In The Name of GOD - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

In The Name of GOD

Description:

Cryptography is the study of mathematical techniques related to aspects of ... Attacker can modify the message (100 Euro to 1000 Euro). method: digital signature ... – PowerPoint PPT presentation

Number of Views:56
Avg rating:3.0/5.0
Slides: 17
Provided by: Mad114
Category:
Tags: god | graffiti | name

less

Transcript and Presenter's Notes

Title: In The Name of GOD


1
In The Name of GOD
2
Introduction to Cryptography
  • KNT University of Technology
  • Department of Basic Science
  • Mathematics group
  • 16 November
  • Mohsen A. Momeni
  • Farnaz Farzi
  • Mehdi Abbas Zadeh
  • Cryptography Association of Science Faculty

DEPARTMENT OFBASIC SCIENCE
3
Definition
  • Cryptography is the study of mathematical
    techniques related to aspects of information
    security such as confidentiality, data integrity,
    entity authentication, and data origin
    authentication.

DEPARTMENT OFBASIC SCIENCE
4
Cryptographic goals
  • Confidentiality
  • assure that data can be kept secret. Attacker
    can eavesdrop the message.
  • method encryption
  • Integrity
  • assure that received message has not been
    altered. - Attacker can modify the message (100
    Euro to 1000 Euro).
  • method digital signature
  • Authentication
  • about verifying identities. Attacker can send a
    different message to company B.
  • method digital certificate

DEPARTMENT OFBASIC SCIENCE
5
How is cryptography applied ?
  • - Secure Communication (SSL IPSEC)
  • - Identification and Authentication (Smart Cards)
  • - Secret sharing (VPN)
  • - Electronic Commerce (Credit Cards)
  • - Remote Access (SSH)

DEPARTMENT OFBASIC SCIENCE
6
CRYPTOGRAPHY TERMINOLOGY
  • Encryption encoding a message so that its
    meaningis not obvious.
  • Decryption the reverse
  • Cipher text Encrypted form Cc1,c2,...,cm
    CE(P)
  • Plain text Original form of message
    Pp1,p2,...,pn PD(C)
  • PD(E(P))
  • Alphabet of definition(A) a finite set which all
    text elements are
  • chosen from it. i.e. 0,1 or a,b,c,,z
  • Secret Key encryption and decryption depends on
    a key.

DEPARTMENT OFBASIC SCIENCE
7
Simple Mathematical Approach CHARACTER
REPRESENTATION
  • All characters in alphabet are labled by
    mathematical objects.
  • These objects can be anything such as number ,
    vector , matrix ,etc.
  • i.e. A 0, B 1, ... , Z 25 (space 26)
  • Then we define a 1-1 transformation from the
    object set onto itself.
  • We can use modular arithmatic for this reason.

DEPARTMENT OFBASIC SCIENCE
8
A privacy scheme The Caesar Cipher
DEPARTMENT OFBASIC SCIENCE
9
Private Key Scheme
DEPARTMENT OFBASIC SCIENCE
10
Private Key disadvantages
  • Frequent key changes (stolen, guessed, bought)
  • Distribution (through different channels)
  • Number of keys rapidly increases with spreading

DEPARTMENT OFBASIC SCIENCE
11
Public Key Scheme (Diffie Hellman, 1976)
DEPARTMENT OFBASIC SCIENCE
12
The mechanical analogy of Public key
A lock with two very different keys--the key E is
for LOCKING and the key D is for
UNLOCKING. Public-key cryptography is thus
sometimes called two-key cryptography or
asymmetric cryptography.
DEPARTMENT OFBASIC SCIENCE
13
Definitions
  • One-way function
  • Easy to compute f(x) but essentially for all y
    in Im(f), its computationally infeasible to find
    x s.t. f(x)y.
  • Trapdoor one-way function
  • One-way function with the additional property
    that given some extra information (called
    trapdoor) ,it becomes feasibe to find for any
    given y in Im(f) , an x s.t. f(x)y.
  • Permutation
  • A 1-1 function from a finite set onto itself.

DEPARTMENT OFBASIC SCIENCE
14
Trapdoor one-way permutations based on two
mathematical problems
  • Integer Factoring Problem (RSA , Rabin)
  • Discrete Logarithm Problem (Elgamal)

DEPARTMENT OFBASIC SCIENCE
15
Association Goals
  • Learning mathematical background of cryptography.
  • Working on Cryptanalysis of different algorithms.
  • Researching about new algorithms for different
    problems posed in cryptography.

DEPARTMENT OFBASIC SCIENCE
16
Thanks for yourattention
Write a Comment
User Comments (0)
About PowerShow.com