages (requires symmetric functions) Alice signs her message by encrypting it with her private key Bob uses Alice’s public key to verify that Alice sent the message.

Modern CryptographyPublic–Key CryptographyExample 2http://pajhome.org.uk/crypt/rsa/intro.html

Modern CryptographyPublic–Key CryptographyActivity 2: Public–Key Cryptography

Modern CryptographyNumber TheoryNumber TheoryNumber Theory

Modern CryptographyNumber TheoryMathematical Preliminaries Fundamental Theorem of Arithemtic Examples: 15 3 · 5 24 23 · 3 101 101 Greatest Common Divisor Examples: (6, 10) 2 (12, 63) 3 (9, 17) 1

Modern CryptographyNumber TheoryEuler ϕ Counts the number of k n such that (k, n) 1. ϕ(n) nY1(1 )pp n Examples: ϕ(12) 4 ϕ(7) 6 ϕ(20) 8{1, 5, 7, 11}{1, 2, 3, 4, 5, 6}{1, 3, 7, 9, 11, 13, 17, 19}

Modern CryptographyNumber TheoryModular Arithmetic 1036 Clock.jpg Standard system of residues

Modern CryptographyNumber TheoryModular Examples 123 3 (mod 10) 287569832 2 (mod 10) 5 1 (mod 4) 33 1 (mod 4) 1 3 (mod 4) 8 0 (mod 4) 4 0 (mod 4)

Modern CryptographyNumber TheoryModular Inverses Standard arithmetic operations , , · Problems with division: 2x 1 (mod 7) vs 2x 1 (mod 6) When do inverses exist?

Modern CryptographyNumber TheoryFermat’s Little TheoremTheorem (Fermat)Let a and n be any integers such that (a, n) 1. Thenaϕ(n) 1(mod n).

Modern CryptographyAlgorithmsAlgorithmsAlgorithms

Modern CryptographyAlgorithmsRSA AlgorithmHistory Ron Rivest, Adi Shamir, and Leonard ww.nytimes.com/2007/11/17/technology/17code.html? r reate/leonard-max-adleman/

Modern CryptographyAlgorithmsRSA AlgorithmKey Generation Select two large primes p and q Compute ϕ(pq) (p 1)(q 1) Choose some integer r such that (r, ϕ(pq)) 1 Comptue x such that rx 1 (mod ϕ(pq)) Public Key: pq r Private Key: p q ϕ(pq) x

Modern CryptographyAlgorithmsRSA AlgorithmRSA Algorithm Alice wants to send a message to Bob Alice takes her message M and computes C M r (mod pq) Alice sends C to Bob Bob computes.xC (M r )x M rx M kϕ(pq) 1 (M ϕ(pq) )k M 1k M M(mod pq)

Modern CryptographyAlgorithmsRSA AlgorithmRSA Example (Bob’s Key Generation) Select p 11 and q 23 We first compute ϕ(253) 220 Next, we choose r 13 and compute x 17 since 13 · 17 221 (mod 220) Bob releases the public key: (253, 13) Bob keeps the private key secret: (11, 23, ϕ(253), 17).

Modern CryptographyAlgorithmsRSA AlgorithmRSA Example (Alice Encodes Her Message) Alice chooses a message, M 18. She uses Bob’s public key to encrypt the message by computing M r(mod pq)1813 20822964865671168 2 Alice sends the ciphertext C 2 to Bob.(mod 253)

Modern CryptographyAlgorithmsRSA AlgorithmRSA Example (Bob Decodes The Message) In order to decode C, Bob uses his private key:217 131072 18 M(mod 253)

Modern CryptographyAlgorithmsRSA AlgorithmActivity rmation-security-be.html

Modern CryptographyAlgorithmsDiscrete LogDiscrete Log Relies on the difficulty of solving ax b (mod n). Diffie–Hellman–Merkle El Gamal Efficient quantum algorithm

Modern CryptographyAlgorithmsElliptic CurvesElliptic Curves An elliptic curve is the set of solutions (x, y) to an equation of theform y 2 x3 AX B. ‘Addition’ operation on points with rational coordinates Computations are difficult so key sizes are much smaller Efficient quantum algorithm

Modern CryptographyAlgorithmsKnaspack AlgorithmKnapsack Codes Merkle–Hellman Subset sum problem NP–Complete Recent Research

Modern CryptographyConclusionThanks to . Dartmouth College Department of Mathematics Johns Hopkins University– Center for Talented Youth

Modern CryptographyConclusionFurther Reading Applied Cryptography (Schneier1 ) Cryptography: A Very Short Introduction (Piper and Murphy) Cryptography and Data Security (Denning) Cryptanalysis of Number Theoretic Ciphers (Wagstaff)1 Anythingby Schneier is worth reading

Modern CryptographyConclusionQuestionsQuestions?

Modern CryptographyConclusionTHANK YOU!!!

of public-key cryptography; providing hands-on experience with some of the most common encryption algorithms that are used on the internet today. Modern Cryptography Introduction Outline 1 Introduction 2 Historical Cryptography Caesar Cipher 3 Public{Key Cryptography

Related Documents:

For Peer Review A OverCode: Visualizing Variation in Student Solutions to Programming Problems at Scale ELENA L. GLASSMAN, MIT CSAIL JEREMY SCOTT, MIT CSAIL RISHABH SINGH, MIT CSAIL PHILIP J. GUO, MIT CSAIL and University of Rochester ROBERT C. MILLER, MIT CSAIL In MOOCs, a single programming exercise may produce thousands of solutions from learners.

Intelligence Laboratory, MIT, Cambridge, MA 02139, USA rdeits@csail.mit.edu 2Russ Tedrake is with the Faculty of Electrical Engineering and Computer Science, MIT, Cambridge, MA 02139, USA russt@csail.mit.edu Fig. 1. Two examples of the output of our MIQCQP footstep planner. Above: An Atlas biped planning footsteps

Cryptography with DNA binary strands and so on. In terms of DNA algorithms, there are such results as A DNA-based, bimolecular cryptography design, Public-key system using DNA as a one-way function for key distribution, DNASC cryptography system and so on. However, DNA cryptography is an

Cryptography and Java Java provides cryptographic functionality using two APIs: JCA - Java Cryptography Architecture - security framework integrated with the core Java API JCE - Java Cryptography Extension - Extensions for strong encryption (exported after 2000 US export policy)

Cryptography and Machine Learning Ronald L. Rivest* Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MA 02139 Abstract This paper gives a survey of the relationship between the fields of cryptography and machine learning, wit

The Design and Implementation of Modern Column-Oriented Database Systems Daniel Abadi Yale University dna@cs.yale.edu Peter Boncz CWI P.Boncz@cwi.nl Stavros Harizopoulos Amiato, Inc. stavros@amiato.com Stratos Idreos Harvard University stratos@seas.harvard.edu Samuel Madden MIT CSAIL madden@csail.mit.edu

Cryptography in Java The Java Cryptography Architecture (JCA) is a set of APIs to implement concepts of modern cryptography such as digital signatures, message digests, certificates, encryption, key generation and management, and secure random number generation, etc. Using JCA, developers c

2 Annual Book of ASTM Standards, Vol 06.03. 3 Annual Book of ASTM Standards, Vol 14.03. 4 Reagent Chemicals, American Chemical Society Specifications, American Chemical Society, Washington, DC. For suggestions on the testing of reagents not listed by the American Chemical Society, see Analar Standards for Laboratory Chemicals, BDH Ltd., Poole, Dorset, U.K., and the United States Pharmacopeia .