Cryptography: A Fairy Tale for Mathematicians and Starring Mathematicians!

Similar documents
CRYPTOGRAPHY AND NUMBER THEORY

Public Key Cryptography

Cryptography. P. Danziger. Transmit...Bob...

Number theory (Chapter 4)

Week 7 An Application to Cryptography

Solution to Midterm Examination

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Review. CS311H: Discrete Mathematics. Number Theory. Computing GCDs. Insight Behind Euclid s Algorithm. Using this Theorem. Euclidian Algorithm

Ma/CS 6a Class 3: The RSA Algorithm

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

An Introduction to Cryptography

Question: Total Points: Score:

Ma/CS 6a Class 1. Course Details

Cryptography. Course 1: Remainder: RSA. Jean-Sébastien Coron. September 21, Université du Luxembourg

CPSC 467b: Cryptography and Computer Security

Overview. Background / Context. CSC 580 Cryptography and Computer Security. March 21, 2017

Chapter 8 Public-key Cryptography and Digital Signatures

Algorithmic Number Theory and Public-key Cryptography

Cryptography. pieces from work by Gordon Royle

RSA. Ramki Thurimella

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms

Implementation Tutorial on RSA

In fact, 3 2. It is not known whether 3 1. All three problems seem hard, although Shor showed that one can solve 3 quickly on a quantum computer.

Great Theoretical Ideas in Computer Science

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

dit-upm RSA Cybersecurity Cryptography

Math.3336: Discrete Mathematics. Mathematical Induction

Practice Assignment 2 Discussion 24/02/ /02/2018

Public Key Cryptography

Introduction to Cryptography. Lecture 8

10 Modular Arithmetic and Cryptography

Public-Key Cryptosystems CHAPTER 4

Public-key Cryptography and elliptic curves

1 Number Theory Basics

Cryptography and Secure Communication Protocols

Mathematical Foundations of Public-Key Cryptography

CPSC 467b: Cryptography and Computer Security

Lattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n.

Cryptanalysis. A walk through time. Arka Rai Choudhuri

Lecture 1: Introduction to Public key cryptography

Public-key Cryptography and elliptic curves

Introduction to Public-Key Cryptosystems:

RSA RSA public key cryptosystem

Elliptic Curve Cryptography

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

Encryption: The RSA Public Key Cipher

Eindhoven University of Technology MASTER. Kleptography cryptography with backdoors. Antheunisse, M. Award date: 2015

Carmen s Core Concepts (Math 135)

Quantum Cryptography. Marshall Roth March 9, 2007

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

CIS 551 / TCOM 401 Computer and Network Security

Asymmetric Cryptography

Chapter 4 Asymmetric Cryptography

Algebra for Cryptology

Ma/CS 6a Class 2: Congruences

ECS 189A Final Cryptography Spring 2011

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 11 April 2017, 8:30-12:30

Notes for Lecture 17

Introduction to Modern Cryptography. Benny Chor

NUMBER THEORY FOR CRYPTOGRAPHY

basics of security/cryptography

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

The security of RSA (part 1) The security of RSA (part 1)

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

Methods of Public-Key Cryptography. Émilie Wheeler

Lecture Notes, Week 6

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS

MATH 158 FINAL EXAM 20 DECEMBER 2016

CPSC 467b: Cryptography and Computer Security

Univ.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m.

MATH3302 Cryptography Problem Set 2

Solutions to the Midterm Test (March 5, 2011)

Ma/CS 6a Class 2: Congruences

Exam Security January 19, :30 11:30

Basics in Cryptology. Outline. II Distributed Cryptography. Key Management. Outline. David Pointcheval. ENS Paris 2018

Lecture 22: RSA Encryption. RSA Encryption

Classical Cryptography

CPSC 467: Cryptography and Computer Security

ASYMMETRIC ENCRYPTION

Cryptography and Number Theory

Dan Boneh. Introduction. Course Overview

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018

Introduction to Cybersecurity Cryptography (Part 4)

My brief introduction to cryptography

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Discrete Mathematics GCD, LCM, RSA Algorithm

Number Theory in Cryptography

Points of High Order on Elliptic Curves ECDSA

Transcription:

Cryptography: A Fairy Tale for Mathematicians and Starring Mathematicians! University of California, Berkeley Mathematics Undergraduate Student Association October 27, 2014

Why Crypto? So why on earth was cryptography invented?

Why Crypto? So why on earth was cryptography invented? Most obvious: Keeping secrets!

Why Crypto? So why on earth was cryptography invented? Most obvious: Keeping secrets! but why keep secrets then?

Why Crypto? So why on earth was cryptography invented? Most obvious: Keeping secrets! but why keep secrets then? send messages to armies during war from Julius Caesar (and his silly shift cipher) to World War II Germany s [not so enigmatic] Enigma machine

Why Crypto? So why on earth was cryptography invented? Most obvious: Keeping secrets! but why keep secrets then? send messages to armies during war from Julius Caesar (and his silly shift cipher) to World War II Germany s [not so enigmatic] Enigma machine organize all sorts of conspiracies eg: Mary Queen of Scots plotted to assassinate Queen Elizabeth she was hanged because her cipher broke and proved her involvement.

Why Crypto? So why on earth was cryptography invented? Most obvious: Keeping secrets! but why keep secrets then? send messages to armies during war from Julius Caesar (and his silly shift cipher) to World War II Germany s [not so enigmatic] Enigma machine organize all sorts of conspiracies eg: Mary Queen of Scots plotted to assassinate Queen Elizabeth she was hanged because her cipher broke and proved her involvement. Etc.

Why Crypto? So why on earth was cryptography invented? Most obvious: Keeping secrets! but why keep secrets then? send messages to armies during war from Julius Caesar (and his silly shift cipher) to World War II Germany s [not so enigmatic] Enigma machine organize all sorts of conspiracies eg: Mary Queen of Scots plotted to assassinate Queen Elizabeth she was hanged because her cipher broke and proved her involvement. Etc. Less obvious: deciphering ancient languages, finding buried treasures, fame, glory, etc.

Why Crypto? So why on earth was cryptography invented? Most obvious: Keeping secrets! but why keep secrets then? send messages to armies during war from Julius Caesar (and his silly shift cipher) to World War II Germany s [not so enigmatic] Enigma machine organize all sorts of conspiracies eg: Mary Queen of Scots plotted to assassinate Queen Elizabeth she was hanged because her cipher broke and proved her involvement. Etc. Less obvious: deciphering ancient languages, finding buried treasures, fame, glory, etc. but most interesting: for fun!

When did math come in?

When did math come in? It didn t.

When did math come in? It didn t. Math has always been there.

When did math come in? Euclid (300 B.C.)

When did math come in? Euclid (300 B.C.) There are infinitely many primes...

When did math come in? Euclid (300 B.C.) There are infinitely many primes...... also there is this algorithm for finding GCD. Let s name it after me!

When did math come in? Pierre de Fermat (1601-1665)

When did math come in? Pierre de Fermat (1601-1665) Fermat s Little Theorem (1640): For any prime p and integer a, such that 1 a < p, then: a p 1 = 1 mod p

When did math come in? Leonhard Euler (1707-1783)

When did math come in? Leonhard Euler (1707-1783) Eulers Theorem (1736): If gcd(a, n) = 1, then: a ϕ(n) = 1 mod n where ϕ(n) is number of integers x less than n such that gcd(x, n) = 1.

Some quick terminology

Some quick terminology Code: a word or phrase replaced with another, possibly shorter one.

Some quick terminology Code: a word or phrase replaced with another, possibly shorter one. Cipher: replacing each letter in a text by another based on a system

Some quick terminology Code: a word or phrase replaced with another, possibly shorter one. Cipher: replacing each letter in a text by another based on a system Plaintext: the message

Some quick terminology Code: a word or phrase replaced with another, possibly shorter one. Cipher: replacing each letter in a text by another based on a system Plaintext: the message Ciphertext: the encrypted message

ducing Characters (from wiki!)

ducing Characters (from wiki!) Alice Bob Carol or Charlie

ducing Characters (from wiki!) Alice Bob Carol or Charlie Eve, the passive eavesdropper

ducing Characters (from wiki!) Alice Bob Carol or Charlie Eve, the passive eavesdropper Craig, the password cracker Mallet or Mallory, the malicious attackers Trudy, the intruder etc.

Leaked photo of Evette in a beach

New research problems and directions More math elliptic curve-based crypto lattice-based crypto braid-based crypto secret-sharing random oracles quantum cryptography zero-knowledge proofs More EECS or applied math multi-party protocols homomorphic encryption private information retrieval anonymity bit commitment oblivious transfer secure voting systems crypto hardware public-key infrastructure tweakable encryption