Encrypted Data Stream Processing at Scale with Cryptographic Access

Total Page:16

File Type:pdf, Size:1020Kb

Encrypted Data Stream Processing at Scale with Cryptographic Access TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control Lukas Burkhalter, ETH Zurich; Anwar Hithnawi, UC Berkeley, ETH Zurich; Alexander Viand and Hossein Shafagh, ETH Zurich; Sylvia Ratnasamy, UC Berkeley https://www.usenix.org/conference/nsdi20/presentation/burkhalter This paper is included in the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’20) February 25–27, 2020 • Santa Clara, CA, USA 978-1-939133-13-7 Open access to the Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’20) is sponsored by TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control Lukas Burkhalter1, Anwar Hithnawi1,2, Alexander Viand1, Hossein Shafagh1, Sylvia Ratnasamy2 1ETH Zürich 2UC Berkeley Abstract Time series workloads come with unique performance and security requirements that existing encrypted data processing A growing number of devices and services collect detailed systems fail to meet: time series data that is stored in the cloud. Protecting the confidentiality of this vast and continuously generated data is (i) Scalability and Interactivity. Query processing over an acute need for many applications in this space. At the same time series data must simultaneously scale to large volumes time, we must preserve the utility of this data by enabling of data, support low-latency interactive queries, and sustain authorized services to securely and selectively access and run high write throughput. To meet these challenges several ded- analytics. This paper presents TimeCrypt, a system that pro- icated databases have been designed for time series work- vides scalable and real-time analytics over large volumes of loads [12, 33, 42, 45, 50, 62, 78]. A key aspect of these sys- encrypted time series data. TimeCrypt allows users to define tems is their use of in-memory indices that store aggregate expressive data access and privacy policies and enforces it statistics, enabling faster query response times and data sum- cryptographically via encryption. In TimeCrypt, data is en- marization. As we discuss in §6/§7, prior work on encrypted crypted end-to-end, and authorized parties can only decrypt data processing does not easily lend itself to maintaining these and verify queries within their authorized access scope. Our in-memory indices. The overhead of the crypto primitives in evaluation of TimeCrypt shows that its memory overhead and encrypted data processing needs to be negligible to meet the performance are competitive and close to operating on data scaling, latency, and performance requirements associated in the clear. with time series workloads. (ii) Secure Sharing. A key challenge in modern systems is 1 Introduction that privacy must co-exist with the desire to extract value from the data, which typically implies sharing data to be analyzed Recent years have seen explosive growth in systems and de- by third-party services [54]. Hence, a truly comprehensive vices that collect time series data and relay it to cloud-based approach to data protection must also comprise mechanisms services for analysis. This growth is only expected to ac- for secure sharing of encrypted data. Sharing should also be celerate with the proliferation of IoT devices, telemetry ser- fine-grained since it is undesirable and often unnecessary to vices, and improvements in data analytics. However, with this give parties unfettered access to the data. Instead, users may growth has come mounting concerns over data protection and want to (1) share only aggregated statistics about the data (e.g., data privacy [66]. Today, the public concern over data privacy avg/min/max), (2) limit the resolution at which such statistics and confidentiality is reaching new heights in light of the are reported (e.g., hourly vs. per-minute), (3) limit the time growing scale and scope of data breaches [17, 29, 56]. To interval over which queries are issued (e.g., only June 2019), grasp the extent of this issue, one can look at the number of (4) or a combination of the above. Moreover, the desired gran- data breaches reported under the new GDPR obligation to no- ularity and scope of sharing can vary greatly across users and tify, which has already exceeded 65,000 in the first year [73]. applications. Hence, support for encrypted query processing Over the last decade, encrypted databases [60, 61, 63, 75, must go hand-in-hand with access control that limits the scope 81] have emerged as a promising solution to tackle the prob- of data that users might query. The sharing paradigm in data- lem of data breaches. The approach of keeping data encrypted stream systems is distinctly different than in conventional while in-use allows users to query encrypted data while pre- databases. Data-stream settings feature a multitude of data serving both confidentiality and functionality. Research in sources continuously pushing data to the cloud, where various this domain has led to various encrypted database designs, in- services that are often not known in advance can subscribe to cluding designs for key-value stores [25], batch analytics [60], consume and analyze data streams. Therefore, such systems graph databases [53], and relational databases [63, 81]. This require flexible access policies. Frequently, there is a need motivates the following natural question: can we enable en- to fuse and analyze data from different sources collectively; crypted data processing for time series workloads? this implies that we need to devise an end-to-end encryption USENIX Association 17th USENIX Symposium on Networked Systems Design and Implementation 835 scheme that is compatible with this sharing paradigm. Contributions. In summary, our contributions are: TimeCrypt. In this paper, we present TimeCrypt, a system • We introduce HEAC, an encryption-based access control that augments time series databases with efficient encrypted construction for stream data that is additively homomor- data processing. TimeCrypt provides cryptographic means phic. HEAC additionally provides verifiable computations to restrict the query scope based on data owners’ defined over ciphertexts to ensure the integrity of the outsourced policies. With TimeCrypt, data owners can cryptographically encrypted computation. restrict user A to query encrypted data at a defined temporal • We design, implement, and evaluate TimeCrypt, the first range and granularity, while simultaneously allowing user B scalable privacy-preserving time series database that meets to execute queries on the same data at a different granularity the scalability and low-latency requirements associated without (i) introducing ciphertext expansion or data redun- with time series workloads. We introduce a design that dancy, (ii) introducing any noticeable delays, or (iii) requiring protects the data confidentiality, yet maintains its utility by a trusted entity to facilitate this. efficiently supporting a rich set of functionalities and ana- In this work, we introduce a partially homomorphic- lytics that are key to time series data. TimeCrypt supports encryption-based access control construction (HEAC) that data lifecycle operations such as ongoing data summariza- supports both fine-grained access control and computations tion and deletion that are common in time series databases. over encrypted data within a unified scheme. These two as- TimeCrypt supports expressive data access and privacy pects have traditionally been addressed independently: the policies, enforceable by encryption. former through cryptographically enforced access control • We make TimeCrypt’s code publicly available1, both as a schemes [35, 39, 49, 59, 83] and the latter through encrypted standalone system and as a library to be integrated with data processing [60, 63, 75, 81]. HEAC simultaneously sup- other time series databases. ports both while meeting the performance and access control requirements of time series workloads. A key insight behind 2 Overview the design of HEAC is based on the observation that time series data streams are continuous and time is the natural TimeCrypt achieves its competitive performance through a attribute for accessing and processing this data. Hence, we careful design of cryptographic primitives tailored for time discretize data streams into fixed-length time segments, and series data workloads. To understand the rationale behind encrypt each segment with a different key using symmetric- our techniques, we start this section by presenting relevant key homomorphic encryption. This allows us to express fine- background on time series data, then we give an overview of grained access policies at the stream segment granularity. TimeCrypt, and describe our security model. This, however, raises two challenges; we need to manage a large number of keys in an efficient and scalable manner and 2.1 Background on Time Series Data translate stream access policies to the corresponding keys suc- Time series Applications. Time series data is increasingly cinctly. To overcome these challenges in HEAC, we associate prevalent across a wide range of systems (e.g., monitoring, keys with temporal segments. With this, we avoid the need to telemetry, IoT) in diverse domains such as health, agricul- maintain a mapping between keys and ciphertexts. We derive ture [82], transportation [69], operational insight [2], and these keys from a hierarchical key-derivation tree construc- smart cities. The growth of time series data is largely at- tion that allows us to express fine-grained
Recommended publications
  • The Daily Egyptian, March 09, 1982
    Southern Illinois University Carbondale OpenSIUC March 1982 Daily Egyptian 1982 3-9-1982 The aiD ly Egyptian, March 09, 1982 Daily Egyptian Staff Follow this and additional works at: https://opensiuc.lib.siu.edu/de_March1982 Volume 67, Issue 114 Recommended Citation , . "The aiD ly Egyptian, March 09, 1982." (Mar 1982). This Article is brought to you for free and open access by the Daily Egyptian 1982 at OpenSIUC. It has been accepted for inclusion in March 1982 by an authorized administrator of OpenSIUC. For more information, please contact [email protected]. Wrestling, water polo cut from sports By Steve MeeHl! student affairs. Both sports Swinburne said SIU-C will try SpIns E4II ... hltve finished their seasons and dual meets this season after a 9- records. He said makiDJ the to continue to offer the 7 record a year ago. The Swinburne said the cutback "diversity" in athletics it has cutback effective immediately The Inten:oUegiate Athletics takes effect immediately. WTP..atllll, program started at frees wrestlers to seek AcIvisM'y Committee Monday bad in the past. Sh] in 1950. HartzOl said droppiDl the two Hartzog said the dropping of scholarships at other schools. unanimously apPro~ed drop­ Hartzog said wrestling Coach sports would save aboUt 135.000. the two intercollegiate sports "This gives the opportunity to piDl water polo and wrestling which wiD be used to improve Linn LofII will not be left "high our two reaUy good Wrestlers to from the athletics program. was a "hard decision to make" and dry" by elimination of the men's athletin programs.
    [Show full text]
  • Information to Users
    INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. ProQuest Information and Learning 300 North Zeeb Road, Ann Arbor, Ml 48106-1346 USA 800-521-0600 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. UNIVERSITY OF CINCINNATI 1 J93S. I hereby recommend that the thesis prepared under my supervision bu ___________________ entitled TVip Aphorisms of GeoTg Christoph Lichtenberg _______ with a Brief Life of Their Author. Materials for a _______ Biography of Lichtenberg. ______________________________________ be accepted as fulfilling this part of the requirements for the degree o f (p /fc -£^OQOTj o Approved by: <r , 6 ^ ^ FORM 660—G.S. ANO CO.—lM—7«33 Reproduced with permission of the copyright owner.
    [Show full text]
  • Alaska Department of Fish and Game Staff Comments on Commercial Regulatory Proposals for the Statewide King and Tanner Crab Meeting
    RC 2 ALASKA DEPARTMENT OF FISH AND GAME STAFF COMMENTS ON COMMERCIAL, PERSONAL USE, SPORT, AND SUBSISTENCE REGULATORY PROPOSALS FOR STATEWIDE (EXCEPT SOUTHEAST AND YAKUTAT) KING AND TANNER CRAB AND SUPPLEMENTAL ISSUES ALASKA BOARD OF FISHERIES MEETING ANCHORAGE, ALASKA MARCH 8–11, 2020 Revised 02/24/20 with the addition of Proposal 284 Regional Information Report No. 5J20-03 The following staff comments were prepared by the Alaska Department of Fish and Game (department) for use at the Alaska Board of Fisheries (board) meeting, March 8–11, 2020 in Anchorage, Alaska. The comments are forwarded to assist the public and board. The comments contained herein should be considered preliminary and subject to change, as new information becomes available. Final department positions will be formulated after review of written and oral public testimony presented to the board. Acronyms and Abbreviations The following acronyms and abbreviations, and others approved for the Système International d'Unités (SI), are used without definition in the following reports by the Divisions of Commercial Fisheries, Sport Fish, and Subsistence: All others, including deviations from definitions listed below, are noted in the text at first mention, as well as in the titles or footnotes of tables, and in figure or figure captions. Weights and measures (metric) General Acronyms centimeter cm Alaska Administrative Acceptable Biological Catch ABC deciliter dL Code AAC Alaska Board of Fisheries board gram g all commonly accepted Alaska Department of Fish department hectare ha abbreviations e.g., Mr., Mrs., and Game /ADF&G kilogram kg AM, PM, etc. kilometer km all commonly accepted Amount Necessary for liter L professional titles e.g., Dr., Ph.D., Subsistence ANS meter m R.N., etc.
    [Show full text]
  • Systemic Insecticides (Neonicotinoids and Fipronil): Trends, Uses, Mode of Action and Metabolites 5
    WORLDWIDE INTEGRATED ASSESSMENT OF THE IMPACTS OF SYSTEMIC PESTICIDES ON BIODIVERSITY AND ECOSYSTEMS http://www.tfsp.info/assets/WIA_2015.pdf Report in brief The Task Force on Systemic Pesticides is an independent group of scientists from all over the globe, who came together to work on the Worldwide Integrated Assessment of the Impact of Systemic Pesticides on Biodiversity and Ecosystems. The mandate of the Task Force on Systemic Pesticides (TFSP) has been “to carry out a comprehensive, objective, scientific review and assessment of the impact of systemic pesticides on biodiversity, and on the basis of the results of this review to make any recommendations that might be needed with regard to risk management procedures, governmental approval of new pesticides, and any other relevant issues that should be brought to the attention of decision makers, policy developers and society in general” (see appendix 2). The Task Force has adopted a science-based approach and aims to promote better informed, evidence-based, decision-making. The method followed is Integrated Assessment (IA) which aims to provide policy-relevant but not policy-prescriptive information on key aspects of the issue at hand. To this end a highly multidisciplinary team of 30 scientists from all over the globe jointly made a synthesis of 1,121 published peer-reviewed studies spanning the last five years, including industry-sponsored ones. All publications of the TFSP have been subject to the standard scientific peer review procedures of the journal (http://www.springer.com/environment/journal/11356). Key findings of the Task Force have been presented in a special issue of the peer reviewed Springer journal “Environmental Science and Pollution Research” entitled “Worldwide Integrated Assessment of the Impacts of Systemic Pesticides on Biodiversity and Ecosystems” and consists of eight scientific papers, reproduced here with permission of Springer.
    [Show full text]
  • 2018 Annual Report on Technology Transfer
    Annual Report on Technology Transfer: Approach and Plans, Fiscal Year 2018 Activities and Achievements U.S. Department of Commerce Report prepared by: National Institute of Standards and Technology National Oceanic and Atmospheric Administration National Telecommunications and Information Administration Institute for Telecommunication Sciences Pursuant to the Technology Transfer Commercialization Act of 2000 (P.L. 106-404) October 2019 This page is intentionally left blank. ii FOREWORD This report summarizes technology transfer activities and achievements of the Department of Commerce’s (DOC) federal laboratories for fiscal year (FY) 2018. At DOC, technology transfer is a significant part of the mission and programmatic activities of the National Institute of Standards and Technology (NIST), the National Oceanic and Atmospheric Administration (NOAA), and the National Telecommunications and Information Administration’s (NTIA) Institute for Telecommunication Sciences (ITS). Accordingly, this report focuses on the activities of these agencies. This report has been prepared as required by 15 U.S.C. § 3710(f). All federal agencies that operate or direct one or more federal laboratories or conduct other activities under 35 U.S.C. §§ 207 and 209 are subject to the requirements of this statute. DOC’s overall and laboratory-specific approaches and its plans for technology transfer are summarized in this report. The report focuses on current year activities and accomplishments, and provides statistical information from FY 2014 through FY 2018. NIST, NOAA, and NTIA’s ITS technology transfer offices have contributed to the organization and preparation of the material reported. An electronic version of this report and versions from previous fiscal years are available online at: http://www.nist.gov/tpo/publications/index.cfm.
    [Show full text]
  • Attack on a Sigint Collector, the USS Liberty (8 CCO)
    TOP SECRET UNITED STATES CRYPTOLOGIC HISTORY Attack on a Sigint Collector, the U.S.S. Liberty (8 CCO) ~O'f ftELEASABLE 'fO t'OftEI8!.- NA'flONAL3 'fHIS f){)Et:Jt.IEN'f E6N'fAINS eot>EW6Kf> MA'fEKIAL Classified by NSA/CSSM 123-2 Review in April 2011 Declassified and approved for release by NSA on 11-08-2006 pursuant to E.O. 12958, as amended. MDR 51712. TOP SECRET Contents of this publication should not be reproduced, or further disseminated outside the U.S. Intelligence Community without the permission of the Director, NSA/CSS. Inquiries about reproduction and dissemination should be directed to the Office of Cryptologic Archives and History, T54. i 'fOP SECRE'f UMBRA I UNITED STATES CRYPTOLOGIC HISTORY Special Series Crisis Collection Volume 1 Attack on a Sigint Collector, the U.S.S. Liberty (S-CCO) William D. Gerhard Henry W. Millington NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 1981 NO'f KELEASABLE 'fO FOKEIGN NA'flONALS 'fOP SHCRE'f UMBRA -- -- --- -~--------...................,...~ UNCLASSIFIED Contents Page Foreword----------------------------------------------------------------------------------- vii Authors' Note------------------------------------------------------------------------------- ix Chapter I POLITICAL-MILITARY BACKGROUND <V>---------------------------------------­ Chapter II CONSIDERATIONS LEADING TO THE SHIP'S DEPLOYMENT (U) ----------------­ 5 The Requirements for Intelligence (U) ----------------------------------------------------­ 5 Technical Collection Factors (U) ----------------------------------------------------------
    [Show full text]
  • University Microfilms, Inc., Ann Arbor, Michigan
    70 - 1 4 ,1 1 6 WENGER, Marion Roy, 1932- A SWISS-GERMAN DIALECT STUDY: THREE LIN­ GUISTIC ISLANDS IN MIDWESTERN U .S.A . [Sampler Tape Recording not included with microfilm. Available for ct-nsultation at The Ohio State University Library!]. The Ohio State University, Ph.D., 1969 Language and Literatui?e, linguistics University Microfilms, Inc., Ann Arbor, Michigan THIS DISSERTATION HAS BEEN MICROFILMED EXACTLY AS RECEIIŒD A SWISS-GERMAN DIALECT STUDY: THREE LINGUISTIC ISLANDS IN MIDWESTERN U.S.A. DISSERTATION Presented in Partial Fulfillment of the Requirements for. the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Marion Roy Wenger, B. A ., M. A. » The Ohio State University 1969 Approved by m/j A dviser Departmène of German ACKNOWLEDGMENTS Two men are primarily responsible for the stimulation which led to this dissertation: Professor Wolfgang Fleischhauer and Professor Dieter Cunz. As a "Doktorvater", Professor Fleischhauer has been all things to me: first, the conscientious and enthusiastic teacher guiding my first steps in research, subsequently, the openhanded elder scholar sharing his own discoveries with me and, most importantly, a warm friend in­ spiring me and others with his "menschliche W krm eFrom him, with him, through him, I came to an appreciation of dialect research as an eminently humane study beyond the austerity of linguistic inquiry, the formal analysis of symbols and the description of their configuration. This tribute also commemorates Professor Cunz, who found time to take a personal interest in my own historical heritage and urged me to work that cultural lode. Throughout this protracted research pro­ ject, he remained constant in his kindly, but firm encouragement, the "benevolent despot" beyond compare, whom we now miss keenly.
    [Show full text]
  • Predator-Prey Dynamics Between the Blue Crab: Callineates Sapidus Rathbun, and Juvenile Oysters Crassostrea Virginica (Gmelin)
    W&M ScholarWorks Dissertations, Theses, and Masters Projects Theses, Dissertations, & Master Projects 1988 Predator-Prey Dynamics between the Blue Crab: Callineates sapidus Rathbun, and Juvenile Oysters Crassostrea virginica (Gmelin) David B. Eggleston College of William and Mary - Virginia Institute of Marine Science Follow this and additional works at: https://scholarworks.wm.edu/etd Part of the Marine Biology Commons, and the Oceanography Commons Recommended Citation Eggleston, David B., "Predator-Prey Dynamics between the Blue Crab: Callineates sapidus Rathbun, and Juvenile Oysters Crassostrea virginica (Gmelin)" (1988). Dissertations, Theses, and Masters Projects. Paper 1539617593. https://dx.doi.org/doi:10.25773/v5-0dfe-pz81 This Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Dissertations, Theses, and Masters Projects by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. Predator-prey dynamics between the blue crab, Callinectes sapidus Rathbun, and juvenile oysters Crassostrea viroinica (Gmelin) A Thesis Presented to The Faculty of the School of Marine Science The College of William and Mary in Virginia In Partial Fulfillment Of the Requirements for the Degree of Master of Arts by David B. Eggleston APPROVAL SHEET This thesis is submitted in partial fulfillm ent of the requirements for the degree of Master of Arts . EggTeston Approved: May 1988 Roger L. Mann, Ph.D. Committee Chairman/Advisor kGroave^T^Ph.D. * 1 yRomuald N. Lipcaus, Ph.D. Joseph G. Loesch, Ph.D. Mark W. Luckenbach, Ph.D. Morris H. Roberts, J r., Ph.D.
    [Show full text]
  • Downloads to Load Malicious Scripts And/Or Trojans Or Worms and Plant Ransomware on the Device Directly
    CURRENT RANSOMWARE THREATS Marisa Midler Kyle O’Meara, and Alexandra Parisi May 2020 Acknowledgments The authors wish to acknowledge the contributions of National Cyber-Forensics and Training Alli- ance (NCFTA) for providing valuable insight to the current ransomware landscape and top 10 trend- ing ransomware families. Executive Summary Ransomware continues to be a grave security threat to both organizations and individual users. The increased sophistication in ransomware design provides enhanced accessibility and distribution ca- pabilities that enable attackers of all types to employ this malicious tool. This report discusses ran- somware, including an explanation of its design, distribution, execution, and business model. Ad- ditionally, the report provides a detailed discussion of encryption methods and runtime activities, as well as indicators that are useful in their detection and mitigation. Ransomware has evolved into a sophisticated tool that is usable by even non-technical persons and has multiple variants offered as Ransomware as a Service (RaaS). RaaS decreases the risk for ran- somware authors, since they do not perform attacks, and reduces the affiliates’ cost to mount at- tacks. Additionally, as of 2019, some ransomware families have started threatening public disclo- sure of a victim’s sensitive data if they do not pay a ransom and are following through with the threat. Ransomware uses strong encryption, making decryption without a key or implementation flaws practically impossible. The success of initial ransomware infections is primarily attributed to the following: • failures in email filtering • users who are unaware and susceptible to opening malicious email attachments • unpatched systems and applications that are vulnerable to exploits • operating systems that lack proactive heuristics-based monitoring This report recommends both proactive and reactive approaches that help avoid having to pay a ransom and minimize the loss of data.
    [Show full text]
  • An Introduction to Cryptography Version Information an Introduction to Cryptography, Version 8.0
    An Introduction to Cryptography Version Information An Introduction to Cryptography, version 8.0. Released Oct. 2002. Copyright Information Copyright © 1991-2002 by PGP Corporation. All Rights Reserved. No part of this document can be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of PGP Corporation. Trademark Information PGP and Pretty Good Privacy are registered trademarks of PGP Corporation in the U.S. and other countries. IDEA is a trademark of Ascom Tech AG. All other registered and unregistered trademarks in this document are the sole property of their respective owners. Licensing and Patent Information The IDEA cryptographic cipher described in U.S. patent number 5,214,703 is licensed from Ascom Tech AG. The CAST encryption algorithm is licensed from Northern Telecom, Ltd. PGP Corporation may have patents and/or pending patent applications covering subject matter in this software or its documentation; the furnishing of this software or documentation does not give you any license to these patents. Acknowledgments The compression code in PGP is by Mark Adler and Jean-Loup Gailly, used with permission from the free Info-ZIP implementation. Export Information Export of this software and documentation may be subject to compliance with the rules and regulations promulgated from time to time by the Bureau of Export Administration, United States Department of Commerce, which restrict the export and re-export of certain products and technical data. Limitations The software provided with this documentation is licensed to you for your individual use under the terms of the End User License Agreement provided with the software.
    [Show full text]
  • Math 314 - Fall 2019 Name: Mission 1 Due September 9, 2019 I Must Study Politics and War That My Sons May Have Liberty to Study Mathematics and Philosophy
    Math 314 - Fall 2019 Name: Mission 1 Due September 9, 2019 I must study politics and war that my sons may have liberty to study mathematics and philosophy. |John Adams Guidelines • All work must be shown for full credit. • You can choose to use SageMath code to help you solve the problems. If you do, print out your code and attach it with the assignment. • Either print out this assignment and write your answers on it, or edit the latex source and type your answers in the document. Make sure you still show your work! • You may work with classmates, but be sure to turn in your own written solutions. Write down the name(s) of anyone who helps you. • Check one: I worked with the following classmate(s): I did not receive any help on this assignment. 1. Graded Problems 1. Encrypt letters using the affine function 15x + 3 (mod 26). What is the decryption function? Check that it works. 1 2. Consider an affine cipher (mod 26). You do a chosen plaintext attack using hahaha. The ciphertext is NONONO. Determine the encryption function. 3. This problem involves the Dancing Men code from a Sherlock Holmes story. a. Read Section 2.5 (Sherlock Holmes), and describe (in a paragraph) how Sherlock fig- ures out which dancing man represents the letter e as well as the letter r. b. Explain in one sentence what the little flags mean. 2 4. (T&W 2.14 # 6) Suppose you encrypt using an affine cipher E1(x) = α1x + β1, then encrypt the encryption using a second affine cipher E2(x) = α2x + β2 (both are working mod 26).
    [Show full text]
  • Ancient Records of Egypt, Volume I
    ANCIENT RECORDS UNDER THE GENERAL EDITORSHIP OF WILLIAM RAINEY HARPER ANCIENT RECORDS OF ASSYRIA AND BABYLONIA EDITED BY ROBERT FRANC18 HARPER ANCIENT RECORDS OF EGYFT EDITED BY JAMES HENRY BREASTED ANCIENT RECORDS OF PALESTINE, PH(ENIC1A AND SYRIA EDITED BY WILLIAM RAINEY HARPEB ANCIENT RECORDS OF EGYPT HISTORICAL DOCU FROM THE EARLIEST TIMES TO THE PERSIAN CONQUEST, COLLECTED EDITED AND TRANSLATED WITH COMMENTARY JAMES HENRY BREASTED, PH.D. PROFESSOR OP EGYPTOLOGY AND ORIENTAL HISTORY IN THE UNIVEESITP OF CHICAGO VOLUME I THE FIRST TO THE SEVENTEENTH DYNASTIES CHICAGO THE UNIVERSITY OF CHICAGO PRESS 1906 LONDON : LUZAC & CO. LEIPZIO: OTTO HARRASSOWITZ COPYRIGFIT 1906, BY THE UNIVBRSITYOP CHICAGO Published February 1906 Compoaed and Printed By The University of Chicago Press Chicago, Illinois, U.S. A. THEDE VOLUMES ARE DEDICATED TO MARTIN A. RYERSON NORMAN W. HARRIS MARY H. WILMARTH PREFACE In no particular have modem historical studies made greater progress than in the reproduction and publication of documentary sources from which our knowledge of the most varied peoples and periods is drawn. In American history whole libraries of such sources have appeared or are promised. These are chiefly in English, although the other languages of Europe are of course often largely represented. The employment of such sources from the early epochs of the world's history involves either a knowledge of ancient languages on the part of the user, or a complete rendition of the documents into English. No attempt has ever been made to collect and present all the sources of Egyptian history in a modern language. A most laudable beginning in this direction, and one that has done great service, was the Records of the Past; but that series never attempted to be complete, and no amount of editing could make con- sistent with themselves the uncorrelated translations of the large number of contributors to that series.
    [Show full text]