Top Banner
Cryptographic teaching Cryptographic teaching tools tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan
35

Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Cryptographic teaching toolsCryptographic teaching tools

Presented by: Suan Khai Chong

Supervisor: Assoc. Prof. Graham Farr

Second Reader: Dianne Hagan

Page 2: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

BackgroundBackground

Need to securely transmit information between two or more parties.

Methods have been devised to meet this need.

Cryptography is the study of these methods.

Page 3: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

CryptographyCryptography

Plain text Original Plain text

Cipher textCipher text

Page 4: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Cryptography (cont…)Cryptography (cont…)

A very long history…

Recent emergence of public key cryptography spurred interest in it.

Page 5: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Public-key cryptographyPublic-key cryptography

Alice Bob

message

public keyprivate key

Page 6: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Public key cryptography (cont…)Public key cryptography (cont…)

Cryptosystems which involve use of public and private keys for encryption and decryption.

Some types of public-key cryptosystems: RSA, Diffie Hellman and Shamir.

Page 7: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Learning & Teaching CryptographyLearning & Teaching Cryptography

Success of public-key cryptosystems

Growing popularity of cryptography

leads toleads to

Interest in learning cryptography

promotespromotes

Effective ways of teaching cryptography

creates need forcreates need for

Page 8: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

General AimGeneral Aim

Automated Cryptographic Teaching Tools

• As an aid to teaching and learning several public key cryptosystems

NOT writing secure implementations of cryptosystems.

Page 9: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Correct RSA calculationCorrect RSA calculation

N=77, e=7, p=11, q=7, c=5(Encrypted msg)Decryption

Extended Euclidean algorithm

d=e^(-1) mod ((p-1)(q-1))

Msg, m=c^d mod N*RSA: a public-key cryptosystem

Fast modular exponentiation

Page 10: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Error paths in RSA exerciseError paths in RSA exercise

*RSA is a type of public-key cryptosystem

11 10 17 43 7 2

Decryption key dDecryption key d

N=77, e=7, p=11, q=7, c=5(Encrypted msg)

55 232333 99 3131 5555 333131232375756767

correct pathwrong path

Page 11: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Doing exercises by handDoing exercises by hand

An important part of learning cryptography is doing exercises by hand. However…

It is difficult to construct exercises by hand with the following properties:

a. Sound examplesb. Diagnostic examples

Page 12: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

SoundSound/Diagnostic examples/Diagnostic examples

Sound example: Wrong path leads to wrong answer. Student must do the correct calculation to

arrive at the right answer.

Diagnostic example: All paths give different answers. Student’s answer indicates the type of

mistake made.

Page 13: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Existing workExisting work

Example generators Example generators have been have been built by Laura Frost built by Laura Frost and Simon Hawley (2002-3) for the following and Simon Hawley (2002-3) for the following cryptosystems:cryptosystems:

RSA Diffie-Hellman Shamir ElGamal Chaum’s e-cash

Page 14: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

RSA example generatorRSA example generator

random keys

All paths

Diagnostic?

correct path

Page 15: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Project JustificationProject Justification

A fair question to ask would be:How useful are these example generators?

Useful for the person constructing examples. Provides guidance to person doing examples. Statistics are helpful for researching in the properties of

examples.

Answer:

Useful!!!

Page 16: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

DeliverablesDeliverables

1. Refining of existing programs to enhance structure and usability.

2. Support for additional cryptosystems.

3. Experimentation with data sets to study sound/diagnostic examples.

4. Construction of web interfaces.

Page 17: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Results OverviewResults Overview

1. System Functionalities.

2. Additional example generators.

3. Web-based interface.

4. Example probabilities table.

5. Evaluation of table results.

Page 18: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

1. System Functionalities1. System Functionalities

Three main modes of operation:Random modeInteractive modeCalculate mode

Page 19: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Main modes: RandomMain modes: Random

Generates example without tweaking parameters.

How this works? Select parameters to be small enough for pen and

paper. Parameters must have suitable mathematical

characteristics. ( e.g. not self-inverses in RSA) Extra options: displaying working or path tree.

Page 20: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Main modes: InteractiveMain modes: Interactive

Requires information from user for individual keys.

How this works? Show user appropriate inputs i.e. small with

suitable properties. Let user select from inputs. Generate example with those inputs Display output depending on extra options.

Page 21: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Main modes: CalculateMain modes: Calculate

Functionality

Loops over existing examples to calculate probabilities

Determines percentage of sound/diagnostic examples.

How it works ? User specifies parameters to be fixed or looped. Several examples are generated and compared. Program outputs example types, probabilities.

Page 22: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Display: Path SelectionDisplay: Path Selection

Selection of paths that users want considered.

Rationale: Some error paths are more probable than

others. Students become expert with parts of

cryptosystems over time.

Page 23: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Path Select InterfacePath Select Interface

Page 24: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Display: Path Tree DisplayDisplay: Path Tree Display

A visual representation of path table.

Page 25: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

2. Additional example generators2. Additional example generators

The additional generators are:

Knapsack RSA signature scheme

Page 26: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Design considerationsDesign considerations

How is an example generator built?

1. Work out possible paths by pen and paper.

2. Determine characteristics unique to cryptosystem.

3. Implement with some code reuse.

Page 27: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

3. Web interface3. Web interface

Consistent input layout for all cryptosystems

Page 28: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Input Interface: Key Input DialogInput Interface: Key Input Dialog

Figure: RSA Calc. Mode Input dialog

Page 29: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Generated OutputGenerated Output

Web output scrollpane

Page 30: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

4. Probabilities table4. Probabilities table

0

0.2

0.4

0.6

0.8

1

1.2

Modulus n

Pro

bab

iliti

es

Unsound

Sound

Diagnostic

N.B. Probabilities table similar for other cryptosystems

Page 31: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Evaluation of probabilitiesEvaluation of probabilities

It is hard to generate examples that are diagnostic.

Probabilities of sound/diagnostic examples increase as input size increases.

Page 32: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

DemonstrationDemonstration

Looking at everything we have talked about…

Main website:http://www.csse.monash.edu.au/~skcho5/

Page 33: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Discussion of resultsDiscussion of results

In short, this project contributes significantly in the following ways:

Web interface lets users interact with the tool easily.

It is easy to generate examples with suitable properties.

Students can learn by example (steps through en/decryption).

Page 34: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Future WorkFuture Work

Project provides a basis for further work:

A generic path tree representation. Better visualization of output. Allowing output of encryption to be given

to decryption. A progress indicator. Support for additional generators.

Page 35: Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.

Q & AQ & A

Any Questions?