1 / 16

Cryptography Trivia

Cryptography Trivia. Week two!. The Game. 8 groups of 2 5 rounds Math 1 Modern history Math 2 Computer Programming Analyzing and comparing Cryptosystems 10 questions per round Each question is worth 1 point. Math Round 1. Find a field with 7 elements. Find a field with 9 elements.

garth
Download Presentation

Cryptography Trivia

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptography Trivia Week two!

  2. The Game • 8 groups of 2 • 5 rounds • Math 1 • Modern history • Math 2 • Computer Programming • Analyzing and comparing Cryptosystems • 10 questions per round • Each question is worth 1 point

  3. Math Round 1 • Find a field with 7 elements. • Find a field with 9 elements. • Multiply in . • Find in mod • Find all quadratics in . • Find • Convert to . • Convert to hex. • Convert to decimal. • How many bits would it take to represent a 100-digit number?

  4. Modern [cryptography] history • Name a fundamental paradigm shift in cryptography that occurred in the 70’s. • This cryptosystem was developed in the 70’s by IBM, with help from the NSA, and lasted through the 90’s. • This cryptosystem handles the majority of worldwide cryptography today. • In the above cryptosystem, how many bits are required in the key for “top secret” documents. • What is the “newest” cryptosystem we have talked about?

  5. Modern [cryptography] history • What country discovered RSA before it was known publically? • What does DES stand for? • What does AES stand for? • What does RSA stand for? • What does ECC stand for?

  6. Math round 2 • Encrypt in the RSA system with and . • Decrypt 5 in the same RSA system. • Run 13 through the S-box. • Find 4 points on • Find the slope of the line connecting and

  7. Math round 2 • Find the equation for the line containing and . • How many squares are there in ? • Find an upper bound on the number of points on . • Perform the “shift rows” operation from AES on the accompanying AES message. • Perform the “mix columns” operation on the accompanying column.

  8. Computer Programming • What is the value of A? • What is the value of B? • What is the value of C? A = 5; B = 3; C = A + B * B;

  9. Computer Programming • What is the value of A? • What is the value of B? A = 5; B = A; A = 4;

  10. Computer Programming • How many multiplications are used in the following program? • What is the value of A? A = 2; Count = 1; While(Count < 4) A = A * A; End

  11. Computer Programming • How many multiplications are used in the following program? • What is the value of A? A = 1; While(A < 2^3) A = A * 2; End

  12. Computer Programming • True or false: A = B A = 5; B = A; A = 4;

  13. Analyzing and comparing Cryptosystems • Which of these encrypt the slowest? DES, AES, RSA, ECC. • Why is AES preferred to DES? • Why is ECC preferred to RSA? • AES consists of 4 operations: xor’ing a key, mixing columns, S-box substitution, and _____________. • How is the DES S-box and AES S-box fundamentally different?

  14. Analyzing and comparing Cryptosystems • RSA and ECC have _________ security. • AES has __________ security. • DES has __________ security. • Which would be more secure? RSA built from two 64-bit primes, or RSA built from four 32-bit primes? • Which of these would require the most operations to encrypt one message? 128-bit AES, 128-bit RSA, or 128-bit ECC?

  15. Cryptography Trivia The End

  16. Reference Information • Created in the summer of 2013 by Dr. Jeffrey Beyerl for use in a cryptography class. • This is just a vanilla PowerPoint, but of course like anything you download from the internet: use at your own risk.

More Related