A Kid Krypto System based on DIRECTED CYCLE COVER
Transcription
A Kid Krypto System based on DIRECTED CYCLE COVER
FPT CHALLENGE The first FPT implementation challenge PACE: Parameterized Algorithms and Computational Experiments Challenge is respectfully dedicated to David Johnson, creator of the DIMACS algorithms challenges and a leader and advocate for algorithms and theoretical computer science. Website https://pacechallenge.wordpress.com for details. ENTER YOUR TEAM NOW. Track A: Tree Decompositions: optimal solutions, heuristics, generating hard instances, and collecting real-world instances. The tree decomposition validator is available at https://github.com/holgerdell/td-validate/ Track B: Feedback Vertex Set: fixed-parameter algorithms. IMPORTANT DATES * Benchmark instances available NOW. * 1 June 2016: Register participation. Track A for TreeWidth send email to Holger Dell at [email protected] and for Track B Feedback Vertex Set send email to [email protected] * 1 August 2016: DEADLINE TO SUBMIT Implementations * 22–26 August 2016: Results announced at the International Symposium on Parameterized and Exact Computation (IPEC 2016). A Kid Krypto System based on DIRECTED CYCLE COVER Frances Rosamond Department of Informatics University of Bergen, Norway Scottish Combinatorics Meeting 26—27 April 2016 • Perfect Code Kid Crypto Computer Science Unplugged www.csunplugged.org • Directed Disjoint-Cycle Packing Crypto • Polly Cracker • Creative Mathematical Sciences Communication www.tcs.uni-luebeck.de/cmsc/ 4—7 October Rudiger Reischuk Neal Koblitz, University of Washington An inventor of elliptic curve cryptography Cryptography as a Teaching Tool. https://www.math.washington.edu/ ~koblitz/ Neal and Ann Hibner Koblitz, author of A Convergence of Lives. Sofia Kovalevskaia: Scientist, Writer, Revolutionary. Founders of the Kovalevskaia Prize Michael Fellows, Univ Bergen Parameterized Complexity This is MEGA-Mathematics http://www.c3.lanl.gov/ captors/ mega-math, (Los Alamos Natl Labs) 1992, with Nancy Casey. Neal and Mike created a kid crypto system based on a special kind of dominating set in a graph called a Perfect Code. Def: A set of vertices V’ ⊆ V in a graph G = (V, E) is said to be a perfect code if for every vertex u ∈ V the neighborhood N[u] contains exactly one vertex of V’ . Perfect Code is an NP-hard problem. Computer Science Unplugged! • http://csunplugged.com/ book, teacher guides and support • http://video.google.com videos COMPUTER SCIENCE Unplugged! Michael Fellows [email protected] Frances Rosamond [email protected] Charles Darwin University, Parameterized Complexity Research Unit, Faculty of Engineering and IT, Northern Territory, 0909 Australia REFERENCES: More information and buy the book: “Computer Science Unplugged!” by Tim Bell, Michael Fellows and Ian Witten, available at http://www.csunplugged.org and http://www.cosc.canterbury.ac.nz/tim.belltour2006. THEMES of the DEMONSTRATIONS: ALGORITHMS and COMPLEXITY THEME ACTIVITIES 1) P vs NP How difficult is it to solve a problem? A million-dollar prize Unsolved problems 2) Examples of polynomial time sorting and bad sorting (parallel is good, logn). 2-coloring versus 3-coloring Sorting Networks CONNECTIONS Concept of an “algorithm” Time complexity table Number sense Modeling Computational thinking Concept of “minimum” Parallel versus serial Permutations Combinatorial objects Universal quantification Factorial Cooperative learning 3) More P vs NP Muddy City (Minimum Spanning Tree) versus Ice Cream Stands (Steiner) Arithmetic in action Weighted paths “Greedy” method Careful checking Scale and layout 4) Public Key Cryptography Kid Krypto Coin Flip over the Phone Perfect codes One-way functions Linear algebra Public key/private key Proofs Color the graph with as few colors as possible. Two vertices connected by an edge must get different colors. 3-coloring Minimum Weight panning Tree Discrete Steiner Place ice cream stands so that no matter which corner you might be standing on, you need walk at most one block to get an ice-cream. Tourist Town village map How do we know we can do it with six? Do you want to create a graph where you know the solution but it will be really hard for mom or dad to solve? The idea of a one-way function. Create a graph with a Perfect Code. Take care that no two stars share a common vertex. Add extra edges to confuse the Adversary. Add additional disguising edges only between vertices not in the dominating set. Create a graph with a Perfect Code Add extra edges to confuse the Adversary A Perfect Code may not be unique. Create a graph with a Perfect Code Add extra edges to confuse the Adversary The Perfect Code is not unique. Public-Key Cryptography (Asymmetric encryption) Three players Alice – publishes her public key in “phonebook”, a trusted, neutral source. She has a private key to decode messages sent to her using her public key. Bob – has an “encryption method” for using Alice’s public key to send her a message. Adversary – tries to crack their communication system, knowing how it works (in general). Alice wants to be able to receive an encrypted bit from Bob. She constructs a graph G(V, E) with a perfect code. The public key is the graph G. Alice’s private key is the perfect code. -4 2 3 4 6 5 -5 The Encryption Method (2 steps) Privately and secretly Step 1. Bob puts numbers on vertices that sum to the Message. The Message is 11. Step 2. -4 2 7 4 3 10 6 8 5 -5 The Encryption Method (2 steps) Privately and secretly Step 1. Bob puts numbers on vertices that sum to the Message. The Message is 11. Step 2. Sum the solid neighborhood of each vertex (the numbers in red). -4 8 2 7 4 1 3 10 6 8 5 3 -5 4 The Encryption Method (2 steps) Privately and secretly Step 1. Bob puts numbers on vertices that sum to the Message. The Message is 11. Step 2. Sum the solid neighborhood of each vertex (the numbers in red). Bob erases all traces of his calculations. 8 7 10 1 8 3 4 Bob returns the graph to Alice annotated only with the red numbers. 8 7 10 1 8 3 4 To decipher the message, Alice takes the sum over the perfect code. 8 7 10 1 8 3 4 To decipher the message, Alice takes the sum over the perfect code. Sharing secrets is very exciting for kids. Research in cryptography has been awarded the Turing Award three times. Whitfield Diffie and Martin Hellman were awarded the Turing Award in 2015. The 2012 Turing Award was awarded to Shafi Goldwasser and Silvio Micali. Ron Rivest, Adi Shamir and Leonard Adleman won the 2002 Turing Award. New kid crypto system based on directed cycles Directed Disjoint Cycle Cover problem asks, for input a digraph D = {V, A} whether there exists a family F = {C1, ..., Cm} vertex-disjoint directed cycles that “spans D”, that is, for every v in V there is a unique directed cycle of F that passes through V. Directed Disjoint Cycle Cover is an NP-hard problem. Disjoint directed cycles The cycles with disguising arcs. The message is 11. Labels the vertices to add to 11. Encryption: Label the edges (twice the tail minus the head). 8 7 10 1 Both systems are secure up to smart high school students. Gaussian elimination. 8 3 4 Processor for each local sum. Large graph maybe 10,000 vertices. Equations with 10,000 variables. Linear algebra sequential, O(n3). New memory heirarchies. To decipher the message, Alice takes the sum over the perfect code. Graph Coloring Kid Crypto Mathematics communication is a two-way street Polly Cracker system Lay our best at the feet of the children, including the frontiers of what we know – Elementary school students deserve to experience profound and imaginative mathematical ideas. – Open unsolved problems are the creative drivers for mathematical activity. – Mathematics is an “interdisciplinary powerhouse.” – Mathematics popularization is a research area of basic interest. Fellows, M.: Computer SCIENCE in the elementary schools. (1991) 3rd CREATIVE MATHEMATICAL SCIENCES COMMUNICATION CONFERENCE (CMSC) The Creative Mathematical Sciences Communication conference (CMSC) explores new ways of popularizing the rich mathematics underlying computer science including outdoor activities, art, dance, drama and all forms of storytelling. Hang out with people who develop creative new ways to explain your research to your colleagues down the hall, in different disciplines, government, your kids, mom. Date: 4-7 October 2016 Location: Lübeck, Germany Abstracts due: 10 June 2016 Submissions due: 8 July 2016 Early Registration: 15 August 2016 Website http://www.tcs.uni-luebeck.de/cmsc/ Thank you educators and artists (theatre, dance, graphic arts). The CMSC has several aspects. • Involve and support researchers to share the frontiers of computer science and mathematics with children and the general public. • Research communication is a “two-way street”. Explaining your research can inspire new research questions. For example, Mike Fellows describes how “Kid Crypto” inspired the new research of Polly Cracker crypto systems. • Future directions of Computer Science Unplugged! Discuss with Tim Bell, Mike Fellows and others future directions of this grass-roots movement, which is now translated into 19 languages. • Storyfull, whole-body, kinesthetic math activities. Demonstrate and design new whole body activities that connect math with the inner self and community. Design activities that include cultural understanding and relevance. Demonstrate activities that foster curiosity, enthusiasm and perseverance. • Expand computational thinking across the curriculum, and explore how mathematical thinking strategies nurture 21st Century competencies. • Policy makers in government, business and industry. What are the issues and unanswered questions of executives and policy makers?