Public-Key Cryptography and RSA

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Cryptography and Network Security Chapter 9
Public Key Algorithms …….. RAIT M. Chatterjee.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Cryptography and Network Security Chapter 9. Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Network Security Chapter 9 5th Edition by William Stallings Lecture slides by Lawrie Brown.
The RSA Algorithm JooSeok Song Tue.
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
ASYMMETRIC CIPHERS.
Introduction to Public Key Cryptography
Prime Numbers Prime numbers only have divisors of 1 and self
Number-Theoretic Algorithms
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
Midterm Review Cryptography & Network Security
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
P1. Public-Key Cryptography and RSA 5351: Introduction to Cryptography Spring 2013.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography and Network Security Public Key Cryptography and RSA.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
@Yuan Xue CS 285 Network Security Public-Key Cryptography Yuan Xue Fall 2012.
Digital Signatures.
Public Key Cryptosystem
Lecture 5 RSA DR. Nermin Hamza.
Computer Communication & Networks
Privacy & Security.
Public Key Encryption and the RSA Algorithm
Digital Signatures Last Updated: Oct 14, 2017.
Message Security, User Authentication, and Key Management
Private-Key Cryptography
Cryptography and Security Fall 2009 Steve Lai
ICS 353: Design and Analysis of Algorithms
“Public Key Cryptography” & “RSA”
NET 311 Information Security
Appendix 5: Cryptography p
NET 311 Information Security
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Asymmetric Cryptographic Algorithms
Introduction to Cryptography
Secure Diffie-Hellman Algorithm
Presentation transcript:

Public-Key Cryptography and RSA CSE 651: Introduction to Network Security

Abstract We will discuss Suggested reading: The concept of public-key cryptography RSA algorithm Attacks on RSA Suggested reading: Sections 4.2, 4.3, 8.1, 8.2, 8.4 Chapter 9

Public-Key Cryptography Also known as asymmetric-key cryptography. Each user has a pair of keys: a public key and a private key. The public key is used for encryption. The key is known to the public. The private key is used for decryption. The key is only known to the owner.

Bob Alice

Why Public-Key Cryptography? Developed to address two main issues: key distribution digital signatures Invented by Whitfield Diffie & Martin Hellman 1976.

Mathematics used in RSA (Sections 4.2, 4.3, 8.1, 8.2, 8.4) Modular Arithmetic Mathematics used in RSA (Sections 4.2, 4.3, 8.1, 8.2, 8.4)

The Chinese Remainder Problem A problem described in an ancient Chinese arithmetic book. Problem: We have a number of things, but we do not know exactly how many. If we count them by threes we have two left over. If we count them by fives we have three left over. If we count them by sevens we have two left over. How many things are there?

Example: Chinese remainder theorem

Setting up an RSA Cryptosystem A user wishing to set up an RSA cryptosystem will: Choose a pair of public/private keys: (PU, PR). Publish the public (encryption) key. Keep secret the private (decryption) key.

RSA-200 = 27,997,833,911,221,327,870,829,467,638, 722,601,621,070,446,786,955,428,537,560, 009,929,326,128,400,107,609,345,671,052, 955,360,856,061,822,351,910,951,365,788, 637,105,954,482,006,576,775,098,580,557, 613,579,098,734,950,144,178,863,178,946, 295,187,237,869,221,823,983.

2B 3B • • • 0 n 2n 3n 4n • • • ns

2B 3B

Public-Key Applications Three categories of applications: encryption/decryption (provide secrecy) digital signatures (provide authentication) key exchange (of session keys) Public-key cryptosystems are slower than symmetric-key systems. So, mainly used for digital signatures and key exchange.

RSA: basic RSA, textbook RSA Padded-RSA: PKCS #1 v.1.5 Original message Padded message