SlideShare une entreprise Scribd logo
1  sur  19
Cryptography 101
What is Cryptography?
Encryption is the process of:
1.Transforming data (x)
2.Using an algorithm (e)
3.To make it unreadable to anyone (y)
4.except those possessing the key. (k)
K={k1,…,kn}
The Quick Brown Fox
Me (mod N) where M=The Quick Brown Fox
Uif Rvjdl Cspxo Gpy
Kerchhoffs’ principle: A cryptosystem should be secure even if the
Attacker knows all the details about the system, with the exception of
The key.
We shall extend the empire of Persia such that its boundaries
will be God's own sky, so the sun will not look down upon
any land beyond the boundaries of what is our own
-Xerxes (Ahasuerus) ~450 B.C.
(Spartan) Scytale
Rail Fence Cipher
Route Cipher
Transposition Ciphers
The Quick Brown Fox
GSV JFRXP YILDM ULC
Substitution Ciphers
The Quick Brown Fox
ZIT JXOEA WKGVF YGB
Shift Cipher (Caesar)
The Quick Brown Fox
SGD PTHBJ AQNVM ENW
At-Bash
Modular ciphers
a = r mod m
42 = 9*4 + 6
r = a – m*q
42 = 6 mod 9
42 = q*9 + 6
6 = 42 – q*9
q = 0, r = 42
q = 1, r = 33
q = 2, r = 24
q = 3, r = 15
q = 4, r = 6 (0<q<m-1)
q = 5, r = -3
q = 6, r = -12
12 + 7 = 19 => 1 mod 9
14 – 2 = 12 => 3 mod 9
11 * 8 = 88 => 7 mod 9
15/5 = 3 !=> 3 mod 9
If the multiplicative inverse exists for a number
then we can divide by that number
5*2=10 => 1 mod 9
2 is the multiplicative inverse of 5 (and vice versa)
15*2 = 30 => 3 mod 9
If x is coprime with modulus then it has an inverse.
Caesar Cipher
Encryption: ek (x) = x + k mod 26
Decryption: ek (y) = y – k mod 26
The quick brown fox
k=3
t=20, 20 + 3 = 23 mod 26
h=8, 8 + 3 = 11 mod 26
e=5, 5 + 3 = 8 mod 26
Affine Cipher k=(a,b)
Encryption: ek (x) = a*x + b mod 26
Decryption: ek (y) = a-1 * (y – b) mod 26
The quick brown fox
k=(5, 3)
t=20, 5*20 + 3 = 103 = 25 mod 26
h=8, 5*8 + 3 = 43 = 17 mod 26
e=5, 5*5 + 3 = 28 = 2 mod 26
21 * 5 = 105 = 1 mod 26
21 * 25-3 = 462 = 20 mod 26
21 * 17-3 = 294 = 8 mod 26
21 * 2-3 = -21 = 5 mod 26
Brute-Force Attacks
Given: y = SGD PTHBJ AQNVM ENW
Keyspace = {1,…,25}
Decryption : ki(y) =? x
Abu Yūsuf Yaʻqūb ibn ʼIsḥāq
aṣ-Ṣabbāḥ al-Kindī 850 C.E.
Cryptanalysis
Letter Frequency Short word and letter combinations
the
be
to
of
and
that
have
for
not
http://www.richkni.co.uk/php/crypta/
Normal English letter frequency
Ciphertext letter frequency
Vigenère cipher
A polyalphabetic cipher
Key = KING
The sun and the man in the moon
Dpr yev ntn buk wia ox buk wwbt
4 possible ways to spell the word “the”
K – DPR I - BUK
N – GNO G - ZRM
http://www.simonsingh.net/The_Black_Chamber/vigenere_cracking_tool.html
http://sharkysoft.com/vigenere/
Enigma
http://cryptoclub.math.uic.edu/shiftcipher/shiftcipher.php
http://enigma.louisedade.co.uk/enigma.html
AXP AVC .. IOV NKZ .. HSA PYT .. PPZ LEX
FZD YQO .. IZL NQL .. NNQ CMA .. GUH BIS
FGT YHD .. KDY GNV .. NBJ COQ .. GOI BKK
MIW MRI .. VWG EZG .. SYX SJB .. TVB KFM
DJG UDG .. OJN QDE .. SNH SMS .. TLI KPK
LNK TMF .. ZAO RXJ .. SXV SVZ .. TYO KJJ
XKN JAE .. CTL OUL .. ERS XWU .. WHJ WBQ
BHG DBG .. CMM OTY .. EAA XXT .. JQR ISH
RZU ZQN .. UKM HAY .. YCE FGR .. JEY ICV
RTC ZUW .. QFF VLP .. PII LRK .. JCE IGP
Loops(1,4) (LTKGBDUHP) (XJINCOQVE) (FY) (RZ) (A) (M) (S) (W)
Loops(2,5) (XVFLPECGHBOKA) (ZQSYJDNMTUIRW)
Loops(3,6) (PCWIKF) (DOJQAT) (NERHSU) (VZXBMY) (L) (G)
Loops(1,4) 8, 9, 9, 2, 2, 1, 1, 1, 1
Loops(2,5) 2, 13, 13
Loops(3,6) 6, 6, 6, 6, 6, 1, 1
By the end of WWII enigma
had a key space of
159 sextillion (159*1021)
Confusion and Diffusion
Claude Shannon
Confusion
The relationship between the key and the ciphertext as complex and as
involved as possible.
e.g. Enigma & complex substitution (S-boxes)
011011
Diffusion
Statistics of the plaintext is "dissipated" in the
statistics of the ciphertext. If we change a
character of the plaintext, then several
characters of the ciphertext should change.
http://en.wikipedia.org/wiki/Permutation_box
P-Box
Left Right
ABCDEF GHIJKL
ABCDEF F() = HJLGIK
Xor = JIHGKL
JIHGKL ABCDEF
DES
Data Encryption Standard (1973)
56 bit (Lucifer cipher)
Key Length Security Estimation
56-64 bits A few hours or days
112-128 bits Several decades (w/o QC)
256 bits Several decades (w QC)
AES
Advance Encryption Standard (2001)
Currently accepted industry standard
Supports 128, 192 and 256 bit keys.
In 1997 National Institute of Standards and Technology (NIST)
Called for proposals for AES
• Rijandel
• Mars
• RC6
• Serpent
• Twofish
In 2001 Rijandel was adopted and renamed AES.
Diffie-Hellman Key Exchange (DHKE)
Discrete Logarithm Problem
Used in:
SSH
TLS
IPSec
Diffie-Hellman Key Exchange (DHKE)
Discrete Logarithm Problem
1. Choose a prime modulus P. 17
2. Choose an integer A that will be known as the generator. 3
3. Alice and Bob both choose a private number
Ax mod P
Alice a – 15 Bob b – 13
315 mod 17 = 6 313 mod 17 = 12
6
<- 12
12 15 mod 17 = 10 6 13 mod 17 = 10
Hacker knows:
Alice - Ax mod P = 6
Bob - Ax mod P = 12
A is specially chosen to induce the discrete logarithm problem and ensure
a one way function.
Exponentiation is commutative: k = (Ax)y = (Ay)x
RSA
Rivest, Shamir, Adleman
Discrete logarithm and integer factorization
Set up
1. Choose two large primes: p=3 and q=11
2. n = p*q = 33
3. Θ(n) = (p-1)(q-1)=(3-1)(11-1)=20
4. Find a number e where gcd(e, Θ(n)) = 1 e=3
5. Find the number d where e*d = 1 mod Θ(n) d=7
Public key (n, e) = (33, 3)
Private key(d)
c = me mod n
m = cd mod n
Alice Bob
m=4
43 mod 33 = 31
31->
317 mod 20 = 4

Contenu connexe

Tendances

Coq for ML users
Coq for ML usersCoq for ML users
Coq for ML userstmiya
 
Introduction to SPI and PMIC with SPI interface (chinese)
Introduction to SPI and PMIC with SPI interface (chinese)Introduction to SPI and PMIC with SPI interface (chinese)
Introduction to SPI and PMIC with SPI interface (chinese)Sneeker Yeh
 
Engineering fast indexes
Engineering fast indexesEngineering fast indexes
Engineering fast indexesDaniel Lemire
 
IoT Chess 16th April Berlin
IoT Chess 16th April BerlinIoT Chess 16th April Berlin
IoT Chess 16th April BerlinLars Gregori
 
Next Generation Indexes For Big Data Engineering (ODSC East 2018)
Next Generation Indexes For Big Data Engineering (ODSC East 2018)Next Generation Indexes For Big Data Engineering (ODSC East 2018)
Next Generation Indexes For Big Data Engineering (ODSC East 2018)Daniel Lemire
 
2021 Quantum Challenge ex.1
2021 Quantum Challenge ex.12021 Quantum Challenge ex.1
2021 Quantum Challenge ex.1RikuyaKubota
 
Why Systolic Architectures
Why Systolic ArchitecturesWhy Systolic Architectures
Why Systolic ArchitecturesMindos Cheng
 
Use the following data definitions until notified otherwise Byte1 BYTE ...
Use the following data definitions until notified otherwise  Byte1    BYTE   ...Use the following data definitions until notified otherwise  Byte1    BYTE   ...
Use the following data definitions until notified otherwise Byte1 BYTE ...hwbloom138
 
Tower of Hanoi using AI technique - means ends analysis
Tower of Hanoi using AI technique - means ends analysisTower of Hanoi using AI technique - means ends analysis
Tower of Hanoi using AI technique - means ends analysisShubham Nimiwal
 
Quantum challenge2021 Ex1
Quantum challenge2021 Ex1Quantum challenge2021 Ex1
Quantum challenge2021 Ex1UkyoKimura
 
Implementation of Bitcoin Miner on SW and HW
Implementation of Bitcoin Miner on SW and HWImplementation of Bitcoin Miner on SW and HW
Implementation of Bitcoin Miner on SW and HWJoe Jiang
 
Gate level minimization (2nd update)
Gate level minimization (2nd update)Gate level minimization (2nd update)
Gate level minimization (2nd update)Aravir Rose
 
Quantum challenge 2021 exercise1
Quantum challenge 2021 exercise1Quantum challenge 2021 exercise1
Quantum challenge 2021 exercise1takumitano
 
Cloud flare jgc bigo meetup rolling hashes
Cloud flare jgc   bigo meetup rolling hashesCloud flare jgc   bigo meetup rolling hashes
Cloud flare jgc bigo meetup rolling hashesCloudflare
 
Concurrency in Go by Denys Goldiner.pdf
Concurrency in Go by Denys Goldiner.pdfConcurrency in Go by Denys Goldiner.pdf
Concurrency in Go by Denys Goldiner.pdfDenys Goldiner
 
Fast Wavelet Tree Construction in Practice
Fast Wavelet Tree Construction in PracticeFast Wavelet Tree Construction in Practice
Fast Wavelet Tree Construction in PracticeRakuten Group, Inc.
 

Tendances (20)

Coq for ML users
Coq for ML usersCoq for ML users
Coq for ML users
 
Introduction to SPI and PMIC with SPI interface (chinese)
Introduction to SPI and PMIC with SPI interface (chinese)Introduction to SPI and PMIC with SPI interface (chinese)
Introduction to SPI and PMIC with SPI interface (chinese)
 
Engineering fast indexes
Engineering fast indexesEngineering fast indexes
Engineering fast indexes
 
IoT Chess 16th April Berlin
IoT Chess 16th April BerlinIoT Chess 16th April Berlin
IoT Chess 16th April Berlin
 
Next Generation Indexes For Big Data Engineering (ODSC East 2018)
Next Generation Indexes For Big Data Engineering (ODSC East 2018)Next Generation Indexes For Big Data Engineering (ODSC East 2018)
Next Generation Indexes For Big Data Engineering (ODSC East 2018)
 
El
ElEl
El
 
2021 Quantum Challenge ex.1
2021 Quantum Challenge ex.12021 Quantum Challenge ex.1
2021 Quantum Challenge ex.1
 
Why Systolic Architectures
Why Systolic ArchitecturesWhy Systolic Architectures
Why Systolic Architectures
 
Use the following data definitions until notified otherwise Byte1 BYTE ...
Use the following data definitions until notified otherwise  Byte1    BYTE   ...Use the following data definitions until notified otherwise  Byte1    BYTE   ...
Use the following data definitions until notified otherwise Byte1 BYTE ...
 
Tower of Hanoi using AI technique - means ends analysis
Tower of Hanoi using AI technique - means ends analysisTower of Hanoi using AI technique - means ends analysis
Tower of Hanoi using AI technique - means ends analysis
 
C coroutine
C coroutineC coroutine
C coroutine
 
Tower of hanoi
Tower of hanoiTower of hanoi
Tower of hanoi
 
Quantum challenge2021 Ex1
Quantum challenge2021 Ex1Quantum challenge2021 Ex1
Quantum challenge2021 Ex1
 
Implementation of Bitcoin Miner on SW and HW
Implementation of Bitcoin Miner on SW and HWImplementation of Bitcoin Miner on SW and HW
Implementation of Bitcoin Miner on SW and HW
 
Gate level minimization (2nd update)
Gate level minimization (2nd update)Gate level minimization (2nd update)
Gate level minimization (2nd update)
 
Quantum challenge 2021 exercise1
Quantum challenge 2021 exercise1Quantum challenge 2021 exercise1
Quantum challenge 2021 exercise1
 
Cloud flare jgc bigo meetup rolling hashes
Cloud flare jgc   bigo meetup rolling hashesCloud flare jgc   bigo meetup rolling hashes
Cloud flare jgc bigo meetup rolling hashes
 
Concurrency in Go by Denys Goldiner.pdf
Concurrency in Go by Denys Goldiner.pdfConcurrency in Go by Denys Goldiner.pdf
Concurrency in Go by Denys Goldiner.pdf
 
Strongly Connected Components
Strongly Connected Components Strongly Connected Components
Strongly Connected Components
 
Fast Wavelet Tree Construction in Practice
Fast Wavelet Tree Construction in PracticeFast Wavelet Tree Construction in Practice
Fast Wavelet Tree Construction in Practice
 

Similaire à Cryptography : From Demaratus to RSA

Demystifying Zero Knowledge Proofs [FINAL].pptx
Demystifying Zero Knowledge Proofs [FINAL].pptxDemystifying Zero Knowledge Proofs [FINAL].pptx
Demystifying Zero Knowledge Proofs [FINAL].pptxRedWhite12
 
Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...
Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...
Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...Mozaic Works
 
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)Svetlin Nakov
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityBikramjit Sarkar, Ph.D.
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...Alex Pruden
 
Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks Yandex
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyDavid Evans
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationAlexander Litvinenko
 
Compilation of COSMO for GPU using LLVM
Compilation of COSMO for GPU using LLVMCompilation of COSMO for GPU using LLVM
Compilation of COSMO for GPU using LLVMLinaro
 
Everything I always wanted to know about crypto, but never thought I'd unders...
Everything I always wanted to know about crypto, but never thought I'd unders...Everything I always wanted to know about crypto, but never thought I'd unders...
Everything I always wanted to know about crypto, but never thought I'd unders...Codemotion
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyKelly Bresnahan
 
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...Sasha Romijn - Everything I always wanted to know about crypto, but never tho...
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...Codemotion
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applicationsItishree Dash
 
Cryptography: way to Arkham - Andriy Savchenko
Cryptography: way to Arkham - Andriy SavchenkoCryptography: way to Arkham - Andriy Savchenko
Cryptography: way to Arkham - Andriy SavchenkoRuby Meditation
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherAmirul Wiramuda
 

Similaire à Cryptography : From Demaratus to RSA (20)

Demystifying Zero Knowledge Proofs [FINAL].pptx
Demystifying Zero Knowledge Proofs [FINAL].pptxDemystifying Zero Knowledge Proofs [FINAL].pptx
Demystifying Zero Knowledge Proofs [FINAL].pptx
 
Cs262 2006 lecture6
Cs262 2006 lecture6Cs262 2006 lecture6
Cs262 2006 lecture6
 
Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...
Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...
Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...
 
Cryptography
CryptographyCryptography
Cryptography
 
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
 
Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty Quantification
 
Compilation of COSMO for GPU using LLVM
Compilation of COSMO for GPU using LLVMCompilation of COSMO for GPU using LLVM
Compilation of COSMO for GPU using LLVM
 
Everything I always wanted to know about crypto, but never thought I'd unders...
Everything I always wanted to know about crypto, but never thought I'd unders...Everything I always wanted to know about crypto, but never thought I'd unders...
Everything I always wanted to know about crypto, but never thought I'd unders...
 
DES Block Cipher Hao Qi
DES Block Cipher Hao QiDES Block Cipher Hao Qi
DES Block Cipher Hao Qi
 
20141105 asfws-norx-slides
20141105 asfws-norx-slides20141105 asfws-norx-slides
20141105 asfws-norx-slides
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...Sasha Romijn - Everything I always wanted to know about crypto, but never tho...
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applications
 
Cryptography: way to Arkham - Andriy Savchenko
Cryptography: way to Arkham - Andriy SavchenkoCryptography: way to Arkham - Andriy Savchenko
Cryptography: way to Arkham - Andriy Savchenko
 
Codes and Isogenies
Codes and IsogeniesCodes and Isogenies
Codes and Isogenies
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream Cipher
 

Dernier

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Cryptography : From Demaratus to RSA

  • 2. What is Cryptography? Encryption is the process of: 1.Transforming data (x) 2.Using an algorithm (e) 3.To make it unreadable to anyone (y) 4.except those possessing the key. (k) K={k1,…,kn} The Quick Brown Fox Me (mod N) where M=The Quick Brown Fox Uif Rvjdl Cspxo Gpy Kerchhoffs’ principle: A cryptosystem should be secure even if the Attacker knows all the details about the system, with the exception of The key.
  • 3. We shall extend the empire of Persia such that its boundaries will be God's own sky, so the sun will not look down upon any land beyond the boundaries of what is our own -Xerxes (Ahasuerus) ~450 B.C.
  • 4. (Spartan) Scytale Rail Fence Cipher Route Cipher Transposition Ciphers
  • 5. The Quick Brown Fox GSV JFRXP YILDM ULC Substitution Ciphers The Quick Brown Fox ZIT JXOEA WKGVF YGB Shift Cipher (Caesar) The Quick Brown Fox SGD PTHBJ AQNVM ENW At-Bash
  • 6. Modular ciphers a = r mod m 42 = 9*4 + 6 r = a – m*q 42 = 6 mod 9 42 = q*9 + 6 6 = 42 – q*9 q = 0, r = 42 q = 1, r = 33 q = 2, r = 24 q = 3, r = 15 q = 4, r = 6 (0<q<m-1) q = 5, r = -3 q = 6, r = -12 12 + 7 = 19 => 1 mod 9 14 – 2 = 12 => 3 mod 9 11 * 8 = 88 => 7 mod 9 15/5 = 3 !=> 3 mod 9 If the multiplicative inverse exists for a number then we can divide by that number 5*2=10 => 1 mod 9 2 is the multiplicative inverse of 5 (and vice versa) 15*2 = 30 => 3 mod 9 If x is coprime with modulus then it has an inverse.
  • 7. Caesar Cipher Encryption: ek (x) = x + k mod 26 Decryption: ek (y) = y – k mod 26 The quick brown fox k=3 t=20, 20 + 3 = 23 mod 26 h=8, 8 + 3 = 11 mod 26 e=5, 5 + 3 = 8 mod 26 Affine Cipher k=(a,b) Encryption: ek (x) = a*x + b mod 26 Decryption: ek (y) = a-1 * (y – b) mod 26 The quick brown fox k=(5, 3) t=20, 5*20 + 3 = 103 = 25 mod 26 h=8, 5*8 + 3 = 43 = 17 mod 26 e=5, 5*5 + 3 = 28 = 2 mod 26 21 * 5 = 105 = 1 mod 26 21 * 25-3 = 462 = 20 mod 26 21 * 17-3 = 294 = 8 mod 26 21 * 2-3 = -21 = 5 mod 26
  • 8. Brute-Force Attacks Given: y = SGD PTHBJ AQNVM ENW Keyspace = {1,…,25} Decryption : ki(y) =? x
  • 9. Abu Yūsuf Yaʻqūb ibn ʼIsḥāq aṣ-Ṣabbāḥ al-Kindī 850 C.E. Cryptanalysis Letter Frequency Short word and letter combinations the be to of and that have for not http://www.richkni.co.uk/php/crypta/
  • 10. Normal English letter frequency Ciphertext letter frequency
  • 11. Vigenère cipher A polyalphabetic cipher Key = KING The sun and the man in the moon Dpr yev ntn buk wia ox buk wwbt 4 possible ways to spell the word “the” K – DPR I - BUK N – GNO G - ZRM http://www.simonsingh.net/The_Black_Chamber/vigenere_cracking_tool.html http://sharkysoft.com/vigenere/
  • 13. AXP AVC .. IOV NKZ .. HSA PYT .. PPZ LEX FZD YQO .. IZL NQL .. NNQ CMA .. GUH BIS FGT YHD .. KDY GNV .. NBJ COQ .. GOI BKK MIW MRI .. VWG EZG .. SYX SJB .. TVB KFM DJG UDG .. OJN QDE .. SNH SMS .. TLI KPK LNK TMF .. ZAO RXJ .. SXV SVZ .. TYO KJJ XKN JAE .. CTL OUL .. ERS XWU .. WHJ WBQ BHG DBG .. CMM OTY .. EAA XXT .. JQR ISH RZU ZQN .. UKM HAY .. YCE FGR .. JEY ICV RTC ZUW .. QFF VLP .. PII LRK .. JCE IGP Loops(1,4) (LTKGBDUHP) (XJINCOQVE) (FY) (RZ) (A) (M) (S) (W) Loops(2,5) (XVFLPECGHBOKA) (ZQSYJDNMTUIRW) Loops(3,6) (PCWIKF) (DOJQAT) (NERHSU) (VZXBMY) (L) (G) Loops(1,4) 8, 9, 9, 2, 2, 1, 1, 1, 1 Loops(2,5) 2, 13, 13 Loops(3,6) 6, 6, 6, 6, 6, 1, 1 By the end of WWII enigma had a key space of 159 sextillion (159*1021)
  • 14. Confusion and Diffusion Claude Shannon Confusion The relationship between the key and the ciphertext as complex and as involved as possible. e.g. Enigma & complex substitution (S-boxes) 011011 Diffusion Statistics of the plaintext is "dissipated" in the statistics of the ciphertext. If we change a character of the plaintext, then several characters of the ciphertext should change. http://en.wikipedia.org/wiki/Permutation_box P-Box
  • 15. Left Right ABCDEF GHIJKL ABCDEF F() = HJLGIK Xor = JIHGKL JIHGKL ABCDEF DES Data Encryption Standard (1973) 56 bit (Lucifer cipher) Key Length Security Estimation 56-64 bits A few hours or days 112-128 bits Several decades (w/o QC) 256 bits Several decades (w QC)
  • 16. AES Advance Encryption Standard (2001) Currently accepted industry standard Supports 128, 192 and 256 bit keys. In 1997 National Institute of Standards and Technology (NIST) Called for proposals for AES • Rijandel • Mars • RC6 • Serpent • Twofish In 2001 Rijandel was adopted and renamed AES.
  • 17. Diffie-Hellman Key Exchange (DHKE) Discrete Logarithm Problem Used in: SSH TLS IPSec
  • 18. Diffie-Hellman Key Exchange (DHKE) Discrete Logarithm Problem 1. Choose a prime modulus P. 17 2. Choose an integer A that will be known as the generator. 3 3. Alice and Bob both choose a private number Ax mod P Alice a – 15 Bob b – 13 315 mod 17 = 6 313 mod 17 = 12 6 <- 12 12 15 mod 17 = 10 6 13 mod 17 = 10 Hacker knows: Alice - Ax mod P = 6 Bob - Ax mod P = 12 A is specially chosen to induce the discrete logarithm problem and ensure a one way function. Exponentiation is commutative: k = (Ax)y = (Ay)x
  • 19. RSA Rivest, Shamir, Adleman Discrete logarithm and integer factorization Set up 1. Choose two large primes: p=3 and q=11 2. n = p*q = 33 3. Θ(n) = (p-1)(q-1)=(3-1)(11-1)=20 4. Find a number e where gcd(e, Θ(n)) = 1 e=3 5. Find the number d where e*d = 1 mod Θ(n) d=7 Public key (n, e) = (33, 3) Private key(d) c = me mod n m = cd mod n Alice Bob m=4 43 mod 33 = 31 31-> 317 mod 20 = 4