Lecture 14 Outline

Reading: text, §10
Due: Homework 3, on May 12


  1. Greetings and felicitations!
    1. Discussion question
  2. Symmetric Cryptography
    1. Monoalphabetic (simple substitution): f(a) = a + k mod n
    2. Example: Caesar with k = 3, RENAISSANCEUHQDLVVDQFH
    3. Polyalphabetic: Vigenère, fi(a) = a + ki
    4. Cryptanalysis: first do index of coincidence to see if it is monoalphabetic or polyalphabetic, then Kasiski method.
    5. Problem: eliminate periodicity of key
  3. Long key generation
    1. Autokey cipher:
      MTHETREASUREISBURIED
      KHELLOTHETREASUREISB
      CALPEFXHWNIIIKVLVQWE
    2. Running-key cipher:
      MTHETREASUREISBURIED
      KTHESECONDCIPHERISAN
      CMOILVGOFXTMXZFLZAEQ
      wedge is that (plaintext, key) letter pairs are not random (T/T, H/H, E/E, T/S, R/E, A/O, S/N, etc.)
    3. Perfect secrecy: when the probability of computing the plaintext message is the same whether or not you have the ciphertext
    4. Only cipher with perfect secrecy: one-time pads; C = AZPR; is that DOIT or DONT?
  4. Product ciphers: DES, AES
  5. Public-Key Cryptography
    1. Basic idea: 2 keys, one private, one public
    2. Cryptosystem must satisfy:
      1. Given public key, computationally infeasible to get private key;
      2. Cipher withstands chosen plaintext attack;
      3. Encryption, decryption computationally feasible (note: commutativity not required)
    3. Benefits: can give confidentiality or authentication or both
  6. Use of public key cryptosystem
    1. Normally used as key interchange system to exchange secret keys (cheap)
    2. Then use secret key system (too expensive to use public key cryptosystem for this)
  7. RSA
    1. Provides both authenticity and confidentiality
    2. Go through algorithm:
      Idea: C = Me mod n, M = Cd mod n, with ed mod φ(n) = 1
      Public key is (e, n); private key is d. Choose n = pq; then φ(n) = (p−1)(q−1).
    3. Example: p = 5, q = 7; then n = 35, φ(n) = (5−1)(7−1) = 24. Pick d = 11. Then ed mod φ(n) = 1,
      so e = 11
      To encipher 2, C = Me mod n = 211 mod 35 = 2048 mod 35 = 18, and M = Cd mod n = 1811 mod 35 = 2.
    4. Example: p = 53, q = 61; then n = 3233, φ(n) = (53−1)(61−1) = 3120. Pick d = 791. Then e = 71
      To encipher M = RENAISSANCE, use the mapping A = 00, B = 01, …, Z = 25, = 26.
      Then: M = RE NA IS SA NC E␢ = 1704 1300 0818 1800 1302 0426
      So: C = 170471 mod 3233 = 3106; … = 3106 0100 0931 2691 1984 2927



Discussion question. An eighth grade school student in Florida shoulder-surfed a teacher he didn’t like typing in a password. He used that password to log into the teacher’s account and changed the wallpaper. The password, like all passwords on the school network, was the last name of the teacher (user), and teachers had administrative privileges on the network.

The student was first suspended for 10 days. But on April 2, 2015, the Pasco County sheriff filed felony charges against the student. The sheriff stated that he filed the charges because the teacher’s computer had “encrypted 2014 FCAT [Florida Comprehensive Assessment Test] questions”, although he admitted the student “did not view or tamper with those files.” He added “Even though some might say this is just a teenage prank, who knows what this teenager might have done.”

Do you think the student should have been suspended? Should he have been charged with a felony?


UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 153, Computer Security
Version of May 11, 2016 at 9:44PM

You can also obtain a PDF version of this.