Merkle-Hellman 3 5 9 18 40 1 0 1 1 0.

Slides:



Advertisements
Similar presentations
RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
Advertisements

OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public Key Cryptography
Chapter 3 Encryption Algorithms & Systems (Part B)
Choose the right picture
Public Key Cryptography Bryan Pearsaul. Outline What is Cryptology? Symmetric Ciphers Asymmetric Ciphers Diffie-Hellman RSA (Rivest/Shamir/Adleman) Moral.
Introduction to Modular Arithmetic and Public Key Cryptography.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Merkle-Hellman Knapsack Cryptosystem Merkle offered $100 award for breaking singly - iterated knapsack Singly-iterated Merkle - Hellman KC was broken by.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Merkle-Hellman Knapsack Cryptosystem
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
Encryption on the Internet Jeff Cohen. Keeping Information Secret What information do we want to be secret? –Credit card number –Social security number.
Example 1 Writing Powers Write the product as a power and describe it in words. a. 44= to the second power, or 4 squared 9 to the third power,
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Public Key Cryptosystem In Symmetric or Private Key cryptosystems the encryption and decryption keys are either the same or can be easily found from each.
Lecture 6. RSA Use in Encryption to encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = M e mod n, where 0≤M
Copyright © Zeph Grunschlag, RSA Encryption Zeph Grunschlag.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Cryptography and Network Security Chapter 13
Public Key Cryptography
Digital Signatures.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Public Key Encryption.
Basics of Cryptography
Attacks on Public Key Encryption Algorithms
Public Key Cryptosystem
Cryptography Dr. X.
PUBLIC-KEY ENCRYPTION Focusing on RSA
Principles of Encryption
K E Y Plain text Cipher text Encryption Decryption
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public-Key Cryptography and RSA
Public-key Cryptography
M3: Encryption r By Andrew Stringer.
Modular Arithmetic and RSA Encryption
CS/COE 1501 Recitation RSA Encryption/Decryption
Public Key Infrastructure
Input: A={a1, a2, … an} – public key, S - ciphertext
Click to edit Master text styles
Big Data & Privacy Review - summary.
ElGamal Public-Key Systems over GF(p) & GF(2m)
Rivest, Shamir and Adleman
Click to edit Master text styles
Public-key encryption
Analysis of the RSA Encryption Algorithm
برگرفته از اسلایدهای © University of Glamorgan
Poking Holes in Knapsack Cryptosystems
Lesson Action Guide COURSE LOGO Lesson Title This
Click to edit Master text styles
ОПШТЕСТВО ТЕМА: МЕСТОТО ВО КОЕ ЖИВЕАМ Скопје
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
DES (Data Encryption Standards)
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Install AD Certificate Services
Introduction to Elliptic Curve Cryptography
Public-Key, Digital Signatures, Management, Security
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Click to edit Master text styles
Presentation On Bit-Coins.
Diffie-Hellman Key Exchange
Purpose: how do computers keep our information secret?
Click to edit Master text styles
TLS Encryption and Decryption
Campbell R. Harvey Duke University and NBER
Presentation transcript:

Merkle-Hellman 3 5 9 18 40 1 0 1 1 0

Merkle-Hellman 3 5 9 18 40 1 0 1 1 0 = 30 = 0 1 1 1 1 (Encrypted)

Merkle-Hellman 3 5 9 18 40 1 0 1 1 0 = 30 = 0 1 1 1 1 (Encrypted) 3 5 9 18 40 1 0 1 1 0 = 30 = 0 1 1 1 1 (Encrypted) 30 < 40 so first bit is 0 (Decrypt)

Merkle-Hellman 3 5 9 18 40 1 0 1 1 0 = 30 = 0 1 1 1 1 (Encrypted) 3 5 9 18 40 1 0 1 1 0 = 30 = 0 1 1 1 1 (Encrypted) 30 < 40 so first bit is 0 (Decrypt) 30 > 18 so second bit is 1 remainder is 12

Merkle-Hellman 3 5 9 18 40 1 0 1 1 0 = 30 = 0 1 1 1 1 (Encrypted) 3 5 9 18 40 1 0 1 1 0 = 30 = 0 1 1 1 1 (Encrypted) 30 < 40 so first bit is 0 (Decrypt) 30 > 18 so second bit is 1 remainder is 12 12 > 9 so third bit is 1 remainder is 3

Merkle-Hellman 3 5 9 18 40 1 0 1 1 0 = 30 = 0 1 1 1 1 (Encrypted) 3 5 9 18 40 1 0 1 1 0 = 30 = 0 1 1 1 1 (Encrypted) 30 < 40 so first bit is 0 (Decrypt) 30 > 18 so second bit is 1 remainder is 12 12 > 9 so third bit is 1 remainder is 3 3 < 5 so fourth bit is 0

Merkle-Hellman 3 5 9 18 40 1 0 1 1 0 = 30 = 0 1 1 1 1 (Encrypted) 3 5 9 18 40 1 0 1 1 0 = 30 = 0 1 1 1 1 (Encrypted) 30 < 40 so first bit is 0 (Decrypt) 30 > 18 so second bit is 1 remainder is 12 12 > 9 so third bit is 1 remainder is 3 3 < 5 so fourth bit is 0 3 == 3 so fifth bit is 1 and we are done

Merkle-Hellman 3 5 9 18 40 Public key 1 0 1 1 0 = 30 = 0 1 1 1 1 3 5 9 18 40 Public key 1 0 1 1 0 = 30 = 0 1 1 1 1 (Encrypted) 30 < 40 so first bit is 0 (Decrypt) 30 > 18 so second bit is 1 remainder is 12 12 > 9 so third bit is 1 remainder is 3 3 < 5 so fourth bit is 0 3 == 3 so fifth bit is 1 and we are done

Merkle-Hellman Problem: Anyone can decrypt the message

Merkle-Hellman Problem: Anyone can decrypt the message So, choose multiplier m and modulus p and for every number ki in the key set pki = ki*m mod p for example, if m=4571 and p=7187 then

Merkle-Hellman Problem: Anyone can decrypt the message So, choose multiplier m and modulus p and for every number ki in the key set pki = ki*m mod p for example, if m=4571 and p=7187 then 3 5 9 18 40 83 157 317 ⇒ 6526 1294 5204 3221 3165 5669 6134 4420

Merkle-Hellman Problem: Anyone can decrypt the message So, choose multiplier m and modulus p and for every number ki in the key set pki = ki*m mod p for example, if m=4571 and p=7187 then The bottom part and p are sent as the public key, the inverse of m and p are the private key. The inverse m-1 of m is 1283 (See http://gauss.ececs.uc.edu/Courses/c653/lectures/Math/Inverse/inverse.html) 3 5 9 18 40 83 157 317 ⇒ 6526 1294 5204 3221 3165 5669 6134 4420

Merkle-Hellman Problem: Anyone can decrypt the message So, choose multiplier m and modulus p and for every number ki in the key set pki = ki*m mod p for example, if m=4571 and p=7187 then The bottom part and p are sent as the public key, the inverse of m and p are the private key. The inverse m-1 of m is 1283 (See http://gauss.ececs.uc.edu/Courses/c653/lectures/Math/Inverse/inverse.html) What is an inverse? Start with msg = ∑ici*ki Encrypt: ∑ici*ki*m mod p Decrypt: ∑ici*ki*m*m-1 mod p = ∑ici*ki*1 mod p = ∑ici*ki 3 5 9 18 40 83 157 317 ⇒ 6526 1294 5204 3221 3165 5669 6134 4420

Merkle-Hellman Problem: Anyone can decrypt the message So, choose multiplier m and modulus p and for every number ki in the key set pki = ki*m mod p for example, if m=4571 and p=7187 then The bottom part and p are sent as the public key, the inverse of m and p are the private key. The inverse m-1 of m is 1283 (See http://gauss.ececs.uc.edu/Courses/c653/lectures/Math/Inverse/inverse.html) Encrypt: 10000110 as 6526+5669+6134 = 18329 3 5 9 18 40 83 157 317 ⇒ 6526 1294 5204 3221 3165 5669 6134 4420

Merkle-Hellman Problem: Anyone can decrypt the message So, choose multiplier m and modulus p and for every number ki in the key set pki = ki*m mod p for example, if m=4571 and p=7187 then The bottom part and p are sent as the public key, the inverse of m and p are the private key. The inverse m-1 of m is 1283 (See http://gauss.ececs.uc.edu/Courses/c653/lectures/Math/Inverse/inverse.html) Encrypt: 10000110 as 6526+5669+6134 = 18329 Decrypt: 18329*1283 mod 7187 = 23516107 mod 7187 = 243 -- use 3 + 83 + 157 = 243 to receive 10000110 (See http://gauss.ececs.uc.edu/Courses/c653/lectures/Java/Encrypt/A.html) 3 5 9 18 40 83 157 317 ⇒ 6526 1294 5204 3221 3165 5669 6134 4420