Cryptography Trivia

16
CRYPTOGRAPHY TRIVIA Week two!

description

Cryptography Trivia. Week two!. The Game. 8 groups of 2 5 rounds Math 1 Modern history Math 2 Computer Programming Analyzing and comparing Cryptosystems 10 questions per round Each question is worth 1 point. Math Round 1. Find a field with 7 elements. Find a field with 9 elements. - PowerPoint PPT Presentation

Transcript of Cryptography Trivia

Page 1: Cryptography Trivia

CRYPTOGRAPHY TRIVIAWeek two!

Page 2: Cryptography Trivia

The Game 8 groups of 2 5 rounds

Math 1 Modern history Math 2 Computer Programming Analyzing and comparing Cryptosystems

10 questions per round Each question is worth 1 point

Page 3: Cryptography Trivia

Math Round 11. Find a field with 7 elements.2. Find a field with 9 elements.3. Multiply in .4. Find in mod 5. Find all quadratics in .6. Find 7. Convert to . 8. Convert to hex.9. Convert to decimal.10. How many bits would it take to represent a

100-digit number?

Page 4: Cryptography Trivia

Modern [cryptography] history1. Name a fundamental paradigm shift in

cryptography that occurred in the 70’s.2. This cryptosystem was developed in the 70’s

by IBM, with help from the NSA, and lasted through the 90’s.

3. This cryptosystem handles the majority of worldwide cryptography today.

4. In the above cryptosystem, how many bits are required in the key for “top secret” documents.

5. What is the “newest” cryptosystem we have talked about?

Page 5: Cryptography Trivia

Modern [cryptography] history6. What country discovered RSA before it was

known publically?7. What does DES stand for?8. What does AES stand for?9. What does RSA stand for?10. What does ECC stand for?

Page 6: Cryptography Trivia

Math round 21. Encrypt in the RSA system with and .2. Decrypt 5 in the same RSA system.3. Run 13 through the S-box. 4. Find 4 points on 5. Find the slope of the line connecting and

S 0 1 2 30 a b c d1 e f g h2 i j k l

Page 7: Cryptography Trivia

Math round 26. Find the equation for the line containing and .7. How many squares are there in ?8. Find an upper bound on the number of points

on .9. Perform the “shift rows” operation from AES

on the accompanying AES message.10. Perform the “mix columns” operation on the

accompanying column. 0 1 2 34 5 6 78 9 A BC D E F

0x010x000x000x00

Page 8: Cryptography Trivia

Computer Programming1. What is the value of A?2. What is the value of B?3. What is the value of C?

A = 5;B = 3;C = A + B * B;

Page 9: Cryptography Trivia

Computer Programming4. What is the value of A?5. What is the value of B?

A = 5;B = A;A = 4;

Page 10: Cryptography Trivia

Computer Programming6. How many multiplications are used in the

following program?7. What is the value of A?

A = 2;Count = 1;While(Count < 4)A = A * A;End

Page 11: Cryptography Trivia

Computer Programming8. How many multiplications are used in the

following program?9. What is the value of A?

A = 1;While(A < 2^3)A = A * 2;End

Page 12: Cryptography Trivia

Computer Programming10. True or false: A = B

A = 5;B = A;A = 4;

Page 13: Cryptography Trivia

Analyzing and comparing Cryptosystems

1. Which of these encrypt the slowest? DES, AES, RSA, ECC.

2. Why is AES preferred to DES?3. Why is ECC preferred to RSA?4. AES consists of 4 operations: xor’ing a key,

mixing columns, S-box substitution, and _____________.

5. How is the DES S-box and AES S-box fundamentally different?

Page 14: Cryptography Trivia

Analyzing and comparing Cryptosystems

6. RSA and ECC have _________ security.7. AES has __________ security.8. DES has __________ security.9. Which would be more secure? RSA built from

two 64-bit primes, or RSA built from four 32-bit primes?

10. Which of these would require the most operations to encrypt one message? 128-bit AES, 128-bit RSA, or 128-bit ECC?

Page 15: Cryptography Trivia

CRYPTOGRAPHY TRIVIAThe End

Page 16: Cryptography Trivia

Reference Information Created in the summer of 2013 by Dr.

Jeffrey Beyerl for use in a cryptography class.

This is just a vanilla PowerPoint, but of course like anything you download from the internet: use at your own risk.