170 likes | 186 Views
Cryptography Trivia. Week two!. The Game. 8 groups of 2 5 rounds Math 1 Modern history Math 2 Computer Programming Analyzing and comparing Cryptosystems 10 questions per round Each question is worth 1 point. Math Round 1. Find a field with 7 elements. Find a field with 9 elements.
E N D
Cryptography Trivia Week two!
The Game • 8 groups of 2 • 5 rounds • Math 1 • Modern history • Math 2 • Computer Programming • Analyzing and comparing Cryptosystems • 10 questions per round • Each question is worth 1 point
Math Round 1 • Find a field with 7 elements. • Find a field with 9 elements. • Multiply in . • Find in mod • Find all quadratics in . • Find • Convert to . • Convert to hex. • Convert to decimal. • How many bits would it take to represent a 100-digit number?
Modern [cryptography] history • Name a fundamental paradigm shift in cryptography that occurred in the 70’s. • This cryptosystem was developed in the 70’s by IBM, with help from the NSA, and lasted through the 90’s. • This cryptosystem handles the majority of worldwide cryptography today. • In the above cryptosystem, how many bits are required in the key for “top secret” documents. • What is the “newest” cryptosystem we have talked about?
Modern [cryptography] history • What country discovered RSA before it was known publically? • What does DES stand for? • What does AES stand for? • What does RSA stand for? • What does ECC stand for?
Math round 2 • Encrypt in the RSA system with and . • Decrypt 5 in the same RSA system. • Run 13 through the S-box. • Find 4 points on • Find the slope of the line connecting and
Math round 2 • Find the equation for the line containing and . • How many squares are there in ? • Find an upper bound on the number of points on . • Perform the “shift rows” operation from AES on the accompanying AES message. • Perform the “mix columns” operation on the accompanying column.
Computer Programming • What is the value of A? • What is the value of B? • What is the value of C? A = 5; B = 3; C = A + B * B;
Computer Programming • What is the value of A? • What is the value of B? A = 5; B = A; A = 4;
Computer Programming • How many multiplications are used in the following program? • What is the value of A? A = 2; Count = 1; While(Count < 4) A = A * A; End
Computer Programming • How many multiplications are used in the following program? • What is the value of A? A = 1; While(A < 2^3) A = A * 2; End
Computer Programming • True or false: A = B A = 5; B = A; A = 4;
Analyzing and comparing Cryptosystems • Which of these encrypt the slowest? DES, AES, RSA, ECC. • Why is AES preferred to DES? • Why is ECC preferred to RSA? • AES consists of 4 operations: xor’ing a key, mixing columns, S-box substitution, and _____________. • How is the DES S-box and AES S-box fundamentally different?
Analyzing and comparing Cryptosystems • RSA and ECC have _________ security. • AES has __________ security. • DES has __________ security. • Which would be more secure? RSA built from two 64-bit primes, or RSA built from four 32-bit primes? • Which of these would require the most operations to encrypt one message? 128-bit AES, 128-bit RSA, or 128-bit ECC?
Cryptography Trivia The End
Reference Information • Created in the summer of 2013 by Dr. Jeffrey Beyerl for use in a cryptography class. • This is just a vanilla PowerPoint, but of course like anything you download from the internet: use at your own risk.