Network and Computer Security, Lecture 11 - MIT OpenCourseWare · 6.857 Computer and Network...
Transcript of Network and Computer Security, Lecture 11 - MIT OpenCourseWare · 6.857 Computer and Network...
6.857 Computer and Network Security Lecture 11
Project Ideas:
Evaluate encrypted email options (esp. ease-of-use) Overview of open-source crypto libraries
Today: More “crypto math”
Finding large primes One-time mac Divisors, gcd, extended gcd, mult. Inverses Orders of elements Finding generators
1
HI[J
eI
InI
,_I:9
T IIH
IILC
S-z
S
.4
LI
-i—
IJ__.
.--—
—i‘-S
—L
--
CL
LU
HL
Lt*
WJ4
Z.j1
H__i
i-W
II
3-)4—
1
-HC
__
—4
IS
i—
---i—-
I
7:
_
a-
__
tGã.
_L
ki_
L__
I5Z4EEC”
jzZ
tiir
ujer
Tri
s__
__
vii
i—
Ct---h
‘
__
__
_
.
4!‘t!
—.
___
F-.
-
Itfl-•-i-
I-.
—iJ
-o
-•
-4S
1-
i4-t-E
___
--‘
0)<
—-—
-—---
I_I
a:
__
__
-—
1-‘
hr’
F
l1
.øta
4-5
S
e
__
___
I
-_
___
_____
S
it
2
“1 2
rr
-II
r-’
-.
I.__
a*
C ‘1—.-
h4’
Sk
—4•
—2
.—
-(
-ct
r•%
_’.
: .t_-
0“.
La
C40
It r -.
S ‘—
V.
.t
-1S
.—
-I-i
I-v r’ ;.t
tD
-‘
3-L
.“
-n3
4‘
n.
t4-t -jr
ftE
S.
1--
Z)r-.. 3
r—
.!t
.a
•4
•-r’
1%
-a
-1’
ri
S.
T.
v Wr”
—-v
ri
CLt m -1 S.. 17 ft
t .3 I tt :3 ‘4 3 p v.4 0 I”
a3-C
‘I’
— v.i
t_.
.0 3 41 p
I—
0 a a
3
bc
___________________________________________
IHlr
______________________________i
L1301
__
-
___+t-L’
IJJ”L44Tj
:z 0r.=r (A
__
—
ELC:E bz:z::::zzz
rL
iiiEir
a
]
IT
—
4
II.
L!
v’e
I iS ! ;) 1. F -C,)j—
na
:::z:z zzz::zrrzrz:
“
-
C
)i{fl!W1t--t
— -
•1
-jJTy.
W.
c -1¼. rrlitsñy
t
r
b
••
n C*
a i. I
1i:Lz±z
Vasttftt
4
L13.a
Dvcsor, • ci (a E Ji’wles a1’ (evenk)
(a aci.k•cA is aci;t.nsor Ira ;f Jo &àta
• (Va’) ijaltp% 1. 1 0 1.. ii• ..Lt 0. iS a dpjj%br Of a a divisor ot V,
tkenA a
_______
q £ b.
• Tht aie&crnwn cltvtsor 0c a & 6 is
ekt kreit o(- tr Coh,fliov ci
.tt6a(,0\=o
•
______
(a4,3d) =
sed
•tf: oLb aetç\44v4pr;tne
I I I
E , ;. { •
.
. ...!
H J.i j I
5
_-!
GH
t,—
__
__
:ji,
e—
---—
1_
i_4
__
1__
LJL
tz
-sr
III,
‘-°iy
t‘p
—-i---j-t-
j%’
siC-f
--
litL
fr’E
!x
0Th-C
4WI
——
——
t---t---&—
_—
Lt-J_i_
——
-a
—
t4
——II’
0II
—
__
__
__
_
H
_
11
I
I
ZZ
EE
E_!
::4
zL
Ji
z::ET
EE
EI
ili
4
:jc’t
iI
r
E-ala
-,
__
___
I
H___
_Q
‘S..
+-4—
+—
-
______
___
—I----------
4z*tz
tz.
r
_
a
r
__
-Cti
__
_
E‘-
—C
I
Ei
ta!
I—I
C,
a
6
i4iiiii
:tlz:HE:
ZTø.:4
H—
•j’
Fr
flk,°-
U‘L______-__-____.___-____._.._.___._
I—-----—-..--—..————-—---—--——-.——-————.—-—-..cI]
z:zz:zz:::z:tzzzimrz
__-
-1----.-
:i1dwbX
çSpQj 1Y
t
iiw):çcS
zh.mZZEEEJ,U
-—i
—--———---
F----
‘4’I
-——
C
‘‘W0
-
——4---—
zzHd‘ E1
.wja
II ci-4
C
4--—
\1
IrPOW)H;.L
It!
4L’!.S’j!
.1 ‘1
L q Si,
_I_-I.
LIL’
?tHtI.5
4a
41!.14:
0=1
S
0•‘T3T
5*1.L
—
$I=“jz,b
I lily’&3iLXb
7
c3L{3.S
C4 1 rep •41 I t•1. c -n.ft4n4
I.’
-------
•LL*
—
(4
—
L.t— -
: [
L.I)’ tiLt
-
1
_ ____
4
H—H +Hc4bh-J—
Z stwizI
__
tHtit$**tipiç4c?1=’(**IZ
-
4$r.‘,,
1;c —
-—
J1LrL = itpJu1on
_____
EL3:
t
izzt ttt*W4zti±1ttI
-
__
“ #EL FFEEF
_t-_4r-t
_•l I ‘I III
___ _______
H J
c m. ‘I’ e
-‘-
L41
-rJL
, I
-
Iãr
—1— -- -
--e4—-
-1---t—
--I—-
rr1”
--HH
HE
a a- a-
. .
I.
r.
8
•)TFit1
ji+j9
—
——
—..
—.
0 % S..—
H•F
H
ul
I ‘t I-
I 0- t 3 i 14
4-F
Fa-
1II.
•1I
I;.
II
I3
—
—
Hrr_
E ?E
I£
-,<
Jib
wig
Lb
-t
‘.
‘rrr
rtrr
m1
E1EE
4L
HzE
jFij
ELI
j•:ta
Fitp
1-t
‘H
OT
t’”rtttt
-
F—
4
rjrT
ht!_L
-n4L
___
-
H-t
--
t:
Etl
!T
-4
EL
ET
j
P.
-.. t
S- I
jfr La-
I—
I
zHz
-
__
--
ThJ
‘
CI
Z
I
II
II
II L
H—
.z:*
t.
ZE
LE
L
__
_-
Uf
i•--
LV
-
L1
10
PLE iNI)Ii:
L_13,8
flw.onm: .1
(1e,
;cn is
Q tntfl%r
is
____
rnor
I
p Ln,)tI.
E k4.s tf(ij) c3evvenk’ors
411. Cs7n4 \
W0w t°cc.A eryerlrbbr flock pr;mcp?
rn SCCMS 0 rt,4rt kinOs.1t4yc I
4cjrrIa4bn 4 p-L
we
prcnies fpr- JV)S% ClQrij p—i. c
H
Thtot&%’.
Exq!nphe p
3)9? P
t0adXf r 9nrnt) 4•t
of- jtrem4tri vnxk p i
=11
W%fle. 4achrtj CS c*t
_____
.
- U11
•#fl
I
-I
t.
1j
rit
tHin
;.4
-
; ‘4 G!a y
Eli.
7.-
.‘
, itli
Ltz
,rv
Izz:
i_V
z___
_Jt
L
.._
j,_
,.......—
. —a
—— —
. ——
-.._
a_e_
I
1•
L9
D.7
.“‘4
Iz :
r::
-.—
s
4
ii
I.
Cl
flff
-r
‘a
.1
1t
i....14n
40
0J-I
t1
4.
i4
Jo rn
-
.1
‘.11
?
Th1
——
.i
ir
V—
Pri
H-
—-
—-
__ ——
Ltt
iJt4
cfiL
L3
I
__
L-
4$--
------
----
:
fl
H_,
N-; I
‘li
iHfj
;-j-
--
rt
r—
---r
---4
---’
-- -
-‘
-‘—
—4
—-
II
frt
IA
_i
_i_
j_flII.
I— I—
fl:
41
C, oH
.1.
‘•1
12
—-S-.-
•• — —---— -
WI Ee:LUt;’4C$k
__
tT.I
P- , I:
I,
a —
-- ii DAtE
n--we--—-
___—j
—
-1 -
. --r —
L l
.1 tej’ir C4 54‘II I
A
A!1 hi
——--
i
r”-rr r::
-
{Y4JI I I I’
gnmiJrf4!%11a%at_____ •
-—i-± L; 44 ¶4!WSJ!6r_L L4:
II II p I
‘ Tfriz—t-I----H!I—f— —1- -[--- -r fl—-’ 4—-t----— 4_t__H_J
±_±Lztt =
r--
LU
-a— r ---——----i- I
iç-ar:t:it:1Z E_t_L ZL L.1_L -l : h’’’L1Vt i
A
iH——-—
ti——II-__L__I be f I I I———----_f —--W—-’hI;jfI_(tftt:ti)1 —L ——H— — --—
— -i--t1—L-FrH
e%$_L-EL4ifl4k4rh:4i
iitØefltfr4Ek!!Sk!EEEEt13
zpzILC
I
--
‘It”
II
I—!
__L___
——4
-.
—
it+-f4tt
±4I2
ZT
L10.
I
L1•1r
;-z
-F-p
-
--
44
-i
frtJ
frHt1
,__
_._
%j
4f—1
__
Lt
IU
JEJ1
__
x‘I
_
‘“t’.A
÷t—
r’—
——
--Hfli
‘at
•4-
tIk
i—i
INJr1ii
iI
!ht
pc
IE
J
q’i1
Ca—I
ii
—;fla
——
I-
E
Eju
LL
t-
±j
‘c-rf—
”R
——
-—-—
—r_
j_—
_---.--IE
—_
L—
P1
Ett!
‘IE11
1’ !jzI
tJEtitrJr
4-1
e-tz
:-tj---iL
rL
4r
--—-
___
SIS
.
a!-,
Ct.
S..
14
MIT OpenCourseWarehttp://ocw.mit.edu
6.857 Network and Computer SecuritySpring 2014
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.