SlideShare a Scribd company logo
what engineers don’t know
  (but mathematicians probably do)

              Budi Rahardjo
 School of Electical Engineering & Informatics
          Institut Teknologi Bandung
engineers
     create
    products

[sorry, pictures deleted - unknown ipr]
security products
sometimes inefficient
• Longer time to boot or process stuff
• Only work for toy problems
• Even, … they just don’t work at all
• [failed products?]
[taken from a product somewhere]

There are 3 kinds of people
in this world:
– Those who can count and
– those who can’t
Need ways to improve
• Increase performance
• Less power
• Smaller in size
• Cost efficiency
• Always, not easy
Example
• Cryptographic applications, eg.
  public-key cryptography
         c=   me   mod n
• With large e and n (big num) integer
• Straight forward software
  implementation is difficult
Large (512-bit) numbers
• n = 81 5a d0 b9 0a ac 9f 4c da cc 57 6e ca a7
  6a c3 46 92 a7 81 68 ec 08 ec 77 dd 40 c2 ec
  97 52 cb 3b 34 2c b6 a6 e2 76 3a ed 42 84 fa
  55 ac 0d 6c 10 39 a2 7e a3 09 be 40 35 38 04
  7d 06 43 1f 6f
• e = 29 40 70 02 50 db 19 6b b1 f4 8a a7 b4 59
  6c 4b 66 b5 94 f6 15 ae e4 69 44 95 23 f3 d0
  fc ea 84 19 7c 55 e0 27 40 2d 19 18 15 08 05
  51 ac f5 98 91 f0 98 5f c4 17 05 eb 3b e8 a3
  04 32 d4 20 2f
• d = 59 f1 2f 29 73 d0 bc 8e 13 6e 2a 21 53 2c
  b7 4d 69 82 c9 54 92 6c 64 43 0d 69 15 83 e9
  44 a6 de 5e 30 e9 ae 48 f9 c8 84 a4 16 44 4d
  df 50 f2 0e 96 3e 24 df a4 f4 ec 3d c6 db 61
  a7 e6 dc ea cf
                                         [64 chunks]
Solutions, transformations,
          tricks, …
Mathematics        Programming
• Fast             • Loop unrolling
  exponentiation   •…
•…
Fast Exponentiation
Loop Unrolling
for (int x = 0; x < 100; x++) {
  do(x);} /* before loop unroll */

for (int x = 0; x < 100; x += 5) {
   do(x);
   do(x+1);
   do(x+2);
   do(x+3);
   do(x+4);} /* after - less loops */
hardware
• Implementation
  in constrained
  devices
  – Limitted memory &
    computing power
a short detour to crypto
Private-key crypto
            (secret key, symmetric)
Alice                                                              Bob

                    Shared (secret) key




            Encryption                     Decryption
Plaintext                  Ciphertext                    Plaintext

 My phone                  Y$3*@8nh                     My phone
 555-1234                  klq&ajbq                     555-1234
                                    Ev e
Problems
• Key exchange
• Number of keys explode
  exponentially
n       n * (n-1) / 2 ≈ n2/2
(# users)      (# of keys)
   10               50
   100             5000
  1000           500.000
 10.000        50.000.000
 100.000     5.000.000.000
New direction in cryptography
Public-key crypto
                        (asymmetric)
   Public key repository                            Public key
   Certificate Authority (CA)
                                                   Private key




               Encryption                    Decryption
Plaintext                       Ciphertext                 Plaintext

 My phone                       L)8*@Hgx                  My phone
 555-1234                       uqnrpGtZ                  555-1234
Concluding Remarks


… engineers taketh what
mathematicians giveth …
Thank You

More Related Content

PDF
Abstracting Vector Architectures in Library Generators: Case Study Convolutio...
PDF
Vectorization with LMS: SIMD Intrinsics
PDF
Let’s talk about microbenchmarking
PDF
Lifted-ElGamal暗号を用いた任意関数演算の二者間秘密計算プロトコルのmaliciousモデルにおける効率化
PDF
Introduction to Homomorphic Encryption
PDF
暗認本読書会6
PPTX
Cryptocurrency Jeopardy!
PPTX
Homomorphic Encryption
Abstracting Vector Architectures in Library Generators: Case Study Convolutio...
Vectorization with LMS: SIMD Intrinsics
Let’s talk about microbenchmarking
Lifted-ElGamal暗号を用いた任意関数演算の二者間秘密計算プロトコルのmaliciousモデルにおける効率化
Introduction to Homomorphic Encryption
暗認本読書会6
Cryptocurrency Jeopardy!
Homomorphic Encryption

Viewers also liked (6)

PDF
Creativity and Innovation
PPTX
Blogging
PPTX
Creativity 02
PDF
Bdg software uploaded
PPTX
Creativity definition
PDF
To teach is ... (On Teaching)
Creativity and Innovation
Blogging
Creativity 02
Bdg software uploaded
Creativity definition
To teach is ... (On Teaching)
Ad

Similar to what engineers don't know (but probably mathematicians do) (20)

PPTX
Computing on Encrypted Data
PPTX
Digital Fingerprinting
PDF
Lec 4 Public Key Cryptography & Digital Identity 2022f.pdf
PPT
PPTX
Homomorphic Encryption
PPTX
"Practical Machine Learning With Ruby" by Iqbal Farabi (ID Ruby Community)
PPTX
Rsa in CTF
PPT
Public_Key_Cryptography in crypto analysis.ppt
PDF
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
PPTX
Cs166 mynote
PDF
The str/bytes nightmare before python2 EOL
PPTX
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
KEY
Java Core | Understanding the Disruptor: a Beginner's Guide to Hardcore Concu...
PPTX
Overview on Cryptography and Network Security
PDF
Cryptography 202
PDF
How Triton can help to reverse virtual machine based software protections
PPTX
RSA ALGORITHM
PDF
10 RSA
PDF
CNIT 141: 10. RSA
PPTX
Trible data encryption standard (3DES)
Computing on Encrypted Data
Digital Fingerprinting
Lec 4 Public Key Cryptography & Digital Identity 2022f.pdf
Homomorphic Encryption
"Practical Machine Learning With Ruby" by Iqbal Farabi (ID Ruby Community)
Rsa in CTF
Public_Key_Cryptography in crypto analysis.ppt
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Cs166 mynote
The str/bytes nightmare before python2 EOL
SMART Seminar Series: "Blockchain and its Applications". Presented by Prof Wi...
Java Core | Understanding the Disruptor: a Beginner's Guide to Hardcore Concu...
Overview on Cryptography and Network Security
Cryptography 202
How Triton can help to reverse virtual machine based software protections
RSA ALGORITHM
10 RSA
CNIT 141: 10. RSA
Trible data encryption standard (3DES)
Ad

More from budi rahardjo (20)

PDF
Uji Keamanan Penetration Testing Itu Tidak Ilmiah
PPTX
How to train Electronics Rockstars
PDF
Product development 2021
PDF
Security in COVID-19 Era
PDF
Peluang IoT di Indonesia
PDF
IoT: Dari Hobby ke Profesi
PDF
The Joy of Programming (short version)
PDF
Technology-based Startup
PDF
A very short Introduction to Software Security
PDF
Identity Theft
PDF
Dealing with Hoax
PDF
Topik Penelitian Keamanan Informasi
PPTX
Network Sniffing
PDF
Keaslian Dokumen Digital
PDF
Strategi Industri Telematika Indonesia
PPTX
Klik and Modar: social engineering dengan menggunakan URL Bait
PDF
How to Train Electronics Rockstars
PDF
Kronologis penganiayaan timmy
PDF
Kesiapan Lulusan Perguruan Tinggi
PPTX
Pengantar Nama Domain
Uji Keamanan Penetration Testing Itu Tidak Ilmiah
How to train Electronics Rockstars
Product development 2021
Security in COVID-19 Era
Peluang IoT di Indonesia
IoT: Dari Hobby ke Profesi
The Joy of Programming (short version)
Technology-based Startup
A very short Introduction to Software Security
Identity Theft
Dealing with Hoax
Topik Penelitian Keamanan Informasi
Network Sniffing
Keaslian Dokumen Digital
Strategi Industri Telematika Indonesia
Klik and Modar: social engineering dengan menggunakan URL Bait
How to Train Electronics Rockstars
Kronologis penganiayaan timmy
Kesiapan Lulusan Perguruan Tinggi
Pengantar Nama Domain

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Classroom Observation Tools for Teachers
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
Insiders guide to clinical Medicine.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Pharma ospi slides which help in ospi learning
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Computing-Curriculum for Schools in Ghana
PDF
Sports Quiz easy sports quiz sports quiz
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
RMMM.pdf make it easy to upload and study
Anesthesia in Laparoscopic Surgery in India
Classroom Observation Tools for Teachers
human mycosis Human fungal infections are called human mycosis..pptx
Cell Structure & Organelles in detailed.
Insiders guide to clinical Medicine.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pharma ospi slides which help in ospi learning
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Supply Chain Operations Speaking Notes -ICLT Program
Computing-Curriculum for Schools in Ghana
Sports Quiz easy sports quiz sports quiz
2.FourierTransform-ShortQuestionswithAnswers.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
RMMM.pdf make it easy to upload and study

what engineers don't know (but probably mathematicians do)

  • 1. what engineers don’t know (but mathematicians probably do) Budi Rahardjo School of Electical Engineering & Informatics Institut Teknologi Bandung
  • 2. engineers create products [sorry, pictures deleted - unknown ipr]
  • 4. sometimes inefficient • Longer time to boot or process stuff • Only work for toy problems • Even, … they just don’t work at all • [failed products?]
  • 5. [taken from a product somewhere] There are 3 kinds of people in this world: – Those who can count and – those who can’t
  • 6. Need ways to improve • Increase performance • Less power • Smaller in size • Cost efficiency • Always, not easy
  • 7. Example • Cryptographic applications, eg. public-key cryptography c= me mod n • With large e and n (big num) integer • Straight forward software implementation is difficult
  • 8. Large (512-bit) numbers • n = 81 5a d0 b9 0a ac 9f 4c da cc 57 6e ca a7 6a c3 46 92 a7 81 68 ec 08 ec 77 dd 40 c2 ec 97 52 cb 3b 34 2c b6 a6 e2 76 3a ed 42 84 fa 55 ac 0d 6c 10 39 a2 7e a3 09 be 40 35 38 04 7d 06 43 1f 6f • e = 29 40 70 02 50 db 19 6b b1 f4 8a a7 b4 59 6c 4b 66 b5 94 f6 15 ae e4 69 44 95 23 f3 d0 fc ea 84 19 7c 55 e0 27 40 2d 19 18 15 08 05 51 ac f5 98 91 f0 98 5f c4 17 05 eb 3b e8 a3 04 32 d4 20 2f • d = 59 f1 2f 29 73 d0 bc 8e 13 6e 2a 21 53 2c b7 4d 69 82 c9 54 92 6c 64 43 0d 69 15 83 e9 44 a6 de 5e 30 e9 ae 48 f9 c8 84 a4 16 44 4d df 50 f2 0e 96 3e 24 df a4 f4 ec 3d c6 db 61 a7 e6 dc ea cf [64 chunks]
  • 9. Solutions, transformations, tricks, … Mathematics Programming • Fast • Loop unrolling exponentiation •… •…
  • 11. Loop Unrolling for (int x = 0; x < 100; x++) { do(x);} /* before loop unroll */ for (int x = 0; x < 100; x += 5) { do(x); do(x+1); do(x+2); do(x+3); do(x+4);} /* after - less loops */
  • 12. hardware • Implementation in constrained devices – Limitted memory & computing power
  • 13. a short detour to crypto
  • 14. Private-key crypto (secret key, symmetric) Alice Bob Shared (secret) key Encryption Decryption Plaintext Ciphertext Plaintext My phone Y$3*@8nh My phone 555-1234 klq&ajbq 555-1234 Ev e
  • 15. Problems • Key exchange • Number of keys explode exponentially
  • 16. n n * (n-1) / 2 ≈ n2/2 (# users) (# of keys) 10 50 100 5000 1000 500.000 10.000 50.000.000 100.000 5.000.000.000
  • 17. New direction in cryptography
  • 18. Public-key crypto (asymmetric) Public key repository Public key Certificate Authority (CA) Private key Encryption Decryption Plaintext Ciphertext Plaintext My phone L)8*@Hgx My phone 555-1234 uqnrpGtZ 555-1234
  • 19. Concluding Remarks … engineers taketh what mathematicians giveth …