Math in the Solitaire Cipher By: Jeffrey Baez
|
|
- Harry Collins
- 7 years ago
- Views:
Transcription
1 Math in the Solitaire Cipher By: Jeffrey Baez Introduction: Neal Stephenson has written several novels in the cyberpunk genre, subspecialty of science fiction dealing with issues from cybernetics and informational technology. Some of his famous works include Snow Crash and The Diamond Age, which were successful in their own right and helped give him credibility as a writer[10]. Along with other awards, his novel Cryptonomicon earned the award winning Prometheus Award in 2013; this is awarded to honor libertarian works of fiction [4]. The reason why Cryptonomicon earned such praise is due to its content. It uses both past and present to understand cryptography and the early days of information technology. This novel explains a variety of concepts that ranges from cryptography to data storage security [10], but the most interesting concept discussed is the Solitaire Cipher. The reason why it s an interesting cipher is that playing cards are used to help create the cipher text. Throughout this paper, I will discuss the Solitaire Cipher that was used in Cryptonomicon. This will include a step by step instructions of how to create a cipher text using normal playing cards, mathematical proofs of the cipher, and some drawbacks by using the Solitaire Cipher; by discussing these ideas about the cipher we will see that it can be a useful way to encrypt messages into cipher text. Because of the in depth explanation of the cipher, we will also see why the Solitaire Cipher is interesting and the cipher I chose from Cryptonomicon. Figure 1: A simple deck of playing cards are used for this cipher method [9]. Solitaire Cipher History: The Solitaire Cipher is a cipher that was created by Bruce Schneier solely for Stephenson s fictional novel Cryptonomicon. Bruce Schneier has a strong background in understanding and creating codes and ciphers, since his profession is a security consultant. He created the cipher just for the novel, and it was not used for real word applications. The Cipher uses 52 playing cards and 2 jokers; it also has no relation to the card game Solitaire. Schneier uses the cards and a sequence of rearrangement as a way to create the key stream in order to encrypt a message. The greater the length of the key makes it difficult to break this cipher. Because of this, experts have said that it is difficult for an attacker to decrypt [2]. How Solitaire Cipher Works The Solitaire Cipher works analogously to a shift cipher when encrypting the plain text to cipher text. The shift cipher encrypts by shifting the original message left or right to another corresponding letter of the alphabet [1]. Below is how a normal shift cipher works and an example of its usage. 1
2 1. Convert each letter in your original message into numbers. The numbers should be as followed: A = 0, B = 1,...,Z = Set Key K to a random constant number. 3. Take numbers from the original message and add K. 4. If any number summed over 25 then take modulo Convert new numbers to letters. This becomes your cipher text. Basic Modular Arithmetic Example: You have the number 28. To get the modulo number subtract 26 from 28 to get the value 2. This value is expressed as 28 2(mod26). Consider the following shift cipher example: Let K = 3 and original message be: Encrypt This K = Cipher text is HQFUBSWWKLV Figure 2: An image of the Shift Cipher [3]. The problem with a shift cipher is that K can be easily found, thus the cipher text can be decrypted and the wrong person can see the original message. The Solitaire Cipher uses an algorithm to fix this problem. It uses a key stream, a set of different keys. Each key stream has a different length with different numbers that are randomized. The random numbers act as a key, which is similar to the shift cipher, except there are more of them. The greater the length of your key stream, the harder it is for your original message to be read by the wrong person. The following explanation is taken from [11]. The Solitaire Cipher generates each key by an algorithm; this process is known as keying the deck. As stated earlier, keying the deck requires 52 cards and 2 jokers. Each card receives a numerical value by using a bridge order on each suit,which means the suits have an order. From lowest to highest, the order of the suits are clubs, diamonds, hearts and spades. Every card s value is also determined by lowest to highest order, with the Ace being the lowest and King being the highest card. Every card, with the exception of the jokers, are numbered 1 to 52. For example, if you have a 5 of diamonds then its numerical value is 18. Aside from the 2
3 playing cards, both the jokers have a numerical value of 53. The jokers have another property, one is greater than the other. One joker is labeled A and the other B. For this explanation let the black joker be A and the red joker be B. Keying the deck can be used with all 4 suits or just one suit. But realize for an unbreakable encryption, it is recommended to use the whole deck. The algorithm uses six steps to key the deck. To explain how the algorithm works one suits will be used, which are the clubs and two jokers. 1. First start off with by shuffling the cards with the two jokers. In order to explain the cards, they will be in their numerical values and the jokers will be labeled A and B. With the deck facing you: B 8 5 A Move A one card down. Note: if A is toward the end of the deck then cycle it back to the front B A Move B two cards down. Note: if B is toward the end of the deck then cycle it back to the front B 2 A Swap the cards in front of the first joker with the cards behind the second joker. This step is known as the triple cut, since the deck is cut into three parts B 2 A Observe the bottom card, then count down from the top card to the value of the bottom card. Cut after the card you counted to and place them on the bottom, leaving the bottom card observed on the bottom. This cut is known as the perform cut. 9 B 2 A Observe the top card, then count down from the top card (including the card) down to the value of the top card. This process is called the output card. The output card determines what the letter of the key. Also the deck does not change. The deck ends up as 9 B 2 A , with the output card being 8. To find the rest of the output cards repeat steps 2 through 6 until the desired key length is satisfied. After all individual keys are found, the final step would be to add the numerical value with the original messages numerical value. The sum of the numbers are in modulo 26 because the numbers require to be converted to letters. This example uses one suit instead of four. The algorithm does not change when all four suites are involved. It is best to use all four suites and have your key length be as long as possible in order to maximize security. Using all four suites maximizes security because it prevents repeats in the key stream. Repeats in the key stream would lead to a constant K, which would make this cipher have similar issues like the normal shift cipher. The Solitaire cipher is a symmetrical cipher meaning the decryption process is the reverse order of the encryption process. The person decrypting the message has to follow the exact same steps the sender did when they created the key. The decryption process begins by subtracting the numbers from the encrypted text by the key. The result will be the original message, make sure that modulo 26 is used. The last step is to convert the numbers solved into letters. Before decryption can be performed it is imperative that the original deck is used by the person decrypting the text; both the sender and the receiver of the message should start off with the same identical deck. The reason why 3
4 both decks need to be identical is because you cannot reverse the order of the algorithm, only the order of the encryption process [8]. Math behind Solitaire Cipher: This section will present a couple of proofs such as: the average number of steps it takes to produce the Solitaire algorithm and the proof that Solitaire Cipher is symmetric. Figure 3: An image of the final step of Solitaire algorithm [5]. Counting the STEPS (One Suit): First we will count the steps of the previous example. Note: will use the number of the steps as references. Step 1 will not count as part of the algorithm because this should already be done before commencing the Solitaire algorithm. Step 2 has one move. Will always have one move since the property of the Joker declares for this step to move this card one space backward. Step 3 has two moves. Will always have two moves since the property of the Joker declares for this step to move this card two spaces backwards. Step 4 has an average of two moves. Will use this number because it is very unlikely that one move or zero moves can occur. While plausible, the percentage of these moves occurring is low. Two moves is the appropriate number because this will be the likely moves made from this step. Step 5 has an average of 9 moves. Since the suite is using 13 playing cards and two Jokers, whose value indicates 14, take the sum and divide it by the total of playing cards used. It should look like appears twice because there are two Jokers whose value equal 14, they affect the perform cut process. The total is 119. Then take 119 and divide it by 15, the result is Because this is not a number of realistic number of moves, round up. This way of counting averages makes allows each card to have an equal opportunity of being the card to use for the perform cut, which means the likely hood of any card appearing is equally plausible. The last step of this method is to moves all the cards you counted from to the back of the deck, so take the rounded 8 moves and add one move, which results this step having an average of 9 moves. Step 6 has an average of 8 moves. This average follows the same logic as Step 5. Unlike Step 5, there is no need to add one step because there is no extra movement once the counting card is found. Finding the counting card is the purpose of Step 6. When you add all the moves together, the result is 22 moves. This means for the previous example to find one letter in the key stream it takes an average of 22 moves. 4
5 Counting the STEPS (All Suits): By using the same logic from Counting the STEPS (One Suit) the following lemma exists. Lemma 1 (The Average Steps Uisng 4 Suits). It takes an average of 62 moves to encrypt one word by using the Solitaire algorithm using all four suits. Proof: To prove Lemma 1, follow Step 1 through Step 4 from Counting the STEPS (One Suit). These steps are the same because they are fixed and the number of the cards used do not affect the moves performed. Note do no simply multiply 22(the number of moves for one suit) by four to get the average number of moves using all four suits. As shown below, calculating the moves from Step 5 and Step 6 differ using four suits than with one suit. Step 5 has an average of 29 moves. Since all four suits are use, then there exist a total of 52 cards used plus the 2 Jokers. The same logic for finding the average is the same as finding the average for one suit. Find the sum of all 54 cards appears twice since there are two Jokers whose value equal 53. The total should be Then take 1484 and divide it by 54, the result should be Round up since.48 of a move is not practical, which makes the average 28 moves. Add one to count for the final step of the method, which places the cards counted toward the back of the deck, which makes an average of 29 moves. Step 6 follows the same logic as Step 5 except there is no need to add the extra move. This step has average of 28 moves. When you add all the moves together, the result is 62 moves. This means that it takes an average of 62 moves to find one letter in the key stream using all four suits. Proof that Solitaire Cipher is Reversible: Lemma 2 (Cipher is Reversible). The Solitaire Cipher is a symmetrical cipher; its plain text can be found by reversing the process of decryption and vice versa. Proof: This proof is dependent on the key, which mean it will require two things: 1. If key word, K has the same length as the plain text. 2. If key word, K does not have the same length as the plain text. For both PART 1 and PART 2: Let A be an arbitrary plain text with finite length N. Let key stream K be ab arbitrary with keys whose length is the same as A. Define the encrypted text as B = A + K. PART 1: A + K = B A + K - K = B - K; The minus K shows the method for decrypting the cipher text. A = B - K; This is the definition for the decrypted text. Start with the decryted text. B - K = A 5
6 B - K + K = A + K; The addition of K shows the method for encrypting the plain text. B = A + K; We have arrived back to the definition for the encrypted text. As shown the cipher text and plain text are dependent on K. Therefore, when K s length is the same as A s, the steps are reversible. PART 2: Let A 1, A 2,..., A N A. A 1, A 2,..., A N are split into equal blocks that equal the length of K. By using A+K= B define new method of encryption as: (A 1 + K) + (A 2 + K) (A N + K) = B 1 + B B N, where the length of A N the length of K. A problem may occur with (A N + K) = B N if length of K > length of A N. To fix the problem, we will pad A N such that A N = a N + C, where a N is the remaining plain text letters and C is a random constant letter that allows for the length of A N to equal the length of K. With new adjustment the new method for encryption is: (A 1 + K) + (A 2 + K) ((a N + C) + K) = B 1 + B B N. B N does not need to be adjusted since its length is dependent on K when encrypted. Since the steps in PART 2 are consistent with PART 1, and the formula for encryption follows A + K = B, then PART 2 is also reversible. Therefore regardless of the plain text s length, the Solitaire Cipher is reversible. PART 2 Example: To demonstrate PART 2 of the proof, the following example is taken from [8]. Let the encrypted message be U D V M W Q I K Z M. Then convert this message into numbers Let the key be , which was found by the Solitaire algorithm. Subtract the message from the key, The result or original message is using modulo 26 when necessary. By converting the number into letters, the original message reads: D O N O T G O X X X. From the given example, we see that C is X, since the plain text was less than K. Problems with the Cipher: One problem with the cipher lies in its ease of use. As shown in the proof for counting the steps if all four suits are used, it takes an average of 62 moves to find one letter of the key. If the key length is five it will take an average of 310 moves. Doing this by hand consumes a lot of time. 6
7 Another problem is the cipher can only work if both the sender and receiver have identical decks. The cipher text can be decrypted by an attacker and its message made known to said attacker if they know the solitaire algorithm and the original deck order. If both are known by an attacker then the plain text can be easily found [11]; this means the plain text can be found by an unauthorized user. This will cause a problem because the plain text will be found and its secrets made known. But this issue will not cause a huge problem as long as the original deck order is kept a secret and hidden in a secure place. The major issue with the cipher is its algorithm. Paul Crowley did such a study that found the cipher has repetitions, using all four suits. He is a professional cryptographer with eleven years of experience in creating software for real-world applications. Some of his has college education are in physics, math and computer science [6]. He created a program in Matlab that mimics the Solitaire algorithm. He found that the keys the cipher generates are repetitive. The output of each step of the algorithm is a number from 0 to 25. One would expect successive outputs to be the same around one time in 26 to represent equal probability, but his experiments show that the output rate is closer to one in Paul Crowley believes the reason for this bias is when the value of the top card is the same in two successive rounds. This probability of having the top card being the same is around two percent; when this occurs there is a thirty four percent probability the output card will be the same [7]. Since it was proven that the Solitaire Cipher is reversible, if repeats exist then it would be easy for the attacker to decrypt the cipher text. While the percentage is low for keys to be repetitive, this problem is something to keep in mind when using the Solitaire algorithm. Conclusion: Overall the Solitaire Cipher is an effective way to encrypt a message. It does not require any computers or complex math. The complexity is in its algorithm. As explained previously, Bruce Schneier created this cipher for Cryptonomicon. It is still considered a new cipher, but as explained earlier its method is similar to a shift cipher. It is the algorithm that allows the Solitaire Cipher to be unique. The algorithm was proven to take several steps depending on the number of suits used. But as long as the attacker does not know the original order of the cards, then the cipher is close to being unbreakable. There is a chance the algorithm may repeat numbers since there is some bias, but the probability it will have several numbers repeat consistently is low. What was covered was how to create a cipher text using normal playing cards, mathematical proofs of the cipher, and drawbacks of using the Solitaire Cipher. Even though the Cipher had no real world applications, the simplicity of its algorithm questions why it has not been used. 7
8 References [1]. Lecture 1: Shift ciphers [2]. The solitaire cipher [3]. Caesar cipher [4]. Prometheus awards [5] Bradford Barr. Crypto unplugged: Solitaire [6] Paul Crowley. Paul crowley: Curriculum vitae [7] Paul Crowley. Problems with bruce schneier s solitaire [8] Deslivres. The solitaire cipher - superstruct instructables series. The-Solitaire-cipher-Superstruct-Instructables-s/step7/ Deciphering-ciphertext/,. [9] Deslivres. The solitaire cipher - superstruct instructables series. The-Solitaire-cipher-Superstruct-Instructables-s/, [10] Mark Flanagan. Neal stephenson [11] Bruce Schneier. The solitaire encryption algorithm
Fundamentals of Probability
Fundamentals of Probability Introduction Probability is the likelihood that an event will occur under a set of given conditions. The probability of an event occurring has a value between 0 and 1. An impossible
More informationReady, Set, Go! Math Games for Serious Minds
Math Games with Cards and Dice presented at NAGC November, 2013 Ready, Set, Go! Math Games for Serious Minds Rande McCreight Lincoln Public Schools Lincoln, Nebraska Math Games with Cards Close to 20 -
More informationClock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter 4 described a mathematical system
CHAPTER Number Theory FIGURE FIGURE FIGURE Plus hours Plus hours Plus hours + = + = + = FIGURE. Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter described a mathematical
More informationNumber Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may
Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition
More informationCryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
More information3 Some Integer Functions
3 Some Integer Functions A Pair of Fundamental Integer Functions The integer function that is the heart of this section is the modulo function. However, before getting to it, let us look at some very simple
More informationNetwork Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
More informationEffective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India sd_patil057@rediffmail.com Modern College of Engineering,
More information1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.
MATH 13150: Freshman Seminar Unit 18 1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. 1.1. Bob and Alice. Suppose that Alice wants to send a message to Bob over the internet
More informationHill s Cipher: Linear Algebra in Cryptography
Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a
More informationALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite
ALGEBRA Pupils should be taught to: Generate and describe sequences As outcomes, Year 7 pupils should, for example: Use, read and write, spelling correctly: sequence, term, nth term, consecutive, rule,
More informationCurrent California Math Standards Balanced Equations
Balanced Equations Current California Math Standards Balanced Equations Grade Three Number Sense 1.0 Students understand the place value of whole numbers: 1.1 Count, read, and write whole numbers to 10,000.
More informationHow To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
More informationK80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013
Hill Cipher Project K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013 Directions: Answer all numbered questions completely. Show non-trivial work in the space provided. Non-computational
More informationPrimes in Sequences. Lee 1. By: Jae Young Lee. Project for MA 341 (Number Theory) Boston University Summer Term I 2009 Instructor: Kalin Kostadinov
Lee 1 Primes in Sequences By: Jae Young Lee Project for MA 341 (Number Theory) Boston University Summer Term I 2009 Instructor: Kalin Kostadinov Lee 2 Jae Young Lee MA341 Number Theory PRIMES IN SEQUENCES
More informationDiscrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10
CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10 Introduction to Discrete Probability Probability theory has its origins in gambling analyzing card games, dice,
More informationGrade 6 Math Circles. Binary and Beyond
Faculty of Mathematics Waterloo, Ontario N2L 3G1 The Decimal System Grade 6 Math Circles October 15/16, 2013 Binary and Beyond The cool reality is that we learn to count in only one of many possible number
More informationWRITING PROOFS. Christopher Heil Georgia Institute of Technology
WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this
More informationNetwork Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
More informationSquaring, Cubing, and Cube Rooting
Squaring, Cubing, and Cube Rooting Arthur T. Benjamin Harvey Mudd College Claremont, CA 91711 benjamin@math.hmc.edu I still recall my thrill and disappointment when I read Mathematical Carnival [4], by
More informationLecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
More informationCore Maths C1. Revision Notes
Core Maths C Revision Notes November 0 Core Maths C Algebra... Indices... Rules of indices... Surds... 4 Simplifying surds... 4 Rationalising the denominator... 4 Quadratic functions... 4 Completing the
More informationAcing Math (One Deck At A Time!): A Collection of Math Games. Table of Contents
Table of Contents Introduction to Acing Math page 5 Card Sort (Grades K - 3) page 8 Greater or Less Than (Grades K - 3) page 9 Number Battle (Grades K - 3) page 10 Place Value Number Battle (Grades 1-6)
More informationSECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationPlaying with Numbers
PLAYING WITH NUMBERS 249 Playing with Numbers CHAPTER 16 16.1 Introduction You have studied various types of numbers such as natural numbers, whole numbers, integers and rational numbers. You have also
More informationThe application of prime numbers to RSA encryption
The application of prime numbers to RSA encryption Prime number definition: Let us begin with the definition of a prime number p The number p, which is a member of the set of natural numbers N, is considered
More informationRSA Encryption. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003
RSA Encryption Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003 1 Public Key Cryptography One of the biggest problems in cryptography is the distribution of keys.
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
More informationMultiplicative Ciphers. Cryptography of Multiplicative Ciphers
Fall 2006 Chris Christensen MAT/CSC 483 Multiplicative Ciphers It is evident from the relative ease with which the Caesar Cipher or its generalization to an arbitrary number of positions of shift has been
More informationOne Time Pad Encryption The unbreakable encryption method
One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been
More informationBEGINNER S BRIDGE NOTES. Leigh Harding
BEGINNER S BRIDGE NOTES Leigh Harding PLAYING THE CARDS IN TRUMP CONTRACTS Don t play a single card until you have planned how you will make your contract! The plan will influence decisions you will have
More informationTHE premier card entertainer of
Si Stebbins THE premier card entertainer of America since 1884, is the original Barnum and Bailey rube, and he has also for some years been with the Keith circuit, telling vast audiences how to do card
More informationPublic Key Cryptography: RSA and Lots of Number Theory
Public Key Cryptography: RSA and Lots of Number Theory Public vs. Private-Key Cryptography We have just discussed traditional symmetric cryptography: Uses a single key shared between sender and receiver
More informationIV. ALGEBRAIC CONCEPTS
IV. ALGEBRAIC CONCEPTS Algebra is the language of mathematics. Much of the observable world can be characterized as having patterned regularity where a change in one quantity results in changes in other
More informationTom wants to find two real numbers, a and b, that have a sum of 10 and have a product of 10. He makes this table.
Sum and Product This problem gives you the chance to: use arithmetic and algebra to represent and analyze a mathematical situation solve a quadratic equation by trial and improvement Tom wants to find
More informationColored Hats and Logic Puzzles
Colored Hats and Logic Puzzles Alex Zorn January 21, 2013 1 Introduction In this talk we ll discuss a collection of logic puzzles/games in which a number of people are given colored hats, and they try
More informationPoker. 10,Jack,Queen,King,Ace. 10, Jack, Queen, King, Ace of the same suit Five consecutive ranks of the same suit that is not a 5,6,7,8,9
Poker Poker is an ideal setting to study probabilities. Computing the probabilities of different will require a variety of approaches. We will not concern ourselves with betting strategies, however. Our
More informationCyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
More informationThe Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler Rebecca.cutler@tufts.edu Mentor: Professor Chris Gregg Abstract Modern day authentication systems
More informationNetwork Security: Cryptography CS/SS G513 S.K. Sahay
Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information
More informationIntroduction to Hill cipher
Introduction to Hill cipher We have explored three simple substitution ciphers that generated ciphertext C from plaintext p by means of an arithmetic operation modulo 26. Caesar cipher: The Caesar cipher
More informationUnit 1 Number Sense. In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions.
Unit 1 Number Sense In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions. BLM Three Types of Percent Problems (p L-34) is a summary BLM for the material
More informationMEP Y9 Practice Book A
1 Base Arithmetic 1.1 Binary Numbers We normally work with numbers in base 10. In this section we consider numbers in base 2, often called binary numbers. In base 10 we use the digits 0, 1, 2, 3, 4, 5,
More information1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier.
Study Group 1 Variables and Types 1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier. 2. What does the byte 00100110 represent? 3. What is the purpose of the declarations
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
More informationMath Workshop October 2010 Fractions and Repeating Decimals
Math Workshop October 2010 Fractions and Repeating Decimals This evening we will investigate the patterns that arise when converting fractions to decimals. As an example of what we will be looking at,
More informationIntroduction To Security and Privacy Einführung in die IT-Sicherheit I
Introduction To Security and Privacy Einführung in die IT-Sicherheit I Prof. Dr. rer. nat. Doğan Kesdoğan Institut für Wirtschaftsinformatik kesdogan@fb5.uni-siegen.de http://www.uni-siegen.de/fb5/itsec/
More informationAccentuate the Negative: Homework Examples from ACE
Accentuate the Negative: Homework Examples from ACE Investigation 1: Extending the Number System, ACE #6, 7, 12-15, 47, 49-52 Investigation 2: Adding and Subtracting Rational Numbers, ACE 18-22, 38(a),
More informationThe science of encryption: prime numbers and mod n arithmetic
The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process
More informationTopology-based network security
Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the
More informationLecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
More informationMultiplying and Dividing Signed Numbers. Finding the Product of Two Signed Numbers. (a) (3)( 4) ( 4) ( 4) ( 4) 12 (b) (4)( 5) ( 5) ( 5) ( 5) ( 5) 20
SECTION.4 Multiplying and Dividing Signed Numbers.4 OBJECTIVES 1. Multiply signed numbers 2. Use the commutative property of multiplication 3. Use the associative property of multiplication 4. Divide signed
More informationSection 6.2 Definition of Probability
Section 6.2 Definition of Probability Probability is a measure of the likelihood that an event occurs. For example, if there is a 20% chance of rain tomorrow, that means that the probability that it will
More informationFACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY
FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY LINDSEY R. BOSKO I would like to acknowledge the assistance of Dr. Michael Singer. His guidance and feedback were instrumental in completing this
More informationRandom Fibonacci-type Sequences in Online Gambling
Random Fibonacci-type Sequences in Online Gambling Adam Biello, CJ Cacciatore, Logan Thomas Department of Mathematics CSUMS Advisor: Alfa Heryudono Department of Mathematics University of Massachusetts
More information26 Integers: Multiplication, Division, and Order
26 Integers: Multiplication, Division, and Order Integer multiplication and division are extensions of whole number multiplication and division. In multiplying and dividing integers, the one new issue
More information1 Construction of CCA-secure encryption
CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.
More informationCryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
More informationModeling and verification of security protocols
Modeling and verification of security protocols Part I: Basics of cryptography and introduction to security protocols Dresden University of Technology Martin Pitt martin@piware.de Paper and slides available
More informationCOMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012
Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about
More informationAnswer: (a) Since we cannot repeat men on the committee, and the order we select them in does not matter, ( )
1. (Chapter 1 supplementary, problem 7): There are 12 men at a dance. (a) In how many ways can eight of them be selected to form a cleanup crew? (b) How many ways are there to pair off eight women at the
More informationAn Introduction to Hill Ciphers Using Linear Algebra
An Introduction to Hill Ciphers Using inear Algebra Brian Worthington October 26, 2010 University of North Texas MATH 2700.002 1 Contents 1 Introduction 3 1.1 Substitution Ciphers.........................
More informationUsing games to support. Win-Win Math Games. by Marilyn Burns
4 Win-Win Math Games by Marilyn Burns photos: bob adler Games can motivate students, capture their interest, and are a great way to get in that paperand-pencil practice. Using games to support students
More informationDigital System Design Prof. D Roychoudhry Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Digital System Design Prof. D Roychoudhry Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 04 Digital Logic II May, I before starting the today s lecture
More informationDirect Translation is the process of translating English words and phrases into numbers, mathematical symbols, expressions, and equations.
Section 1 Mathematics has a language all its own. In order to be able to solve many types of word problems, we need to be able to translate the English Language into Math Language. is the process of translating
More informationCAHSEE on Target UC Davis, School and University Partnerships
UC Davis, School and University Partnerships CAHSEE on Target Mathematics Curriculum Published by The University of California, Davis, School/University Partnerships Program 006 Director Sarah R. Martinez,
More informationNetwork Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
More informationHow encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
More informationBlock encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015
CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret
More informationThe Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
More informationMath 202-0 Quizzes Winter 2009
Quiz : Basic Probability Ten Scrabble tiles are placed in a bag Four of the tiles have the letter printed on them, and there are two tiles each with the letters B, C and D on them (a) Suppose one tile
More informationCaesar Ciphers: An Introduction to Cryptography
Purdue GK-12 Lesson Plan 2006-07 Caesar Ciphers: An Introduction to Cryptography Purdue University GK-12 2006-07 Lead developer and contact: Lance Bryant Purdue GK-12 Fellow LBRYANT@MATH.PURDUE.EDU Co-author
More informationPAYCHEX, INC. BASIC BUSINESS MATH TRAINING MODULE
PAYCHEX, INC. BASIC BUSINESS MATH TRAINING MODULE 1 Property of Paychex, Inc. Basic Business Math Table of Contents Overview...3 Objectives...3 Calculator...4 Basic Calculations...6 Order of Operation...9
More informationLesson 1. Basics of Probability. Principles of Mathematics 12: Explained! www.math12.com 314
Lesson 1 Basics of Probability www.math12.com 314 Sample Spaces: Probability Lesson 1 Part I: Basic Elements of Probability Consider the following situation: A six sided die is rolled The sample space
More informationProbabilistic Strategies: Solutions
Probability Victor Xu Probabilistic Strategies: Solutions Western PA ARML Practice April 3, 2016 1 Problems 1. You roll two 6-sided dice. What s the probability of rolling at least one 6? There is a 1
More informationDiscrete Mathematics, Chapter 4: Number Theory and Cryptography
Discrete Mathematics, Chapter 4: Number Theory and Cryptography Richard Mayr University of Edinburgh, UK Richard Mayr (University of Edinburgh, UK) Discrete Mathematics. Chapter 4 1 / 35 Outline 1 Divisibility
More informationThe Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer
More informationInteger Operations. Overview. Grade 7 Mathematics, Quarter 1, Unit 1.1. Number of Instructional Days: 15 (1 day = 45 minutes) Essential Questions
Grade 7 Mathematics, Quarter 1, Unit 1.1 Integer Operations Overview Number of Instructional Days: 15 (1 day = 45 minutes) Content to Be Learned Describe situations in which opposites combine to make zero.
More informationPseudo code Tutorial and Exercises Teacher s Version
Pseudo code Tutorial and Exercises Teacher s Version Pseudo-code is an informal way to express the design of a computer program or an algorithm in 1.45. The aim is to get the idea quickly and also easy
More informationIntroduction to Encryption
Computers and Society Introduction to Encryption Chris Brooks Department of Computer Science University of San Francisco Department of Computer Science University of San Francisco p.1/35 3-0: Terminology
More informationComputer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
More informationCryptography and Network Security Block Cipher
Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit
More informationYear 2 Summer Term Oral and Mental Starter Activity Bank
Year 2 Summer Term Oral and Mental Starter Activity Bank Objectives for term Recall x2 table facts and derive division facts. Recognise multiples of 5. Recall facts in x5 table. Recall x10 table and derive
More informationSYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1
SYMMETRIC ENCRYPTION Mihir Bellare UCSD 1 Syntax A symmetric encryption scheme SE = (K,E,D) consists of three algorithms: K and E may be randomized, but D must be deterministic. Mihir Bellare UCSD 2 Correct
More informationTEACHER S GUIDE TO RUSH HOUR
Using Puzzles to Teach Problem Solving TEACHER S GUIDE TO RUSH HOUR Includes Rush Hour 2, 3, 4, Rush Hour Jr., Railroad Rush Hour and Safari Rush Hour BENEFITS Rush Hour is a sliding piece puzzle that
More informationComputing exponents modulo a number: Repeated squaring
Computing exponents modulo a number: Repeated squaring How do you compute (1415) 13 mod 2537 = 2182 using just a calculator? Or how do you check that 2 340 mod 341 = 1? You can do this using the method
More informationProperties of Real Numbers
16 Chapter P Prerequisites P.2 Properties of Real Numbers What you should learn: Identify and use the basic properties of real numbers Develop and use additional properties of real numbers Why you should
More informationMATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
More information7 Gaussian Elimination and LU Factorization
7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method
More informationMaths Workshop for Parents 2. Fractions and Algebra
Maths Workshop for Parents 2 Fractions and Algebra What is a fraction? A fraction is a part of a whole. There are two numbers to every fraction: 2 7 Numerator Denominator 2 7 This is a proper (or common)
More information159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
More informationThe Peruvian coin flip Cryptographic protocols
Activity 17 The Peruvian coin flip Cryptographic protocols Age group Older elementary and up. Abilities assumed Requires counting, and recognition of odd and even numbers. Some understanding of the concepts
More informationMinnesota Academic Standards
A Correlation of to the Minnesota Academic Standards Grades K-6 G/M-204 Introduction This document demonstrates the high degree of success students will achieve when using Scott Foresman Addison Wesley
More informationRSA and Primality Testing
and Primality Testing Joan Boyar, IMADA, University of Southern Denmark Studieretningsprojekter 2010 1 / 81 Correctness of cryptography cryptography Introduction to number theory Correctness of with 2
More informationMultiplication Rules! Tips to help your child learn their times tables
Multiplication Rules! Tips to help your child learn their times tables 1. Have fun! We want relaxed kids and plenty of giggles. 2. Go slowly and relax. 3. Do the preliminary review, all the preliminary
More informationPOLYNOMIAL FUNCTIONS
POLYNOMIAL FUNCTIONS Polynomial Division.. 314 The Rational Zero Test.....317 Descarte s Rule of Signs... 319 The Remainder Theorem.....31 Finding all Zeros of a Polynomial Function.......33 Writing a
More informationStupid Divisibility Tricks
Stupid Divisibility Tricks 101 Ways to Stupefy Your Friends Appeared in Math Horizons November, 2006 Marc Renault Shippensburg University Mathematics Department 1871 Old Main Road Shippensburg, PA 17013
More information