17

Click here to load reader

PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

  • Upload
    vandieu

  • View
    217

  • Download
    4

Embed Size (px)

Citation preview

Page 1: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:
Page 2: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

By: Carla Sorrell

Thesis Advisor: Dr. Jennifer Hontz

Page 3: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

•Overview of Cryptology

•History of Cryptology

•BCH Codes

•Algebraic Approach with Maple

•New Method for BCH Codes

•Application to Education

•Further Research and Exploration

Page 4: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

• Cryptography

• Cryptanalysis

• Cryptology

Page 5: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

General History

Interesting Points:

• Caesar cipher

•Jefferson Cylinder •Enigma

Page 6: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

•Bose-Chaudhuri-Hocquengham codes

•Error correcting code

•Subclass of cyclic codes

Page 7: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

•Information transmitted via the Internet

•Data stored on a computer

•Encoded music

•Photograph Transmission

•Data transmission

Page 8: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

•Primitive Polynomial or Not?123 xx

03)1(01)0(

1)( 23

pp

xxxp

)1)(1()( 2323 xxxxxg

•Generator Element

Page 9: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

•Cosets

•Not disjoint

•Therefore and thus, .

•So

...},1,1,,1,,1,0{][ 22222 xxxxxxxxx

,...}1)1)(1(,)1(,1,0{)1( 242334232323 xxxxxxxxxxxxxxxx

,...}1,,1,{ 2344233 xxxxxxxxx ,...}1,,,1{)1( 2344322 xxxxxxxxx

23 1 xx 23 1 xx

34 xxx 21 xx

325 xxxx

xxxx

11 22

Parity Check Matrix Construction

Ideal:

Page 10: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

Word ____________ power of___ 100 1 =1010 x001101111110 1+x011000 0 -

)(mod xpx i 0

12x

221 x

321 xx

45

2xx 6

•Process continues to construct parity check matrix

•The parity check matrix of G: 7X6

4186

155

5124

293

62

3

11

111011010110110111001101011001101010100100

=H

Page 11: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

•Syndromes:

•Received word:

•Multiply received word by matrix H

•Find syndromes

Finding The Roots

313 ,)](),([ sswwwH

6321)( xxxxxr

[1111001][H]=[001100]

=001= =100= = =

1s )(2

3s10 )( 3 6323

1 )( s 03s

245222

0

001111110)(

Page 12: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

•Where the sum of two words : 2

110101011001111110001110111110011101101100001000010010101001100

36

245

254

63

72

11

20

•The roots are at and .

•Error Polynomial:

•Corrected Polynomial:

5454)( xxxe

654321)()()( xxxxxxxcxexr

Finding The Roots continued

Page 13: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

•Using Maple to approach BCH codes

•Maple Commands

Page 14: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

Theorem by Yi-Chang Cheng, Erl Huei Lu, To Chang, and Po-Chiang Lu

For =1 or 2, if and only if

where is the number of errors in received vector, or block length

)}({ xew 11

ne

)}({ xew12 mn

Cyclic Shift Theorem

For either =1 or 2,

if and only if .

)}({ xew 3~

13

~

)(SS

1ke

3~

13

~

)(SS

Page 15: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

•Students break the code to learn information for other subjects.

•Students gain skills in the content and process standards.

•Start simple with simple cipher, cryptograms, and matching or word search to learn history, and move to

more advanced activities.

Page 16: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points:

•Further Exploration

•Questions

Page 17: PowerPoint Presentationmste.illinois.edu/courses/mat764fa04/folder… · PPT file · Web view · 2005-05-10Cryptography Cryptanalysis Cryptology General History Interesting Points: