SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
“How Do You Say ‘Cryptography’ in Romanian?”
Learning About Integers from Ciphers in Different
                  Languages


                                  Joshua Holden

                          Rose-Hulman Institute of Technology
                       http://www.rose-hulman.edu/~holden




Joshua Holden (RHIT)           “How Do You Say ‘Cryptography’?”   1 / 16
Decimation ciphers
The decimation cipher goes back at least as far as 1935.
Pick a key, say 3. Start by writing out the plaintext (original message)
alphabet.
Example
 plaintext:      abcdefghijklmnopqrstuvwxyz

Count off every third letter, crossing them out (or “decimating” them)
and writing them below as our ciphertext (encrypted message)
alphabet.

Example
  plaintext:        ab/defghijklmnopqrstuvwxyz
                      c

 ciphertext:        C
    Joshua Holden (RHIT)    “How Do You Say ‘Cryptography’?”             2 / 16
Decimation ciphers
The decimation cipher goes back at least as far as 1935.
Pick a key, say 3. Start by writing out the plaintext (original message)
alphabet.
Example
 plaintext:      abcdefghijklmnopqrstuvwxyz

Count off every third letter, crossing them out (or “decimating” them)
and writing them below as our ciphertext (encrypted message)
alphabet.

Example
  plaintext:        ab/de/ ghijklmnopqrstuvwxyz
                      c f

 ciphertext:        CF
    Joshua Holden (RHIT)    “How Do You Say ‘Cryptography’?”             2 / 16
Decimation ciphers
The decimation cipher goes back at least as far as 1935.
Pick a key, say 3. Start by writing out the plaintext (original message)
alphabet.
Example
 plaintext:      abcdefghijklmnopqrstuvwxyz

Count off every third letter, crossing them out (or “decimating” them)
and writing them below as our ciphertext (encrypted message)
alphabet.

Example
  plaintext:        ab/de/ gh/
                      c f ijklmnopqrstuvwxyz

 ciphertext:        CFI
    Joshua Holden (RHIT)   “How Do You Say ‘Cryptography’?”              2 / 16
Decimation ciphers
The decimation cipher goes back at least as far as 1935.
Pick a key, say 3. Start by writing out the plaintext (original message)
alphabet.
Example
 plaintext:      abcdefghijklmnopqrstuvwxyz

Count off every third letter, crossing them out (or “decimating” them)
and writing them below as our ciphertext (encrypted message)
alphabet.

Example
  plaintext:        ab/de/ gh/ lmnopqrstuvwxyz
                      c f ijk /

 ciphertext:        CFIL
    Joshua Holden (RHIT)    “How Do You Say ‘Cryptography’?”             2 / 16
Decimation ciphers
The decimation cipher goes back at least as far as 1935.
Pick a key, say 3. Start by writing out the plaintext (original message)
alphabet.
Example
 plaintext:      abcdefghijklmnopqrstuvwxyz

Count off every third letter, crossing them out (or “decimating” them)
and writing them below as our ciphertext (encrypted message)
alphabet.

Example
  plaintext:        ab/de/ gh/ lmnopqrstuvwxyz
                      c f ijk / /

 ciphertext:        CFILO
    Joshua Holden (RHIT)    “How Do You Say ‘Cryptography’?”             2 / 16
Decimation ciphers
The decimation cipher goes back at least as far as 1935.
Pick a key, say 3. Start by writing out the plaintext (original message)
alphabet.
Example
 plaintext:      abcdefghijklmnopqrstuvwxyz

Count off every third letter, crossing them out (or “decimating” them)
and writing them below as our ciphertext (encrypted message)
alphabet.

Example
  plaintext:        ab/de/ gh/ lmnopq/stuvwxyz
                      c f ijk / / r

 ciphertext:        CFILOR
    Joshua Holden (RHIT)     “How Do You Say ‘Cryptography’?”            2 / 16
Decimation ciphers
The decimation cipher goes back at least as far as 1935.
Pick a key, say 3. Start by writing out the plaintext (original message)
alphabet.
Example
 plaintext:      abcdefghijklmnopqrstuvwxyz

Count off every third letter, crossing them out (or “decimating” them)
and writing them below as our ciphertext (encrypted message)
alphabet.

Example
  plaintext:        ab/de/ gh/ lmnopq/st/vwxyz
                      c f ijk / / r u

 ciphertext:        CFILORU
    Joshua Holden (RHIT)      “How Do You Say ‘Cryptography’?”           2 / 16
Decimation ciphers
The decimation cipher goes back at least as far as 1935.
Pick a key, say 3. Start by writing out the plaintext (original message)
alphabet.
Example
 plaintext:      abcdefghijklmnopqrstuvwxyz

Count off every third letter, crossing them out (or “decimating” them)
and writing them below as our ciphertext (encrypted message)
alphabet.

Example
  plaintext:        ab/de/ gh/ lmnopq/st/vw/
                      c f ijk / / r u xyz

 ciphertext:        CFILORUX
    Joshua Holden (RHIT)       “How Do You Say ‘Cryptography’?”          2 / 16
Wrap around



When you get to the end, “wrap around” to the beginning.1 In this
case, cross out the “a” and keep going.

Example
  plaintext:          ab/de/ gh/ lmnopq/st/vw/
                        c f ijk / / r u xyz

 ciphertext:          CFILORUX




  1
      There is an alternative which may be older but is not as pretty.
      Joshua Holden (RHIT)        “How Do You Say ‘Cryptography’?”       3 / 16
Wrap around



When you get to the end, “wrap around” to the beginning.1 In this
case, cross out the “a” and keep going.

Example
  plaintext:          ab/de/ gh/ lmnopq/st/vw/
                      / c f ijk / / r u xyz

 ciphertext:          CFILORUXA




  1
      There is an alternative which may be older but is not as pretty.
      Joshua Holden (RHIT)        “How Do You Say ‘Cryptography’?”       3 / 16
Wrap around



When you get to the end, “wrap around” to the beginning.1 In this
case, cross out the “a” and keep going.

Example
  plaintext:          ab//e// ijklmnopq/st// w/ yz
                      / cd fgh/// // // r / uv x/

 ciphertext:          CFILORUXADGJMPSVY




  1
      There is an alternative which may be older but is not as pretty.
      Joshua Holden (RHIT)        “How Do You Say ‘Cryptography’?”       3 / 16
Wrap it up



Finally, wrap around to the “b” and finish up:

Example
  plaintext:        ab//e// ijklmnopq/st// w/ yz
                    / cd fgh/// // // r / uv x/

 ciphertext:        CFILORUXADGJMPSVY




    Joshua Holden (RHIT)     “How Do You Say ‘Cryptography’?”   4 / 16
Wrap it up



Finally, wrap around to the “b” and finish up:

Example
  plaintext:        abc/e// ijklmnopq/st// w/ yz
                    ///d fgh/// // // r / uv x/

 ciphertext:        CFILORUXADGJMPSVYB




    Joshua Holden (RHIT)     “How Do You Say ‘Cryptography’?”   4 / 16
Wrap it up



Finally, wrap around to the “b” and finish up:

Example
  plaintext:        abc//// h////////pq/st//// y/
                    ///defg/ ijklmno //r //uvwx/ z

 ciphertext:        CFILORUXADGJMPSVYBEHKNQTWZ




    Joshua Holden (RHIT)     “How Do You Say ‘Cryptography’?”   4 / 16
Be fruitful


So our final translation of plaintext to ciphertext is:
Example
   plaintext:       abcdefghijklmnopqrstuvwxyz
 ciphertext:        CFILORUXADGJMPSVYBEHKNQTWZ

and an example message might be:
Example
   plaintext:       befruitfulandmultiply
 ciphertext:        FORBKAHRKJCPLMKJHAVJW




    Joshua Holden (RHIT)    “How Do You Say ‘Cryptography’?”   5 / 16
Letters to numbers



How can we describe the decimation method in terms of modular
arithmetic? We should translate our numbers into letters, of course.
Example
         plaintext:       a   b    c     d       e        f      g    h    i   j    ···
        numbers:          1   2    3     4       5        6      7    8    9   10   ···
 some operation?:         3   6    9     12      15       18     21   24   1    4   ···
       ciphertext:        C   F    I     L       O        R      U    X    A   D    ···




   Joshua Holden (RHIT)       “How Do You Say ‘Cryptography’?”                        6 / 16
Multiplicative cipher


And now we see that a decimation cipher is the same as a
“multiplicative cipher” with multiplication by 3 modulo 26:
Example
 plaintext     number     times 3      ciphertext
     a           1           3             C
     b           2           6             F
     .
     .            .
                  .          .
                             .             .
                                           .
     .            .          .             .
    y              25       23                W
    z              26       26                Z




   Joshua Holden (RHIT)      “How Do You Say ‘Cryptography’?”   7 / 16
Bad Keys
Are there any keys we can’t use? Think about multiplying by 2 — we
know that any number multiplied by 2 is even. A multiplicative cipher
with a key of 2 looks like:
Example
 plaintext     number     times 2      ciphertext
     a           1           2             B
     b           2           4             D
     .
     .            .
                  .          .
                             .             .
                                           .
     .            .          .             .
    m              13       26                Z
    n              14        2                B
    o              15        4                D
    .
    .               .
                    .        .
                             .                .
                                              .
    .               .        .                .
    z              26       26                Z

   Joshua Holden (RHIT)      “How Do You Say ‘Cryptography’?”           8 / 16
Phi
So even keys are bad, and so is one other. (Which one?)
In fact, the bad keys are exactly those which have a common factor
with 26. Or, to put it another way:
Fact
The good keys for the multiplicative cipher are the numbers between 1
and 26 which are relatively prime to 26.

These good keys are counted by the Euler phi function, which is very
important in number theory (and cryptography):


                             φ(n) = # {1 ≤ k ≤ n : gcd(k , n) = 1}

φ(26) = 12, so there are 12 good keys for this cipher.

      Joshua Holden (RHIT)            “How Do You Say ‘Cryptography’?”   9 / 16
Aloha



Clearly, losing more than half of our keys can’t be good!
We could solve the problem in a terribly extreme way by getting rid of
the English language altogether and using a language with an odd
number of letters.
The Hawaiian alphabet, for instance, has 13:
 plaintext:      aeiouhklmnpw‘
(Yes, that last symbol is a letter.)




    Joshua Holden (RHIT)    “How Do You Say ‘Cryptography’?”         10 / 16
Two can be good, too!
So the multiplicative cipher with a key of 2 in Hawaiian looks like:
 plaintext      number     times 2      ciphertext
     a             1           2            E
     e             2           4            O
     i             3           6            H
     o             4           8            L
     u             5          10            N
     h             6          12            W
     k             7           1            A
     l             8           3            I
     m             9           5            U
     n            10          7             K
     p            11          9             M
     w            12          11            P
     ‘            13          13            ‘
    Joshua Holden (RHIT)      “How Do You Say ‘Cryptography’?”         11 / 16
Hawaiian keys




How many good keys are there for decimation ciphers in Hawaiian?
Since 13 is prime, every key except 13 itself is good.
φ(13) = 12 good keys, same as in English.




   Joshua Holden (RHIT)   “How Do You Say ‘Cryptography’?”         12 / 16
The formula for phi



A nice application of the inclusion-exclusion principle can be used to
prove:
Theorem
        e
If n = p11 · · · ptet then

                      φ(n) = p11 − p11 −1 · · · ptet − ptet −1 .
                              e     e




    Joshua Holden (RHIT)        “How Do You Say ‘Cryptography’?”     13 / 16
Danish, anyone?


So for English, we have φ(26) = (2 − 1)(13 − 1) = 12 good keys.
For Hawaiian, φ(13) = (13 − 1) = 12, also.
Spanish has 27 letters and φ(27) = (27 − 9) = 18 good keys.
Romanian has 28 letters and φ(28) = (4 − 2)(7 − 1) = 12 good keys.
Danish, Norwegian, and Swedish all have 29 letters and
φ(29) = (29 − 1) = 28 good keys.
So clearly we should be sending our secret messages in Scandinavian
languages!




   Joshua Holden (RHIT)   “How Do You Say ‘Cryptography’?”        14 / 16
Further developments




There is lots of other modular arithmetic that can be motivated in this
way.
You may see some of it (fixed points) in the next talk.
But if you only look at it in English, you only get to see one modulus!




    Joshua Holden (RHIT)   “How Do You Say ‘Cryptography’?”           15 / 16
EILWE ‘LO
                       and thanks for listening!



Joshua Holden (RHIT)     “How Do You Say ‘Cryptography’?”   16 / 16

Mais conteúdo relacionado

Mais procurados

Cypher technique
Cypher techniqueCypher technique
Cypher techniqueZubair CH
 
Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003keyurbz
 
History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher SystemAsad Ali
 
Solutions advanced sb
Solutions advanced sbSolutions advanced sb
Solutions advanced sbmaicanhtinh
 
Classic Information encryption techniques
Classic Information encryption techniquesClassic Information encryption techniques
Classic Information encryption techniquesJay Nagar
 

Mais procurados (9)

Cypher technique
Cypher techniqueCypher technique
Cypher technique
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher System
 
Solutions advanced sb
Solutions advanced sbSolutions advanced sb
Solutions advanced sb
 
Ch02
Ch02Ch02
Ch02
 
Classic Information encryption techniques
Classic Information encryption techniquesClassic Information encryption techniques
Classic Information encryption techniques
 
Topic3 playfain
Topic3 playfainTopic3 playfain
Topic3 playfain
 

Destaque

Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1Deepak John
 
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...Joshua Holden
 
Modular Arithmetic and Trap Door Ciphers
Modular Arithmetic and Trap Door CiphersModular Arithmetic and Trap Door Ciphers
Modular Arithmetic and Trap Door CiphersJoshua Holden
 
Eucledian algorithm for gcd of integers and polynomials
Eucledian algorithm for gcd of integers and polynomialsEucledian algorithm for gcd of integers and polynomials
Eucledian algorithm for gcd of integers and polynomialsSWAMY J S
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSAPratik Poddar
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 

Destaque (7)

Cryptographicalgorithms
CryptographicalgorithmsCryptographicalgorithms
Cryptographicalgorithms
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1
 
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
The Pohlig-Hellman Exponentiation Cipher as a Bridge Between Classical and Mo...
 
Modular Arithmetic and Trap Door Ciphers
Modular Arithmetic and Trap Door CiphersModular Arithmetic and Trap Door Ciphers
Modular Arithmetic and Trap Door Ciphers
 
Eucledian algorithm for gcd of integers and polynomials
Eucledian algorithm for gcd of integers and polynomialsEucledian algorithm for gcd of integers and polynomials
Eucledian algorithm for gcd of integers and polynomials
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 

Semelhante a How Do You Say 'Cryptography' in Romanian?

dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.pptdokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppthusnainali397602
 
Informationtoinformation///Security.pptx
Informationtoinformation///Security.pptxInformationtoinformation///Security.pptx
Informationtoinformation///Security.pptxMahmoodTareq3
 
The Engima Cipher
The Engima CipherThe Engima Cipher
The Engima Cipherguestfaf89d
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Saif Kassim
 

Semelhante a How Do You Say 'Cryptography' in Romanian? (6)

dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.pptdokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
dokumen.tips_chapter-2-classical-encryption-techniques-56969e027fe68.ppt
 
Informationtoinformation///Security.pptx
Informationtoinformation///Security.pptxInformationtoinformation///Security.pptx
Informationtoinformation///Security.pptx
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
The Engima Cipher
The Engima CipherThe Engima Cipher
The Engima Cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03
 

Mais de Joshua Holden

The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...Joshua Holden
 
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...Joshua Holden
 
Statistics for fixed points of x ↦ x^x mod p
Statistics for fixed points of x  ↦ x^x mod pStatistics for fixed points of x  ↦ x^x mod p
Statistics for fixed points of x ↦ x^x mod pJoshua Holden
 
Teaching the Group Theory of Permutation Ciphers
Teaching the Group Theory of Permutation CiphersTeaching the Group Theory of Permutation Ciphers
Teaching the Group Theory of Permutation CiphersJoshua Holden
 
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...Joshua Holden
 
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...Joshua Holden
 
A statistical look at maps of the discrete logarithm
A statistical look at maps of the discrete logarithmA statistical look at maps of the discrete logarithm
A statistical look at maps of the discrete logarithmJoshua Holden
 
Mapping the discrete logarithm
Mapping the discrete logarithmMapping the discrete logarithm
Mapping the discrete logarithmJoshua Holden
 
Fixed points and two-cycles of the self-power map
Fixed points and two-cycles of the self-power mapFixed points and two-cycles of the self-power map
Fixed points and two-cycles of the self-power mapJoshua Holden
 
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...Joshua Holden
 
A Good Hash Function is Hard to Find, and Vice Versa
A Good Hash Function is Hard to Find, and Vice VersaA Good Hash Function is Hard to Find, and Vice Versa
A Good Hash Function is Hard to Find, and Vice VersaJoshua Holden
 
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...Joshua Holden
 
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...Joshua Holden
 
How to Paint Your Way out of a Maze
How to Paint Your Way out of a MazeHow to Paint Your Way out of a Maze
How to Paint Your Way out of a MazeJoshua Holden
 
Blackwork embroidery and algorithms for maze traversals
Blackwork embroidery and algorithms for maze traversalsBlackwork embroidery and algorithms for maze traversals
Blackwork embroidery and algorithms for maze traversalsJoshua Holden
 
Mathematical Cryptography
Mathematical CryptographyMathematical Cryptography
Mathematical CryptographyJoshua Holden
 
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...Joshua Holden
 

Mais de Joshua Holden (18)

The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
The Interplay Between Art and Math: Lessons from a STEM-based Art and Math co...
 
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
Between the Two Cultures: Teaching Math and Art to Engineers (and Scientists ...
 
Statistics for fixed points of x ↦ x^x mod p
Statistics for fixed points of x  ↦ x^x mod pStatistics for fixed points of x  ↦ x^x mod p
Statistics for fixed points of x ↦ x^x mod p
 
Teaching the Group Theory of Permutation Ciphers
Teaching the Group Theory of Permutation CiphersTeaching the Group Theory of Permutation Ciphers
Teaching the Group Theory of Permutation Ciphers
 
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
Granny’s Not So Square, After All: Hyperbolic Tilings with Truly Hyperbolic C...
 
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
Stitching Graphs and Painting Mazes: Problems in Generalizations of Eulerian ...
 
A statistical look at maps of the discrete logarithm
A statistical look at maps of the discrete logarithmA statistical look at maps of the discrete logarithm
A statistical look at maps of the discrete logarithm
 
Mapping the discrete logarithm
Mapping the discrete logarithmMapping the discrete logarithm
Mapping the discrete logarithm
 
Fixed points and two-cycles of the self-power map
Fixed points and two-cycles of the self-power mapFixed points and two-cycles of the self-power map
Fixed points and two-cycles of the self-power map
 
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
Braids, Cables, and Cells II: Representing Art and Craft with Mathematics and...
 
A Good Hash Function is Hard to Find, and Vice Versa
A Good Hash Function is Hard to Find, and Vice VersaA Good Hash Function is Hard to Find, and Vice Versa
A Good Hash Function is Hard to Find, and Vice Versa
 
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
Braids, Cables, and Cells: An intersection of Mathematics, Computer Science, ...
 
Math in Your Hands
Math in Your HandsMath in Your Hands
Math in Your Hands
 
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
Braids, Cables, and Cells I: An Interesting Intersection of Mathematics, Comp...
 
How to Paint Your Way out of a Maze
How to Paint Your Way out of a MazeHow to Paint Your Way out of a Maze
How to Paint Your Way out of a Maze
 
Blackwork embroidery and algorithms for maze traversals
Blackwork embroidery and algorithms for maze traversalsBlackwork embroidery and algorithms for maze traversals
Blackwork embroidery and algorithms for maze traversals
 
Mathematical Cryptography
Mathematical CryptographyMathematical Cryptography
Mathematical Cryptography
 
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
 

Último

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 

Último (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

How Do You Say 'Cryptography' in Romanian?

  • 1. “How Do You Say ‘Cryptography’ in Romanian?” Learning About Integers from Ciphers in Different Languages Joshua Holden Rose-Hulman Institute of Technology http://www.rose-hulman.edu/~holden Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 1 / 16
  • 2. Decimation ciphers The decimation cipher goes back at least as far as 1935. Pick a key, say 3. Start by writing out the plaintext (original message) alphabet. Example plaintext: abcdefghijklmnopqrstuvwxyz Count off every third letter, crossing them out (or “decimating” them) and writing them below as our ciphertext (encrypted message) alphabet. Example plaintext: ab/defghijklmnopqrstuvwxyz c ciphertext: C Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 2 / 16
  • 3. Decimation ciphers The decimation cipher goes back at least as far as 1935. Pick a key, say 3. Start by writing out the plaintext (original message) alphabet. Example plaintext: abcdefghijklmnopqrstuvwxyz Count off every third letter, crossing them out (or “decimating” them) and writing them below as our ciphertext (encrypted message) alphabet. Example plaintext: ab/de/ ghijklmnopqrstuvwxyz c f ciphertext: CF Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 2 / 16
  • 4. Decimation ciphers The decimation cipher goes back at least as far as 1935. Pick a key, say 3. Start by writing out the plaintext (original message) alphabet. Example plaintext: abcdefghijklmnopqrstuvwxyz Count off every third letter, crossing them out (or “decimating” them) and writing them below as our ciphertext (encrypted message) alphabet. Example plaintext: ab/de/ gh/ c f ijklmnopqrstuvwxyz ciphertext: CFI Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 2 / 16
  • 5. Decimation ciphers The decimation cipher goes back at least as far as 1935. Pick a key, say 3. Start by writing out the plaintext (original message) alphabet. Example plaintext: abcdefghijklmnopqrstuvwxyz Count off every third letter, crossing them out (or “decimating” them) and writing them below as our ciphertext (encrypted message) alphabet. Example plaintext: ab/de/ gh/ lmnopqrstuvwxyz c f ijk / ciphertext: CFIL Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 2 / 16
  • 6. Decimation ciphers The decimation cipher goes back at least as far as 1935. Pick a key, say 3. Start by writing out the plaintext (original message) alphabet. Example plaintext: abcdefghijklmnopqrstuvwxyz Count off every third letter, crossing them out (or “decimating” them) and writing them below as our ciphertext (encrypted message) alphabet. Example plaintext: ab/de/ gh/ lmnopqrstuvwxyz c f ijk / / ciphertext: CFILO Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 2 / 16
  • 7. Decimation ciphers The decimation cipher goes back at least as far as 1935. Pick a key, say 3. Start by writing out the plaintext (original message) alphabet. Example plaintext: abcdefghijklmnopqrstuvwxyz Count off every third letter, crossing them out (or “decimating” them) and writing them below as our ciphertext (encrypted message) alphabet. Example plaintext: ab/de/ gh/ lmnopq/stuvwxyz c f ijk / / r ciphertext: CFILOR Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 2 / 16
  • 8. Decimation ciphers The decimation cipher goes back at least as far as 1935. Pick a key, say 3. Start by writing out the plaintext (original message) alphabet. Example plaintext: abcdefghijklmnopqrstuvwxyz Count off every third letter, crossing them out (or “decimating” them) and writing them below as our ciphertext (encrypted message) alphabet. Example plaintext: ab/de/ gh/ lmnopq/st/vwxyz c f ijk / / r u ciphertext: CFILORU Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 2 / 16
  • 9. Decimation ciphers The decimation cipher goes back at least as far as 1935. Pick a key, say 3. Start by writing out the plaintext (original message) alphabet. Example plaintext: abcdefghijklmnopqrstuvwxyz Count off every third letter, crossing them out (or “decimating” them) and writing them below as our ciphertext (encrypted message) alphabet. Example plaintext: ab/de/ gh/ lmnopq/st/vw/ c f ijk / / r u xyz ciphertext: CFILORUX Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 2 / 16
  • 10. Wrap around When you get to the end, “wrap around” to the beginning.1 In this case, cross out the “a” and keep going. Example plaintext: ab/de/ gh/ lmnopq/st/vw/ c f ijk / / r u xyz ciphertext: CFILORUX 1 There is an alternative which may be older but is not as pretty. Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 3 / 16
  • 11. Wrap around When you get to the end, “wrap around” to the beginning.1 In this case, cross out the “a” and keep going. Example plaintext: ab/de/ gh/ lmnopq/st/vw/ / c f ijk / / r u xyz ciphertext: CFILORUXA 1 There is an alternative which may be older but is not as pretty. Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 3 / 16
  • 12. Wrap around When you get to the end, “wrap around” to the beginning.1 In this case, cross out the “a” and keep going. Example plaintext: ab//e// ijklmnopq/st// w/ yz / cd fgh/// // // r / uv x/ ciphertext: CFILORUXADGJMPSVY 1 There is an alternative which may be older but is not as pretty. Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 3 / 16
  • 13. Wrap it up Finally, wrap around to the “b” and finish up: Example plaintext: ab//e// ijklmnopq/st// w/ yz / cd fgh/// // // r / uv x/ ciphertext: CFILORUXADGJMPSVY Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 4 / 16
  • 14. Wrap it up Finally, wrap around to the “b” and finish up: Example plaintext: abc/e// ijklmnopq/st// w/ yz ///d fgh/// // // r / uv x/ ciphertext: CFILORUXADGJMPSVYB Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 4 / 16
  • 15. Wrap it up Finally, wrap around to the “b” and finish up: Example plaintext: abc//// h////////pq/st//// y/ ///defg/ ijklmno //r //uvwx/ z ciphertext: CFILORUXADGJMPSVYBEHKNQTWZ Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 4 / 16
  • 16. Be fruitful So our final translation of plaintext to ciphertext is: Example plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: CFILORUXADGJMPSVYBEHKNQTWZ and an example message might be: Example plaintext: befruitfulandmultiply ciphertext: FORBKAHRKJCPLMKJHAVJW Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 5 / 16
  • 17. Letters to numbers How can we describe the decimation method in terms of modular arithmetic? We should translate our numbers into letters, of course. Example plaintext: a b c d e f g h i j ··· numbers: 1 2 3 4 5 6 7 8 9 10 ··· some operation?: 3 6 9 12 15 18 21 24 1 4 ··· ciphertext: C F I L O R U X A D ··· Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 6 / 16
  • 18. Multiplicative cipher And now we see that a decimation cipher is the same as a “multiplicative cipher” with multiplication by 3 modulo 26: Example plaintext number times 3 ciphertext a 1 3 C b 2 6 F . . . . . . . . . . . . y 25 23 W z 26 26 Z Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 7 / 16
  • 19. Bad Keys Are there any keys we can’t use? Think about multiplying by 2 — we know that any number multiplied by 2 is even. A multiplicative cipher with a key of 2 looks like: Example plaintext number times 2 ciphertext a 1 2 B b 2 4 D . . . . . . . . . . . . m 13 26 Z n 14 2 B o 15 4 D . . . . . . . . . . . . z 26 26 Z Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 8 / 16
  • 20. Phi So even keys are bad, and so is one other. (Which one?) In fact, the bad keys are exactly those which have a common factor with 26. Or, to put it another way: Fact The good keys for the multiplicative cipher are the numbers between 1 and 26 which are relatively prime to 26. These good keys are counted by the Euler phi function, which is very important in number theory (and cryptography): φ(n) = # {1 ≤ k ≤ n : gcd(k , n) = 1} φ(26) = 12, so there are 12 good keys for this cipher. Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 9 / 16
  • 21. Aloha Clearly, losing more than half of our keys can’t be good! We could solve the problem in a terribly extreme way by getting rid of the English language altogether and using a language with an odd number of letters. The Hawaiian alphabet, for instance, has 13: plaintext: aeiouhklmnpw‘ (Yes, that last symbol is a letter.) Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 10 / 16
  • 22. Two can be good, too! So the multiplicative cipher with a key of 2 in Hawaiian looks like: plaintext number times 2 ciphertext a 1 2 E e 2 4 O i 3 6 H o 4 8 L u 5 10 N h 6 12 W k 7 1 A l 8 3 I m 9 5 U n 10 7 K p 11 9 M w 12 11 P ‘ 13 13 ‘ Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 11 / 16
  • 23. Hawaiian keys How many good keys are there for decimation ciphers in Hawaiian? Since 13 is prime, every key except 13 itself is good. φ(13) = 12 good keys, same as in English. Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 12 / 16
  • 24. The formula for phi A nice application of the inclusion-exclusion principle can be used to prove: Theorem e If n = p11 · · · ptet then φ(n) = p11 − p11 −1 · · · ptet − ptet −1 . e e Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 13 / 16
  • 25. Danish, anyone? So for English, we have φ(26) = (2 − 1)(13 − 1) = 12 good keys. For Hawaiian, φ(13) = (13 − 1) = 12, also. Spanish has 27 letters and φ(27) = (27 − 9) = 18 good keys. Romanian has 28 letters and φ(28) = (4 − 2)(7 − 1) = 12 good keys. Danish, Norwegian, and Swedish all have 29 letters and φ(29) = (29 − 1) = 28 good keys. So clearly we should be sending our secret messages in Scandinavian languages! Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 14 / 16
  • 26. Further developments There is lots of other modular arithmetic that can be motivated in this way. You may see some of it (fixed points) in the next talk. But if you only look at it in English, you only get to see one modulus! Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 15 / 16
  • 27. EILWE ‘LO and thanks for listening! Joshua Holden (RHIT) “How Do You Say ‘Cryptography’?” 16 / 16