Math in the Solitaire Cipher By: Jeffrey Baez

Size: px
Start display at page:

Download "Math in the Solitaire Cipher By: Jeffrey Baez"

Transcription

1 Math in the Solitaire Cipher By: Jeffrey Baez Introduction: Neal Stephenson has written several novels in the cyberpunk genre, subspecialty of science fiction dealing with issues from cybernetics and informational technology. Some of his famous works include Snow Crash and The Diamond Age, which were successful in their own right and helped give him credibility as a writer[10]. Along with other awards, his novel Cryptonomicon earned the award winning Prometheus Award in 2013; this is awarded to honor libertarian works of fiction [4]. The reason why Cryptonomicon earned such praise is due to its content. It uses both past and present to understand cryptography and the early days of information technology. This novel explains a variety of concepts that ranges from cryptography to data storage security [10], but the most interesting concept discussed is the Solitaire Cipher. The reason why it s an interesting cipher is that playing cards are used to help create the cipher text. Throughout this paper, I will discuss the Solitaire Cipher that was used in Cryptonomicon. This will include a step by step instructions of how to create a cipher text using normal playing cards, mathematical proofs of the cipher, and some drawbacks by using the Solitaire Cipher; by discussing these ideas about the cipher we will see that it can be a useful way to encrypt messages into cipher text. Because of the in depth explanation of the cipher, we will also see why the Solitaire Cipher is interesting and the cipher I chose from Cryptonomicon. Figure 1: A simple deck of playing cards are used for this cipher method [9]. Solitaire Cipher History: The Solitaire Cipher is a cipher that was created by Bruce Schneier solely for Stephenson s fictional novel Cryptonomicon. Bruce Schneier has a strong background in understanding and creating codes and ciphers, since his profession is a security consultant. He created the cipher just for the novel, and it was not used for real word applications. The Cipher uses 52 playing cards and 2 jokers; it also has no relation to the card game Solitaire. Schneier uses the cards and a sequence of rearrangement as a way to create the key stream in order to encrypt a message. The greater the length of the key makes it difficult to break this cipher. Because of this, experts have said that it is difficult for an attacker to decrypt [2]. How Solitaire Cipher Works The Solitaire Cipher works analogously to a shift cipher when encrypting the plain text to cipher text. The shift cipher encrypts by shifting the original message left or right to another corresponding letter of the alphabet [1]. Below is how a normal shift cipher works and an example of its usage. 1

2 1. Convert each letter in your original message into numbers. The numbers should be as followed: A = 0, B = 1,...,Z = Set Key K to a random constant number. 3. Take numbers from the original message and add K. 4. If any number summed over 25 then take modulo Convert new numbers to letters. This becomes your cipher text. Basic Modular Arithmetic Example: You have the number 28. To get the modulo number subtract 26 from 28 to get the value 2. This value is expressed as 28 2(mod26). Consider the following shift cipher example: Let K = 3 and original message be: Encrypt This K = Cipher text is HQFUBSWWKLV Figure 2: An image of the Shift Cipher [3]. The problem with a shift cipher is that K can be easily found, thus the cipher text can be decrypted and the wrong person can see the original message. The Solitaire Cipher uses an algorithm to fix this problem. It uses a key stream, a set of different keys. Each key stream has a different length with different numbers that are randomized. The random numbers act as a key, which is similar to the shift cipher, except there are more of them. The greater the length of your key stream, the harder it is for your original message to be read by the wrong person. The following explanation is taken from [11]. The Solitaire Cipher generates each key by an algorithm; this process is known as keying the deck. As stated earlier, keying the deck requires 52 cards and 2 jokers. Each card receives a numerical value by using a bridge order on each suit,which means the suits have an order. From lowest to highest, the order of the suits are clubs, diamonds, hearts and spades. Every card s value is also determined by lowest to highest order, with the Ace being the lowest and King being the highest card. Every card, with the exception of the jokers, are numbered 1 to 52. For example, if you have a 5 of diamonds then its numerical value is 18. Aside from the 2

3 playing cards, both the jokers have a numerical value of 53. The jokers have another property, one is greater than the other. One joker is labeled A and the other B. For this explanation let the black joker be A and the red joker be B. Keying the deck can be used with all 4 suits or just one suit. But realize for an unbreakable encryption, it is recommended to use the whole deck. The algorithm uses six steps to key the deck. To explain how the algorithm works one suits will be used, which are the clubs and two jokers. 1. First start off with by shuffling the cards with the two jokers. In order to explain the cards, they will be in their numerical values and the jokers will be labeled A and B. With the deck facing you: B 8 5 A Move A one card down. Note: if A is toward the end of the deck then cycle it back to the front B A Move B two cards down. Note: if B is toward the end of the deck then cycle it back to the front B 2 A Swap the cards in front of the first joker with the cards behind the second joker. This step is known as the triple cut, since the deck is cut into three parts B 2 A Observe the bottom card, then count down from the top card to the value of the bottom card. Cut after the card you counted to and place them on the bottom, leaving the bottom card observed on the bottom. This cut is known as the perform cut. 9 B 2 A Observe the top card, then count down from the top card (including the card) down to the value of the top card. This process is called the output card. The output card determines what the letter of the key. Also the deck does not change. The deck ends up as 9 B 2 A , with the output card being 8. To find the rest of the output cards repeat steps 2 through 6 until the desired key length is satisfied. After all individual keys are found, the final step would be to add the numerical value with the original messages numerical value. The sum of the numbers are in modulo 26 because the numbers require to be converted to letters. This example uses one suit instead of four. The algorithm does not change when all four suites are involved. It is best to use all four suites and have your key length be as long as possible in order to maximize security. Using all four suites maximizes security because it prevents repeats in the key stream. Repeats in the key stream would lead to a constant K, which would make this cipher have similar issues like the normal shift cipher. The Solitaire cipher is a symmetrical cipher meaning the decryption process is the reverse order of the encryption process. The person decrypting the message has to follow the exact same steps the sender did when they created the key. The decryption process begins by subtracting the numbers from the encrypted text by the key. The result will be the original message, make sure that modulo 26 is used. The last step is to convert the numbers solved into letters. Before decryption can be performed it is imperative that the original deck is used by the person decrypting the text; both the sender and the receiver of the message should start off with the same identical deck. The reason why 3

4 both decks need to be identical is because you cannot reverse the order of the algorithm, only the order of the encryption process [8]. Math behind Solitaire Cipher: This section will present a couple of proofs such as: the average number of steps it takes to produce the Solitaire algorithm and the proof that Solitaire Cipher is symmetric. Figure 3: An image of the final step of Solitaire algorithm [5]. Counting the STEPS (One Suit): First we will count the steps of the previous example. Note: will use the number of the steps as references. Step 1 will not count as part of the algorithm because this should already be done before commencing the Solitaire algorithm. Step 2 has one move. Will always have one move since the property of the Joker declares for this step to move this card one space backward. Step 3 has two moves. Will always have two moves since the property of the Joker declares for this step to move this card two spaces backwards. Step 4 has an average of two moves. Will use this number because it is very unlikely that one move or zero moves can occur. While plausible, the percentage of these moves occurring is low. Two moves is the appropriate number because this will be the likely moves made from this step. Step 5 has an average of 9 moves. Since the suite is using 13 playing cards and two Jokers, whose value indicates 14, take the sum and divide it by the total of playing cards used. It should look like appears twice because there are two Jokers whose value equal 14, they affect the perform cut process. The total is 119. Then take 119 and divide it by 15, the result is Because this is not a number of realistic number of moves, round up. This way of counting averages makes allows each card to have an equal opportunity of being the card to use for the perform cut, which means the likely hood of any card appearing is equally plausible. The last step of this method is to moves all the cards you counted from to the back of the deck, so take the rounded 8 moves and add one move, which results this step having an average of 9 moves. Step 6 has an average of 8 moves. This average follows the same logic as Step 5. Unlike Step 5, there is no need to add one step because there is no extra movement once the counting card is found. Finding the counting card is the purpose of Step 6. When you add all the moves together, the result is 22 moves. This means for the previous example to find one letter in the key stream it takes an average of 22 moves. 4

5 Counting the STEPS (All Suits): By using the same logic from Counting the STEPS (One Suit) the following lemma exists. Lemma 1 (The Average Steps Uisng 4 Suits). It takes an average of 62 moves to encrypt one word by using the Solitaire algorithm using all four suits. Proof: To prove Lemma 1, follow Step 1 through Step 4 from Counting the STEPS (One Suit). These steps are the same because they are fixed and the number of the cards used do not affect the moves performed. Note do no simply multiply 22(the number of moves for one suit) by four to get the average number of moves using all four suits. As shown below, calculating the moves from Step 5 and Step 6 differ using four suits than with one suit. Step 5 has an average of 29 moves. Since all four suits are use, then there exist a total of 52 cards used plus the 2 Jokers. The same logic for finding the average is the same as finding the average for one suit. Find the sum of all 54 cards appears twice since there are two Jokers whose value equal 53. The total should be Then take 1484 and divide it by 54, the result should be Round up since.48 of a move is not practical, which makes the average 28 moves. Add one to count for the final step of the method, which places the cards counted toward the back of the deck, which makes an average of 29 moves. Step 6 follows the same logic as Step 5 except there is no need to add the extra move. This step has average of 28 moves. When you add all the moves together, the result is 62 moves. This means that it takes an average of 62 moves to find one letter in the key stream using all four suits. Proof that Solitaire Cipher is Reversible: Lemma 2 (Cipher is Reversible). The Solitaire Cipher is a symmetrical cipher; its plain text can be found by reversing the process of decryption and vice versa. Proof: This proof is dependent on the key, which mean it will require two things: 1. If key word, K has the same length as the plain text. 2. If key word, K does not have the same length as the plain text. For both PART 1 and PART 2: Let A be an arbitrary plain text with finite length N. Let key stream K be ab arbitrary with keys whose length is the same as A. Define the encrypted text as B = A + K. PART 1: A + K = B A + K - K = B - K; The minus K shows the method for decrypting the cipher text. A = B - K; This is the definition for the decrypted text. Start with the decryted text. B - K = A 5

6 B - K + K = A + K; The addition of K shows the method for encrypting the plain text. B = A + K; We have arrived back to the definition for the encrypted text. As shown the cipher text and plain text are dependent on K. Therefore, when K s length is the same as A s, the steps are reversible. PART 2: Let A 1, A 2,..., A N A. A 1, A 2,..., A N are split into equal blocks that equal the length of K. By using A+K= B define new method of encryption as: (A 1 + K) + (A 2 + K) (A N + K) = B 1 + B B N, where the length of A N the length of K. A problem may occur with (A N + K) = B N if length of K > length of A N. To fix the problem, we will pad A N such that A N = a N + C, where a N is the remaining plain text letters and C is a random constant letter that allows for the length of A N to equal the length of K. With new adjustment the new method for encryption is: (A 1 + K) + (A 2 + K) ((a N + C) + K) = B 1 + B B N. B N does not need to be adjusted since its length is dependent on K when encrypted. Since the steps in PART 2 are consistent with PART 1, and the formula for encryption follows A + K = B, then PART 2 is also reversible. Therefore regardless of the plain text s length, the Solitaire Cipher is reversible. PART 2 Example: To demonstrate PART 2 of the proof, the following example is taken from [8]. Let the encrypted message be U D V M W Q I K Z M. Then convert this message into numbers Let the key be , which was found by the Solitaire algorithm. Subtract the message from the key, The result or original message is using modulo 26 when necessary. By converting the number into letters, the original message reads: D O N O T G O X X X. From the given example, we see that C is X, since the plain text was less than K. Problems with the Cipher: One problem with the cipher lies in its ease of use. As shown in the proof for counting the steps if all four suits are used, it takes an average of 62 moves to find one letter of the key. If the key length is five it will take an average of 310 moves. Doing this by hand consumes a lot of time. 6

7 Another problem is the cipher can only work if both the sender and receiver have identical decks. The cipher text can be decrypted by an attacker and its message made known to said attacker if they know the solitaire algorithm and the original deck order. If both are known by an attacker then the plain text can be easily found [11]; this means the plain text can be found by an unauthorized user. This will cause a problem because the plain text will be found and its secrets made known. But this issue will not cause a huge problem as long as the original deck order is kept a secret and hidden in a secure place. The major issue with the cipher is its algorithm. Paul Crowley did such a study that found the cipher has repetitions, using all four suits. He is a professional cryptographer with eleven years of experience in creating software for real-world applications. Some of his has college education are in physics, math and computer science [6]. He created a program in Matlab that mimics the Solitaire algorithm. He found that the keys the cipher generates are repetitive. The output of each step of the algorithm is a number from 0 to 25. One would expect successive outputs to be the same around one time in 26 to represent equal probability, but his experiments show that the output rate is closer to one in Paul Crowley believes the reason for this bias is when the value of the top card is the same in two successive rounds. This probability of having the top card being the same is around two percent; when this occurs there is a thirty four percent probability the output card will be the same [7]. Since it was proven that the Solitaire Cipher is reversible, if repeats exist then it would be easy for the attacker to decrypt the cipher text. While the percentage is low for keys to be repetitive, this problem is something to keep in mind when using the Solitaire algorithm. Conclusion: Overall the Solitaire Cipher is an effective way to encrypt a message. It does not require any computers or complex math. The complexity is in its algorithm. As explained previously, Bruce Schneier created this cipher for Cryptonomicon. It is still considered a new cipher, but as explained earlier its method is similar to a shift cipher. It is the algorithm that allows the Solitaire Cipher to be unique. The algorithm was proven to take several steps depending on the number of suits used. But as long as the attacker does not know the original order of the cards, then the cipher is close to being unbreakable. There is a chance the algorithm may repeat numbers since there is some bias, but the probability it will have several numbers repeat consistently is low. What was covered was how to create a cipher text using normal playing cards, mathematical proofs of the cipher, and drawbacks of using the Solitaire Cipher. Even though the Cipher had no real world applications, the simplicity of its algorithm questions why it has not been used. 7

8 References [1]. Lecture 1: Shift ciphers [2]. The solitaire cipher [3]. Caesar cipher [4]. Prometheus awards [5] Bradford Barr. Crypto unplugged: Solitaire [6] Paul Crowley. Paul crowley: Curriculum vitae [7] Paul Crowley. Problems with bruce schneier s solitaire [8] Deslivres. The solitaire cipher - superstruct instructables series. The-Solitaire-cipher-Superstruct-Instructables-s/step7/ Deciphering-ciphertext/,. [9] Deslivres. The solitaire cipher - superstruct instructables series. The-Solitaire-cipher-Superstruct-Instructables-s/, [10] Mark Flanagan. Neal stephenson [11] Bruce Schneier. The solitaire encryption algorithm

Fundamentals of Probability

Fundamentals of Probability Fundamentals of Probability Introduction Probability is the likelihood that an event will occur under a set of given conditions. The probability of an event occurring has a value between 0 and 1. An impossible

More information

Ready, Set, Go! Math Games for Serious Minds

Ready, Set, Go! Math Games for Serious Minds Math Games with Cards and Dice presented at NAGC November, 2013 Ready, Set, Go! Math Games for Serious Minds Rande McCreight Lincoln Public Schools Lincoln, Nebraska Math Games with Cards Close to 20 -

More information

Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter 4 described a mathematical system

Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter 4 described a mathematical system CHAPTER Number Theory FIGURE FIGURE FIGURE Plus hours Plus hours Plus hours + = + = + = FIGURE. Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter described a mathematical

More information

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition

More information

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

More information

3 Some Integer Functions

3 Some Integer Functions 3 Some Integer Functions A Pair of Fundamental Integer Functions The integer function that is the heart of this section is the modulo function. However, before getting to it, let us look at some very simple

More information

Network Security. HIT Shimrit Tzur-David

Network Security. HIT Shimrit Tzur-David Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

More information

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India sd_patil057@rediffmail.com Modern College of Engineering,

More information

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. MATH 13150: Freshman Seminar Unit 18 1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. 1.1. Bob and Alice. Suppose that Alice wants to send a message to Bob over the internet

More information

Hill s Cipher: Linear Algebra in Cryptography

Hill s Cipher: Linear Algebra in Cryptography Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a

More information

ALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite

ALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite ALGEBRA Pupils should be taught to: Generate and describe sequences As outcomes, Year 7 pupils should, for example: Use, read and write, spelling correctly: sequence, term, nth term, consecutive, rule,

More information

Current California Math Standards Balanced Equations

Current California Math Standards Balanced Equations Balanced Equations Current California Math Standards Balanced Equations Grade Three Number Sense 1.0 Students understand the place value of whole numbers: 1.1 Count, read, and write whole numbers to 10,000.

More information

How To Encrypt With A 64 Bit Block Cipher

How To Encrypt With A 64 Bit Block Cipher The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric

More information

K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013

K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013 Hill Cipher Project K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013 Directions: Answer all numbered questions completely. Show non-trivial work in the space provided. Non-computational

More information

Primes in Sequences. Lee 1. By: Jae Young Lee. Project for MA 341 (Number Theory) Boston University Summer Term I 2009 Instructor: Kalin Kostadinov

Primes in Sequences. Lee 1. By: Jae Young Lee. Project for MA 341 (Number Theory) Boston University Summer Term I 2009 Instructor: Kalin Kostadinov Lee 1 Primes in Sequences By: Jae Young Lee Project for MA 341 (Number Theory) Boston University Summer Term I 2009 Instructor: Kalin Kostadinov Lee 2 Jae Young Lee MA341 Number Theory PRIMES IN SEQUENCES

More information

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10 CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10 Introduction to Discrete Probability Probability theory has its origins in gambling analyzing card games, dice,

More information

Grade 6 Math Circles. Binary and Beyond

Grade 6 Math Circles. Binary and Beyond Faculty of Mathematics Waterloo, Ontario N2L 3G1 The Decimal System Grade 6 Math Circles October 15/16, 2013 Binary and Beyond The cool reality is that we learn to count in only one of many possible number

More information

WRITING PROOFS. Christopher Heil Georgia Institute of Technology

WRITING PROOFS. Christopher Heil Georgia Institute of Technology WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret

More information

Squaring, Cubing, and Cube Rooting

Squaring, Cubing, and Cube Rooting Squaring, Cubing, and Cube Rooting Arthur T. Benjamin Harvey Mudd College Claremont, CA 91711 benjamin@math.hmc.edu I still recall my thrill and disappointment when I read Mathematical Carnival [4], by

More information

Lecture 9 - Message Authentication Codes

Lecture 9 - Message Authentication Codes Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,

More information

Core Maths C1. Revision Notes

Core Maths C1. Revision Notes Core Maths C Revision Notes November 0 Core Maths C Algebra... Indices... Rules of indices... Surds... 4 Simplifying surds... 4 Rationalising the denominator... 4 Quadratic functions... 4 Completing the

More information

Acing Math (One Deck At A Time!): A Collection of Math Games. Table of Contents

Acing Math (One Deck At A Time!): A Collection of Math Games. Table of Contents Table of Contents Introduction to Acing Math page 5 Card Sort (Grades K - 3) page 8 Greater or Less Than (Grades K - 3) page 9 Number Battle (Grades K - 3) page 10 Place Value Number Battle (Grades 1-6)

More information

SECURITY IN NETWORKS

SECURITY IN NETWORKS SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Playing with Numbers

Playing with Numbers PLAYING WITH NUMBERS 249 Playing with Numbers CHAPTER 16 16.1 Introduction You have studied various types of numbers such as natural numbers, whole numbers, integers and rational numbers. You have also

More information

The application of prime numbers to RSA encryption

The application of prime numbers to RSA encryption The application of prime numbers to RSA encryption Prime number definition: Let us begin with the definition of a prime number p The number p, which is a member of the set of natural numbers N, is considered

More information

RSA Encryption. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003

RSA Encryption. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003 RSA Encryption Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003 1 Public Key Cryptography One of the biggest problems in cryptography is the distribution of keys.

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

More information

Multiplicative Ciphers. Cryptography of Multiplicative Ciphers

Multiplicative Ciphers. Cryptography of Multiplicative Ciphers Fall 2006 Chris Christensen MAT/CSC 483 Multiplicative Ciphers It is evident from the relative ease with which the Caesar Cipher or its generalization to an arbitrary number of positions of shift has been

More information

One Time Pad Encryption The unbreakable encryption method

One Time Pad Encryption The unbreakable encryption method One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been

More information

BEGINNER S BRIDGE NOTES. Leigh Harding

BEGINNER S BRIDGE NOTES. Leigh Harding BEGINNER S BRIDGE NOTES Leigh Harding PLAYING THE CARDS IN TRUMP CONTRACTS Don t play a single card until you have planned how you will make your contract! The plan will influence decisions you will have

More information

THE premier card entertainer of

THE premier card entertainer of Si Stebbins THE premier card entertainer of America since 1884, is the original Barnum and Bailey rube, and he has also for some years been with the Keith circuit, telling vast audiences how to do card

More information

Public Key Cryptography: RSA and Lots of Number Theory

Public Key Cryptography: RSA and Lots of Number Theory Public Key Cryptography: RSA and Lots of Number Theory Public vs. Private-Key Cryptography We have just discussed traditional symmetric cryptography: Uses a single key shared between sender and receiver

More information

IV. ALGEBRAIC CONCEPTS

IV. ALGEBRAIC CONCEPTS IV. ALGEBRAIC CONCEPTS Algebra is the language of mathematics. Much of the observable world can be characterized as having patterned regularity where a change in one quantity results in changes in other

More information

Tom wants to find two real numbers, a and b, that have a sum of 10 and have a product of 10. He makes this table.

Tom wants to find two real numbers, a and b, that have a sum of 10 and have a product of 10. He makes this table. Sum and Product This problem gives you the chance to: use arithmetic and algebra to represent and analyze a mathematical situation solve a quadratic equation by trial and improvement Tom wants to find

More information

Colored Hats and Logic Puzzles

Colored Hats and Logic Puzzles Colored Hats and Logic Puzzles Alex Zorn January 21, 2013 1 Introduction In this talk we ll discuss a collection of logic puzzles/games in which a number of people are given colored hats, and they try

More information

Poker. 10,Jack,Queen,King,Ace. 10, Jack, Queen, King, Ace of the same suit Five consecutive ranks of the same suit that is not a 5,6,7,8,9

Poker. 10,Jack,Queen,King,Ace. 10, Jack, Queen, King, Ace of the same suit Five consecutive ranks of the same suit that is not a 5,6,7,8,9 Poker Poker is an ideal setting to study probabilities. Computing the probabilities of different will require a variety of approaches. We will not concern ourselves with betting strategies, however. Our

More information

Cyber Security Workshop Encryption Reference Manual

Cyber Security Workshop Encryption Reference Manual Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics

More information

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler Rebecca.cutler@tufts.edu Mentor: Professor Chris Gregg Abstract Modern day authentication systems

More information

Network Security: Cryptography CS/SS G513 S.K. Sahay

Network Security: Cryptography CS/SS G513 S.K. Sahay Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information

More information

Introduction to Hill cipher

Introduction to Hill cipher Introduction to Hill cipher We have explored three simple substitution ciphers that generated ciphertext C from plaintext p by means of an arithmetic operation modulo 26. Caesar cipher: The Caesar cipher

More information

Unit 1 Number Sense. In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions.

Unit 1 Number Sense. In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions. Unit 1 Number Sense In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions. BLM Three Types of Percent Problems (p L-34) is a summary BLM for the material

More information

MEP Y9 Practice Book A

MEP Y9 Practice Book A 1 Base Arithmetic 1.1 Binary Numbers We normally work with numbers in base 10. In this section we consider numbers in base 2, often called binary numbers. In base 10 we use the digits 0, 1, 2, 3, 4, 5,

More information

1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier.

1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier. Study Group 1 Variables and Types 1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier. 2. What does the byte 00100110 represent? 3. What is the purpose of the declarations

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

More information

Math Workshop October 2010 Fractions and Repeating Decimals

Math Workshop October 2010 Fractions and Repeating Decimals Math Workshop October 2010 Fractions and Repeating Decimals This evening we will investigate the patterns that arise when converting fractions to decimals. As an example of what we will be looking at,

More information

Introduction To Security and Privacy Einführung in die IT-Sicherheit I

Introduction To Security and Privacy Einführung in die IT-Sicherheit I Introduction To Security and Privacy Einführung in die IT-Sicherheit I Prof. Dr. rer. nat. Doğan Kesdoğan Institut für Wirtschaftsinformatik kesdogan@fb5.uni-siegen.de http://www.uni-siegen.de/fb5/itsec/

More information

Accentuate the Negative: Homework Examples from ACE

Accentuate the Negative: Homework Examples from ACE Accentuate the Negative: Homework Examples from ACE Investigation 1: Extending the Number System, ACE #6, 7, 12-15, 47, 49-52 Investigation 2: Adding and Subtracting Rational Numbers, ACE 18-22, 38(a),

More information

The science of encryption: prime numbers and mod n arithmetic

The science of encryption: prime numbers and mod n arithmetic The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process

More information

Topology-based network security

Topology-based network security Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the

More information

Lecture 5 - CPA security, Pseudorandom functions

Lecture 5 - CPA security, Pseudorandom functions Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.

More information

Multiplying and Dividing Signed Numbers. Finding the Product of Two Signed Numbers. (a) (3)( 4) ( 4) ( 4) ( 4) 12 (b) (4)( 5) ( 5) ( 5) ( 5) ( 5) 20

Multiplying and Dividing Signed Numbers. Finding the Product of Two Signed Numbers. (a) (3)( 4) ( 4) ( 4) ( 4) 12 (b) (4)( 5) ( 5) ( 5) ( 5) ( 5) 20 SECTION.4 Multiplying and Dividing Signed Numbers.4 OBJECTIVES 1. Multiply signed numbers 2. Use the commutative property of multiplication 3. Use the associative property of multiplication 4. Divide signed

More information

Section 6.2 Definition of Probability

Section 6.2 Definition of Probability Section 6.2 Definition of Probability Probability is a measure of the likelihood that an event occurs. For example, if there is a 20% chance of rain tomorrow, that means that the probability that it will

More information

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY LINDSEY R. BOSKO I would like to acknowledge the assistance of Dr. Michael Singer. His guidance and feedback were instrumental in completing this

More information

Random Fibonacci-type Sequences in Online Gambling

Random Fibonacci-type Sequences in Online Gambling Random Fibonacci-type Sequences in Online Gambling Adam Biello, CJ Cacciatore, Logan Thomas Department of Mathematics CSUMS Advisor: Alfa Heryudono Department of Mathematics University of Massachusetts

More information

26 Integers: Multiplication, Division, and Order

26 Integers: Multiplication, Division, and Order 26 Integers: Multiplication, Division, and Order Integer multiplication and division are extensions of whole number multiplication and division. In multiplying and dividing integers, the one new issue

More information

1 Construction of CCA-secure encryption

1 Construction of CCA-secure encryption CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.

More information

Cryptography and Network Security Chapter 10

Cryptography and Network Security Chapter 10 Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central

More information

Modeling and verification of security protocols

Modeling and verification of security protocols Modeling and verification of security protocols Part I: Basics of cryptography and introduction to security protocols Dresden University of Technology Martin Pitt martin@piware.de Paper and slides available

More information

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012 Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about

More information

Answer: (a) Since we cannot repeat men on the committee, and the order we select them in does not matter, ( )

Answer: (a) Since we cannot repeat men on the committee, and the order we select them in does not matter, ( ) 1. (Chapter 1 supplementary, problem 7): There are 12 men at a dance. (a) In how many ways can eight of them be selected to form a cleanup crew? (b) How many ways are there to pair off eight women at the

More information

An Introduction to Hill Ciphers Using Linear Algebra

An Introduction to Hill Ciphers Using Linear Algebra An Introduction to Hill Ciphers Using inear Algebra Brian Worthington October 26, 2010 University of North Texas MATH 2700.002 1 Contents 1 Introduction 3 1.1 Substitution Ciphers.........................

More information

Using games to support. Win-Win Math Games. by Marilyn Burns

Using games to support. Win-Win Math Games. by Marilyn Burns 4 Win-Win Math Games by Marilyn Burns photos: bob adler Games can motivate students, capture their interest, and are a great way to get in that paperand-pencil practice. Using games to support students

More information

Digital System Design Prof. D Roychoudhry Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Digital System Design Prof. D Roychoudhry Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Digital System Design Prof. D Roychoudhry Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 04 Digital Logic II May, I before starting the today s lecture

More information

Direct Translation is the process of translating English words and phrases into numbers, mathematical symbols, expressions, and equations.

Direct Translation is the process of translating English words and phrases into numbers, mathematical symbols, expressions, and equations. Section 1 Mathematics has a language all its own. In order to be able to solve many types of word problems, we need to be able to translate the English Language into Math Language. is the process of translating

More information

CAHSEE on Target UC Davis, School and University Partnerships

CAHSEE on Target UC Davis, School and University Partnerships UC Davis, School and University Partnerships CAHSEE on Target Mathematics Curriculum Published by The University of California, Davis, School/University Partnerships Program 006 Director Sarah R. Martinez,

More information

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5) Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain

More information

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing

More information

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015 CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret

More information

The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

More information

Math 202-0 Quizzes Winter 2009

Math 202-0 Quizzes Winter 2009 Quiz : Basic Probability Ten Scrabble tiles are placed in a bag Four of the tiles have the letter printed on them, and there are two tiles each with the letters B, C and D on them (a) Suppose one tile

More information

Caesar Ciphers: An Introduction to Cryptography

Caesar Ciphers: An Introduction to Cryptography Purdue GK-12 Lesson Plan 2006-07 Caesar Ciphers: An Introduction to Cryptography Purdue University GK-12 2006-07 Lead developer and contact: Lance Bryant Purdue GK-12 Fellow LBRYANT@MATH.PURDUE.EDU Co-author

More information

PAYCHEX, INC. BASIC BUSINESS MATH TRAINING MODULE

PAYCHEX, INC. BASIC BUSINESS MATH TRAINING MODULE PAYCHEX, INC. BASIC BUSINESS MATH TRAINING MODULE 1 Property of Paychex, Inc. Basic Business Math Table of Contents Overview...3 Objectives...3 Calculator...4 Basic Calculations...6 Order of Operation...9

More information

Lesson 1. Basics of Probability. Principles of Mathematics 12: Explained! www.math12.com 314

Lesson 1. Basics of Probability. Principles of Mathematics 12: Explained! www.math12.com 314 Lesson 1 Basics of Probability www.math12.com 314 Sample Spaces: Probability Lesson 1 Part I: Basic Elements of Probability Consider the following situation: A six sided die is rolled The sample space

More information

Probabilistic Strategies: Solutions

Probabilistic Strategies: Solutions Probability Victor Xu Probabilistic Strategies: Solutions Western PA ARML Practice April 3, 2016 1 Problems 1. You roll two 6-sided dice. What s the probability of rolling at least one 6? There is a 1

More information

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

Discrete Mathematics, Chapter 4: Number Theory and Cryptography Discrete Mathematics, Chapter 4: Number Theory and Cryptography Richard Mayr University of Edinburgh, UK Richard Mayr (University of Edinburgh, UK) Discrete Mathematics. Chapter 4 1 / 35 Outline 1 Divisibility

More information

The Advanced Encryption Standard (AES)

The Advanced Encryption Standard (AES) The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer

More information

Integer Operations. Overview. Grade 7 Mathematics, Quarter 1, Unit 1.1. Number of Instructional Days: 15 (1 day = 45 minutes) Essential Questions

Integer Operations. Overview. Grade 7 Mathematics, Quarter 1, Unit 1.1. Number of Instructional Days: 15 (1 day = 45 minutes) Essential Questions Grade 7 Mathematics, Quarter 1, Unit 1.1 Integer Operations Overview Number of Instructional Days: 15 (1 day = 45 minutes) Content to Be Learned Describe situations in which opposites combine to make zero.

More information

Pseudo code Tutorial and Exercises Teacher s Version

Pseudo code Tutorial and Exercises Teacher s Version Pseudo code Tutorial and Exercises Teacher s Version Pseudo-code is an informal way to express the design of a computer program or an algorithm in 1.45. The aim is to get the idea quickly and also easy

More information

Introduction to Encryption

Introduction to Encryption Computers and Society Introduction to Encryption Chris Brooks Department of Computer Science University of San Francisco Department of Computer Science University of San Francisco p.1/35 3-0: Terminology

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Cryptography and Network Security Block Cipher

Cryptography and Network Security Block Cipher Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit

More information

Year 2 Summer Term Oral and Mental Starter Activity Bank

Year 2 Summer Term Oral and Mental Starter Activity Bank Year 2 Summer Term Oral and Mental Starter Activity Bank Objectives for term Recall x2 table facts and derive division facts. Recognise multiples of 5. Recall facts in x5 table. Recall x10 table and derive

More information

SYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1

SYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1 SYMMETRIC ENCRYPTION Mihir Bellare UCSD 1 Syntax A symmetric encryption scheme SE = (K,E,D) consists of three algorithms: K and E may be randomized, but D must be deterministic. Mihir Bellare UCSD 2 Correct

More information

TEACHER S GUIDE TO RUSH HOUR

TEACHER S GUIDE TO RUSH HOUR Using Puzzles to Teach Problem Solving TEACHER S GUIDE TO RUSH HOUR Includes Rush Hour 2, 3, 4, Rush Hour Jr., Railroad Rush Hour and Safari Rush Hour BENEFITS Rush Hour is a sliding piece puzzle that

More information

Computing exponents modulo a number: Repeated squaring

Computing exponents modulo a number: Repeated squaring Computing exponents modulo a number: Repeated squaring How do you compute (1415) 13 mod 2537 = 2182 using just a calculator? Or how do you check that 2 340 mod 341 = 1? You can do this using the method

More information

Properties of Real Numbers

Properties of Real Numbers 16 Chapter P Prerequisites P.2 Properties of Real Numbers What you should learn: Identify and use the basic properties of real numbers Develop and use additional properties of real numbers Why you should

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

7 Gaussian Elimination and LU Factorization

7 Gaussian Elimination and LU Factorization 7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method

More information

Maths Workshop for Parents 2. Fractions and Algebra

Maths Workshop for Parents 2. Fractions and Algebra Maths Workshop for Parents 2 Fractions and Algebra What is a fraction? A fraction is a part of a whole. There are two numbers to every fraction: 2 7 Numerator Denominator 2 7 This is a proper (or common)

More information

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

More information

The Peruvian coin flip Cryptographic protocols

The Peruvian coin flip Cryptographic protocols Activity 17 The Peruvian coin flip Cryptographic protocols Age group Older elementary and up. Abilities assumed Requires counting, and recognition of odd and even numbers. Some understanding of the concepts

More information

Minnesota Academic Standards

Minnesota Academic Standards A Correlation of to the Minnesota Academic Standards Grades K-6 G/M-204 Introduction This document demonstrates the high degree of success students will achieve when using Scott Foresman Addison Wesley

More information

RSA and Primality Testing

RSA and Primality Testing and Primality Testing Joan Boyar, IMADA, University of Southern Denmark Studieretningsprojekter 2010 1 / 81 Correctness of cryptography cryptography Introduction to number theory Correctness of with 2

More information

Multiplication Rules! Tips to help your child learn their times tables

Multiplication Rules! Tips to help your child learn their times tables Multiplication Rules! Tips to help your child learn their times tables 1. Have fun! We want relaxed kids and plenty of giggles. 2. Go slowly and relax. 3. Do the preliminary review, all the preliminary

More information

POLYNOMIAL FUNCTIONS

POLYNOMIAL FUNCTIONS POLYNOMIAL FUNCTIONS Polynomial Division.. 314 The Rational Zero Test.....317 Descarte s Rule of Signs... 319 The Remainder Theorem.....31 Finding all Zeros of a Polynomial Function.......33 Writing a

More information

Stupid Divisibility Tricks

Stupid Divisibility Tricks Stupid Divisibility Tricks 101 Ways to Stupefy Your Friends Appeared in Math Horizons November, 2006 Marc Renault Shippensburg University Mathematics Department 1871 Old Main Road Shippensburg, PA 17013

More information