Public Key Encryption and the RSA Algorithm

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

Cryptography and Network Security Chapter 9
Public Key Algorithms …….. RAIT M. Chatterjee.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Public Key Cryptography
Cryptography and Network Security Chapter 9. Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 9 – Public Key Cryptography and RSA Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Cryptography and Network Security Chapter 9 5th Edition by William Stallings Lecture slides by Lawrie Brown.
The RSA Algorithm JooSeok Song Tue.
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Introduction to Public Key Cryptography
Prime Numbers Prime numbers only have divisors of 1 and self
Public Key Cryptography and the RSA Algorithm Cryptography and Network Security by William Stallings Lecture slides by Lawrie Brown Edited by Dick Steflik.
Applied Cryptography (Public Key) RSA. Public Key Cryptography Every Egyptian received two names, which were known respectively as the true name and the.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Public Key Cryptography and RSA” Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 11/9/2009 INCS 741: Cryptography 11/9/20091Dr. Monther.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography and Network Security Public Key Cryptography and RSA.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Fall 2002CS 395: Computer Security1 Chapter 9: Public Key Cryptography.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Asymmetric Encryption
Visit for more Learning Resources
Lecture 5 RSA DR. Nermin Hamza.
G. Pullaiah College of Engineering and Technology
Cryptography and Network Security
Chapter 9 – Public Key Cryptography and RSA
Privacy & Security.
Public Key Cryptography and the RSA Algorithm
RSA Algorithm Cryptography and Network Security by William Stallings
Public-Key Cryptography and RSA
CSCI-235 Micro-Computer Applications
The RSA Algorithm JooSeok Song Tue.
Public-Key Cryptography
Cryptography.
Private-Key Cryptography
ICS 353: Design and Analysis of Algorithms
The RSA Algorithm JooSeok Song Tue.
NET 311 Information Security
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
NET 311 Information Security
Cryptography and Network Security
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Asymmetric Cryptographic Algorithms
Introduction to Cryptography
Presentation transcript:

Public Key Encryption and the RSA Algorithm Computer Networking- A top-Down Approach Featuring the Internet James F Kurose and Keith W Ross, Second Edition, Pearson Publication Chapter 7- page 642 – 647

Goal To understand what public key encryption is doing to achieve security. To focus on the working principle of public key encryption using RSA algorithm

Objective The student will be able to apply the technique followed in public key encryption method

Private-Key Cryptography traditional private/secret/single key cryptography uses only one key . Key is shared by both sender and receiver and needs to be known in advance. if the key is disclosed communications are compromised. This is also referred to as symmetric key approach.

Possibility of secret key in advance In internet communicating parties never meet or converse except over the network. Is it possible for communication to take place without having secret key in advance? Answer is YES.

Public-Key Cryptography uses two keys – a public key and a private key asymmetric since sender do not know private key of receiver uses clever application of number theory concepts to function complements rather than replaces private key cryptography

Diagram to understand PKE

Public Key Encryption public-key/two-key/asymmetric cryptography involves the use of two keys: a public-key, which may be known by anybody, and can be used to encrypt messages a private-key, known only to the recipient, used to decrypt messages is asymmetric because those who encrypt messages cannot decrypt messages

Bob communicating with Alice

Why PK Cryptography? developed to address two key issues: key distribution – how to have secure communications in general without having to trust a KDC with your key digital signatures – how to verify a message comes intact from the claimed sender public key invention is due to Whitfield Diffie & Martin Hellman at Stanford U. in 1976

Applications can classify uses into 3 categories: encryption/decryption (provide secrecy) digital signatures (provide authentication) key exchange (of session keys)

RSA Ron Rivest, Adi Shamir & Leonard Adleman of MIT in 1977. best known & widely used public-key scheme

Two interrelated components of RSA The choice of the public key and the private key The encryption and decryption algorithm

Steps to generate public and private Keys Choose two large prime numbers, p and q. Compute n = pq and z = (p – 1)(q – 1). 3. Choose a number, e, less than n, that has no common factors (other than 1) with z. 4. Find a number, d, such that ed – 1 is exactly divisible (that is, with no remainder) by z. We choose d such that ed mod z = 1 5. The public key that Bob makes available to the world, KB+, is the pair of numbers (n, e); his private key, KB–, is the pair of numbers (n, d).

Encryption and Decryption steps

Pros and Cons of RSA The security of RSA relies on the fact that there are no known algorithms for quickly factoring a number, in this case the public value n, into the primes p and q. It is not known whether or not there exist fast algorithms for factoring a number, hence the security of RSA is not guaranteed. If one knew p and q, then given the public value e, one could easily compute the secret key, d.

Things to ponder The application of PKC Limitation of Public key cryptography KDC Digital signature Example to solve with integer numbers Example to solve with text Alert points

General Instruction for evaluation Students will follow the team members formed for problem solving Each team will be assigned a task on the spot in the classroom based on this ppt.

End of RSA FLIPPED CLASSROOM SESSION Click here to view the movie