Thursday, June 5, 2008

Final Assignment

The final reading assignment concerns itself with what has been hailed recently as the "future" of not only cryptology, but all of computing. Namely, the use of quantum mechanics to somehow create a quantum computer which operates on a completely different premise than that of normal computers. Though the quantum mechanics are somewhat complicated, the basic premise of the system is the utilization of the "spins" or orientations of subatomic particles to represent unique information. The challenge for this system of computing is that there is not currently a known way to consistently and accurately measure these subatomic particles without changing the states that they are in and thus changing the data.

If quantum computing can be realized, however, it represents an almost unimaginable leap in computing power because it allows for computations to be done parralell to one another rather than sequentially. Thus, if a problem can be broken into parts, each part can be computed simultaneously rather than in order to develop a massively faster machine. This would lead to the brute force attack becoming much more feasible and would effectively eliminate el gamal and RSA as viable cryptosystems. Quantum computers would, however, be able to use their new power towards the application of more advanced cryptosystems and the "battle between cryptology and cryptanalysis" would suppossedly continue.

Tuesday, June 3, 2008

26

Chapter five deals with the advanced encryption standard Rijndael which is an encryption system based on symmetric key standards meant to replace DES which has recently been deemed as too insecure for commercial use. Rijndael was one of many finalists basically elicited due to a competition. Thus, the algorithm is perhaps not perfect and, as the book mentions, the other four finalists may be used in future crypto-systems. Rinndael, aside from having difficult computation, is based on the application of rounds, 10 for a 128 byte, otherwise 12 or 14 for other variations. The application was somewhat difficult to understand because it involves basically four different encryptions: the three transformations and then an XOR operation.

The significant part of this reading is mainly that this is a departure from the public key cryptosystems and indicates that despite the effectiveness of RSA and el gamal systems, symmetric key cryptosystems are still more efficient and cost effective than the public key counterparts. Rijndael is a block-cipher, indicating that this is still the preferred method of encryption for symmetric systems and, hopefully will be improved upon to make a truly secure symmetric system other than a one time pad.

Sunday, May 18, 2008

Assignment 21

The first midterm was an interesting combination of the history of cryptography and an introduction to number theory. Though I am still somewhat disappointed that a misreading of the final question on the midterm resulted in a less than stellar grade, the first part of the class was somewhat disconnected. Euler's theorem and the Vigenere cipher, for instance, had almost no overlap and so the questions felt like an assortment of disconnected tidbits. For this midterm, I expect a similar approach to conceptual and application problems, but I also think that the questions will be more encompassing than the first.
The second part of the course so far has been almost exclusively dedicated to covering public key cryptosystems and I would imagine that a variety of questions would all relate directly to RSA systems, hash functions and discrete logarithms even if the questions did not explicitly state them. All of the number theory and theorems covered have basically been background information to allow us to appreciate that factoring large numbers and computing discrete logarithms is hard. Using this mathematical appreciation and basis, I imagine the test would compare public key cryptosystems and perhaps be more theoretical than the first. In any event, I am not prepared for it yet and am somewhat frightenned by the number of possible questions, though they appear to be much smaller than the number of calculations necessary to factor large prime numbers...

Thursday, May 15, 2008

assignment 20

Section 8.4 deals with the concept of Birthday attacks, which were briefly mentioned in the beginning of chapter 7 when introducing discrete logarithms and are also mentioned in chapter 9 (I did some perusing). At first glance birthday attacks seem like a counter intuitive notion, but the statistics behind them is remarkably simple. It just utilizes the probability of something not happening (the probability of not having the same birthday as someone else) over and over. The notion is made much less counter-intuitive when it is presented as the probability that any two units in a set n can match rather than checking if any of the units from set n match a particular unit of set n. The latter is the view that is probably intuitively understood, but when described appropriately it is easy to comprehend.

The birthday attacks' relevance to cryptology is not immediately apparent, but it can be used as a way of attacking discrete logarithms (by checking for matches between groups probabalistically) and, thanks to the perusing, it is also mentioned with regard to digital signatures. Unfortunately for the enthused, the Baby step Giant step algorithm is superior to a birthday attack for all intents and purposes regarding discrete logarithms, but as will presumably be seen, the birthday attack does have other uses including an interesting "did you know" amongst friends.

Tuesday, May 13, 2008

Assignment 19

Sections 8.1 and 8.2 introduced the concepts of has functions, which luckily I'd already encountered in PIC 10a so the concept was familiar. The cryptographic applications of hash functions were determined to be based on 3 principles, the third of which, that two messages that produce the same hash output is hard to find, is by far the hardest to verify as was seen by the example in section 8.2, where it was scarcely done. The most difficult part of these sections was visualizing a function that releagates a message of any length into a hash output of fixed length that gives meaning information. The example of a digital signature was the application that stuck out to me the most, but as far as cryptography is concerned, it seems infeasible to take a message m, send it to h(m) and then get m back out (which is the point) so as a cryptosystem hash functions seem unavailable.

As previously mentioned, one of the prominent uses of hash functions for cryptographic purposes, is in the form of a digital signature. If the 3rd principle is indeed satisfied, the hash function works as signature verification and error checking, both of which are paramount in cryptosystems sincce eve can presumably tamper with a message or possibly create her own.

Sunday, May 11, 2008

Assignment 18

Sections 7.3-7.5 elaborated on applications of discrete logorathims just like the ensuing sections in chapter six continued to elaborate on the different approaches to the RSA algorithm. The key part to all three sections was the difficulty in computing discrete logarithms just like the fundamental part of the RSA applications was the difficulty factoring large prime numbers. What struck me as interesting in this chapter was that, like the section on factoring large prime numbers, the computational diffie-hellman problem and decision diffie-hellman problem and eventually the elGamal cryptosystem all could be fundamentally boiled down to discrete logarithms but were different applications of that idea. The RSA algorithm on the other hand was much more straightforward in its application and the different approaches weren't different cryptosystems but instead were different approaches to computing the compositeness of a number (non primality). Probably the most difficult part of this reading, which was largely conceptual, was trying to find differences in security and application between the diffie-hellman and elGamal cryptosystem. I also had to reread the section on bit-commitment to convince myself that even if Eve had access to all of the communication between Alice and Bob, she would still have to compute discrete logs to find the key K.

These sections were important in a broad sense largely because they illustrated the idea that the RSA system is not the only application of a sort of one-way function for a public-key cryptosystem and that there are potentially many others. It's very possible that once technology, whether quantum computers or otherwise, can factor large primes or compute discrete logarithms for large primes, other one-way functions for public-key cryptosystems may be developed. On a side note, by far my favorite part of this reading was the mentioning basically that "this is not yet known" or "has not been developed" to describe the feasibility of computing discrete logarithms, basically implying that mathematics is still hard at work and can give us a "busy" signal every once in awhile.

Tuesday, May 6, 2008

Assignment 16

Sections 6.6 and 6.7 wrapped up the chapter on RSA cryptosystems, which much to my dismay, didn't lead to any breakable ciphertexts for homework assignements, by illustrating how two countries could be sure that each was basically being honest with its information transfer to the other and then by describing, in general, the concept of a public-key cryptosystem. These two sections were more conceptual than mathematical but it was difficult to imagine examples of trapdoors for one-way functions that weren't already given by RSA. I also didn't understand why section 6.7 didn't come as section 6.1, but that's irrelevant.

The most significant part of this reading was probably the illustration of the development of the signature for an RSA cryptosystem which I had been wondering about since the introduction of a public-key cryptosystem in the first week of class. The security of it is still not completely understood as to how Eve could not replicate what country B does, but the illustration of the signature is a critical step in the public key cryptosystem.