|
|
|
A review session is being scheduled for Saturday
March 15 |
|
|
|
|
Encryption encodes information to hide it from
everyone else … maintaining your privacy |
|
|
|
|
|
|
To keep information private it must be hidden
from “prying” computers |
|
As children, most of us used “secret” codes |
|
Most often the code was a Caesar Cipher -- an
alphabetic shift by a constant amount |
|
|
|
|
|
|
Fixed substitutions don’t work, ‘cause letters
have a known distribution |
|
In a large text, count the frequency of each
letter, match the results to distribution |
|
The twelve most frequent letters account for 80%
of English text |
|
ETAOINSHRDLU |
|
|
|
|
|
|
Traditionally, encryption technology has been
“breakable” with effort |
|
Breakable codes let law enforcement and
governments watch criminals and spies |
|
Codes are good enough for the honest |
|
|
|
|
|
|
|
|
Traditionally, encryption technology has been
“breakable” with effort |
|
Breakable codes let law enforcement and
governments watch criminals and spies |
|
Codes are good enough for the honest |
|
ŽNew
computer encryption is unbreakableÜ |
|
It’s called “strong
encryption” … should it be legal to be able to keep secrets absolutely? |
|
|
|
|
Encryption is most important for when sending
information |
|
|
|
|
To communicate securely, users must meet before
sending/receiving |
|
|
|
|
|
|
Public Key Encryption is based on publishing the
key |
|
Sender uses public key to encrypt |
|
|
|
|
|
|
Using the public key, encrypt message |
|
Divide T, the clear text bytes, into blocks |
|
Treat each block as a number |
|
Cube number (raise to 3 pwr), divide by key |
|
Send the remainder for each block |
|
|
|
|
|
|
Does PKC work? Can’t it be cracked? |
|
Recall definition of divide: a=b×c + d |
|
|
|
|
|
For example, 50/6 implies 50=6×8 + 2 |
|
The encryption process is a division: |
|
T3=Kr×c + d |
|
so sending c&d determines clear text T |
|
|
|
|
|
|
|
|
Rivest, Adelman and Shamir invented a PKC scheme
called RSA |
|
The secret is to pick the key, Kr,
right |
|
Pick two prime numbers -- numbers divisible only
by themselves and 1 -- that are 2 greater than a multiple of 3 … weird! |
|
Examples are 5, 11, 17, 23, 29, ... |
|
Kr = p×q so that it is 129 digits |
|
|
|
|
|
|
|
|
Compute s=1/3(2(p-1)(q-1)+1) then compute Cs
= Kr×c + T |
|
That is … |
|
The remainders (C) raised to s power equal Kr
times some (quotient) c no one cares about plus the original clear text
number! |
|
So, raise the remainders to s, divide by Kr
and PRESTO! the new remainder is the answer |
|
|
|
|
|
|
Though the numbers get huge, computer can handle
them quickly |
|
These codes are strong because breaking them
needs s, which needs p, q, which means factoring Kr |
|
Factoring is computationally tough -- best
methods are only somewhat better than grammar school, “try all small
primes” |
|
Picking 129 digit key, means no computer can
factor it … so the code is unbreakable |
|
|
|
|
|
|
After inventing their scheme (1977), RSA
challenged people to break it |
|
Their first key was broken in 1994 using 1000
computers over 8 months |
|
Their secret message: THE MAGIC WORDS ARE
SQUEAMISH OSSIFRAGE |
|
Doomed? No. There are many other 129 digit
keys, or if people get nervous make 200 digit keys or more … breaking gets
harder very fast; encrypt/decrypt doesn’t |
|
|
|
|
|
|
Should we allow people to use strong encryption?
Or should only breakable codes be legal? |
|
It hampers law enforcement and security |
|
Most criminals reveal plans in other ways |
|
PKC exists and is known, so build in escape |
|
-- Trap door |
|
-- Key Escrow |
|
But are these schemes really secure? |
|