EECS 395-0-21 Introduction to Cryptography - PowerPoint PPT Presentation

1 / 34
About This Presentation
Title:

EECS 395-0-21 Introduction to Cryptography

Description:

Sudoku. I know solution. I can't solve it. Choose either: Row ... Sudoku. I know solution. I can't solve it. Original. Other Cryptography Uses. Identification ... – PowerPoint PPT presentation

Number of Views:121
Avg rating:3.0/5.0
Slides: 35
Provided by: fort8
Category:

less

Transcript and Presenter's Notes

Title: EECS 395-0-21 Introduction to Cryptography


1
EECS 395-0-21Introduction to Cryptography
  • Lance Fortnow

2
Basic Info
  • Webpage Off http//lance.fortnow.com
  • Text Intro to Cryptography with Coding Theory by
    Trappe and Washington
  • Topics Crypto past, current and future
  • Grading on mostly weekly assignments and take-off
    exams.
  • Math Background A little probability, a little
    more number theory. Will teach.

3
The Players
Bob
Alice
Eve
4
Lock and Key
Safe Impossible to open or view inside without
key Cheap and easy to transport
Key Can be used to open safe Easily copied
5
Puzzle 1
6
Puzzle 1 Solution
7
Puzzle 2
8
Puzzle 2 Solution
9
Flipping a coin
10
Flipping a coin
If coins same declare Heads If coins differ
declare Tails
11
Poker
12
Sudoku
I cant solve it.
I know solution.
13
Sudoku
I cant solve it.
I know solution.
14
Sudoku
I cant solve it.
I know solution.
15
Sudoku
I cant solve it.
  • Choose either
  • Row
  • Column
  • 3x3 square
  • Original

I know solution.
16
Sudoku
I cant solve it.
4th Row
I know solution.
17
Sudoku
I cant solve it.
Left Center Box
I know solution.
18
Sudoku
I cant solve it.
Original
I know solution.
19
Other Cryptography Uses
  • Identification
  • Digital Signatures
  • Secret Sharing
  • Electronic Voting
  • Electronic Cash

20
Data Encryption Standard
  • DES approved by NBS (now NIST) in 1977.
  • Uses key of 56 bits to encrypt and decrypt.
  • Very efficient in time and memory.

Plaintext
DES Encoder
Key
Codeword
Codeword
DES Decoder
Plaintext
Key
21
DES
22
Data Encryption Standard
  • DES approved by NBS (now NIST) in 1977.
  • Uses key of 56 bits to encrypt and decrypt.
  • Very efficient in time and memory.
  • Problem 56 bits not very big by todays
    standards
  • Idea Use DES multiple times
  • 2 times doesnt help Meet in the middle attack
  • 3 times gives 112 bits of security (Triple DES)

23
Meet in the Middle
Plaintext
DES Encoder
Key1
Codeword1
Key2
DES Encoder
Final Codeword
24
Advanced Encryption Standard
  • Also known as Rijndael
  • Approved in 1997 by NIST
  • Allows key lengths of 128, 192 or 256 bits.

Plaintext
AES Encoder
Key
Codeword
Codeword
AES Decoder
Plaintext
Key
25
Safe and Key
  • In AES, key k describes function fk(x) that is
    hard to invert without k.
  • fk(x)
  • k
  • Same key to encrypt and decrypt

26
Password System
  • System has secret key k
  • Password file has (users, fk(pass))
  • Can check password
  • Making password file public is safe
  • Dictionary attack/Salt

27
Public-Key Cryptography
  • Diffie-Hellman

28
Public-Key Cryptography
  • Diffie-Hellman

Public Key e Private Key d
29
Public-Key Cryptography
  • Diffie-Hellman

Public Key e Private Key d
Use key e to encrypt and key d to decrypt.
30
Public-Key Cryptography
  • Diffie-Hellman

Public Key e Private Key d
Key e
31
Public-Key Cryptography
  • Diffie-Hellman

e
Public Key e Private Key d
Key e
32
Public-Key Cryptography
  • Diffie-Hellman

Public Key e Private Key d
Key e
33
Public-Key Cryptography
  • Diffie-Hellman

d
Public Key e Private Key d
Key e
34
RSA Algorithm
  • Rivest-Shamir-Adelman
  • Bob chooses secret primes p and q
  • Bob chooses random e, gcd(e,(p-1)(q-1)) 1
  • Bob computes d with de ? 1 (mod (p-1)(q-1))
  • Public Key n,e
  • Private Key p,q,d
  • Encoding message m cme (mod n)
  • Decoding code c mcd (mod n)
Write a Comment
User Comments (0)
About PowerShow.com