secrets of internet secrecy graham seibert december 2, 2015
DESCRIPTION
The “key” ingredient is the shared key Only you and I know it (or our computers!) Quite long (about 38 decimal digits) Established on-the-fly One-time useTRANSCRIPT
![Page 1: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/1.jpg)
Secrets of Internet Secrecy
Graham SeibertDecember 2, 2015
![Page 2: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/2.jpg)
Everything is numbers
T o a s t m a s t e r s84 111 97 115 116 109 97 115 116 101 114 115
+6 +8 +11 +6 +8 +11 +6 +8 +11 +6 +8 +1190 119 108 121 124 120 103 123 127 107 122 126
Z w l y | x g { � k z ~
Add an encryption key (here, 6 8 11)
And get an encrypted message
![Page 3: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/3.jpg)
The “key” ingredient is the shared key
• Only you and I know it (or our computers!)• Quite long (about 38 decimal digits)• Established on-the-fly• One-time use
![Page 4: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/4.jpg)
Public key cryptographybasics
• You have a secret number• I have a secret number• There is a shared number passed over the
Internet. We assume it is not secret.
![Page 5: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/5.jpg)
We need to combine the public number with a private number
in an Irreversible process
• Not using addition – subtraction is its exact inverse
85340810 + 280919064 = 366259874 but
366259874 - 280919064 = 85340810
• Not using multiplication – Division is its inverse
51,924,521 x 6,807,506 = 353,476,488,254,626 but
353,476,488,254,626 / 51,924,521 = 6,807,506
• But Use Exponentiation! – logarithms are tough, and not an exact inverse
28123 = 209,047,682,734,381,552,013,280, 415,608,595,285,371,404,001,732,212,455,331
But
log281209,047,682,734,381,552,013,280, 415,608,595,285,371,404,001,732,212,455,331 = ????
![Page 6: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/6.jpg)
Paint mixing is a good metaphor –you cannot unmix paint
My color Your color Public color
![Page 7: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/7.jpg)
Mix with the public color in our own secret lab (computer)
Mine plus public Yours plus public
![Page 8: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/8.jpg)
Make just the mixes available over the Internet
Public Mine + public Yours + public
Big clue – they all contain the public color
![Page 9: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/9.jpg)
I take your mix, you take mineand we add to our own secret color
Your mix plus my secret color
My mix plus your secret color
![Page 10: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/10.jpg)
And we get the same thing!
Our shared secret color
![Page 11: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/11.jpg)
Which nobody else can get because they don’t have our pure colors
• Everything they have contains the public color, which they cannot get rid of
![Page 12: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/12.jpg)
Think 38-digit numbers instead of colors, and we have created
• A key that only you and I know• A throw-away key, good for one session only• Encryption that is so difficult to break that all
governments are afraid of it
![Page 13: Secrets of Internet Secrecy Graham Seibert December 2, 2015](https://reader036.vdocuments.mx/reader036/viewer/2022082909/5a4d1b6d7f8b9ab0599b3d6b/html5/thumbnails/13.jpg)
Public Key Cryptography
• Is at the heart of all secure Internet communications
• Is used to protect files stored on local computers
• Is essential to digital currencies, like Bitcoin