30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

(1) X precedes M with information which includes <strong>the</strong> date <strong>and</strong> time as<br />

well as his identity, thus M is extended to a longer message M1, say,<br />

which is something like<br />

M1: ‘I am X, <strong>the</strong> date is 13-06-2001 <strong>and</strong> <strong>the</strong> time is 1827. M’<br />

where M is <strong>the</strong> original message.<br />

(2) X decrypts M1 using his private key, D X , producing a cipher message<br />

D X (M1) which he sends to Y.<br />

(3) Y applies X’s public encipherment key, E X, to this cipher message <strong>and</strong> so<br />

recovers <strong>the</strong> extended message, M1, since<br />

Now:<br />

E X (D X (M1))�M1.<br />

(1) Y can be sure that X sent M1 since only X can produce D X (M1).<br />

(2) If Y claims that he received a different message, M�, X challenges Y to<br />

produce <strong>the</strong> cipher text D X (M�). Y will be unable to do this since he<br />

doesn’t know X’s secret key, D X .<br />

(3) If X claims that he sent a different message, M�, to Y <strong>the</strong> latter can show<br />

<strong>the</strong> cipher message, D X (M1), to a judge who will ask X for his secret key<br />

so that he can check whe<strong>the</strong>r <strong>the</strong> message M1 was sent. Since Y doesn’t<br />

know X’s secret key he couldn’t have constructed D X (M1). If X refuses<br />

to give his secret key to <strong>the</strong> judge he will lose his case.<br />

It is important that <strong>the</strong> extended message M1 includes <strong>the</strong> date <strong>and</strong><br />

time o<strong>the</strong>rwise an old message could be substituted for M1 which would<br />

invalidate <strong>the</strong> point made in (2) above.<br />

Elliptic curve cryptography<br />

Encipherment <strong>and</strong> <strong>the</strong> <strong>internet</strong> 189<br />

In recent years an interesting method for signature verification has<br />

received a lot of attention both in <strong>the</strong> Universities <strong>and</strong> in industry. The<br />

method, known as Elliptic Curve Cryptography (ECC for short), is based<br />

upon deeper ma<strong>the</strong>matical ideas than <strong>the</strong> RSA algorithm <strong>and</strong> is claimed<br />

to be more secure. The ma<strong>the</strong>matics behind <strong>the</strong> method is too advanced<br />

to be described here but interested readers are invited to turn to M28.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!