1. Public Key Encryption (A Simple Case)

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Cryptography & Message Authentication By Tahaei Fall 2012.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Public Encryption: RSA
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Introduction to Public Key Cryptography
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Behzad Akbari Spring In the Name of the Most High.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Cryptography, Authentication and Digital Signatures
Public-Key Cryptography CS110 Fall Conventional Encryption.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
What is RSA RSA is a system employed to create the encrypted message in which the key used for encryption is different from that used to decrypt. It is.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Cryptography & Network Security : Topic Seminar Description & Analysis Madhava.N 1RV06SCN05 2 nd Semester M.Tech CNE RVCE RSA ALGORITHM.
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Cryptography Readings Encryption, Decryption, & Digital Certificates.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Public Key Cryptography. 2 Public Key Cryptography Agenda: Message authentication – authentication codes and hash functions Public key encryption –
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Public Key Encryption ● Diffie and Hellman – 1976 Famous Paper: New Directions In Cryptography New Directions In Cryptography ● First revolutionary.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Public Key Encryption.
Basics of Cryptography
Asymmetric-Key Cryptography
Symmetric and Asymmetric Encryption
Public-Key Cryptography and Message Authentication
Public Key Encryption and Digital Signatures
Cryptography and Security Technologies
Public Key Encryption and the RSA Algorithm
Chap 6: Security and Protection
Solution to Security Threat
Analysis of the RSA Encryption Algorithm
Public-Key Cryptography and Message Authentication
Digital Signatures…!.
Chapter 3 - Public-Key Cryptography & Authentication
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Introduction to Cryptography
Technology Solutions to E-Commerce Environment
The RSA Public-Key Encryption Algorithm
Presentation transcript:

1. Public Key Encryption (A Simple Case) Uses two mathematically related digital keys Public key (widely distributed) Private key (kept secret by owner) Both keys used to encrypt and decrypt message Once key used to encrypt message, same key cannot be used to decrypt message Sender uses recipient’s public key to encrypt message; recipient uses his/her private key to decrypt it Copyright © 2010 Pearson Education, Inc.

Public Key Cryptography—A Simple Case Figure 5.8, Page 290 Copyright © 2010 Pearson Education, Inc.

Asymmetric/Public key Encryption In public key encryption mathematically algorithms produce the keys through one – way function. In one – way function an input can’t be derived from output. Example: it is easy to make scrambled eggs, but impossible to retrieve whole eggs from the scrambled eggs. Keys used in Asymmetric key encryption are 128 bit, 256bit, 512bit. Algorithm used in Asymmetric key encryption are RSA(Ron Rives, Adi Shamir and Len Adleman ) etc. Copyright © 2010 Pearson Education, Inc.

The RSA Algorithm – Key Generation (Just Concept) Select p,q p and q both prime Calculate n = p x q Calculate Select integer e Calculate d Public Key KU = {e,n} Private key KR = {d,n} Copyright © 2010 Pearson Education, Inc.

The RSA Algorithm – Encryption/Decryption Just Concept Plaintext: M<n Ciphertext: C = Me (mod n) Ciphertext: C Plaintext: M = Cd (mod n) Copyright © 2010 Pearson Education, Inc.

Example of RSA Algorithm (Just Concept) Copyright © 2010 Pearson Education, Inc.

Problem: public key encryption (a simple case) In public key encryption some elements of security are missing. Although we can be quite sure the message was not understood or read by a third party (Message Confidentiality) But No guarantee the sender really is the sender (no authentication of message) This mean the sender could deny ever sending the message (repudiation) And there is no assurance the message was not altered some how in transit. Example: message change to Buy Cisco@Rs.25 from sell Cisco @Rs.25. This suggests a potential lack of integrity in the system. Copyright © 2010 Pearson Education, Inc.