Contact
CoCalc Logo Icon
StoreFeaturesDocsShareSupport News AboutSign UpSign In
| Download

Oct/31/2017 class notes

Views: 53
1
\documentclass{article}
2
3
% set font encoding for PDFLaTeX or XeLaTeX
4
\usepackage{ifxetex}
5
\ifxetex
6
\usepackage{fontspec}
7
\else
8
\usepackage[T1]{fontenc}
9
\usepackage[utf8]{inputenc}
10
\usepackage{lmodern}
11
\fi
12
\usepackage{amsmath}
13
% used in maketitle
14
\title{Class Notes Oct 31 2017}
15
\author{Derek Stachowiak}
16
17
% Enable SageTeX to run SageMath code right inside this LaTeX file.
18
% documentation: http://mirrors.ctan.org/macros/latex/contrib/sagetex/sagetexpackage.pdf
19
% \usepackage{sagetex}
20
21
\begin{document}
22
\maketitle
23
Finishing SAES example\\
24
End round 1: 0010 1110 0100 1011\\
25
Substitute(Feed into S-Box): 1010 1111 1101 0011\\
26
Put results from previous step into a matrix by filling down the rows
27
$\begin{bmatrix}
28
1010 & 1101 \\
29
1111 & 0011
30
\end{bmatrix}$
31
\\Shift columns
32
$\begin{bmatrix}
33
1010 & 1101 \\
34
0011 & 1111
35
\end{bmatrix}$
36
\\Read down columns: 1010 0011 1101 1111\\
37
xor with round key: 1000 0111 1010 1111\\
38
C= 0010 0100 0111 0000\\
39
\\
40
\textbf{AES:}\\
41
10 Rounds\\
42
Skip mix columns in last round\\
43
128 bits of plain text\\
44
key is 128, 196 or 256 bits in length\\
45
Differential cryptoanalysis is faster than brute force for 7 rounds. For this reason 10 rounds was chosen to be secure against future attacks.\\
46
almost all secure internet fraffic uses AES\\
47
\\
48
\\
49
The problem is you need the key to encrypt or decrypt. AES and DES are examples of symetric key algorithms, i.e. both Alice and Bob need the key and if anyone finds the key then the system is compromised. \\
50
\\
51
\\
52
\textbf{Big Innovation}\\
53
Pubic key cryptography\\
54
Allows messages to be sent securely between two people who have no shared secret key\\
55
\\
56
\textbf{Public key cryptography}\\
57
Relies on trap door problem\\
58
Trap door problem: math problem that is easy to do one way but very difficult the other way\\
59
\\
60
Mathematician Rivest,Adelman and Shamir came up with RSA\\
61
Trap door problem: Factoring\\
62
Take two primes p,q\\
63
Easy to multiply n = p * q\\
64
Very hard to find p and q given n\\
65
\textbf{Five steps to RSA}\\
66
Alice will pick two prime numbers p,q(120ish digits in length)\\
67
n = p * q\\
68
She picks encryption exponent e (65537 is common)\\
69
She publishes (n,e)\\
70
Alice computes $\varphi$(n) = (p-1)(q-1) (this is secret!)\\
71
Compute $d= e^{-1}$(mod $\varphi$(n)) using Euclids algorithm\\
72
d is the decryption key (secret)\\
73
74
\end{document}
75
76