1 / 14

Three-Pass Protocol for Secure Communication: Overview and Demonstration

Learn about the Three-Pass Protocol for secure messaging without a key. Discover how Alice and Bob can transmit messages securely using locks and prime numbers. Gain insights into the protocol's encryption process and its vulnerabilities. Get ready for a quiz on breaking codes and understand the importance of Fermat's locks in cryptography. Explore a toy example to comprehend the protocol's workings. Stay prepared for the upcoming computer quiz by revising the material from Chapter 2.

weeksl
Download Presentation

Three-Pass Protocol for Secure Communication: Overview and Demonstration

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DTTF/NB479: Dszquphsbqiz Day 12 • Announcements: • HW3 updated. Due next Thursday • Written quiz today • Computer quiz next Friday on breaking codes from chapter 2 • Today: • Three-pass protocol • Quiz • Questions?

  2. Wrapping up Fermat and Euler • We skipped the proof of Fermat’s Little Theorem in the text. • Be sure to read it • You are also prepared to read the rest of chapter 3 at your own pace.

  3. Three-pass protocol • How can Alice get a secret message to Bob without an established key? • Can do it with locks. • First 2 volunteers get to do the live demo

  4. Three-pass protocol • Situation: Alice wants to get a short message to Bob, but they don’t have an established key to transmit it. • Can do with locks:

  5. Three-pass protocol • Situation: Alice wants to get a short message to Bob, but they don’t have an established key to transmit it. • Can do with locks:

  6. Three-pass protocol • Situation: Alice wants to get a short message to Bob, but they don’t have an established key to transmit it. • Can do with locks:

  7. Three-pass protocol • Situation: Alice wants to get a short message to Bob, but they don’t have an established key to transmit it. • Can do with locks: Note: it’s always secured by one of their locks

  8. Now with “Fermat’s locks” • K: the secret message • p: a public prime number > K • The two locks: • a: Alice’s random #, gcd(a,p-1)=1 • b: Bob’s random #, gcd(b,p-1)=1 • To unlock their locks: • a-1 mod (p-1) • b-1 mod (p-1)

  9. K: the secret message p: a public prime number > K The two locks: a: Alice’s random #, gcd(a,p-1)=1 b: Bob’s random #, gcd(b,p-1)=1 To unlock their locks: a-1 mod (p-1) b-1 mod (p-1) Three-pass protocol: Alice computes Ka (mod p) and sends to Bob Bob computes (Ka)b (mod p) and sends it back Alice computes ((Ka)b )inv(a) (mod p) and sends it back Bob computes (((Ka)b )inv(a))inv(b) (mod p) and reads K Now with “Fermat’s locks”

  10. K: the secret message p: a public prime number > K The two locks: a: Alice’s random #, gcd(a,p-1)=1 b: Bob’s random #, gcd(b,p-1)=1 To unlock their locks: a-1 mod (p-1) b-1 mod (p-1) Three-pass protocol: Alice computes Ka (mod p) and sends to Bob Bob computes (Ka)b (mod p) and sends it back Alice computes ((Ka)b )inv(a) (mod p) and sends it back Bob computes (((Ka)b )inv(a))inv(b) (mod p) and reads K Now with “Fermat’s locks” 36 59 17 21 41 • Toy example: • 3617 (mod 59) = 12 • 1221 (mod 59) = 45 • 4541 (mod 59) = 48 • 4847 (mod 59) = 36 47 Why’s it work?

  11. Recall the basic principle • When dealing with numbers mod n, we can deal with their exponents mod _____ • Only look at once you’ve thought about this… • Given integers a and b, • Since aa-1=bb-1=1(mod p-1) • What’s K^(aba-1b-1) (mod p)?

  12. Final thought • Trappe and Washington say that it’s vulnerable to an “intruder-in-the-middle” attack. Think about this…

  13. Some levity before the exam • http://xkcd.com/c177.html • Thanks to Nathan for the link!

  14. Quiz • Closed book and computer • Get out note sheet: • 1 handwritten sheet of 8.5 x 11 paper, one side only.

More Related