Top Banner
CRYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran
55

C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

Jan 12, 2016

Download

Documents

Georgina Jacobs
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

CRYPTOGRAPHY

Presented by: Noushin Ranjkesh

Olinka Bedroya

Sharif University of Technology-1391

Department of Physics, Tehran, Iran

Page 2: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

CHAPTER 4THE LANGUAGE BARRIER

The impenetrability of

unknown languages, the Navajo

code talkers of World War II

and the decipherment of

Egyptian hieroglyphs

Page 3: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

PURPLE CODE , BATTLE OF MIDWAY

1/

47

Page 4: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

2/

47

Page 5: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

رمزنگاری، های ماشین بنیادی بیهودگینبردهای در اطالعات انتقال پایین سرعت

اقیانوس های جنگ ویژه به محدود، مناطقگوهای کد از استفاده موجب نهایت در آرام،

. گردید ناواجو

3/

47

Page 6: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

4/

47

Page 7: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

ناواجو زبان از استفاده های کاستیجنگ در اطالعات رمزگذاری برای

دوم جهانی

های واژه ناواجو،برای زبان در معادل های واژه نبودننظامی

حیوانات نام با جنگ در کاربردی های واژه سازی معادلناواجو زبان در اصیل واژهای و

ادا مشابه صورت به زبانی، هر در که افراد و ها مکان نامشود می

زبان معادل،در دارای های واژه از ای نامه واژه ی تهیهالفبا حرف هر برای ناواجو

5/

47

Page 8: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

6/

47

Page 9: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

The military terms The Navajo terms

fighter plane amphibious vehicle Submarine

owl (Da-he-tih-hi) frog (Chal) iron fish (Besh-lo)

7/

47

Page 10: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

PACIFIC Pig Ant Cat Ice Fox Ice Cat

Bi-sodih Wol-la-chee Moasi Tkin Ma-e Tkin Moasi

8/

47

Page 11: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

DECIPHERING LOST LANGUAGE AND ANCIENT SCRIPTS

9/

47

Page 12: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

HIEROGLYPH

10/

47

Page 13: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

HIEROGLYPH از پیش سال هزار سه حدود از ن باستا مصریان زبان

میالد معابد برای کاربردی و زینتی بسیار زبان یک

و هیراتیک زبان به کم کم زبان این نوشتار سختی دلیل بهتر مناسب روزمره در استفاده برای که دموتیک سپس

. اند شده تبدیل است،مسیحیت گسترش مسیح،با میالد از پس قرن چهار حدود در

و شد غالب یونانی کلیسا،زبان نفوذ قدرت افزایش وترکیب از جدیدی و 24الفبای یونانی زبان از 6حرف

شکل قبطی زبان و شد ساخته دموتیک زبان از نشانهگرفت. 11

/ 47

Page 14: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

HIERATIC

12/

47

Page 15: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

13/

47

Page 16: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

14/

47

Page 17: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

DEMOTIC

15/

47

Page 18: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

COPTIC

16/

47

Page 19: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

THE ROSETTA STONE

17/

47

Page 20: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

روزتا سنگ روزتا شهر در اسکندر اعزامی شناس باستان گروه توسط

. شد کشف. شود می داری نگه بریتانیا ی موزه در و دموتیک یونانی، زبان سه به ثابت متن یک شامل

. است هیروگلیف

18/

47

Page 21: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

19/

47

Page 22: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

THOMAS YOUNG

20/

47

Page 23: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

KARNAK TEMPLE

21/

47

Page 24: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

22/

47

Jean-François Champollion

Page 25: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

23/

47

Page 26: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

24/

47

Page 27: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

25/

47

Page 28: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

26/

47

Berenika

Page 29: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

27/

47

Page 30: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

28/

47

Ptolemaios

Cleopatra

Page 31: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

29/

47

Page 32: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

RAگفته ) خورشید به درقبطی

شود (می

RAMSS( رامسس)

30/

47

Page 33: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

CHAPTER 5ALICE AND BOB GO PUBLIC

Modern cryptography,the solution to the so-calledkey-distribution problemand the secret history ofnonsecret encryption

Page 34: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

ENTERING THE COMPUTER AGE

31/

47

Break of lorenz cypher: sending a same 4000 characters message twice (slightly different)

Bill Tutte

John TiltmanA Lorenz cypher machine

Page 35: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

ENTERING THE COMPUTER AGE

32/

44

Colossus,delivered 1943

Max Newman

Thomas H. FlowersENIAC ,1945

Page 36: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

ENTERING THE COMPUTER AGE

33/

47

Differences between computer and mechanical encryption: complexity speed Computers deal with binary numbers

e.g. computer version of a substitution cipher:

ASCII table

Message HELLOMessage in ASCII 10010001000101100110010011001001111Key(DAVID) 10001001000001101011010010011000100Ciphertext 00011000000100001101000001010001011

Page 37: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

ENTERING THE COMPUTER AGE

34/

47

1947, invention of transistor 1951, Ferranti began to make computers to order. 1953, IBM launched its first computer 1957, introduction of Fortran 1959, invention of the integrated circuit

First transistor Ferranti’s computer IBMs first computer

Page 38: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

KEY DISTRIBUTION

35/

47

Vigenère key

Delivering the Enigma monthly code book

1970s, Banks needed to deliver keys to customers

Page 39: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

KEY DISTRIBUTION

36/

47

Quadratic gap is best possible if we treat cipher as a black box oracle[B. Barak and M. Mahmoody-Ghidary. Merkle Puzzles are Optimal]

Merkle puzzles

Page 40: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

KEY DISTRIBUTION

37/

47

Whitfield Diffie

connections of the world wide web. Colors represent different domains.

Page 41: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

KEY DISTRIBUTION

38/

47

Martin Hellman

Ralph Merkle

Exchanging keys in person

No key sharing - double locked

Asymmetric key…

Page 42: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

ASYMMETRIC KEY

39/

47

What symmetric and asymmetric indicate

To build an asymmetric cipher: Alice publishes a public key People lookup for Alice’s Public key They use the public key and encryption method to send

Alice messages Alice uses her private key to decrypt

Page 43: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

ONE WAY FUNCTIONS

40/

47

Mixing colors

Page 44: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

ONE WAY FUNCTIONS

41/

47

Modular Exponentiation

Diffie-Hellman

Agree on a public modulus N and a base g Alice chooses a private key x between 1 and N -1 She constructs a public key by computing X=g x mod N Bob chooses a random y and calculate K= X y. Bob sends Alice the enciphered text and Y=g y

Alice calculates the K= Y x and deciphers the text

Page 45: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

ONE WAY FUNCTIONS

42/

47

Page 46: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

RSA CRYPTOSYSTEM

43/

47

 

Ronald Rivest, Adi Shamir and Leonard Adleman.

Page 47: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

RSA CRYPTOSYSTEM

44/

47

Page 48: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

RSA CRYPTOSYSTEM

45/

47

N = 114,381,625,757,888,867,669,235,779,976,146,612,010, 218,296,721,242,362,562,561,842,935,706,935,245,733,897, 830,597,123,563,958,705,058,989,075,147,599,290,026,879, 543,541

q = 3,490,529,510,847,650,949,147,849,619,903,898,133,417, 764,638,493,387,843,990,820,577

p = 32,769,132,993,266,709,549,961,988,190,834,461,413,177, 642,967,992,942,539,798,288,533

Thus far, the best way known to invert RSA is to factor N. The best running time for a fully proved algorithm is Dixon’s

Random squares which runs in time It took 2 years to factor a 232 digit number, using hundreds of

machines P should have 1024 bits

Page 49: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

THE SECRET HISTORY OF PUBLIC KEY CRYPTOGRAPHY

46/

47

James Ellis, joined GCHQ in 1965

Clifford Cocks , joined GCHQ in 1973 Malcolm Williamson , joined GCHQ in 1974Both new and old GCHQbuildings

Page 50: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

Brief review of chapter 5

• Birth of computer encryption• Key distribution problem• Asymmetric encryption• Diffie-Hellman cryptosystem• RSA crypto system

47/

47

Page 51: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

APPENDIX

Page 52: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

NUMBER THEORY BASIS FORRSA CRYPTOSYSTEM

1/4

Number Theory Background

is the number of elements in relatively prime to forms an Abeliangroup

Theorem: If then

Page 53: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

HOW TO FIND PRIME NUMBERS

2/4

AKS primality test Fermat primality test Miller–Rabin primality test Solovay-strassen primality test

take a preselected random number of the desired length apply a Fermat primality test apply a certain number of Miller–Rabin tests (depending on

the length and the allowed error rate) to get a number which is very probably a prime number.

Deterministic

Probabilistic

Page 54: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

HOW TO FIND PRIME NUMBERS

3/4

AKS primality test

Input: integer n > 1.If n = ab for integers a > 0 and b > 1, output composite.

Find the smallest r such that or(n) > log2(n).

If 1 < gcd(a,n) < n for some a ≤ r, output composite. If n ≤ r, output prime. For a = 1 to  do if (X+a)n≠ Xn+a (mod Xr − 1,n),

output composite; Output prime.

Page 55: C RYPTOGRAPHY Presented by: Noushin Ranjkesh Olinka Bedroya Sharif University of Technology-1391 Department of Physics, Tehran, Iran.

HOW TO FIND PRIME NUMBERS

4/4

Fermat primality test

Choose random

If so output p as prime; else go back to first step and choose another random number