Week two The Game 8 groups of 2 5 rounds Math 1 Modern history Math 2 Computer Programming Analyzing and comparing Cryptosystems 10 questions per round Each question is worth 1 point Math Round 1 ID: 564200
Download Presentation The PPT/PDF document "Cryptography Trivia" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Cryptography Trivia
Week two!Slide2
The Game
8 groups of 2
5 rounds
Math 1
Modern history
Math 2
Computer Programming
Analyzing and comparing Cryptosystems
10 questions per round
Each question is worth 1 pointSlide3
Math Round 1
Find a field with 7 elements.
Find a field with 9 elements.
Multiply
in
.Find in mod Find all quadratics in .Find Convert to . Convert to hex.Convert to decimal.How many bits would it take to represent a 100-digit number?
Slide4
Modern [cryptography] history
Name a fundamental paradigm shift in cryptography that occurred in the 70’s.
This cryptosystem was developed in the 70’s by IBM, with help from the NSA, and lasted through the 90’s.
This cryptosystem handles the majority of worldwide cryptography today.
In the above cryptosystem, how many bits are required in the key for “top secret” documents.
What is the “newest” cryptosystem we have talked about?Slide5
Modern [cryptography] history
What country discovered RSA before it was known publically?
What does DES stand for?
What does AES stand for?
What does RSA stand for?
What does ECC stand for?Slide6
Math round 2
Encrypt
in the RSA system with
and
.
Decrypt 5 in the same RSA system.Run 13 through the S-box. Find 4 points on Find the slope of the line connecting and S01230abcd1efgh2ijklSlide7
Math round 2
Find the equation for the line containing
and
.
How many squares are there in
?Find an upper bound on the number of points on .Perform the “shift rows” operation from AES on the accompanying AES message.Perform the “mix columns” operation on the accompanying column. 0123456
7
8
9
A
B
C
D
E
F
0x01
0x00
0x00
0x00Slide8
Computer Programming
What is the value of A?
What is the value of B?
What is the value of C?
A = 5;
B = 3;C = A + B * B;Slide9
Computer
Programming
What is the value of A?
What is the value of B?
A = 5;
B = A;A = 4;Slide10
Computer
Programming
How many multiplications are used in the following program?
What is the value of A?
A = 2;
Count = 1;While(Count < 4)A = A * A;EndSlide11
Computer
Programming
How many multiplications are used in the following program?
What is the value of A?
A = 1;
While(A < 2^3)A = A * 2;EndSlide12
Computer
Programming
True or false: A = B
A = 5;
B = A;
A = 4;Slide13
Analyzing and comparing Cryptosystems
Which of these encrypt the slowest? DES, AES, RSA, ECC.
Why is AES preferred to DES?
Why is ECC preferred to RSA?
AES consists of 4 operations:
xor’ing a key, mixing columns, S-box substitution, and _____________.How is the DES S-box and AES S-box fundamentally different?Slide14
Analyzing and comparing Cryptosystems
RSA and ECC have _________ security.
AES has __________ security.
DES has __________ security.
Which would be more secure? RSA built from two 64-bit primes, or RSA built from four 32-bit primes?
Which of these would require the most operations to encrypt one message? 128-bit AES, 128-bit RSA, or 128-bit ECC?Slide15
Cryptography Trivia
The EndSlide16
Reference Information
Created in the summer of 2013 by Dr. Jeffrey
Beyerl
for use in a cryptography class.
This is just a vanilla PowerPoint, but of course like anything you download from the internet: use at your own risk.