Factoring large integers

Slides:



Advertisements
Similar presentations
RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
Advertisements

22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
The RSA Algorithm Rocky K. C. Chang, March
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Topic 22: Digital Schemes (2)
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Elements of Coding and Encryption Continuation 1.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Public-Key Cryptography ElGamal Public-Key Crypto-System
Overview Modern public-key cryptosystems: RSA
Public Key Encryption Major topics The RSA scheme was devised in 1978
Asymmetric-Key Cryptography
Public Key Encryption.
Asymmetric Encryption
Public Key Cryptosystem
RSA Slides by Kent Seamons and Tim van der Horst
Public-Key Cryptography RSA Rivest-Shamir-Adelmann Public-Key System
CS 2210:0001Discrete Structures Modular Arithmetic and Cryptography
PUBLIC-KEY ENCRYPTION Focusing on RSA
Public Key Encryption and Digital Signatures
MA/CSSE 473 Day 10 Data Encryption RSA.
RSA and El Gamal Cryptosystems
RSA Cryptosystem Bits PCs Memory MB ,000 4GB 1,020
Private-Key Cryptography
ICS 454 Principles of Cryptography
Topic 25: Discrete LOG, DDH + Attacks on Plain RSA
Asymmetric Cryptography
Public Key Cryptography Diffie-Hellman, Discrete Log, RSA
ICS 353: Design and Analysis of Algorithms
Public-key encryption
Cryptography: Basics (2)
ICS 454 Principles of Cryptography
CSE 321 Discrete Structures
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
El Gamal and Diffie Hellman
Where Complexity Finally Comes In Handy…
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Cryptology Design Fundamentals
Where Complexity Finally Comes In Handy…
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
The RSA Public-Key Encryption Algorithm
Where Complexity Finally Comes In Handy…
Presentation transcript:

Factoring large integers The RSA Cryptosystem Factoring large integers

Florida State University Factorization Given an integer N > 1, it has a unique factorization into primes: N = p1r1  p2r2  ...  pkrk ; Elementary-school algorithm for factoring: List primes and try each in order Inefficient: If N is k bits long, primes  √N, or less than k/2 bits long should be tried. There are 2k/2/k such primes. Exponential workload Breno de Medeiros Florida State University Fall 2005

Florida State University RSA Integers Let k = 1024, or 2048, for instance. Generate two primes p, q, of bitlength k/2 Put N = p•q Under most conditions, it is hard to factor N The primes p, q must not be of a “weak” form All known algorithms to factor such numbers have super-polynomial running times. Publish N; keep p, q secret. Breno de Medeiros Florida State University Fall 2005

Florida State University Size of the RSA ring Let ZN* be the set of integers a such that: a is in [1, N-1]; a relatively prime to N: a and N have no common divisors; Then ZN* contains (p-1)(q-1) elements. For each integer L: let (L) be the size of the subset of [1, L-1] made of numbers relatively prime to L We have seen that if N = pq, a product of primes: (N) = (p - 1)(q - 1) Breno de Medeiros Florida State University Fall 2005

Exponentiation modulo N If a is relatively prime to (N), then: Let b be such that ab + k (N) = 1. Such b exists by the Euclidean algorithm for GCD It follows that for every M in ZN* : C = Ma mod N D = Cb mod N Then D = M mod N (!!!) Breno de Medeiros Florida State University Fall 2005

Florida State University Inverting exponents If p, q are known: First compute (N) Then use GCD algorithm to find, for each exponent a, its inverse. If p and q are not known: Given an exponent, one cannot find its inverse without first having to factor N. Public Key: (N, e) Private Key: (p, q, d), where d = e-1 Breno de Medeiros Florida State University Fall 2005

To encrypt using RSA Retrieve the public key (N, e) First, encode a block B of bitlength smaller than k = | N |, as an element M of ZN* : M = Encode(N, B) Then compute C = Me mod N. Send C to recipient, who then uses private d: Recovers M = Cd mod N. Decodes B = Decode(N, M). This is not an encryption everybody knows how to decode Breno de Medeiros Florida State University Fall 2005

Florida State University To sign using RSA Compute digest H = H (M) of message M. Encode H as an element K of ZN* K = Encode(N, H) Use private key (p, q, d): S = Kd mod N. To verify signature S on Message M Re-compute: H = H(M) Retrieve public key (N, e) Check: (K = Se mod N)? Breno de Medeiros Florida State University Fall 2005

Florida State University RSA Encoding Unlike DSA and discrete-log type signatures, the encoding of bytes as elements of is security-critical in RSA signatures and encryption. The encoding is specified as part of the RSA standard. There are two main encoding standards used w/ RSA: RSA-OAEP(+) EMSA-PSS Breno de Medeiros Florida State University Fall 2005