Rabin Lock and Public-Key Systems

Slides:



Advertisements
Similar presentations
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Advertisements

Public Key Encryption Algorithm
Primality Testing By Ho, Ching Hei Cheung, Wai Kwok.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
and Factoring Integers
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography & Number Theory
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
Protecting Satellite Networks from Disassociation DoS Attacks Protecting Satellite Networks from Disassociation DoS Attacks (2010 IEEE International Conference.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
1 Section Congruences In short, a congruence relation is an equivalence relation on the carrier of an algebra such that the operations of the algebra.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
Information and Computer Security CPIS 312 Lab 8 1 Asymmetric Key Algorithms RSA Algorithm TRIGUI Mohamed Salim.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-9 Public-Key Cryptography.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-12 Public-Key Cryptography.
Page : 1 Date : Duration : 90 Minutes Maximum marks 70% Vorname ……………………………………….. Nachname ……………………………………….. Matrikel-Nr. ………………………………………..
Feige-Fiat-Shamir Zero Knowledge Proof Based on difficulty of computing square roots mod a composite n Given two large primes p, q and n=p * q, computing.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Public-Key Cryptography ElGamal Public-Key Crypto-System
Mathematical Background: Groups, Rings, Finite Fields (GF)
Mathematical Background for Cryptography: Modular arithmetic and gcd
Public Key Encryption Major topics The RSA scheme was devised in 1978
Mathematical Background: Extension Fields
Network Security Design Fundamentals Lecture-13
Public-Key Cryptography RSA Rivest-Shamir-Adelmann Public-Key System
Integers and Division Section 3.4.
RSA Public-Key Secrecy and Signature
DH Public-Key Exchange
Design Problems (Open book)
Factoring large integers
RSA Cryptosystem Bits PCs Memory MB ,000 4GB 1,020
Network Security Sample Solution Short questions (Closed book)
Mathematical Background: Prime Numbers
Number Theory and Euclidean Algorithm
ElGamal Public-Key Systems over GF(p) & GF(2m)
Mathematical Background: Primes and (GF)
GCD and LCM relationship
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Sample Solution Final exam: Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology System Design Fundamentals
Network Security Tutorial-14 Design Fundamentals IPSEC, KERBEROS
Network Security Design Fundamentals Lecture-13
Cryptology Design Fundamentals
Network Security Tutorial-16 Design Fundamentals PGP ET-IDA-082
The RSA Public-Key Encryption Algorithm
Network Security Tutorial-16 Design Fundamentals PGP ET-IDA-082
Network Security Tutorial-14 Design Fundamentals IPSEC, KERBEROS
Network Security Tutorial-17 Design Fundamentals E-Commerce ET-IDA-082
Diffie-Hellman Algorithm
Cryptology Design Fundamentals
Mathematical Background: Groups, Rings, Finite Fields (GF)
Public-Key Cryptography Quadratic Residues and „Rabin Lock“
Mathematical Background: Primes and (GF)
Presentation transcript:

Rabin Lock and Public-Key Systems Network Security Design Fundamentals ET-IDA-082 Tutorial-10 Rabin Lock and Public-Key Systems 11.05.2016, v23 Prof. W. Adi

Problem 10-1: Solution 10-1: YA = 272 mod 33 = 3 Set up a Rabin Pubic-Key secrecy system using for user A and B the prime numbers 7,3 and 11,3 respectively User A Encrypts the message M=3 to get the cryptogram YA and sends it to B Let user B decrypt the cryptogram YA Solution 10-1: Set up and calculate Cryptogram and decrypt the message M=3 for a user with the public key mb = 3x11=33 User B receives User A sends M to B Public directory ma = pa . qa=7x3 = 21 mb = pb . qb = 3 x 11 = 33 ma = 21 public key of A mb = 33 public key of B M = 3 = 011 M’= 011 011=27 3 YA = 272 mod 33 = 3 C mod mb 3 mod 33 (M’)2 mod mb M =27 mb = 33 Use square root Algorithm modulo m = p.q for known p and q. (exercise) mb = pb . qb= 3 x 11

r = c(p+1)/4 mod p => r = 33 mod 11 = 5 Solution Cont.: See square root algorithm calculations: Decryption: Take p = 11, q = 3, and n = 33. Then gcd(11,3) = (-1)*11 + (4)*3 = 1, so that a = -1 and b = 4. To decrypt compute the square root of C modulo 33: r = c(p+1)/4 mod p => r = 33 mod 11 = 5 s = c(q+1)/4 mod q => s = 31 mod 3 = 0 And x = (a*p*s + b*q*r) mod m => x = ((-1)*11*0 + 4*3*5) mod 33 = 27 y = (a*p*s - b*q*r) mod m => y = ((-1)*11*0 - 4*3*5) mod 33 = 6 These are two of the four square roots, and the remaining two are -x mod 33 = -27 mod 33 = 6 -y mod 33 = -6 mod 33 = 27 In binary, the four square roots are 27 = 0110112 6 = 0001102 27 = 0110112 One of these roots is M’. Only 27 has the required repetition redundancy, so this is the only possible message M’= 27 = 011011 => M = 011. The only sqare root with two equal halfs Is the correct result

Problem 10-2: Two square roots are somehow found in Zm in the following cases: - √ 25 = 5 and 31 mod 39 - √ 66 = 41 and 24 mod 85 - √ 54 = 33 and 36 mod 69 Try to factorize m = p  q in all cases. Hint: gcd [ m, (a+b) ] = p or q Solution 10-2: