Introduction
ECEN 5022 Cryptography
Introduction Peter Mathys
University of Colorado
Spring 2008
Peter Mathys ECEN 5022 Cryptography
ECEN 5022 Cryptography Introduction Peter Mathys University of - - PowerPoint PPT Presentation
Introduction ECEN 5022 Cryptography Introduction Peter Mathys University of Colorado Spring 2008 Peter Mathys ECEN 5022 Cryptography Introduction Basic Definitions, Overview Historically, cryptography is the science and study of secret
Introduction
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
◮ Cryptographic systems are built for many users and are used
◮ Because many users use the same algorithm, it is infeasible to
◮ In fact, the algorithms should be published, so that everybody
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
2n
2n .
2n and if r ≈ 1.18√n then p ≈ 0.5.
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
E(K1, m) E(K2, x) K1 K2 m c = E(K2, E(K1, m)) e.g., DES1 e.g., DES2 x = E(K1, m)
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
◮ P: x is even. h(x) = x2 (mod n) for n = pq, p, q, p = q,
◮ h(x) = pq where p, q are large primes, with p = 1 (mod 4)
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
◮ Entity authentication is real-time, does not need meaningful
◮ Message authentication applies to meaningful message, not
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
Peter Mathys ECEN 5022 Cryptography
Introduction Basic Definitions, Overview
e , r1, C)
d , a1)
d , a2)
e , r1, r2)
Peter Mathys ECEN 5022 Cryptography