# Section 2.1: Shift Ciphers and Modular Arithmetic

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 1 Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15 The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical concepts we will need to implement the cryptographical techniques that we will study this semester. Afterwards, we will introduce basic concepts in cryptography and illustrate a basic cryptographical involving shift ciphers. Modular Arithmetic In grade school, we first learned how to divide numbers. 40 Example 1: Consider 40 3 =. Determine the quotient and remainder and write the 3 result as an equation.

2 2 The previous example illustrates a special case of the division algorithm which we state next. Before stating this algorithm, recall that the integers are the numbers in the following set: Integers: { 4, 3, 2, 1, 0, 1, 2, 3, 4, } Division algorithm: Let m be a positive integer ( m > 0 ) and let b be any integer. Then there is exactly one pair of integers q (called the quotient) and r (called the remainder) such that b = qm + r where 0 r < m. A number of primary interest in this class will be the remainder r that we obtain the division of two numbers. We will find the remainder so often that we use a special term that is used to describe its computation. This is done in the following definition. Definition: We say that r is equal to b MOD m, written as r = b MOD m, if r is the integer remainder of b divided by m. We define the variable m as the modulus. Example 2: Determine 25 MOD 7, 31 MOD 5, 26 MOD 2, and 5 MOD 7. Note: In the division algorithm, the remainder r is non-negative, that is, r 0 This fact means that when doing modular arithmetic that we will never obtain a negative remainder. To compute b MOD m when b < 0 correctly, we must always look for the largest number that m evenly divides that is less than b. The next example illustrates this fact.

3 3 Example 3: Compare computing 23 MOD 9 with -23 MOD 9. Doing Modular Arithmetic For Larger Numbers With A Calculator To do modular arithmetic with a calculator, we use the fact from the division algorithm that b = qm + r, and solve for the remainder to obtain r = b qm. We put this result in division tableau format as follows: m q b qm b qm = r Truncated Quotient (chop digits to right of decimal) Remainder (1)

4 4 Example 4: Compute 1024 MOD 37: Example 5: Compute MOD 10301

5 5 Example 6: Compute MOD 107 Generalization of Modular Arithmetic In number theory, modular arithmetic has a more formal representation which we now give a brief description of. This idea can be expressed with the following example. Example 7: Find solution)s b to the equation b MOD 7 = 4

6 6 The numbers {, 17, 10, 3, 4, 11, 18, 25, 32, } from the previous example that give a remainder of 4 MOD 7 represents a congruence class. We define this idea more precisely in the following definition. Definition: Let m be a positive integer (the modulus of our arithmetic). Two integers a and b are said to be congruent modulo m if a b is divisible by m. We write a b mod m (note the lower case mod ) Note: The previous definition can be thought of more informally as follows. We say that a b mod m if a and b give the same integer remainder r when divide by m. That is, a b mod m if r = a MOD m = b MOD m. The following example illustrates this idea: Example 8: Illustrate why 25 11mod 7. The last example illustrates that when the uppercase MOD notation is used, we are interested in only the specific integer remainder r when a number is divided by a modulus. The lowercase mod notation with the notation is used when we are looking for a set of numbers that have the same integer remainder when divided by a modulus. In this class, we will primarily use the MOD notation.

7 7 *Note: When considering b MOD m, since 0 r < m, the only possible remainders are 0, 1, 2,, m 1. This causes the remainders to wrap around when performing modular arithmetic. This next example illustrates this idea. Example 9: Make a table of y values for the equation y = ( x + 5) MOD 9 Fact: Solving equations (and congruences) if modular arithmetic is similar to solving equations in the real number system. That is, if a b mod m then and a + k b + k a k b k mod mod m m for any number k. The next example makes use of these facts.

8 8 Example 10: Make a list of five solutions to x MOD 8 Basic Concepts of Cryptography Cryptography is the art of transmitting information in a secret manner. We next describe some of the basic terminology and concepts we will use in this class involving cryptography. Plaintext the actual undisguised message (usually an English message) that we want to send. Ciphertext the secret disguised message that is transmitted. Encryption (encipherment) the process of converting plaintext to ciphertext. Decryption (decipherment) process of converting ciphertext back to plaintext.

9 9 Notation: Z m represents all possible remainders in a MOD m system, that is, Z m = { 0, 1, 2,, m 2, m 1} For representing our alphabet, we use a MOD 26 system Z 26 = {0, 1, 2,, 24, 25} and perform a one to one correspondence between the alphabet letters and the elements of this set. Alphabet Assignment A 0 B 1 C 2 D 3 E 4 F 5 G 6 H 7 I 8 J 9 K 10 L 11 M 12 N 13 O 14 P 15 Q 16 R 17 S 18 T 19 U 20 V 21 W 22 X 23 Y 24 Z 25

10 10 Monoalphabetic Ciphers Monoalphabetic Ciphers are substitution ciphers in which the correspondents agree on a rearrangement (permutation) of the alphabet. In this class, we examine 3 basic types of monoalphabetic ciphers Types of Monoalphabetic Ciphers 1. Shift Ciphers (covered in Section 2.1) 2 Affine Ciphers (covered in Section 2.2) 3. Substitution Ciphers (covered in Section 2.3) Shift Ciphers If x is a numerical plaintext letter, we encipher x by computing the Enciphering formula for Shift Ciphers y = ( x + k) MOD 26, where k is in Z 26. Here y will be the numerical ciphertext letter. *Note: k is called the key of the cipher and represents the shift amount.

11 11 Example 11: The Caesar cipher, developed by Julius Caesar is a shift cipher given by Figure 1: Julius Caesar y = ( x + 3) MOD 26 Note that the key k = 3. Use the Caesar cipher to create a cipher alphabet. Then use it to encipher the message RADFORD. To create the cipher alphabet, we substitute the MOD 26 alphabet assignment number for each letter into the Caesar shift cipher formula and calculate the corresponding ciphertext letter number as follows: A x = 0 y = (0 + 3) MOD 26 = 3 MOD 26 = 3 D B x = 1 y = (1 + 3) MOD 26 = 4 MOD 26 = 4 E C x = 2 y = (2 + 3) MOD 26 = 5 MOD 26 = 5 F D x = 3 y = (3 + 3) MOD 26 = 6 MOD 26 = 6 G W x = 22 y = (22 + 3) MOD 26 = 25 MOD 26 = 25 Z X x = 23 y = (23 + 3) MOD 26 = 26 MOD 26 = 0 A Y x = 24 y = (24 + 3) MOD 26 = 27 MOD 26 = 1 B Z x = 25 y = (25 + 3) MOD 26 = 28 MOD 26 = 2 C This gives the corresponding correspondence between the plain and ciphertext alphabets Plain A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Cipher D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Using the above table, we can encipher the message RADFORD as follows Plaintext: R A D F O R D Ciphertext: U D G I R U G Hence, the ciphertext is UDGIRUG

12 12 Of course, in the last example we did not have to create the entire plain and ciphertext alphabets to encipher the message. We could instead just used the shift cipher formula y = ( x + 3) MOD 26 directly. We will illustrate this idea more generally in the next example given below. The Caesar cipher is just a special case of a shift cipher with a key of k = 3. In a general shift cipher, the key k can be any value in a MOD 26 system, that is, any value in the set { 0, 1, 2,, 24, 25}. The next example illustrates a more general shift cipher. Example 12: Encipher the message SEINFELD using a 12 shift cipher.

13 13 Deciphering Shift Ciphers Given a key k, plaintext letter number x, and ciphertext letter number y, we decipher as follows: y = ( x + k) MOD 26 This gives the Deciphering formula for shift ciphers x = ( y k) MOD 26 where y is the numerical ciphertext letter, x is the numerical plaintext letter, and k is the key of the cipher (the shift amount). *Note: In the deciphering shift cipher formula, k MOD 26 can be converted to its equivalent positive form by finding a positive remainder. The next two examples illustrate how to deciphering process works.

14 14 Example 13: Suppose we received the ciphertext YLUJLQLD that was encrypted using a Caesar cipher (shift k = 3). Decipher this message.

15 15 Example 14: Decipher the message EVZCJZXDFE that was enciphered using a 17 shift cipher. Using the shift cipher formula y = ( x + k) MOD 26, we see that the key k for this cipher must be k = 17. Hence the formula becomes y = ( x + 17) MOD 26. Recall in this formula that x represents the alphabet assignment number for the plaintext and y represents the alphabet assignment number for the cipher-text. Since we want to decipher the above cipher-text, we must solve the above equation for x. Rearranging first gives: x + 17 = y MOD 26. To solve for x, we must subtract 17 from both sides. This gives: x = ( y 17) MOD 26 (*) Note that since 17 MOD 26 = 9 (this can be computed simply by taking = 9), we can write equation (*) as: x = ( y + 9) MOD 26 (**) Either equations (*) or (**) can be used to decipher the message. We will use equation (**). Taking each letter of the cipher-text EVZCJZXDFE and using the MOD 26 alphabet assignment, we obtain: E y = 4 x = (4 + 9) MOD 26 = 13 MOD 26 = 13 N V y = 21 x = (21+ 9) MOD 26 = 30 MOD 26 = 4 E Z y = 25 x = (25 + 9) MOD 26 = 34 MOD 26 = 8 I C y = 2 x = (2 + 9) MOD 26 = 11 MOD 26 = 11 L J y = 9 x = (9 + 9) MOD 26 = 18 MOD 26 = 18 S Z y = 25 x = (25 + 9) MOD 26 = 34 MOD 26 = 8 I X y = 23 x = (23 + 9) MOD 26 = 32 MOD 26 = 6 G D y = 3 x = (3 + 9) MOD 26 = 12 MOD 26 = 12 M F y = 5 x = (5 + 9) MOD 26 = 14 MOD 26 = 14 O E y = 4 x = (4 + 9) MOD 26 = 13 MOD 26 = 13 N Hence, the plaintext is NEIL SIGMON.

16 16 Cryptanalysis of Shift Ciphers As the last two examples illustrate, one must know the key k used in a shift cipher when deciphering a message. This leads to an important question. How can we decipher a message in a shift cipher if we do not know the key k? Cryptanalysis is the process of trying to break a cipher by finding its key. Cryptanalysis in general is not an easy problem. The more secure a cipher is, the harder it is to cryptanalyze. We will soon see that a shift cipher is not very secure and is relatively easy to break. Methods for Breaking a Shift Cipher 1. Knowing x = ( y k) MOD 26, we can test all possibilities for k (there are 26 total in a MOD 26 alphabet { 0, 1, 2,, 24, 25} ) until we recover a message that makes sense. 2. Frequency analysis: Uses the fact that the most frequently occurring letters in the ciphertext produced by shift cipher has a good chance of corresponding to the most frequently occurring letters in the standard English alphabet. The most frequently occurring letters in English are E, T, A, O, I, N, and T (see the English frequency table on next page). We will demonstrate these techniques using Maplets.

17 17 Letter Relative Frequency (%) Letter Relative Frequency (%) A N B O C P D Q E R F S G T H U I V J W K X L Y M Z Table 1: Relative Frequencies of letters of English Language Most Common are E, T, A, O, I, N, and R 1. TH 9. HA 2. ER 10. AT, EN, ES, OF, OR 3. ON 11. NT 4. AN 12. EA, TI, TO 5. RE 13. IT, ST 6. HE 14. IO, LE 7. IN 15. IS, OU 8. ED, ND 16. AR, AS, DE, RT, VE Table 2: Most Common Digraphs in the English Language (Based on a 2000 letter sample) 1. THE 6. TIO 11. EDT 2. AND 7. FOR 12. TIS 3. THA 8. NDE 13. OFT 4. ENT 9. HAS 14. STH 5. ION 10. NCE 15. MEN Table 3: Most Common Trigraphs in the English Language

### CSE331: Introduction to Networks and Security. Lecture 20 Fall 2006

CSE331: Introduction to Networks and Security Lecture 20 Fall 2006 Announcements Homework 2 has been assigned: **NEW DUE DATE** It's now due on Friday, November 3rd. Midterm 2 is Friday, November 10th

### Topic 1: Cryptography

1 Introduction to Cryptography: 1.1 Science SCIE1000 Project, Semester 1 2011 Topic 1: Cryptography Cryptography is the science of using mathematics to hide information. Cryptography allows us to store

### Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition

### Solutions to Problem Set 1

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose

### MODULAR ARITHMETIC. a smallest member. It is equivalent to the Principle of Mathematical Induction.

MODULAR ARITHMETIC 1 Working With Integers The usual arithmetic operations of addition, subtraction and multiplication can be performed on integers, and the result is always another integer Division, on

### Cryptography. Helmer Aslaksen Department of Mathematics National University of Singapore

Cryptography Helmer Aslaksen Department of Mathematics National University of Singapore aslaksen@math.nus.edu.sg www.math.nus.edu.sg/aslaksen/sfm/ 1 Basic Concepts There are many situations in life where

### Introduction to Hill cipher

Introduction to Hill cipher We have explored three simple substitution ciphers that generated ciphertext C from plaintext p by means of an arithmetic operation modulo 26. Caesar cipher: The Caesar cipher

### Hill s Cipher: Linear Algebra in Cryptography

Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a

### Mathematics of Cryptography Modular Arithmetic, Congruence, and Matrices. A Biswas, IT, BESU SHIBPUR

Mathematics of Cryptography Modular Arithmetic, Congruence, and Matrices A Biswas, IT, BESU SHIBPUR McGraw-Hill The McGraw-Hill Companies, Inc., 2000 Set of Integers The set of integers, denoted by Z,

### Multiplicative Ciphers. Cryptography of Multiplicative Ciphers

Fall 2006 Chris Christensen MAT/CSC 483 Multiplicative Ciphers It is evident from the relative ease with which the Caesar Cipher or its generalization to an arbitrary number of positions of shift has been

### Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

### 9 Modular Exponentiation and Cryptography

9 Modular Exponentiation and Cryptography 9.1 Modular Exponentiation Modular arithmetic is used in cryptography. In particular, modular exponentiation is the cornerstone of what is called the RSA system.

### Some practice problems for midterm 2

Some practice problems for midterm 2 Kiumars Kaveh November 15, 2011 Problem: What is the remainder of 6 2000 when divided by 11? Solution: This is a long-winded way of asking for the value of 6 2000 mod

### Page 1. Session Overview: Cryptography

Cool Careers in Cyber Security Frequency Chart and Cipher Cryptography Delivery: Can be used as a table demo (hands-on) activity or during a presentation session. Best to have the wheels pre-made. Messaging

### Elementary Number Theory We begin with a bit of elementary number theory, which is concerned

CONSTRUCTION OF THE FINITE FIELDS Z p S. R. DOTY Elementary Number Theory We begin with a bit of elementary number theory, which is concerned solely with questions about the set of integers Z = {0, ±1,

### Cyber Security Workshop Encryption Reference Manual

Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics

### Discrete Mathematics, Chapter 4: Number Theory and Cryptography

Discrete Mathematics, Chapter 4: Number Theory and Cryptography Richard Mayr University of Edinburgh, UK Richard Mayr (University of Edinburgh, UK) Discrete Mathematics. Chapter 4 1 / 35 Outline 1 Divisibility

### The application of prime numbers to RSA encryption

The application of prime numbers to RSA encryption Prime number definition: Let us begin with the definition of a prime number p The number p, which is a member of the set of natural numbers N, is considered

### Hill Ciphers and Modular Linear Algebra

Hill Ciphers and Modular Linear Algebra Murray Eisenberg November 3, 1999 Hill ciphers are an application of linear algebra to cryptology (the science of making and breaking codes and ciphers). Below we

### Cryptography and Network Security

Cryptography and Network Security Xiang-Yang Li Introduction The art of war teaches us not on the likelihood of the enemy s not coming, but on our own readiness to receive him; not on the chance of his

### Network Security. HIT Shimrit Tzur-David

Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

### 3. Applications of Number Theory

3. APPLICATIONS OF NUMBER THEORY 163 3. Applications of Number Theory 3.1. Representation of Integers. Theorem 3.1.1. Given an integer b > 1, every positive integer n can be expresses uniquely as n = a

### Notes for Recitation 5

6.042/18.062J Mathematics for Computer Science September 24, 2010 Tom Leighton and Marten van Dijk Notes for Recitation 5 1 Exponentiation and Modular Arithmetic Recall that RSA encryption and decryption

### Activity 1: Using base ten blocks to model operations on decimals

Rational Numbers 9: Decimal Form of Rational Numbers Objectives To use base ten blocks to model operations on decimal numbers To review the algorithms for addition, subtraction, multiplication and division

### COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012

Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about

### RSA Encryption. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003

RSA Encryption Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003 1 Public Key Cryptography One of the biggest problems in cryptography is the distribution of keys.

### Network Security: Cryptography CS/SS G513 S.K. Sahay

Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information

### Maths delivers! A guide for teachers Years 11 and 12. RSA Encryption

1 Maths delivers! 2 3 4 5 6 7 8 9 10 11 12 A guide for teachers Years 11 and 12 RSA Encryption Maths delivers! RSA Encryption Dr Michael Evans AMSI Editor: Dr Jane Pitkethly, La Trobe University Illustrations

### 8 Primes and Modular Arithmetic

8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.

### Homework 5 Solutions

Homework 5 Solutions 4.2: 2: a. 321 = 256 + 64 + 1 = (01000001) 2 b. 1023 = 512 + 256 + 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = (1111111111) 2. Note that this is 1 less than the next power of 2, 1024, which

### Cryptography Worksheet Polybius Square

Cryptography Worksheet Polybius Square 1 A B C D E 2 F G H I / J K 3 L M N O P 4 Q R S T U Using the grid shown, can you encipher the message: We escape tonight Explain how you did it. Now decipher the

### Accuplacer Arithmetic Study Guide

Testing Center Student Success Center Accuplacer Arithmetic Study Guide I. Terms Numerator: which tells how many parts you have (the number on top) Denominator: which tells how many parts in the whole

### The Paillier Cryptosystem

The Paillier Cryptosystem A Look Into The Cryptosystem And Its Potential Application By Michael O Keeffe The College of New Jersey Mathematics Department April 18, 2008 ABSTRACT So long as there are secrets,

### Cryptography and Network Security Chapter 2

Cryptography and Network Security Chapter 2 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 2 Classical Encryption Techniques "I am fairly familiar with all

### Computer Science 281 Binary and Hexadecimal Review

Computer Science 281 Binary and Hexadecimal Review 1 The Binary Number System Computers store everything, both instructions and data, by using many, many transistors, each of which can be in one of two

### A short primer on cryptography

A short primer on cryptography A. V. Atanasov April 14 2007 1 Preliminaries (This section is an introduction to the referred mathematical concepts. Feel free to skip it if you are familiar with the first

### NUMBER THEORY AND CRYPTOGRAPHY

NUMBER THEORY AND CRYPTOGRAPHY KEITH CONRAD 1. Introduction Cryptography is the study of secret messages. For most of human history, cryptography was important primarily for military or diplomatic purposes

### Math in the Solitaire Cipher By: Jeffrey Baez

Math in the Solitaire Cipher By: Jeffrey Baez Introduction: Neal Stephenson has written several novels in the cyberpunk genre, subspecialty of science fiction dealing with issues from cybernetics and informational

### Chap 2. Basic Encryption and Decryption

Chap 2. Basic Encryption and Decryption H. Lee Kwang Department of Electrical Engineering & Computer Science, KAIST Objectives Concepts of encryption Cryptanalysis: how encryption systems are broken 2.1

### Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it

### SECURITY IN NETWORKS

SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,

### Public Key Cryptography: RSA and Lots of Number Theory

Public Key Cryptography: RSA and Lots of Number Theory Public vs. Private-Key Cryptography We have just discussed traditional symmetric cryptography: Uses a single key shared between sender and receiver

### CSI 333 Lecture 1 Number Systems

CSI 333 Lecture 1 Number Systems 1 1 / 23 Basics of Number Systems Ref: Appendix C of Deitel & Deitel. Weighted Positional Notation: 192 = 2 10 0 + 9 10 1 + 1 10 2 General: Digit sequence : d n 1 d n 2...

### Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

### 4.4 Clock Arithmetic and Modular Systems

4.4 Clock Arithmetic and Modular Systems A mathematical system has 3 major properies. 1. It is a set of elements 2. It has one or more operations to combine these elements (ie. Multiplication, addition)

### 159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

### Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination

### Insight Guide. Encryption: A Guide

Encryption: A Guide for Beginners If you read anything about information security, you re likely to have come across the word encryption. It s a fundamental building block when it comes to securing your

### Number Systems and Radix Conversion

Number Systems and Radix Conversion Sanjay Rajopadhye, Colorado State University 1 Introduction These notes for CS 270 describe polynomial number systems. The material is not in the textbook, but will

### CHAPTER 5. Number Theory. 1. Integers and Division. Discussion

CHAPTER 5 Number Theory 1. Integers and Division 1.1. Divisibility. Definition 1.1.1. Given two integers a and b we say a divides b if there is an integer c such that b = ac. If a divides b, we write a

### Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond

### Introduction To Security and Privacy Einführung in die IT-Sicherheit I

Introduction To Security and Privacy Einführung in die IT-Sicherheit I Prof. Dr. rer. nat. Doğan Kesdoğan Institut für Wirtschaftsinformatik kesdogan@fb5.uni-siegen.de http://www.uni-siegen.de/fb5/itsec/

### Students will operate in pairs and teams of four to decipher and encipher information.

Title: SHHHHHH! It s a Secret Link to Outcomes: Patterns and Relationships Cooperation Connections Technology Problem Solving Algebra Writing Students will discover the need for a common understanding

### Caesar Ciphers: An Introduction to Cryptography

Purdue GK-12 Lesson Plan 2006-07 Caesar Ciphers: An Introduction to Cryptography Purdue University GK-12 2006-07 Lead developer and contact: Lance Bryant Purdue GK-12 Fellow LBRYANT@MATH.PURDUE.EDU Co-author

### Applications of Fermat s Little Theorem and Congruences

Applications of Fermat s Little Theorem and Congruences Definition: Let m be a positive integer. Then integers a and b are congruent modulo m, denoted by a b mod m, if m (a b). Example: 3 1 mod 2, 6 4

### Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer

Hill Cipher Project K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013 Directions: Answer all numbered questions completely. Show non-trivial work in the space provided. Non-computational

### Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Principles of Public Key Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter : Security on Network and Transport

### Integers, Division, and Divisibility

Number Theory Notes (v. 4.23 October 31, 2002) 1 Number Theory is the branch of mathematics that deals with integers and their properties, especially properties relating to arithmetic operations like addition,

### Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret

### Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter 4 described a mathematical system

CHAPTER Number Theory FIGURE FIGURE FIGURE Plus hours Plus hours Plus hours + = + = + = FIGURE. Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter described a mathematical

### Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

The : Keeping Eve The Eavesdropper Away From Your Credit Card Information Department of Mathematics North Dakota State University 16 September 2010 Science Cafe Introduction Disclaimer: is not an internet

### Sandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology s.mahapatra15101987@gmail.com

Computing For Nation Development, March 10 11, 2011 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi A Comparative Evaluation of Various Encryptions Techniques Committing

### NUMBER SYSTEMS. William Stallings

NUMBER SYSTEMS William Stallings The Decimal System... The Binary System...3 Converting between Binary and Decimal...3 Integers...4 Fractions...5 Hexadecimal Notation...6 This document available at WilliamStallings.com/StudentSupport.html

### Outline. Cryptography. Bret Benesh. Math 331

Outline 1 College of St. Benedict/St. John s University Department of Mathematics Math 331 2 3 The internet is a lawless place, and people have access to all sorts of information. What is keeping people

### Stupid Divisibility Tricks

Stupid Divisibility Tricks 101 Ways to Stupefy Your Friends Appeared in Math Horizons November, 2006 Marc Renault Shippensburg University Mathematics Department 1871 Old Main Road Shippensburg, PA 17013

### Problem Set 7 - Fall 2008 Due Tuesday, Oct. 28 at 1:00

18.781 Problem Set 7 - Fall 2008 Due Tuesday, Oct. 28 at 1:00 Throughout this assignment, f(x) always denotes a polynomial with integer coefficients. 1. (a) Show that e 32 (3) = 8, and write down a list

### 1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier.

Study Group 1 Variables and Types 1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier. 2. What does the byte 00100110 represent? 3. What is the purpose of the declarations

### Lecture Notes: Cryptography Part 2

Lecture Notes: Cryptography Part 2 Gordan pflegte etwa zu sagen: Die Zahlentheorie ist nützlich, weil man nämlich mit ihr promovieren kann. Gordan used to say something to the effect that Number Theory

### An Introduction to Hill Ciphers Using Linear Algebra

An Introduction to Hill Ciphers Using inear Algebra Brian Worthington October 26, 2010 University of North Texas MATH 2700.002 1 Contents 1 Introduction 3 1.1 Substitution Ciphers.........................

### The mathematics of cryptology

The mathematics of cryptology Paul E. Gunnells Department of Mathematics and Statistics University of Massachusetts, Amherst Amherst, MA 01003 www.math.umass.edu/ gunnells April 27, 2004 What is Cryptology?

### RSA and Primality Testing

and Primality Testing Joan Boyar, IMADA, University of Southern Denmark Studieretningsprojekter 2010 1 / 81 Correctness of cryptography cryptography Introduction to number theory Correctness of with 2

### Let s just do some examples to get the feel of congruence arithmetic.

Basic Congruence Arithmetic Let s just do some examples to get the feel of congruence arithmetic. Arithmetic Mod 7 Just write the multiplication table. 0 1 2 3 4 5 6 0 0 0 0 0 0 0 0 1 0 1 2 3 4 5 6 2 0

### MATH 537 (Number Theory) FALL 2016 TENTATIVE SYLLABUS

MATH 537 (Number Theory) FALL 2016 TENTATIVE SYLLABUS Class Meetings: MW 2:00-3:15 pm in Physics 144, September 7 to December 14 [Thanksgiving break November 23 27; final exam December 21] Instructor:

### The Mathematics 11 Competency Test Percent Increase or Decrease

The Mathematics 11 Competency Test Percent Increase or Decrease The language of percent is frequently used to indicate the relative degree to which some quantity changes. So, we often speak of percent

### SRI VIDYA COLLEGE OF ENGINEERING & TECHNOLOGY - VIRUDHUNAGAR. Sri Vidya College of Engineering and Technology Department of Information Technology

Sri Vidya College of Engineering and Technology Department of Information Technology Class III IT Subject Code IT2352 Subject Cryptography network security Prepared By Vanaja B Lesson Plan for Introduction

### Application Layer (1)

Application Layer (1) Functionality: providing applications (e-mail, Web service, USENET, ftp etc) providing support protocols to allow the real applications to function properly (e.g. HTTP for Web appl.)

### CLASS 3, GIVEN ON 9/27/2010, FOR MATH 25, FALL 2010

CLASS 3, GIVEN ON 9/27/2010, FOR MATH 25, FALL 2010 1. Greatest common divisor Suppose a, b are two integers. If another integer d satisfies d a, d b, we call d a common divisor of a, b. Notice that as

### Fractions and Decimals

Fractions and Decimals Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles December 1, 2005 1 Introduction If you divide 1 by 81, you will find that 1/81 =.012345679012345679... The first

### 8 Divisibility and prime numbers

8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express

Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.

### Basic Algorithms In Computer Algebra

Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,

### Useful Number Systems

Useful Number Systems Decimal Base = 10 Digit Set = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9} Binary Base = 2 Digit Set = {0, 1} Octal Base = 8 = 2 3 Digit Set = {0, 1, 2, 3, 4, 5, 6, 7} Hexadecimal Base = 16 = 2

### Lecture 2. Binary and Hexadecimal Numbers

Lecture 2 Binary and Hexadecimal Numbers Purpose: Review binary and hexadecimal number representations Convert directly from one base to another base Review addition and subtraction in binary representations

### Chapter 4: Computer Codes

Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data

### CIS 5371 Cryptography. 8. Encryption --

CIS 5371 Cryptography p y 8. Encryption -- Asymmetric Techniques Textbook encryption algorithms In this chapter, security (confidentiality) is considered in the following sense: All-or-nothing secrecy.

### The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

### Number Theory and Cryptography using PARI/GP

Number Theory and Cryptography using Minh Van Nguyen nguyenminh2@gmail.com 25 November 2008 This article uses to study elementary number theory and the RSA public key cryptosystem. Various commands will

### Symmetric Key cryptosystem

SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single

### Cryptography Exercises

Cryptography Exercises 1 Contents 1 source coding 3 2 Caesar Cipher 4 3 Ciphertext-only Attack 5 4 Classification of Cryptosystems-Network Nodes 6 5 Properties of modulo Operation 10 6 Vernam Cipher 11

### RSA Attacks. By Abdulaziz Alrasheed and Fatima

RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.

### COMPASS Numerical Skills/Pre-Algebra Preparation Guide. Introduction Operations with Integers Absolute Value of Numbers 13

COMPASS Numerical Skills/Pre-Algebra Preparation Guide Please note that the guide is for reference only and that it does not represent an exact match with the assessment content. The Assessment Centre

### NCTM Curriculum Focal Points for Grade 5. Everyday Mathematics, Grade 5

NCTM Curriculum Focal Points and, Grade 5 NCTM Curriculum Focal Points for Grade 5 Number and Operations and Algebra: Developing an understanding of and fluency with division of whole numbers Students

### Preliminary Mathematics

Preliminary Mathematics The purpose of this document is to provide you with a refresher over some topics that will be essential for what we do in this class. We will begin with fractions, decimals, and

### An Introduction to the RSA Encryption Method

April 17, 2012 Outline 1 History 2 3 4 5 History RSA stands for Rivest, Shamir, and Adelman, the last names of the designers It was first published in 1978 as one of the first public-key crytographic systems

### Math Circle Beginners Group October 18, 2015

Math Circle Beginners Group October 18, 2015 Warm-up problem 1. Let n be a (positive) integer. Prove that if n 2 is odd, then n is also odd. (Hint: Use a proof by contradiction.) Suppose that n 2 is odd

### Rational Exponents. Squaring both sides of the equation yields. and to be consistent, we must have

8.6 Rational Exponents 8.6 OBJECTIVES 1. Define rational exponents 2. Simplify expressions containing rational exponents 3. Use a calculator to estimate the value of an expression containing rational exponents