Introduction to Cryptography

Similar documents
Introduction to Cryptography

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Cryptography. P. Danziger. Transmit...Bob...

Math.3336: Discrete Mathematics. Primes and Greatest Common Divisors

Week 7 An Application to Cryptography

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.

Number Theory. Modular Arithmetic

Introduction to Number Theory

ECE596C: Handout #11

Cryptography. pieces from work by Gordon Royle

CIS 551 / TCOM 401 Computer and Network Security

Introduction to Cybersecurity Cryptography (Part 5)

CRYPTOGRAPHY AND LARGE PRIMES *

ECE 646 Lecture 5. Mathematical Background: Modular Arithmetic

Review. CS311H: Discrete Mathematics. Number Theory. Computing GCDs. Insight Behind Euclid s Algorithm. Using this Theorem. Euclidian Algorithm

CRYPTOGRAPHY AND NUMBER THEORY

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers

AN INTRODUCTION TO THE UNDERLYING COMPUTATIONAL PROBLEM OF THE ELGAMAL CRYPTOSYSTEM

LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS

Congruence Classes. Number Theory Essentials. Modular Arithmetic Systems

Asymmetric Cryptography

Chapter 4 Asymmetric Cryptography

ASSIGNMENT Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9.

Notes. Number Theory: Applications. Notes. Number Theory: Applications. Notes. Hash Functions I

Pseudo-random Number Generation. Qiuliang Tang

Number theory (Chapter 4)

Mathematical Foundations of Public-Key Cryptography

MODULAR ARITHMETIC KEITH CONRAD

This is a recursive algorithm. The procedure is guaranteed to terminate, since the second argument decreases each time.

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS. CIS 400/628 Spring 2005 Introduction to Cryptography

Cryptography. Number Theory with AN INTRODUCTION TO. James S. Kraft. Lawrence C. Washington. CRC Press

Topics in Cryptography. Lecture 5: Basic Number Theory

Number Theory and Algebra: A Brief Introduction

Public Key Cryptography

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

Lecture 7: ElGamal and Discrete Logarithms

MATHEMATICS EXTENDED ESSAY

Cryptography: Joining the RSA Cryptosystem

Encryption: The RSA Public Key Cipher

NET 311D INFORMATION SECURITY

CHMC: Finite Fields 9/23/17

Introduction to Cybersecurity Cryptography (Part 4)

Elliptic Curve Cryptography

Eindhoven University of Technology MASTER. Kleptography cryptography with backdoors. Antheunisse, M. Award date: 2015

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms

Solution to Midterm Examination

Introduction to Cybersecurity Cryptography (Part 4)

Introduction to Cryptography. Lecture 6

10 Modular Arithmetic and Cryptography

Introduction to Cryptography. Lecture 8

The Elliptic Curve in https

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer?

A new security notion for asymmetric encryption Draft #8

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.

Cryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Public Key Cryptography

ECE 646 Lecture 5. Motivation: Mathematical Background: Modular Arithmetic. Public-key ciphers. RSA keys. RSA as a trap-door one-way function

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Elliptic Curves and an Application in Cryptography

( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1

Public Key Encryption

Notes for Lecture 17

RSA ENCRYPTION USING THREE MERSENNE PRIMES

Public Key Encryption

THE CUBIC PUBLIC-KEY TRANSFORMATION*

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Ma/CS 6a Class 3: The RSA Algorithm

NUMBER THEORY FOR CRYPTOGRAPHY

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer?

Integers and Division

A Piggybank Protocol for Quantum Cryptography

2 More on Congruences

ICS141: Discrete Mathematics for Computer Science I

Lecture Notes. Advanced Discrete Structures COT S

basics of security/cryptography

Sharing a Secret in Plain Sight. Gregory Quenell

MATH3302 Cryptography Problem Set 2

Cryptography IV: Asymmetric Ciphers

Outline. Computer Science 418. Number of Keys in the Sum. More on Perfect Secrecy, One-Time Pad, Entropy. Mike Jacobson. Week 3

Number Theory and Group Theoryfor Public-Key Cryptography

Carmen s Core Concepts (Math 135)

RSA Cryptosystem and Factorization

and Other Fun Stuff James L. Massey

Cryptography and Number Theory

Attempt QUESTIONS 1 and 2, and THREE other questions. penalised if you attempt additional questions.

PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY

Private Key Cryptography. Fermat s Little Theorem. One Time Pads. Public Key Cryptography

Curves, Cryptography, and Primes of the Form x 2 + y 2 D

1.7 Proof Methods and Strategy

[Part 2] Asymmetric-Key Encipherment. Chapter 9. Mathematics of Cryptography. Objectives. Contents. Objectives

Great Theoretical Ideas in Computer Science

Biomedical Security. Some Security News 9/17/2018. Erwin M. Bakker. Blockchains are not safe for voting (slashdot.org) : From: paragonie.

Mathematics of Cryptography

Lecture 8 - Cryptography and Information Theory

Classical Cryptography

CPSC 467b: Cryptography and Computer Security

Transcription:

Introduction to Cryptography by Dr. Deep Singh Department of Mathematics, Central University of Jammu, Jammu

Outline Introduction to Number Theory Classification of Numbers Various results Introduction to Cryptography Private key cryptosystems

What is Number Theory? Study of the behavior of positive integers 1, 2, 3, 4, 5,... and their various combinations God made the numbers and rest all the work of man. - L. Kronecker. Classification of natural numbers odd 1, 3, 5, 7, 9, 11,... even 2, 4, 6, 8, 10,... square 1, 4, 9, 16, 25, 36,... cube 1, 8, 27, 64, 125,... prime 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31,... composite 4, 6, 8, 9, 10, 12, 14, 15, 16,... 1 (modulo 4) 1, 5, 9, 13, 17, 21, 25,... 3 (modulo 4) 3, 7, 11, 15, 19, 23, 27,... perfect 6, 28, 496,...(sum of proper divisors = number) triangular 1, 3, 6, 10, 15, 21,...

Triangular numbers can be arranged in the shape of triangles

Square numbers Square numbers are the numbers 1, 4, 9, 16,... that can be arranged in the shape of square.

Obvious queries Can the sum of two squares be a square? Yes. (Pythagorean Triples) Examples: 3 2 + 4 2 = 5 2, 5 2 + 12 2 = 13 2 etc. Can the sum of two cubes be a cube? Can the sum of two fourth powers be a fourth power? In general, can the sum of two n th powers be an n th power?

No. Fermat s Last Theorem: a n + b n c n, n > 2. After 358 years in 1994 Andrew Wiles has given the first successful proof of the problem and formally published in 1995. Proof is about 100 page long.

Ramanujan number A natural number that can be expressed as the sum of cubes of positive numbers in two different ways. Example: 1729 (Ramanujan number) 1729 = 1 3 + 12 3 = 9 3 + 10 3 Divisors of 1729 are 1, 7, 13, 19, 91, 133, 247. (not a perfect number)

Taxicab numbers can be expressed as a sum of two positive cubes in n distinct ways. T (1) = 2 = 1 3 + 1 3 T (2) = 1729 = 1 3 + 12 3 9 3 + 10 3 T (3) = 87539319 = 167 3 + 436 3 228 3 + 423 3 255 3 + 414 3 T (4) = 6963472309248 = 2421 3 + 19083 3 5436 3 + 18948 3 10200 3 + 18072 3 13322 3 + 16630 3

Arithmetic for integers Modular Arithmetic : Let n be a +ve integer. Then any two integers a and b are said to be congruent modulo n i.e., a b mod n if n/(a b). For Example; 1 50 14 mod 12 2 2 3 mod 5

Euclid s division algorithm For every integer m and +ve integer n, there exist unique integers q and r such that m = nq + r, 0 r < n. Further, r = m mod n. Example compute 10 mod 7 and 10 mod 7. What are q and r in each case? Does ( m) mod n = (m mod n)?

Cryptography Cryptography is a key technology in providing secure transmission of information. It is a branch of science which mainly deals with constructing and analyzing protocols which are related to various aspects of secure communication. Nowdays cryptography is at the heart of many techniques used for secure transfer of data, such as web based applications, online government services, online banking, mobile phones, wireless local area networks, ATM etc.

Cryptosystem Cryptography is associated with the security of the piece of the information being transmitted over the insecure channel. Cryptosystem is an algorithm required to implement special types of encryptions and decryptions. There are mainly two types of cryptosystems: symmetric key (private key) and asymmetric key (public key) cryptosystems.

Encryption and decryption process

Caesar Cipher (Private key cryptography) One can encrypt the original message by just shifting each symbol to some certain places. To encrypt the message symbols for n places, the encryption function is Decryption function is E n (x) = (x + n) mod 26 D n (y = x + n) = (y n) mod 26

G UGJJ KCCR WMS YR KGBLGEFR

A Caeser cipher is especially easy to implement on a computer using a scheme known as arithmetic mod 26. English alphabets and residue modulo 26 A B C D E F G H I J K L M N 0 1 2 3 4 5 6 7 8 9 10 11 12 13 O P Q R S T U V W X Y Z 14 15 16 17 18 19 20 21 22 23 24 25

Numbers corresponds to alphabets G U G J J K C C R W M S Y R 6 20 6 9 9 10 2 2 17 22 12 18 24 17 K G B L G E F R 10 6 1 11 6 4 5 17

guess G can corresponds to I or A only Key = 2 or 20

Right shift by 2 (Key = 2) 8 22 8 11 11 12 4 4 19 24 14 20 26 19 I W I L L M E E T Y O U A T 12 8 3 13 8 6 7 19 M I D N I G H T

I WILL MEET YOU AT MIDNIGHT

BQXOSNFQZOGX LDZMR GHCCDM VQJSHMF

Right shift by 1 (Key = 1) CRYPTOGRAPHY MEANS HIDDEN WRITING

QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD

Right shift by 3 (Key = 3) THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG

Refrences Hoffstein J., Pipher J., Silverman J. H.: An Introduction to Mathematical cryptography. Springer 2008. Moon T. K., Error Correction Coding: Mathematical methods and Algorithms, John wiley & Sons 2009. Stinson D. R.: Cryptography Theory and Practice, Chapman & Hall/CRC, Taylor & Francis Group 2006. Shannon C., Communication theory of secrecy systems, Bell System Technical Journal Vol.28, pp. 656-715, 1949.

Thank You