MATH 470 Lecture 3

From Notes
Jump to navigation Jump to search

« previous | Tuesday, January 22, 2013 | next »


Homework 2 will be online later today.

Deciding whether

takes one division step:


Deciding whether

has a solution iff [1] and takes 5 × (number of digits in smaller of and ) + 1



From Homework 1

Problem 18b

When is the matrix invertible?

The inverse should be

As long as the determinant has a multiplicative inverse, then the formula still works.

Working in , the determinant has to be relatively prime to 26, or .

...

When is undefined for prime number ?

Therefore, only makes sense mod when , so makes nonsensical.


Complexity

[2]

Caesar cipher can be broken by looking at 26 possible shifts (where = key) of plaintext.

Vigenere cipher or equivalently, can be broken with brute force by looking at possible keys/shifts

Edit.png

Page Under Construction
This page still needs revision. Please edit this page to finish it.

Frequency of letters in English: Table 2.1 on page 17

Both are examples of symmetric [3] ciphers, where the decryption key is easy to obtain from the encryption key.

Disadvantages:

  1. If an enemy knows the encryption key, he/she gets the decryption key (almost) for free.
  2. You must still send the key to your partner somehow


Vigenere Cipher

easier to break if key length is known and plaintext is long enough (sufficiently large samles of English text have predictable letter frequencies)

  1. Decimate your sequence:
  2. Perform frequency analysis on decimations: most frequent in each is likely the letter 'E'
  • If plaintext consists of symbols, you're going to spend time reading anyway, so adversary should spend time breaking code.
  • IF we know , we need time to break the cipher
  • If we don't know , finding it is nontrivial.


In practice, , perhaps .


Dearrangement Inequality

Discovered in 1952 by Hardy-Little???, this inequality will help us find

Given any sequences and of the same length and any permutation [4] , we have

In particular, if both sequences are strictly increasing, then equality occurs only for

For example, if and , then

Finding Key Length

Given , do the following:

  1. Get frequency info for symbols in your language (e.g. English)
  2. for from 1 to , compare the frequency of a collision between and for . This yields

To be continued …

Next Time

Dr. Rojas will be in Washington D.C.

Guest lecture Catherine Yan on Fermat's Little Theorem


Footnotes

  1. Lame's Theorem
  2. Later, we'll see more on the complexity of multiplication, and that the complexity of multiplication ≈ complexity of division for integers
  3. Later, we'll see asymmetric ciphers (enemy cannot easily get the decryption key, even knowing the encryption key)
  4. A permutation is a one-to-one and onto mapping