VIDEO Intypedia008en LESSON 8: SECRET SHARING PROTOCOL. AUTHOR: Luis Hernández Encinas. Spanish Scientific Research Council in Madrid, Spain

Size: px
Start display at page:

Download "VIDEO Intypedia008en LESSON 8: SECRET SHARING PROTOCOL. AUTHOR: Luis Hernández Encinas. Spanish Scientific Research Council in Madrid, Spain"

Transcription

1 VIDEO Intypedia008en LESSON 8: SECRET SHARING PROTOCOL AUTHOR: Luis Hernández Encinas Spanish Scientific Research Council in Madrid, Spain Hello and welcome to Intypedia. We have learned many things about cipher systems and network security up to this date. Today we will see how a secret can be protected without using encryption systems. Join us! SCENE 1. PROTECTING A SECRET Hi! Today we will see how to design and carry out a protocol to protect a secret from possible loss, theft or damage. In particular, we will see how to protect a secret key that we have used to encrypt a document, or the private key that we use to sign digitally. Does that mean that if I lose my secret key or if it gets damaged I can recover it? Or that I can prevent someone from stealing it even if I have it hidden in my house? That would be fantastic! Well, not exactly, Bob. What I mean is that you can take measures to avoid losing your secret keys or prevent someone from stealing them if you keep them somewhere that is not Script Intypedia008en 1

2 adequately protected. For this, there are protocols that allow a secret to be recovered from certain pieces of information that have been prepared previously. These are known as sharing protocols or secret sharing protocols. This doesn't mean sharing or distributing secrets with other people. It has to do with dividing the secret into many pieces in a way that will allow you to recover the secret later. That sounds great but I still don't understand it very well. Don't worry, Bob, you'll see how easy it is. Let me show you in the next chapter. SCENE 2. SECRET SHARING PROTOCOL The original idea for recovering a secret is to divide it into several pieces so that if later on you have some of these pieces, not all of them necessarily, it is possible to recover the secret that had been hidden. Let's see if I understand this. Suppose I have written my secret key on a piece of paper. What you are saying is that I have to break that paper into several pieces, so that I will be able to recover the key just by gluing the pieces of the original paper back together again? In that case, it doesn't seem like a very bright idea. The example you've given doesn't work because the method you suggest is too simple and insecure. In fact, it isn't a good method because it has several problems: for example, you won't be able to recover the key if you lose only one piece of paper and if someone gets one of your pieces of paper, they will know part of your key. In practice, a protocol for sharing and distributing secrets is a cryptographic process that allows you to obtain a series of values or shadows from a given secret, so it is possible to recover the original secret using a previously specified number of those shadows, but impossible if there are fewer shadows. If I've understood correctly, you mean shadows that are derived from the original secret, but are not part of the secret. Does that mean that the shadows don't contain pieces of the secret information, like the pieces of paper that I mentioned earlier? Script Intypedia008en 2

3 That's it. The aim is to obtain different values from the secret, so that these values don't give clues about the content of the secret. I haven't said anything about the size of the shadows. If the shadows are the same size as the secret, the protocol is said to be ideal. Furthermore, there is no need to use all the shadows that were generated initially in order to recover the secret. To be more precise, if in a secret sharing protocol n shadows are generated and we need k of them to recover the secret, the k is considered a threshold value and the protocol is called a (k, n) threshold protocol. In this way, if less than k shadows are known, that is, k 1 or less, it is impossible to recover the secret. So, for example, if I use a (3, 5) threshold protocol to share my password, I will obtain 5 shadows from my secret key and I will be able to recover the complete original key using any 3 shadows. Is that correct? Can I keep one shadow of my secret in my laptop, another on a flash drive, another at home, one more in the office and the last one in a CD? Of course! That way, if you lose the CD, for example, you won't lose the key, you would have only lost one of the shadows. And you could use any of the 3 remaining shadows to recover the secret. This way, your password is protected against loss, damage and theft. An attacker won't be able to recover your password if they retrieve, in this example, 2 or fewer shadows. Alice, you've convinced me about the usefulness of these protocols. But how are they used in practice? Are they complicated? It's easy to understand. We'll take a look at an example in the next chapter. SCENE 3. EFFECTIVE IMPLEMENTATION OF A SECRET SHARING PROTOCOL One of the easiest ways to conduct a secret sharing protocol is using polynomials as a mathematical tool, although it's not the only way to do it. There are other ways, but they are more complicated. Script Intypedia008en 3

4 Well, I think I can handle polynomials; they aren't very difficult. So please explain how they are used in secret sharing. First of all, remember that a polynomial can be used to plot a curve through the points that verify this polynomial. Secondly, a polynomial of a fixed degree can be determined if we know the values that this polynomial takes on as many points as its degree value plus one. Do you mean that to find the three coefficients of a polynomial of degree 2, for example, I just need to know the values of the polynomial in three points, that is, for three values of x? That's the idea. Remember that two points determine a single line, that is a polynomial of degree 1; three points determine a single parable, which is a polynomial of degree 2, and so on. So if you know the values of a polynomial for certain points, you can determine the polynomial that passes through these points and whose degree is one less than the number of known points. The process of calculating a polynomial from its points is known as the Lagrange interpolation method. Sorry, Alice, but I still can't see how you can use polynomials to hide secrets. Patience, we're on to it. Adi Shamir, one of the most important cryptographers of today, came up with the idea of using polynomials for this protocol. The idea is to hide a secret inside of a polynomial so that given certain partial information of the polynomial you can recover the secret that was hidden in it. Okay, but there are two problems. The first one is to hide the secret in the polynomial and the second is to recover the polynomial to recover the secret. Script Intypedia008en 4

5 Let's see the first one: if my secret is, for example, the number 263 and we use a (3, 5) threshold protocol, how can we hide it in a polynomial? Bob, you have chosen the value k=3 as the threshold, so we will use a polynomial of degree 2, which has 3 factors: p(x) = ax2+bx+c. So the threshold is the same as the number of coefficients in the polynomial. Once this has been decided, the polynomial's independent term will correspond to the secret value, that is: c = 263. For the other two coefficients, two random numbers are chosen, for example: a = 167; b = 227. So our polynomial would be: p(x) = 167x2+227x+263. Now we just have to calculate the polynomial for any 5 values of x (5 shadows). For example, to make it simple, we can choose for x the values 1, 2, 3, 4 and 5, although it can be any other set of 5 numbers. That's something I can do. If I substitute the value x = 1 in the polynomial, it would be: p(1)= =657. And the other values would be 1385, 2447, 3843 and Well done! You've built the 5 shadows you needed. Each shadow is the pair formed by the value of x and the corresponding value of the polynomial. That is, your 5 shadows are the following pairs of numbers (1, 657), (2, 1385), (3, 2447), (4, 3843) and (5, 5573). Now you can save them in five different places. As you can see in this example, none of the shadows look like your secret. There is no way that anyone could find out that your secret value is 263 by stealing or finding a pair of the above numbers. But you must not forget to destroy the paper where you had written your secret number or delete the file where you had saved it. By the way, you should also delete all traces of the polynomial so that no one can find it and see your secret number on it. SCENE 4. RECOVERING THE SECRET This was easy, but now comes the second part: how can we recover the secret value using only 3 of the 5 shadows? Script Intypedia008en 5

6 To recover the secret we must obtain the polynomial and consider its independent term. To do this we consider 3 of the 5 shadows (x, p (x)). For example, the second (2, 1385), the third (3, 2447) and the fifth (5, 5573), and we use the Lagrange interpolation method to recover the polynomial. Let's calculate it: We would have k points: (x 1, y 1 )... (x k,y k ). And the polynomial is determined by calculating: p(x) = k j=1 y j q j (x), where q j (x)= k i=1,i j (x x i )/(x j x i ), with j=1,,k. In our example the 3 points are: (x 2, y 2 ), (x 3, y 3 ), (x 5, y 5 ), to simplify the calculation. The corresponding auxiliary polynomial q(x) is calculated for each point, so we obtain: Point (x 2, y 2 ) = (2, 1385) q 2 (x) = ((x x 3 )/(x 2 x 3 )) ((x x 5 )/(x 2 x 5 )) = ((x 3)/(2 3)) ((x 5)/(2 5)) = x 2 /3 8x/3+5 Point (x 3, y 3 ) = (3, 2447) q 3 (x) = ((x x 2 )/(x 3 x 2 )) ((x x 5 )/(x 3 x 5 )) = ((x 2)/(3 2)) ((x 5)/(3 5)) = x 2 /2+7x/2 5 Point (x 5,y 5 ) = (5, 5573) q 5 (x) = ((x x 2 )/(x 5 x 2 )) ((x x 3 )/(x 5 x 3 )) = ((x 2)/(5 2)) ((x 3)/(5 3)) = x 2 /6 5x/6+1 The original polynomial is obtained by calculating p(x) = j=2,3,5 y j q j (x) p(x) = y 2 q 2 (x)+y 3 q 3 (x)+y 5 q 5 (x) So the final result is: p(x) = 1385 q 2 (x)+2447 q 3 (x)+5573 q 5 (x) = 167x x+263. And your secret number is 263. You can do this same calculation with any other 3 shadows. No matter which ones you use, you will always get the same polynomial. I love it, it s fantastic. It's clear that with 3 shadows my secret can be recovered, so I'll have to be careful that no one gets 3 of the shadows. I imagine that secret sharing protocols have other uses. You're right. Although protection was their original motivation, nowadays these protocols are used and applied in other situations. For example, a secret can be divided and each shadow can be given to a different person, so the secret is recovered only if a certain number of people Script Intypedia008en 6

7 agree to share their shadows and create the secret. This approach is used for access control, opening safes or military device initialization. Alice, I only have one question: how safe is this protocol? Has anyone tried to break it? The security of the protocol has been demonstrated. It is true that there have been attempts to break it, but so far there is no known way to violate the protocol, provided that the established guidelines are followed and that their implementation has no errors. Well this is enough for today. In future lessons we will see different protocols that allow other interesting actions. On the Intypedia website you will find additional documentation for this lesson, like an example of the impossibility to recover a secret with k 1 shadows. Goodbye! See you later. Script adapted to the Intypedia format from the document sent by Dr. Luis Hernández Encinas from the Spanish Scientific Research Council in Madrid, Spain. Madrid, Spain. June Script Intypedia008en 7

Secret Sharing CPT, Version 3

Secret Sharing CPT, Version 3 Secret Sharing CPT, 2006 Version 3 1 Introduction In all secure systems that use cryptography in practice, keys have to be protected by encryption under other keys when they are stored in a physically

More information

MITOCW ocw f07-lec39_300k

MITOCW ocw f07-lec39_300k MITOCW ocw-18-01-f07-lec39_300k The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free.

More information

Int er net Saf et y Tip s

Int er net Saf et y Tip s BE CAREFUL AS: Facebook oft en means People oft en pret end t o be people t hey are not so be wary of t his!! Int er net Saf et y Tip s N ever accept people you do not know. Never give out your real name

More information

Module 3 Study Guide. GCF Method: Notice that a polynomial like 2x 2 8 xy+9 y 2 can't be factored by this method.

Module 3 Study Guide. GCF Method: Notice that a polynomial like 2x 2 8 xy+9 y 2 can't be factored by this method. Module 3 Study Guide The second module covers the following sections of the textbook: 5.4-5.8 and 6.1-6.5. Most people would consider this the hardest module of the semester. Really, it boils down to your

More information

Secret Sharing Schemes

Secret Sharing Schemes Secret Sharing Schemes 1.1 Introduction 1 1 Handling secret has been an issue of prominence from the time human beings started to live together. Important things and messages have been always there to

More information

MITOCW ocw f99-lec23_300k

MITOCW ocw f99-lec23_300k MITOCW ocw-18.06-f99-lec23_300k -- and lift-off on differential equations. So, this section is about how to solve a system of first order, first derivative, constant coefficient linear equations. And if

More information

Lesson 6: Algebra. Chapter 2, Video 1: "Variables"

Lesson 6: Algebra. Chapter 2, Video 1: Variables Lesson 6: Algebra Chapter 2, Video 1: "Variables" Algebra 1, variables. In math, when the value of a number isn't known, a letter is used to represent the unknown number. This letter is called a variable.

More information

MITOCW ocw f99-lec05_300k

MITOCW ocw f99-lec05_300k MITOCW ocw-18.06-f99-lec05_300k This is lecture five in linear algebra. And, it will complete this chapter of the book. So the last section of this chapter is two point seven that talks about permutations,

More information

But, there is always a certain amount of mystery that hangs around it. People scratch their heads and can't figure

But, there is always a certain amount of mystery that hangs around it. People scratch their heads and can't figure MITOCW 18-03_L19 Today, and for the next two weeks, we are going to be studying what, for many engineers and a few scientists is the most popular method of solving any differential equation of the kind

More information

Secret Sharing: Four People, Need Three

Secret Sharing: Four People, Need Three Secret Sharing A secret is an n-bit string. Throughout this talk assume that Zelda has a secret s {0, 1} n. She will want to give shares of the secret to various people. Applications Rumor: Secret Sharing

More information

MITOCW MITRES18_006F10_26_0601_300k-mp4

MITOCW MITRES18_006F10_26_0601_300k-mp4 MITOCW MITRES18_006F10_26_0601_300k-mp4 ANNOUNCER: The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational

More information

Lecture 18 - Secret Sharing, Visual Cryptography, Distributed Signatures

Lecture 18 - Secret Sharing, Visual Cryptography, Distributed Signatures Lecture 18 - Secret Sharing, Visual Cryptography, Distributed Signatures Boaz Barak November 27, 2007 Quick review of homework 7 Existence of a CPA-secure public key encryption scheme such that oracle

More information

Lecture 1. 1 Introduction. 2 Secret Sharing Schemes (SSS) G Exposure-Resilient Cryptography 17 January 2007

Lecture 1. 1 Introduction. 2 Secret Sharing Schemes (SSS) G Exposure-Resilient Cryptography 17 January 2007 G22.3033-013 Exposure-Resilient Cryptography 17 January 2007 Lecturer: Yevgeniy Dodis Lecture 1 Scribe: Marisa Debowsky 1 Introduction The issue at hand in this course is key exposure: there s a secret

More information

MITOCW MITRES_18-007_Part3_lec5_300k.mp4

MITOCW MITRES_18-007_Part3_lec5_300k.mp4 MITOCW MITRES_18-007_Part3_lec5_300k.mp4 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 33 The Diffie-Hellman Problem

More information

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing Lecture 11: Key Management, Secret Sharing Céline Blondeau Email: celine.blondeau@aalto.fi Department of Computer Science Aalto University, School of Science Key Management Secret Sharing Shamir s Threshold

More information

Introduction. What is RSA. A Guide To RSA by Robert Yates. Topics

Introduction. What is RSA. A Guide To RSA by Robert Yates. Topics A Guide To RSA by Robert Yates. Topics Introduction...01/09 What is RSA...01/09 Mod-Exponentiation...02/09 Euler's Theorem...03/09 RSA Algorithm...08/09 RSA Security...09/09 Introduction Welcome to my

More information

MITOCW watch?v=ko0vmalkgj8

MITOCW watch?v=ko0vmalkgj8 MITOCW watch?v=ko0vmalkgj8 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To

More information

MITOCW 8. Electromagnetic Waves in a Vacuum

MITOCW 8. Electromagnetic Waves in a Vacuum MITOCW 8. Electromagnetic Waves in a Vacuum The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resources

More information

Midterm 1. Total. CS70 Discrete Mathematics and Probability Theory, Spring :00-9:00pm, 1 March. Instructions:

Midterm 1. Total. CS70 Discrete Mathematics and Probability Theory, Spring :00-9:00pm, 1 March. Instructions: CS70 Discrete Mathematics and Probability Theory, Spring 2012 Midterm 1 7:00-9:00pm, 1 March Your Name: Person on Your Left: Person on Your Right: Your Section: Instructions: (a) There are five questions

More information

MITOCW big_picture_derivatives_512kb-mp4

MITOCW big_picture_derivatives_512kb-mp4 MITOCW big_picture_derivatives_512kb-mp4 PROFESSOR: OK, hi. This is the second in my videos about the main ideas, the big picture of calculus. And this is an important one, because I want to introduce

More information

MITOCW MIT18_02SCF10Rec_61_300k

MITOCW MIT18_02SCF10Rec_61_300k MITOCW MIT18_02SCF10Rec_61_300k JOEL LEWIS: Hi. Welcome back to recitation. In lecture, you've been learning about the divergence theorem, also known as Gauss's theorem, and flux, and all that good stuff.

More information

Guide to Negating Formulas

Guide to Negating Formulas Guide to Negating Formulas Hi everybody! We spent a little bit of time in class talking about how to negate formulas in propositional or frst-order logic. This is a really valuable skill! If you ever need

More information

Winter 2011 Josh Benaloh Brian LaMacchia

Winter 2011 Josh Benaloh Brian LaMacchia Winter 2011 Josh Benaloh Brian LaMacchia Fun with Public-Key Tonight we ll Introduce some basic tools of public-key crypto Combine the tools to create more powerful tools Lay the ground work for substantial

More information

MITOCW 5. Traveling Waves without Damping

MITOCW 5. Traveling Waves without Damping MITOCW 5. Traveling Waves without Damping The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resources

More information

Simple Math: Cryptography

Simple Math: Cryptography 1 Introduction Simple Math: Cryptography This section develops some mathematics before getting to the application. The mathematics that I use involves simple facts from number theory. Number theory is

More information

Note: Please use the actual date you accessed this material in your citation.

Note: Please use the actual date you accessed this material in your citation. MIT OpenCourseWare http://ocw.mit.edu 18.02 Multivariable Calculus, Fall 2007 Please use the following citation format: Denis Auroux. 18.02 Multivariable Calculus, Fall 2007. (Massachusetts Institute of

More information

MITOCW ocw f99-lec17_300k

MITOCW ocw f99-lec17_300k MITOCW ocw-18.06-f99-lec17_300k OK, here's the last lecture in the chapter on orthogonality. So we met orthogonal vectors, two vectors, we met orthogonal subspaces, like the row space and null space. Now

More information

Uncertainty: A Reading Guide and Self-Paced Tutorial

Uncertainty: A Reading Guide and Self-Paced Tutorial Uncertainty: A Reading Guide and Self-Paced Tutorial First, read the description of uncertainty at the Experimental Uncertainty Review link on the Physics 108 web page, up to and including Rule 6, making

More information

The general topic for today is going to be oscillations, which are extremely important in the applications and in

The general topic for today is going to be oscillations, which are extremely important in the applications and in MITOCW 18-03_L10 This is a brief, so, the equation, and we got the characteristic equation from the last time. The general topic for today is going to be oscillations, which are extremely important in

More information

MITOCW MITRES_18-007_Part1_lec3_300k.mp4

MITOCW MITRES_18-007_Part1_lec3_300k.mp4 MITOCW MITRES_18-007_Part1_lec3_300k.mp4 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resources

More information

MITOCW watch?v=ed_xr1bzuqs

MITOCW watch?v=ed_xr1bzuqs MITOCW watch?v=ed_xr1bzuqs The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To

More information

BBC LEARNING ENGLISH 6 Minute English Would the world stop without clocks?

BBC LEARNING ENGLISH 6 Minute English Would the world stop without clocks? BBC LEARNING ENGLISH 6 Minute English Would the world stop without clocks? NB: This is not a word-for-word transcript Hello, I'm. And welcome to 6 Minute English, where we bring you an interesting topic

More information

Sequences and Series

Sequences and Series Sequences and Series What do you think of when you read the title of our next unit? In case your answers are leading us off track, let's review the following IB problems. 1 November 2013 HL 2 3 November

More information

Ian Stewart's article "Million-Dollar Minesweeper"

Ian Stewart's article Million-Dollar Minesweeper Page 1 of 5 Million-Dollar Minesweeper Lecture: November 1, 2000 (Video Online) Ian Stewart, Department of Mathematics, University of Warwick, UK It's not often you can win a million dollars by analysing

More information

Introduction to Modern Cryptography Lecture 11

Introduction to Modern Cryptography Lecture 11 Introduction to Modern Cryptography Lecture 11 January 10, 2017 Instructor: Benny Chor Teaching Assistant: Orit Moskovich School of Computer Science Tel-Aviv University Fall Semester, 2016 17 Tuesday 12:00

More information

MITOCW watch?v=y6ma-zn4olk

MITOCW watch?v=y6ma-zn4olk MITOCW watch?v=y6ma-zn4olk PROFESSOR: We have to ask what happens here? This series for h of u doesn't seem to stop. You go a 0, a 2, a 4. Well, it could go on forever. And what would happen if it goes

More information

MITOCW ocw-18_02-f07-lec02_220k

MITOCW ocw-18_02-f07-lec02_220k MITOCW ocw-18_02-f07-lec02_220k The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free.

More information

MITOCW free_body_diagrams

MITOCW free_body_diagrams MITOCW free_body_diagrams This is a bungee jumper at the bottom of his trajectory. This is a pack of dogs pulling a sled. And this is a golf ball about to be struck. All of these scenarios can be represented

More information

Cryptography. P. Danziger. Transmit...Bob...

Cryptography. P. Danziger. Transmit...Bob... 10.4 Cryptography P. Danziger 1 Cipher Schemes A cryptographic scheme is an example of a code. The special requirement is that the encoded message be difficult to retrieve without some special piece of

More information

Relationships Between Quantities

Relationships Between Quantities Algebra 1 Relationships Between Quantities Relationships Between Quantities Everyone loves math until there are letters (known as variables) in problems!! Do students complain about reading when they come

More information

Lecture 17 - Diffie-Hellman key exchange, pairing, Identity-Based Encryption and Forward Security

Lecture 17 - Diffie-Hellman key exchange, pairing, Identity-Based Encryption and Forward Security Lecture 17 - Diffie-Hellman key exchange, pairing, Identity-Based Encryption and Forward Security Boaz Barak November 21, 2007 Cyclic groups and discrete log A group G is cyclic if there exists a generator

More information

Dan Boneh. Introduction. Course Overview

Dan Boneh. Introduction. Course Overview Online Cryptography Course Introduction Course Overview Welcome Course objectives: Learn how crypto primitives work Learn how to use them correctly and reason about security My recommendations: Take notes

More information

We are going to start studying today, and for quite a while, the linear second-order differential equation with

We are going to start studying today, and for quite a while, the linear second-order differential equation with MITOCW 18-03_L9 We're going to start. We are going to start studying today, and for quite a while, the linear second-order differential equation with constant coefficients. In standard form, it looks like,

More information

Mathematical Logic Part Three

Mathematical Logic Part Three Mathematical Logic Part Three Recap from Last Time What is First-Order Logic? First-order logic is a logical system for reasoning about properties of objects. Augments the logical connectives from propositional

More information

Introduction to Cryptography. Susan Hohenberger

Introduction to Cryptography. Susan Hohenberger Introduction to Cryptography Susan Hohenberger 1 Cryptography -- from art to science -- more than just encryption -- essential today for non-military applications 2 Symmetric Crypto Shared secret K =>

More information

Topics in Complexity

Topics in Complexity Topics in Complexity Please evaluate this course on Axess! Your feedback really does make a difference. Applied Complexity Theory Complexity theory has enormous practical relevance across various domains

More information

MITOCW MITRES_18-007_Part1_lec5_300k.mp4

MITOCW MITRES_18-007_Part1_lec5_300k.mp4 MITOCW MITRES_18-007_Part1_lec5_300k.mp4 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resources

More information

Instructor (Brad Osgood)

Instructor (Brad Osgood) TheFourierTransformAndItsApplications-Lecture26 Instructor (Brad Osgood): Relax, but no, no, no, the TV is on. It's time to hit the road. Time to rock and roll. We're going to now turn to our last topic

More information

MITOCW R11. Double Pendulum System

MITOCW R11. Double Pendulum System MITOCW R11. Double Pendulum System The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for

More information

6: Polynomials and Polynomial Functions

6: Polynomials and Polynomial Functions 6: Polynomials and Polynomial Functions 6-1: Polynomial Functions Okay you know what a variable is A term is a product of constants and powers of variables (for example: x ; 5xy ) For now, let's restrict

More information

Exam Security January 19, :30 11:30

Exam Security January 19, :30 11:30 Exam Security January 19, 2016. 8:30 11:30 You can score a maximum of 100. Each question indicates how many it is worth. You are NOT allowed to use books or notes, or a (smart) phone. You may answer in

More information

Student: We have to buy a new access code? I'm afraid you have to buy a new one. Talk to the bookstore about that.

Student: We have to buy a new access code? I'm afraid you have to buy a new one. Talk to the bookstore about that. Physics 1-21-09 Wednesday Daily Homework Statistics 118 Responses Mean: 0.944 Median: 0.96 Do we want to turn the front lights off? This okay? A friend of mine used to visit a psychology class back in

More information

MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY

MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY In this meeting we go through the foundations of modular arithmetic. Before the meeting it is assumed that you have watched the videos and worked

More information

CRYPTOGRAPHY AND LARGE PRIMES *

CRYPTOGRAPHY AND LARGE PRIMES * CRYPTOGRAPHY AND LARGE PRIMES * B. Hartley University of Manchester, England, and National University of Singapore The word "cryptography" derives from Greek and means "secret writing". Since ancient times,

More information

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution CS 70 Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution 1. Polynomial intersections Find (and prove) an upper-bound on the number of times two distinct degree

More information

MITOCW MITRES18_005S10_DerivOfSinXCosX_300k_512kb-mp4

MITOCW MITRES18_005S10_DerivOfSinXCosX_300k_512kb-mp4 MITOCW MITRES18_005S10_DerivOfSinXCosX_300k_512kb-mp4 PROFESSOR: OK, this lecture is about the slopes, the derivatives, of two of the great functions of mathematics: sine x and cosine x. Why do I say great

More information

6.041SC Probabilistic Systems Analysis and Applied Probability, Fall 2013 Transcript Tutorial:A Random Number of Coin Flips

6.041SC Probabilistic Systems Analysis and Applied Probability, Fall 2013 Transcript Tutorial:A Random Number of Coin Flips 6.041SC Probabilistic Systems Analysis and Applied Probability, Fall 2013 Transcript Tutorial:A Random Number of Coin Flips Hey, everyone. Welcome back. Today, we're going to do another fun problem that

More information

MITOCW watch?v=0usje5vtiks

MITOCW watch?v=0usje5vtiks MITOCW watch?v=0usje5vtiks PROFESSOR: Mach-Zehnder-- interferometers. And we have a beam splitter. And the beam coming in, it splits into 2. A mirror-- another mirror. The beams are recombined into another

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

MITOCW ocw feb k

MITOCW ocw feb k MITOCW ocw-18-086-13feb2006-220k INTRODUCTION: The following content is provided by MIT OpenCourseWare under a Creative Commons license. Additional information about our license and MIT OpenCourseWare

More information

Goldilocks and the Three Bears By Camille Atebe

Goldilocks and the Three Bears By Camille Atebe Goldilocks and the Three Bears By Camille Atebe 2009 CAMILLE ATEBE Dramatis Personae Goldilocks the trespasser Papa Bear the father bear Mama Bear the mother bear Baby Bear the baby bear Officer Briggs

More information

MITOCW MIT20_020S09_06_inverter

MITOCW MIT20_020S09_06_inverter MITOCW MIT20_020S09_06_inverter >> Izzy: Dude, I like what you built there. What's it do? >> Dude: Oh...hi Iz. This is a cool bug. I made it using an electronics building kit that Sally got me. She wanted

More information

MITOCW 6. Standing Waves Part I

MITOCW 6. Standing Waves Part I MITOCW 6. Standing Waves Part I The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free.

More information

19. Coding for Secrecy

19. Coding for Secrecy 19. Coding for Secrecy 19.1 Introduction Protecting sensitive information from the prying eyes and ears of others is an important issue today as much as it has been for thousands of years. Government secrets,

More information

MITOCW MITRES18_006F10_26_0101_300k-mp4

MITOCW MITRES18_006F10_26_0101_300k-mp4 MITOCW MITRES18_006F10_26_0101_300k-mp4 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resources

More information

MITOCW ocw-18_02-f07-lec25_220k

MITOCW ocw-18_02-f07-lec25_220k MITOCW ocw-18_02-f07-lec25_220k The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free.

More information

Week 7 An Application to Cryptography

Week 7 An Application to Cryptography SECTION 9. EULER S GENERALIZATION OF FERMAT S THEOREM 55 Week 7 An Application to Cryptography Cryptography the study of the design and analysis of mathematical techniques that ensure secure communications

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 22 November 27, 2017 CPSC 467, Lecture 22 1/43 BBS Pseudorandom Sequence Generator Secret Splitting Shamir s Secret Splitting Scheme

More information

Introduction to Cryptography. Lecture 8

Introduction to Cryptography. Lecture 8 Introduction to Cryptography Lecture 8 Benny Pinkas page 1 1 Groups we will use Multiplication modulo a prime number p (G, ) = ({1,2,,p-1}, ) E.g., Z 7* = ( {1,2,3,4,5,6}, ) Z p * Z N * Multiplication

More information

MITOCW Investigation 3, Part 1

MITOCW Investigation 3, Part 1 MITOCW Investigation 3, Part 1 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free.

More information

CRYPTOGRAPHY AND NUMBER THEORY

CRYPTOGRAPHY AND NUMBER THEORY CRYPTOGRAPHY AND NUMBER THEORY XINYU SHI Abstract. In this paper, we will discuss a few examples of cryptographic systems, categorized into two different types: symmetric and asymmetric cryptography. We

More information

Column: The Physics of Digital Information 1

Column: The Physics of Digital Information 1 Column: The Physics of Digital Information 1 Fred Cohen One of the interesting questions underlying creating a science of digital forensics is what form that science might take. At the end of the IEEE

More information

MITOCW ocw f99-lec09_300k

MITOCW ocw f99-lec09_300k MITOCW ocw-18.06-f99-lec09_300k OK, this is linear algebra lecture nine. And this is a key lecture, this is where we get these ideas of linear independence, when a bunch of vectors are independent -- or

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2018 Identification Identification Non- Repudiation Consider signature- based C- R sk ch=r res = Sig(vk,ch) Bob can prove to police

More information

MITOCW MIT8_01F16_w02s07v03_1_360p

MITOCW MIT8_01F16_w02s07v03_1_360p MITOCW MIT8_01F16_w02s07v03_1_360p Let's consider what we call the window washer problem. What we have is suspended from some ceiling. We have a pulley. And the pulley is suspended by a rope, which we're

More information

Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1 (Version B)

Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1 (Version B) CS 70 Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1 (Version B) Instructions: Do not turn over this page until the proctor tells you to. Don t write any answers on the backs

More information

MITOCW watch?v=vu_of9tcjaa

MITOCW watch?v=vu_of9tcjaa MITOCW watch?v=vu_of9tcjaa The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resources for free. To

More information

Module 2 Study Guide. The second module covers the following sections of the textbook: , 4.1, 4.2, 4.5, and

Module 2 Study Guide. The second module covers the following sections of the textbook: , 4.1, 4.2, 4.5, and Module 2 Study Guide The second module covers the following sections of the textbook: 3.3-3.7, 4.1, 4.2, 4.5, and 5.1-5.3 Sections 3.3-3.6 This is a continuation of the study of linear functions that we

More information

Instructor (Andrew Ng)

Instructor (Andrew Ng) MachineLearning-Lecture02 Instructor (Andrew Ng):All right, good morning, welcome back. So before we jump into today's material, I just have one administrative announcement, which is graders. So I guess

More information

Outline for Today. What is an Implication? Negations and their Applications. Proof by Contrapositive. Proof by Contradiction

Outline for Today. What is an Implication? Negations and their Applications. Proof by Contrapositive. Proof by Contradiction Indirect Proofs Outline for Today What is an Implication? Understanding a key type of mathematical statement. Negations and their Applications How do you show something is not true? Proof by Contrapositive

More information

Public-key Cryptography and elliptic curves

Public-key Cryptography and elliptic curves Public-key Cryptography and elliptic curves Dan Nichols nichols@math.umass.edu University of Massachusetts Oct. 14, 2015 Cryptography basics Cryptography is the study of secure communications. Here are

More information

Mathematical Logic Part Three

Mathematical Logic Part Three Mathematical Logic Part Three Recap from Last Time What is First-Order Logic? First-order logic is a logical system for reasoning about properties of objects. Augments the logical connectives from propositional

More information

MITOCW watch?v=4q0t9c7jotw

MITOCW watch?v=4q0t9c7jotw MITOCW watch?v=4q0t9c7jotw The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To

More information

Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1

Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1 CS 70 Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1 Thursday July 17, 2014, 12:40pm-2:00pm. Instructions: Do not turn over this page until the proctor tells you to. Don t

More information

Mathematical Logic Part Three

Mathematical Logic Part Three Mathematical Logic Part Three Recap from Last Time What is First-Order Logic? First-order logic is a logical system for reasoning about properties of objects. Augments the logical connectives from propositional

More information

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

Intro to Public Key Cryptography Diffie & Hellman Key Exchange Introduction to Modern Cryptography Lecture 5 Number Theory: 1. Quadratic residues. 2. The discrete log problem. Intro to Public Key Cryptography Diffie & Hellman Key Exchange Course Summary - Math Part

More information

MITOCW ocw f99-lec30_300k

MITOCW ocw f99-lec30_300k MITOCW ocw-18.06-f99-lec30_300k OK, this is the lecture on linear transformations. Actually, linear algebra courses used to begin with this lecture, so you could say I'm beginning this course again by

More information

Secret sharing schemes

Secret sharing schemes Secret sharing schemes Martin Stanek Department of Computer Science Comenius University stanek@dcs.fmph.uniba.sk Cryptology 1 (2017/18) Content Introduction Shamir s secret sharing scheme perfect secret

More information

Solutions for week 1, Cryptography Course - TDA 352/DIT 250

Solutions for week 1, Cryptography Course - TDA 352/DIT 250 Solutions for week, Cryptography Course - TDA 352/DIT 250 In this weekly exercise sheet: you will use some historical ciphers, the OTP, the definition of semantic security and some combinatorial problems.

More information

MITOCW MITRES_18-007_Part5_lec3_300k.mp4

MITOCW MITRES_18-007_Part5_lec3_300k.mp4 MITOCW MITRES_18-007_Part5_lec3_300k.mp4 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resources

More information

MITOCW MITRES18_005S10_DiffEqnsGrowth_300k_512kb-mp4

MITOCW MITRES18_005S10_DiffEqnsGrowth_300k_512kb-mp4 MITOCW MITRES18_005S10_DiffEqnsGrowth_300k_512kb-mp4 GILBERT STRANG: OK, today is about differential equations. That's where calculus really is applied. And these will be equations that describe growth.

More information

Pseudonym and Anonymous Credential Systems. Kyle Soska 4/13/2016

Pseudonym and Anonymous Credential Systems. Kyle Soska 4/13/2016 Pseudonym and Anonymous Credential Systems Kyle Soska 4/13/2016 Moving Past Encryption Encryption Does: Hide the contents of messages that are being communicated Provide tools for authenticating messages

More information

I'm not going to tell you what differential equations are, or what modeling is. If you still are uncertain about those

I'm not going to tell you what differential equations are, or what modeling is. If you still are uncertain about those MITOCW 18-03_L1d OK, let's get started. I'm assuming that, A, you went recitation yesterday, B, that even if you didn't, you know how to separate variables, and you know how to construct simple models,

More information

Mathematical Logic Part Three

Mathematical Logic Part Three Mathematical Logic Part Three The Aristotelian Forms All As are Bs x. (A(x B(x Some As are Bs x. (A(x B(x No As are Bs x. (A(x B(x Some As aren t Bs x. (A(x B(x It It is is worth worth committing committing

More information

Note: Please use the actual date you accessed this material in your citation.

Note: Please use the actual date you accessed this material in your citation. MIT OpenCourseWare http://ocw.mit.edu 18.06 Linear Algebra, Spring 2005 Please use the following citation format: Gilbert Strang, 18.06 Linear Algebra, Spring 2005. (Massachusetts Institute of Technology:

More information

Introduction to Quantum Cryptography

Introduction to Quantum Cryptography Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics

More information

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech + Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts

More information

MITOCW watch?v=v-rpm3e8ws0

MITOCW watch?v=v-rpm3e8ws0 MITOCW watch?v=v-rpm3e8ws0 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To

More information

LESSON #1: VARIABLES, TERMS, AND EXPRESSIONS COMMON CORE ALGEBRA II

LESSON #1: VARIABLES, TERMS, AND EXPRESSIONS COMMON CORE ALGEBRA II 1 LESSON #1: VARIABLES, TERMS, AND EXPRESSIONS COMMON CORE ALGEBRA II Mathematics has developed a language all to itself in order to clarify concepts and remove ambiguity from the analysis of problems.

More information