An Introduction to Cryptography

Size: px
Start display at page:

Download "An Introduction to Cryptography"

Transcription

1 An Introduction to Cryptography Spotlight on Science J. Robert Buchanan Department of Mathematics Spring 2008

2 What is Cryptography? cryptography: study of methods for sending messages in a form that only be understood by the recipient. cryptanalysis: study of methods for defeating cryptography. cryptology: study of both cryptography and cryptanalysis.

3 Cryptology Throughout History Subject as old as recorded history.

4 Cryptology Throughout History Subject as old as recorded history. Julius Caesar used substitution ciphers for military and personal communication.

5 History (cont.) Enigma patented by Arthur Scherbius in 1918 (became the foundation of German and Japanese codes during WWII). Photo credit: JRB

6 History (cont.) Since WWII foundation of cryptology has been mathematics, particularly number theory. Photo credit: JRB

7 Terminology Plaintext: the un-encrypted, clearly readable form of a message. Ciphertext: the encrypted form of the plaintext, readable only with the key to the cipher. To tell them apart we will write plaintext in lowercase and ciphertext in UPPERCASE.

8 Modular Arithmetic Definition Two integers n and m are congruent modulo k (or equivalent modulo k) written symbolically as when k divides n m evenly. n m (mod k) Example (mod 26) since = 1.

9 Modular Arithmetic Definition Two integers n and m are congruent modulo k (or equivalent modulo k) written symbolically as when k divides n m evenly. n m (mod k) Example (mod 26) since = 1. What other integers are equivalent to 13 modulo 26?

10 Monoalphabetic Substitution Ciphers Definition A monoalphabetic substitution cipher substitutes each letter in the plaintext with an alternate letter to form the ciphertext.

11 Monoalphabetic Substitution Ciphers Definition A monoalphabetic substitution cipher substitutes each letter in the plaintext with an alternate letter to form the ciphertext. Question: how do we make the substitution?

12 Monoalphabetic Substitution Ciphers Definition A monoalphabetic substitution cipher substitutes each letter in the plaintext with an alternate letter to form the ciphertext. Question: how do we make the substitution? An answer: using modular arithmetic.

13 Positional Representation of the Alphabet Associate each letter with an integer giving its position in the standard alphabet. a b c d e f g h i j k l m n o p q r s t u v w x y z Take the letter at position i and replace it with the letter at position (i + 5) (mod 26). This is called an additive cipher with key 5.

14 Example a b c d e f g h i j k l m F G H I J K L M N O P Q R n o p q r s t u v w x y z S T U V W X Y Z A B C D E

15 Example a b c d e f g h i j k l m F G H I J K L M N O P Q R n o p q r s t u v w x y z S T U V W X Y Z A B C D E Now encrypt One if by land, two if by sea.

16 Plaintext to Ciphertext Plaintext: One if by land, two if by sea. o n e i f b y l a n d t w T S J N K G D Q F S I Y B o i f b y s e a T N K G D X J F Ciphertext: TSJ NK GD QFSI, YBT NK GD XJF.

17 Questions 1 Can you see any deficiencies in this way of encrypting the plaintext? 2 How could it be improved?

18 Answers Frequently occurring single letter words ( a and I ), common two-letter combinations ( an, in, if, etc.) called digraphs, and common three-letter combinations ( and, the, ion, etc.) called trigraphs can give clues to the cipher key. To help hide these clues, encrypted messages are often written in letter blocks of length five. Thus our encrypted message would be formatted as: TSJNK GDQFS IYBTN KGDXJ F

19 Decrypting the Ciphertext Suppose you receive a ciphertext, how do you read it?

20 Decrypting the Ciphertext Suppose you receive a ciphertext, how do you read it? If you have the key, you must apply its additive inverse cipher to the ciphertext to reveal the plaintext.

21 Decrypting the Ciphertext Suppose you receive a ciphertext, how do you read it? If you have the key, you must apply its additive inverse cipher to the ciphertext to reveal the plaintext. What is the additive inverse of 5 (mod 26)?

22 Decrypting the Ciphertext Suppose you receive a ciphertext, how do you read it? If you have the key, you must apply its additive inverse cipher to the ciphertext to reveal the plaintext. What is the additive inverse of 5 (mod 26)? (q + 5) (mod 26) 0 q = 1 q = 21

23 Decryption A B C D E F G H I J K L M v w x y z a b c d e f g h N O P Q R S T U V W X Y Z i j k l m n o p q r s t u

24 Example A B C D E F G H I J K L M v w x y z a b c d e f g h N O P Q R S T U V W X Y Z i j k l m n o p q r s t u Ciphertext H M J J X J G Z W L J W Plaintext

25 Example A B C D E F G H I J K L M v w x y z a b c d e f g h N O P Q R S T U V W X Y Z i j k l m n o p q r s t u Ciphertext H M J J X J G Z W L J W Plaintext c h e e s e b u r g e r

26 What if You Don t Have the Key? Questions: 1 If the letter a occurs 10 times in the plaintext and F is substituted for a in the ciphertext, how often will F occur in the ciphertext?

27 What if You Don t Have the Key? Questions: 1 If the letter a occurs 10 times in the plaintext and F is substituted for a in the ciphertext, how often will F occur in the ciphertext?

28 What if You Don t Have the Key? Questions: 1 If the letter a occurs 10 times in the plaintext and F is substituted for a in the ciphertext, how often will F occur in the ciphertext? 2 How often do various letters and letter combinations occur in English writing?

29 Single Letter Frequencies Letter Position Frequency Letter Position Frequency a n b o c p d q e r f s g t h u i v j w k x l y m z

30 Highest to Lowest Frequencies Letter Position Frequency Letter Position Frequency e m t w a f o g i y n p s b h v r k d j l x c q u z

31 Challenge Decrypt the following ciphertext: VUNIR RAWBL RQZRR GVATJ VGULB HGBQN LNAQG NYXVA TNOBH GPELC GBTEN CULVU BCRLB HYRNE ARQFB ZRGUV ATNOB HGGUR CBJRE NAQHG VYVGL BSZNG URZNG VPFNA QUBJV GCYNL FNAVZ CBEGN AGEBY RVABH EYVIR FJURA LBHQR PELCG GUVFZ RFFNT RCYRN FRFRA QNARZ NVYGB EBORE GQBGO HPUNA NANGZ VYYRE FIVYY RQBGR QH

32 Public Key Cryptography In the previous cryptographic systems, the key used to encipher the message must be kept hidden from the public and should be known only by the sender and recipient of the message. There are other cryptographic systems in which each party has a private key (which they keep secret) and a public key which they publish so that others may send them encrypted messages which only they can decrypt. The public key functions as the recipient s cryptographic telephone number.

33 Overview of Public Key Cryptography Suppose Alice wants to send Bob a message which only Bob will be able to read. 1 Alice looks up Bob s public key and enciphers the plaintext using his public key.

34 Overview of Public Key Cryptography Suppose Alice wants to send Bob a message which only Bob will be able to read. 1 Alice looks up Bob s public key and enciphers the plaintext using his public key. 2 Alice sends Bob the ciphertext (or even publishes it in the newspaper!).

35 Overview of Public Key Cryptography Suppose Alice wants to send Bob a message which only Bob will be able to read. 1 Alice looks up Bob s public key and enciphers the plaintext using his public key. 2 Alice sends Bob the ciphertext (or even publishes it in the newspaper!). 3 Bob decrypts the ciphertext using his private key.

36 RSA Public Key Cryptography One of the most popular public key cryptographic systems is known as RSA. It was developed by Adi Shamir Ronald Rivest Leonard Adelman.

37 A Little Number Theory Definition A prime number is a whole number p greater than 1 whose only divisors are p and 1. An integer which is not prime is called a composite number.

38 A Little Number Theory Definition A prime number is a whole number p greater than 1 whose only divisors are p and 1. An integer which is not prime is called a composite number. Definition If a and b are positive integers, the greatest common divisor of a and b is number denoted gcd(a, b) and is the positive integer d satisfying both of the following properties: d divides a and d divides b, if c is and integer and c divides a and c divides b, then c divides d.

39 A Little Number Theory Definition A prime number is a whole number p greater than 1 whose only divisors are p and 1. An integer which is not prime is called a composite number. Definition If a and b are positive integers, the greatest common divisor of a and b is number denoted gcd(a, b) and is the positive integer d satisfying both of the following properties: d divides a and d divides b, if c is and integer and c divides a and c divides b, then c divides d. Definition If gcd(a, b) = 1 we say that a and b are relatively prime.

40 Examples Example 4 = gcd(16, 60) 13 = gcd(13, 65)? = gcd(72, 81)

41 Euclidean Algorithm To find the gcd(a, b): 1 If b divides a evenly, gcd(a, b) = b. 2 If not, replace a by b and replace b by the remainder of a b and go back to step 1. A Java applet implementing the Euclidean Algorithm is also available.

42 Example Example Find gcd(105, 56) using the Euclidean Algorithm.

43 Example Example Find gcd(105, 56) using the Euclidean Algorithm. a b gcd(105, 56) = 7

44 Linear Combinations Definition If a and b are integers, then an expression of the from ax + by where x and y are also integers is called a linear combination of a and b.

45 Linear Combinations Definition If a and b are integers, then an expression of the from ax + by where x and y are also integers is called a linear combination of a and b. Theorem If a and b are integers, then gcd(a, b) is the smallest positive integer which can be written as a linear combination of a and b.

46 Linear Combinations Definition If a and b are integers, then an expression of the from ax + by where x and y are also integers is called a linear combination of a and b. Theorem If a and b are integers, then gcd(a, b) is the smallest positive integer which can be written as a linear combination of a and b. Corollary If a and b are relatively prime then b has a multiplicative inverse modulo a.

47 Extended Euclidean Algorithm To find x and y such that use the tabular method. gcd(a, b) = ax + by Start the table like this: x y d 1 0 a 0 1 b???

48 Extended Euclidean Algorithm To find x and y such that gcd(a, b) = ax + by use the tabular method. Start the table like this: x y d 1 0 a 0 1 b??? To fill in the next row: 1 Find q and r such that a b = q + r b. 2 Multiply next to last row by q and subtract from third to last row. 3 Keep appending rows to the table until r = 0.

49 Example x y d ( 1)(105) + (2)(56) = 7 A Java applet implementing the Extended Euclidean Algorithm is also available.

50 Finding a Multiplicative Inverse Verify that 23 and 29 are relatively prime and find the multiplicative inverse of 29 modulo 23. x y d (4)(29) + ( 5)(23) (mod 23) 1 (4)(29) (mod 23) So 4 is the multiplicative inverse of 29 modulo 23.

51 More Number Theory Definition If N is the set of all positive integers then for each positive integer n define φ(n) to be the number of positive integers less than or equal to n which are relatively prime to n. Such a function φ is called the Euler phi function.

52 More Number Theory Definition If N is the set of all positive integers then for each positive integer n define φ(n) to be the number of positive integers less than or equal to n which are relatively prime to n. Such a function φ is called the Euler phi function. Example Do you notice a pattern? n

53 Euler Phi Function n φ(n) n φ(n)

54 Euler Phi Function n φ(n) n φ(n) Lemma If p is prime, then φ(p) = p 1.

55 Euler Phi Function n φ(n) n φ(n) Lemma If p is prime, then φ(p) = p 1. Lemma If p and q are distinct primes, then φ(pq) = φ(p)φ(q) = (p 1)(q 1).

56 Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 1 let p = 1009 and q = 2003.

57 Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 2 forms the product n = pq, 1 let p = 1009 and q = n =

58 Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 2 forms the product n = pq, 3 computes φ(n), 1 let p = 1009 and q = n = φ( ) = (1009 1)(2003 1) =

59 Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 2 forms the product n = pq, 3 computes φ(n), 4 selects integer e such that gcd(e, φ(n)) = 1, 1 let p = 1009 and q = n = φ( ) = (1009 1)(2003 1) = e = 1003 (for example)

60 Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 2 forms the product n = pq, 3 computes φ(n), 4 selects integer e such that gcd(e, φ(n)) = 1, 5 finds the multiplicative inverse d of e (mod φ(n)), 1 let p = 1009 and q = n = φ( ) = (1009 1)(2003 1) = e = 1003 (for example) 5 d = (for this e)

61 Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 2 forms the product n = pq, 3 computes φ(n), 4 selects integer e such that gcd(e, φ(n)) = 1, 5 finds the multiplicative inverse d of e (mod φ(n)), 6 private key is d, public key is (e, n). 1 let p = 1009 and q = n = φ( ) = (1009 1)(2003 1) = e = 1003 (for example) 5 d = (for this e) 6 private key is , public key is (1003, ).

62 Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 2 forms the product n = pq, 3 computes φ(n), 4 selects integer e such that gcd(e, φ(n)) = 1, 5 finds the multiplicative inverse d of e (mod φ(n)), 6 private key is d, public key is (e, n). 1 let p = 1009 and q = n = Remark: only the Key Utility knows p and q. 3 φ( ) = (1009 1)(2003 1) = e = 1003 (for example) 5 d = (for this e) 6 private key is , public key is (1003, ).

63 Exchanging Messages Suppose Alice and Bob have the following keys. Key Holder Public Key Private Key Alice (e a, n a ) = (1003, ) d a = Bob (e b, n b ) = (10007, ) d b =

64 Exchanging Messages Suppose Alice and Bob have the following keys. Key Holder Public Key Private Key Alice (e a, n a ) = (1003, ) d a = Bob (e b, n b ) = (10007, ) d b = Private key d a is known only to Alice (and the Key Utility), while private key d b is known only to Bob (and the Key Utility).

65 Exchanging Messages Suppose Alice and Bob have the following keys. Key Holder Public Key Private Key Alice (e a, n a ) = (1003, ) d a = Bob (e b, n b ) = (10007, ) d b = Private key d a is known only to Alice (and the Key Utility), while private key d b is known only to Bob (and the Key Utility). If Alice wants to send the message hi to Bob, she looks up Bob s public key (e b, n b ) and must do two things.

66 Encrypting Using RSA 1 Alice converts hi to a number, m. Letter h i ASCII Code m =

67 Encrypting Using RSA 1 Alice converts hi to a number, m. Letter h i ASCII Code m = Alice creates the ciphertext c using the formula c m e b (mod n b ) c = (mod ) c = and sends it to Bob. Alice can try this Java applet if she needs help with modular exponentiation.

68 Encrypting Using RSA 1 Alice converts hi to a number, m. Letter h i ASCII Code m = Alice creates the ciphertext c using the formula c m e b (mod n b ) c = (mod ) c = and sends it to Bob. Alice can try this Java applet if she needs help with modular exponentiation. Remark: if m > n b Alice breaks the m into chunks smaller than n b.

69 Bob Decrypts the Ciphertext When Bob receives the ciphertext c he uses his private key d b and computes m c d b (mod n b ) m = (mod ) m =

70 Bob Decrypts the Ciphertext When Bob receives the ciphertext c he uses his private key d b and computes m c d b (mod n b ) m = (mod ) m = ASCII Code Letter h i

71 Is RSA Secure? The security of RSA depends on the difficulty in factoring large numbers like n.

72 Is RSA Secure? The security of RSA depends on the difficulty in factoring large numbers like n. If n = pq where p and q are prime numbers with more than 500 digits each then n has more than 1000 digits.

73 Is RSA Secure? The security of RSA depends on the difficulty in factoring large numbers like n. If n = pq where p and q are prime numbers with more than 500 digits each then n has more than 1000 digits. It takes approximately years to factor a 500-digit composite number using today s computers.

74 Is RSA Secure? The security of RSA depends on the difficulty in factoring large numbers like n. If n = pq where p and q are prime numbers with more than 500 digits each then n has more than 1000 digits. It takes approximately years to factor a 500-digit composite number using today s computers. As computers get faster, we can keep increasing n.

75 Will We Run Out of Primes? Theorem There are infinitely many prime numbers.

76 Will We Run Out of Primes? Theorem There are infinitely many prime numbers. Proof. Suppose there are only finitely many primes p 1 < p 2 < < p k.

77 Will We Run Out of Primes? Theorem There are infinitely many prime numbers. Proof. Suppose there are only finitely many primes p 1 < p 2 < < p k. Form the number q = (p 1 )(p 2 ) (p k ) + 1 > p k. This number is either prime or composite.

78 Will We Run Out of Primes? Theorem There are infinitely many prime numbers. Proof. Suppose there are only finitely many primes p 1 < p 2 < < p k. Form the number q = (p 1 )(p 2 ) (p k ) + 1 > p k. This number is either prime or composite. 1 q (mod p i )

79 Will We Run Out of Primes? Theorem There are infinitely many prime numbers. Proof. Suppose there are only finitely many primes p 1 < p 2 < < p k. Form the number q = (p 1 )(p 2 ) (p k ) + 1 > p k. This number is either prime or composite. 1 q (mod p i ) No (known) prime evenly divides q.

80 Will We Run Out of Primes? Theorem There are infinitely many prime numbers. Proof. Suppose there are only finitely many primes p 1 < p 2 < < p k. Form the number q = (p 1 )(p 2 ) (p k ) + 1 > p k. This number is either prime or composite. 1 q (mod p i ) No (known) prime evenly divides q. Either q itself is prime or there is a prime larger than p k which divides q.

81 Where Can You Learn More? The modern language of cryptology is mathematics. Major in mathematics in college. Take a course in number theory. The National Security Agency employs and educates cryptologists. The National Cryptologic Museum has exhibits on ancient and modern cryptography.

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Spotlight on Science J. Robert Buchanan Department of Mathematics 2011 What is Cryptography? cryptography: study of methods for sending messages in a form that only be understood

More information

Chapter 8 Public-key Cryptography and Digital Signatures

Chapter 8 Public-key Cryptography and Digital Signatures Chapter 8 Public-key Cryptography and Digital Signatures v 1. Introduction to Public-key Cryptography 2. Example of Public-key Algorithm: Diffie- Hellman Key Exchange Scheme 3. RSA Encryption and Digital

More information

CRYPTOGRAPHY AND NUMBER THEORY

CRYPTOGRAPHY AND NUMBER THEORY CRYPTOGRAPHY AND NUMBER THEORY XINYU SHI Abstract. In this paper, we will discuss a few examples of cryptographic systems, categorized into two different types: symmetric and asymmetric cryptography. We

More information

Cryptography. P. Danziger. Transmit...Bob...

Cryptography. P. Danziger. Transmit...Bob... 10.4 Cryptography P. Danziger 1 Cipher Schemes A cryptographic scheme is an example of a code. The special requirement is that the encoded message be difficult to retrieve without some special piece of

More information

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University Number Theory, Public Key Cryptography, RSA Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr The Euler Phi Function For a positive integer n, if 0

More information

10 Modular Arithmetic and Cryptography

10 Modular Arithmetic and Cryptography 10 Modular Arithmetic and Cryptography 10.1 Encryption and Decryption Encryption is used to send messages secretly. The sender has a message or plaintext. Encryption by the sender takes the plaintext and

More information

CIS 551 / TCOM 401 Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 15 3/20/08 CIS/TCOM 551 1 Announcements Project 3 available on the web. Get the handout in class today. Project 3 is due April 4th It

More information

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems CPE 776:DATA SECURITY & CRYPTOGRAPHY Some Number Theory and Classical Crypto Systems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Some Number Theory

More information

Discrete Mathematics GCD, LCM, RSA Algorithm

Discrete Mathematics GCD, LCM, RSA Algorithm Discrete Mathematics GCD, LCM, RSA Algorithm Abdul Hameed http://informationtechnology.pk/pucit abdul.hameed@pucit.edu.pk Lecture 16 Greatest Common Divisor 2 Greatest common divisor The greatest common

More information

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya BBM 205 Discrete Mathematics Hacettepe University http://web.cs.hacettepe.edu.tr/ bbm205 Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya Resources: Kenneth Rosen,

More information

Cryptography. pieces from work by Gordon Royle

Cryptography. pieces from work by Gordon Royle Cryptography pieces from work by Gordon Royle The set-up Cryptography is the mathematics of devising secure communication systems, whereas cryptanalysis is the mathematics of breaking such systems. We

More information

Week 7 An Application to Cryptography

Week 7 An Application to Cryptography SECTION 9. EULER S GENERALIZATION OF FERMAT S THEOREM 55 Week 7 An Application to Cryptography Cryptography the study of the design and analysis of mathematical techniques that ensure secure communications

More information

Encryption: The RSA Public Key Cipher

Encryption: The RSA Public Key Cipher Encryption: The RSA Public Key Cipher Michael Brockway March 5, 2018 Overview Transport-layer security employs an asymmetric public cryptosystem to allow two parties (usually a client application and a

More information

10 Public Key Cryptography : RSA

10 Public Key Cryptography : RSA 10 Public Key Cryptography : RSA 10.1 Introduction The idea behind a public-key system is that it might be possible to find a cryptosystem where it is computationally infeasible to determine d K even if

More information

Number Theory & Modern Cryptography

Number Theory & Modern Cryptography Number Theory & Modern Cryptography Week 12 Stallings: Ch 4, 8, 9, 10 CNT-4403: 2.April.2015 1 Introduction Increasing importance in cryptography Public Key Crypto and Signatures Concern operations on

More information

Review. CS311H: Discrete Mathematics. Number Theory. Computing GCDs. Insight Behind Euclid s Algorithm. Using this Theorem. Euclidian Algorithm

Review. CS311H: Discrete Mathematics. Number Theory. Computing GCDs. Insight Behind Euclid s Algorithm. Using this Theorem. Euclidian Algorithm Review CS311H: Discrete Mathematics Number Theory Instructor: Işıl Dillig What does it mean for two ints a, b to be congruent mod m? What is the Division theorem? If a b and a c, does it mean b c? What

More information

Integers and Division

Integers and Division Integers and Division Notations Z: set of integers N : set of natural numbers R: set of real numbers Z + : set of positive integers Some elements of number theory are needed in: Data structures, Random

More information

Math.3336: Discrete Mathematics. Mathematical Induction

Math.3336: Discrete Mathematics. Mathematical Induction Math.3336: Discrete Mathematics Mathematical Induction Instructor: Dr. Blerina Xhabli Department of Mathematics, University of Houston https://www.math.uh.edu/ blerina Email: blerina@math.uh.edu Fall 2018

More information

Number theory (Chapter 4)

Number theory (Chapter 4) EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?

More information

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m. Final Exam Math 10: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 0 April 2002 :0 11:00 a.m. Instructions: Please be as neat as possible (use a pencil), and show

More information

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1). 1 Background 1.1 The group of units MAT 3343, APPLIED ALGEBRA, FALL 2003 Handout 3: The RSA Cryptosystem Peter Selinger Let (R, +, ) be a ring. Then R forms an abelian group under addition. R does not

More information

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2 Contents 1 Recommended Reading 1 2 Public Key/Private Key Cryptography 1 2.1 Overview............................................. 1 2.2 RSA Algorithm.......................................... 2 3 A Number

More information

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL NUMBER THEORY AND CODES Álvaro Pelayo WUSTL Talk Goal To develop codes of the sort can tell the world how to put messages in code (public key cryptography) only you can decode them Structure of Talk Part

More information

Topics in Cryptography. Lecture 5: Basic Number Theory

Topics in Cryptography. Lecture 5: Basic Number Theory Topics in Cryptography Lecture 5: Basic Number Theory Benny Pinkas page 1 1 Classical symmetric ciphers Alice and Bob share a private key k. System is secure as long as k is secret. Major problem: generating

More information

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009) Make sure that this examination has 10 numbered pages University of Regina Department of Mathematics & Statistics Final Examination 200910 (April 21, 2009) Mathematics 124 The Art and Science of Secret

More information

ECE596C: Handout #11

ECE596C: Handout #11 ECE596C: Handout #11 Public Key Cryptosystems Electrical and Computer Engineering, University of Arizona, Loukas Lazos Abstract In this lecture we introduce necessary mathematical background for studying

More information

RSA. Ramki Thurimella

RSA. Ramki Thurimella RSA Ramki Thurimella Public-Key Cryptography Symmetric cryptography: same key is used for encryption and decryption. Asymmetric cryptography: different keys used for encryption and decryption. Public-Key

More information

The RSA public encryption scheme: How I learned to stop worrying and love buying stuff online

The RSA public encryption scheme: How I learned to stop worrying and love buying stuff online The RSA public encryption scheme: How I learned to stop worrying and love buying stuff online Anthony Várilly-Alvarado Rice University Mathematics Leadership Institute, June 2010 Our Goal Today I will

More information

Clock Arithmetic and Euclid s Algorithm

Clock Arithmetic and Euclid s Algorithm Clock Arithmetic and Euclid s Algorithm Lecture notes for Access 2008 by Erin Chamberlain. Earlier we discussed Caesar Shifts and other substitution ciphers, and we saw how easy it was to break these ciphers

More information

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013 RSA Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013 Recap Recap Number theory o What is a prime number? o What is prime factorization? o What is a GCD? o What does relatively prime

More information

Public-key Cryptography and elliptic curves

Public-key Cryptography and elliptic curves Public-key Cryptography and elliptic curves Dan Nichols nichols@math.umass.edu University of Massachusetts Oct. 14, 2015 Cryptography basics Cryptography is the study of secure communications. Here are

More information

My brief introduction to cryptography

My brief introduction to cryptography My brief introduction to cryptography David Thomson dthomson@math.carleton.ca Carleton University September 7, 2013 introduction to cryptography September 7, 2013 1 / 28 Outline 1 The general framework

More information

The RSA cryptosystem and primality tests

The RSA cryptosystem and primality tests Mathematics, KTH Bengt Ek November 2015 Supplementary material for SF2736, Discrete mathematics: The RSA cryptosystem and primality tests Secret codes (i.e. codes used to make messages unreadable to outsiders

More information

MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS. CIS 400/628 Spring 2005 Introduction to Cryptography

MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS. CIS 400/628 Spring 2005 Introduction to Cryptography MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS CIS 400/628 Spring 2005 Introduction to Cryptography This is based on Chapter 1 of Lewand and Chapter 1 of Garrett. MONOALPHABETIC SUBSTITUTION CIPHERS These

More information

NUMBER THEORY FOR CRYPTOGRAPHY

NUMBER THEORY FOR CRYPTOGRAPHY 1 CHAPTER 4. NUMBER THEORY FOR CRYPTOGRAPHY 1 INSTITÚID TEICNEOLAÍOCHTA CHEATHARLACH INSTITUTE OF TECHNOLOGY CARLOW NUMBER THEORY FOR CRYPTOGRAPHY Contents 1 Number Theory for Cryptography 2 1.1 Linear

More information

Lecture 1: Introduction to Public key cryptography

Lecture 1: Introduction to Public key cryptography Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means

More information

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory. CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L06, Steve/Courses/2011/S2/CSS322/Lectures/number.tex,

More information

Simple Math: Cryptography

Simple Math: Cryptography 1 Introduction Simple Math: Cryptography This section develops some mathematics before getting to the application. The mathematics that I use involves simple facts from number theory. Number theory is

More information

Number Theory. Modular Arithmetic

Number Theory. Modular Arithmetic Number Theory The branch of mathematics that is important in IT security especially in cryptography. Deals only in integer numbers and the process can be done in a very fast manner. Modular Arithmetic

More information

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS 1 C Theme : Cryptography Instructor : Prof. C Pandu Rangan Speaker : Arun Moorthy 93115 CS 2 RSA Cryptosystem Outline of the Talk! Introduction to RSA! Working of the RSA system and associated terminology!

More information

Implementation Tutorial on RSA

Implementation Tutorial on RSA Implementation Tutorial on Maciek Adamczyk; m adamczyk@umail.ucsb.edu Marianne Magnussen; mariannemagnussen@umail.ucsb.edu Adamczyk and Magnussen Spring 2018 1 / 13 Overview Implementation Tutorial Introduction

More information

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography Peter Schwabe October 21 and 28, 2011 So far we assumed that Alice and Bob both have some key, which nobody else has. How

More information

Introduction to Modern Cryptography. Benny Chor

Introduction to Modern Cryptography. Benny Chor Introduction to Modern Cryptography Benny Chor RSA Public Key Encryption Factoring Algorithms Lecture 7 Tel-Aviv University Revised March 1st, 2008 Reminder: The Prime Number Theorem Let π(x) denote the

More information

RSA Algorithm. Factoring, EulerPhi, Breaking RSA. Çetin Kaya Koç Spring / 14

RSA Algorithm. Factoring, EulerPhi, Breaking RSA.   Çetin Kaya Koç Spring / 14 RSA Algorithm http://koclab.org Çetin Kaya Koç Spring 2018 1 / 14 Well-Known One-Way Functions Discrete Logarithm: Given p, g, and x, computing y in y = g x (mod p) is EASY Given p, g, y, computing x in

More information

THE RSA CRYPTOSYSTEM

THE RSA CRYPTOSYSTEM THE RSA CRYPTOSYSTEM SILVIA ROBLES Abstract. This paper explores the history and mathematics behind the RSA cryptosystem, including the idea of public key cryptosystems and number theory. It outlines the

More information

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used. UNIVERSITY OF EAST ANGLIA School of Mathematics May/June UG Examination 2010 2011 CRYPTOGRAPHY Time allowed: 2 hours Attempt THREE questions. Candidates must show on each answer book the type of calculator

More information

Cryptography and Number Theory

Cryptography and Number Theory Chapter 2 Cryptography and Number Theory 2.1 Cryptography and Modular Arithmetic 2.1.1 Introduction to Cryptography For thousands of years people have searched for ways to send messages in secret. For

More information

NET 311D INFORMATION SECURITY

NET 311D INFORMATION SECURITY 1 NET 311D INFORMATION SECURITY Networks and Communication Department TUTORIAL 3 : Asymmetric Ciphers (RSA) A Symmetric-Key Cryptography (Public-Key Cryptography) Asymmetric-key (public key cryptography)

More information

MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY

MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY In this meeting we go through the foundations of modular arithmetic. Before the meeting it is assumed that you have watched the videos and worked

More information

Introduction to Cryptography. Lecture 6

Introduction to Cryptography. Lecture 6 Introduction to Cryptography Lecture 6 Benny Pinkas page 1 Public Key Encryption page 2 Classical symmetric ciphers Alice and Bob share a private key k. System is secure as long as k is secret. Major problem:

More information

Introduction to Public-Key Cryptosystems:

Introduction to Public-Key Cryptosystems: Introduction to Public-Key Cryptosystems: Technical Underpinnings: RSA and Primality Testing Modes of Encryption for RSA Digital Signatures for RSA 1 RSA Block Encryption / Decryption and Signing Each

More information

Powers in Modular Arithmetic, and RSA Public Key Cryptography

Powers in Modular Arithmetic, and RSA Public Key Cryptography 1 Powers in Modular Arithmetic, and RSA Public Key Cryptography Lecture notes for Access 2006, by Nick Korevaar. It was a long time from Mary Queen of Scotts and substitution ciphers until the end of the

More information

MATH3302 Cryptography Problem Set 2

MATH3302 Cryptography Problem Set 2 MATH3302 Cryptography Problem Set 2 These questions are based on the material in Section 4: Shannon s Theory, Section 5: Modern Cryptography, Section 6: The Data Encryption Standard, Section 7: International

More information

CS March 17, 2009

CS March 17, 2009 Discrete Mathematics CS 2610 March 17, 2009 Number Theory Elementary number theory, concerned with numbers, usually integers and their properties or rational numbers mainly divisibility among integers

More information

Addition. Ch1 - Algorithms with numbers. Multiplication. al-khwārizmī. al-khwārizmī. Division 53+35=88. Cost? (n number of bits) 13x11=143. Cost?

Addition. Ch1 - Algorithms with numbers. Multiplication. al-khwārizmī. al-khwārizmī. Division 53+35=88. Cost? (n number of bits) 13x11=143. Cost? Ch - Algorithms with numbers Addition Basic arithmetic Addition ultiplication Division odular arithmetic factoring is hard Primality testing 53+35=88 Cost? (n number of bits) O(n) ultiplication al-khwārizmī

More information

MATHEMATICS EXTENDED ESSAY

MATHEMATICS EXTENDED ESSAY MATHEMATICS EXTENDED ESSAY How does the RSA algorithm function and why is it used in modern communication? Candidate Name: Murtuza Kainan Candidate Session Number: 003077006 Word Count: 3908 1 P a g e

More information

W3203 Discrete Mathema1cs. Number Theory. Spring 2015 Instructor: Ilia Vovsha. hcp://www.cs.columbia.edu/~vovsha/w3203

W3203 Discrete Mathema1cs. Number Theory. Spring 2015 Instructor: Ilia Vovsha. hcp://www.cs.columbia.edu/~vovsha/w3203 W3203 Discrete Mathema1cs Number Theory Spring 2015 Instructor: Ilia Vovsha hcp://www.cs.columbia.edu/~vovsha/w3203 1 Outline Communica1on, encryp1on Number system Divisibility Prime numbers Greatest Common

More information

ICS141: Discrete Mathematics for Computer Science I

ICS141: Discrete Mathematics for Computer Science I ICS141: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Jan Stelovsky based on slides by Dr. Baek and Dr. Still Originals by Dr. M. P. Frank and Dr. J.L. Gross Provided by

More information

Discrete mathematics I - Number theory

Discrete mathematics I - Number theory Discrete mathematics I - Number theory Emil Vatai (based on hungarian slides by László Mérai) 1 January 31, 2018 1 Financed from the financial support ELTE won from the Higher Education

More information

Number Theory A focused introduction

Number Theory A focused introduction Number Theory A focused introduction This is an explanation of RSA public key cryptography. We will start from first principles, but only the results that are needed to understand RSA are given. We begin

More information

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy Symmetric Cryptography Review Alice Bob Public Key x e K (x) y d K (y) x K K Instructor: Dr. Wei (Lisa) Li Department of Computer Science, GSU Two properties of symmetric (secret-key) crypto-systems: The

More information

The Hill Cipher A Linear Algebra Perspective

The Hill Cipher A Linear Algebra Perspective The Hill Cipher A Linear Algebra Perspective Contents 1 Introduction to Classical Cryptography 3 1.1 Alice, Bob & Eve................................. 3 1.2 Types of Attacks.................................

More information

Public-key Cryptography and elliptic curves

Public-key Cryptography and elliptic curves Public-key Cryptography and elliptic curves Dan Nichols University of Massachusetts Amherst nichols@math.umass.edu WINRS Research Symposium Brown University March 4, 2017 Cryptography basics Cryptography

More information

Notes. Number Theory: Applications. Notes. Number Theory: Applications. Notes. Hash Functions I

Notes. Number Theory: Applications. Notes. Number Theory: Applications. Notes. Hash Functions I Number Theory: Applications Slides by Christopher M. Bourke Instructor: Berthe Y. Choueiry Fall 2007 Computer Science & Engineering 235 Introduction to Discrete Mathematics Sections 3.4 3.7 of Rosen cse235@cse.unl.edu

More information

For your quiz in recitation this week, refer to these exercise generators:

For your quiz in recitation this week, refer to these exercise generators: Monday, Oct 29 Today we will talk about inverses in modular arithmetic, and the use of inverses to solve linear congruences. For your quiz in recitation this week, refer to these exercise generators: GCD

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 8 February 1, 2012 CPSC 467b, Lecture 8 1/42 Number Theory Needed for RSA Z n : The integers mod n Modular arithmetic GCD Relatively

More information

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups

More information

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers Number Theory: Applications Number Theory Applications Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Results from Number Theory have many applications

More information

Ma/CS 6a Class 3: The RSA Algorithm

Ma/CS 6a Class 3: The RSA Algorithm Ma/CS 6a Class 3: The RSA Algorithm By Adam Sheffer Reminder: Putnam Competition Signup ends Wednesday 10/08. Signup sheets available in all Sloan classrooms, Math office, or contact Kathy Carreon, kcarreon@caltech.edu.

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 13 (rev. 2) Professor M. J. Fischer October 22, 2008 53 Chinese Remainder Theorem Lecture Notes 13 We

More information

Overview. Background / Context. CSC 580 Cryptography and Computer Security. March 21, 2017

Overview. Background / Context. CSC 580 Cryptography and Computer Security. March 21, 2017 CSC 580 Cryptography and Computer Security Math for Public Key Crypto, RSA, and Diffie-Hellman (Sections 2.4-2.6, 2.8, 9.2, 10.1-10.2) March 21, 2017 Overview Today: Math needed for basic public-key crypto

More information

Math 299 Supplement: Modular Arithmetic Nov 8, 2013

Math 299 Supplement: Modular Arithmetic Nov 8, 2013 Math 299 Supplement: Modular Arithmetic Nov 8, 2013 Numbers modulo n. We have previously seen examples of clock arithmetic, an algebraic system with only finitely many numbers. In this lecture, we make

More information

Cryptography. Course 1: Remainder: RSA. Jean-Sébastien Coron. September 21, Université du Luxembourg

Cryptography. Course 1: Remainder: RSA. Jean-Sébastien Coron. September 21, Université du Luxembourg Course 1: Remainder: RSA Université du Luxembourg September 21, 2010 Public-key encryption Public-key encryption: two keys. One key is made public and used to encrypt. The other key is kept private and

More information

Eindhoven University of Technology MASTER. Kleptography cryptography with backdoors. Antheunisse, M. Award date: 2015

Eindhoven University of Technology MASTER. Kleptography cryptography with backdoors. Antheunisse, M. Award date: 2015 Eindhoven University of Technology MASTER Kleptography cryptography with backdoors Antheunisse, M. Award date: 2015 Disclaimer This document contains a student thesis (bachelor's or master's), as authored

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 9 February 14, 2013 CPSC 467b, Lecture 9 1/42 Integer Division (cont.) Relatively prime numbers, Z n, and φ(n) Computing in Z n

More information

Introduction to Cryptography. Lecture 8

Introduction to Cryptography. Lecture 8 Introduction to Cryptography Lecture 8 Benny Pinkas page 1 1 Groups we will use Multiplication modulo a prime number p (G, ) = ({1,2,,p-1}, ) E.g., Z 7* = ( {1,2,3,4,5,6}, ) Z p * Z N * Multiplication

More information

Introduction. What is RSA. A Guide To RSA by Robert Yates. Topics

Introduction. What is RSA. A Guide To RSA by Robert Yates. Topics A Guide To RSA by Robert Yates. Topics Introduction...01/09 What is RSA...01/09 Mod-Exponentiation...02/09 Euler's Theorem...03/09 RSA Algorithm...08/09 RSA Security...09/09 Introduction Welcome to my

More information

Elementary Number Theory MARUCO. Summer, 2018

Elementary Number Theory MARUCO. Summer, 2018 Elementary Number Theory MARUCO Summer, 2018 Problem Set #0 axiom, theorem, proof, Z, N. Axioms Make a list of axioms for the integers. Does your list adequately describe them? Can you make this list as

More information

CRYPTOGRAPHY AND LARGE PRIMES *

CRYPTOGRAPHY AND LARGE PRIMES * CRYPTOGRAPHY AND LARGE PRIMES * B. Hartley University of Manchester, England, and National University of Singapore The word "cryptography" derives from Greek and means "secret writing". Since ancient times,

More information

Introduction to Cryptography

Introduction to Cryptography Introduction to Cryptography Hong-Jian Lai West Virginia University, Morgantown, WV 26506-6310 Version 2007 March 2, 2007 TABLE OF CONTENTS I. Divisibility.............................................................................

More information

ECE 646 Lecture 5. Mathematical Background: Modular Arithmetic

ECE 646 Lecture 5. Mathematical Background: Modular Arithmetic ECE 646 Lecture 5 Mathematical Background: Modular Arithmetic Motivation: Public-key ciphers RSA as a trap-door one-way function PUBLIC KEY message ciphertext M C = f(m) = M e mod N C M = f -1 (C) = C

More information

Cryptography and Secure Communication Protocols

Cryptography and Secure Communication Protocols Cryptography and Secure Communication Protocols Jayadev Misra The University of Texas at Austin October 1, 2003 Contents 1 Introduction 1 2 Early Encryption Schemes 2 2.1 Substitution cyphers.........................

More information

Cryptography IV: Asymmetric Ciphers

Cryptography IV: Asymmetric Ciphers Cryptography IV: Asymmetric Ciphers Computer Security Lecture 7 David Aspinall School of Informatics University of Edinburgh 31st January 2011 Outline Background RSA Diffie-Hellman ElGamal Summary Outline

More information

CS483 Design and Analysis of Algorithms

CS483 Design and Analysis of Algorithms CS483 Design and Analysis of Algorithms Lectures 2-3 Algorithms with Numbers Instructor: Fei Li lifei@cs.gmu.edu with subject: CS483 Office hours: STII, Room 443, Friday 4:00pm - 6:00pm or by appointments

More information

Algorithmic Number Theory and Public-key Cryptography

Algorithmic Number Theory and Public-key Cryptography Algorithmic Number Theory and Public-key Cryptography Course 3 University of Luxembourg March 22, 2018 The RSA algorithm The RSA algorithm is the most widely-used public-key encryption algorithm Invented

More information

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other. Public Key Cryptography All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other. The thing that is common among all of them is that each

More information

Asymmetric Encryption

Asymmetric Encryption -3 s s Encryption Comp Sci 3600 Outline -3 s s 1-3 2 3 4 5 s s Outline -3 s s 1-3 2 3 4 5 s s Function Using Bitwise XOR -3 s s Key Properties for -3 s s The most important property of a hash function

More information

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above.

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above. 1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above. Directions: You have 75 minutes in which to complete this exam. Please make sure that you read through this entire exam before

More information

RSA RSA public key cryptosystem

RSA RSA public key cryptosystem RSA 1 RSA As we have seen, the security of most cipher systems rests on the users keeping secret a special key, for anyone possessing the key can encrypt and/or decrypt the messages sent between them.

More information

Cryptosystem. Traditional Cryptosystems: The two parties agree on a secret (one to one) function f. To send a message M, thesendersendsthemessage

Cryptosystem. Traditional Cryptosystems: The two parties agree on a secret (one to one) function f. To send a message M, thesendersendsthemessage Cryptosystem Traditional Cryptosystems: The two parties agree on a secret (one to one) function f. To send a message M, thesendersendsthemessage f(m). The receiver computes f 1 (f(m)). Advantage: Cannot

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

Cryptography: A Fairy Tale for Mathematicians and Starring Mathematicians!

Cryptography: A Fairy Tale for Mathematicians and Starring Mathematicians! Cryptography: A Fairy Tale for Mathematicians and Starring Mathematicians! University of California, Berkeley Mathematics Undergraduate Student Association October 27, 2014 Why Crypto? So why on earth

More information

The security of RSA (part 1) The security of RSA (part 1)

The security of RSA (part 1) The security of RSA (part 1) The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 i.e. q = (n φ(n) + 1)

More information

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 11 April 2017, 8:30-12:30

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 11 April 2017, 8:30-12:30 CHALMERS GÖTEBORGS UNIVERSITET CRYPTOGRAPHY TDA35 (Chalmers) - DIT50 (GU) 11 April 017, 8:30-1:30 No extra material is allowed during the exam except for pens and a simple calculator (not smartphones).

More information

A Readable Introduction to Real Mathematics

A Readable Introduction to Real Mathematics Solutions to selected problems in the book A Readable Introduction to Real Mathematics D. Rosenthal, D. Rosenthal, P. Rosenthal Chapter 7: The Euclidean Algorithm and Applications 1. Find the greatest

More information

Classical Cryptography

Classical Cryptography Classical Cryptography CSG 252 Fall 2006 Riccardo Pucella Goals of Cryptography Alice wants to send message X to Bob Oscar is on the wire, listening to communications Alice and Bob share a key K Alice

More information

Mathematical Foundations of Public-Key Cryptography

Mathematical Foundations of Public-Key Cryptography Mathematical Foundations of Public-Key Cryptography Adam C. Champion and Dong Xuan CSE 4471: Information Security Material based on (Stallings, 2006) and (Paar and Pelzl, 2010) Outline Review: Basic Mathematical

More information

Chapter 4 Asymmetric Cryptography

Chapter 4 Asymmetric Cryptography Chapter 4 Asymmetric Cryptography Introduction Encryption: RSA Key Exchange: Diffie-Hellman [NetSec/SysSec], WS 2008/2009 4.1 Asymmetric Cryptography General idea: Use two different keys -K and +K for

More information

Asymmetric Cryptography

Asymmetric Cryptography Asymmetric Cryptography Chapter 4 Asymmetric Cryptography Introduction Encryption: RSA Key Exchange: Diffie-Hellman General idea: Use two different keys -K and +K for encryption and decryption Given a

More information

Public-Key Encryption: ElGamal, RSA, Rabin

Public-Key Encryption: ElGamal, RSA, Rabin Public-Key Encryption: ElGamal, RSA, Rabin Introduction to Modern Cryptography Benny Applebaum Tel-Aviv University Fall Semester, 2011 12 Public-Key Encryption Syntax Encryption algorithm: E. Decryption

More information