Handbook of Applied Cryptography - CH8, Public-Key Encryption

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Asymmetric-Key Cryptography
7. Asymmetric encryption-
Elliptic curve arithmetic and applications to cryptography By Uros Abaz Supervised by Dr. Shaun Cooper and Dr. Andre Barczak.
Great Theoretical Ideas in Computer Science.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
ASYMMETRIC CIPHERS.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
The RSA Algorithm Based on the idea that factorization of integers into their prime factors is hard. ★ n=p . q, where p and q are distinct primes Proposed.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
-Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
1 AN EFFICIENT METHOD FOR FACTORING RABIN SCHEME SATTAR J ABOUD 1, 2 MAMOUN S. AL RABABAA and MOHAMMAD A AL-FAYOUMI 1 1 Middle East University for Graduate.
Lecture 7 Discrete Logarithms
Abstract Many security primitives are based on hard math¬ematical problems. Using hard AI problems for security is emerging as an exciting new paradigm,
Lecture 5-6 The RSA and Rabin Algorithms. The possibility of the public key cryptosystem was first publicly suggested by Diffie and Hellman. However,
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Number Theory and Advanced Cryptography 2
1 Number Theory and Advanced Cryptography 5. Cryptanalysis of RSA Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
Scott CH Huang COM 5336 Lecture 7 Other Public-Key Cryptosystems Scott CH Huang COM 5336 Cryptography Lecture 7.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
@Yuan Xue CS 285 Network Security Public-Key Cryptography Yuan Xue Fall 2012.
Systems Architecture Receiver Anonymity Matthias Füssel, Dennis Schneider June 5, 2007.
KNAPSACK公開金鑰密碼學 Algorithms FINITE DEFINITENESS INPUT/OUTPUT GENERALITY
Overview Modern public-key cryptosystems: RSA
Outline Primitive Element Theorem Diffie Hellman Key Distribution
Public Key Encryption Major topics The RSA scheme was devised in 1978
Asymmetric-Key Cryptography
Public Key Encryption.
Applied Cryptography Spring 2017 Asymmetric ciphers.
Practical Aspects of Modern Cryptography
Public Key Cryptosystem
Asymmetric-Key Cryptography
Network Security Design Fundamentals Lecture-13
Key Exchange References: Applied Cryptography, Bruce Schneier
Handbook of Applied Cryptography - CH4, from 4.1~4.3
PUBLIC-KEY ENCRYPTION Focusing on RSA
B504/I538: Introduction to Cryptography
MA/CSSE 473 Day 10 Data Encryption RSA.
RSA and El Gamal Cryptosystems
IEEE TRANSACTIONS ON INFORMATION THEORY, JULY 1985
Input: A={a1, a2, … an} – public key, S - ciphertext
Symmetric-Key Cryptography
Appendix 5: Cryptography p
Introduction to Elliptic Curve Cryptography
Symmetric-Key Cryptography
Cryptology Design Fundamentals
Introduction to Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Network Security Design Fundamentals Lecture-13
Diffie-Hellman Algorithm
Lecture 7: Key Distribution
LAB 3: Digital Signature
A General Introduction to Modern Cryptography
Presentation transcript:

Handbook of Applied Cryptography - CH8, Public-Key Encryption Jinmyeong Shin 2017. 11. 13

Agenda 8.1 Introduction 8.2 RSA public-key encryption 8.3 Rabin public-key encryption 8.4 ElGamal public-key encryption 8.5 McEliece public-key encryption 8.6 Knapsack public-key encryption 8.7 Probabilistic public-key encryption 8.8 Notes and further references

8.1 Introduction

8.1 Introduction

8.2.1 Description of RSA public-key encryption Computational problem Integer factorization problem(ch.3.2) RSA problem (ch.3.3) Key generation

8.2.1 Description of RSA public-key encryption Encryption and Decryption Proof  

8.2.2 Security of RSA Relation to factoring

8.2.2 Security of RSA  

8.2.3 RSA encryption in practice  

8.3 Rabin public-key encryption Computational problem Integer factorization problem(ch.3.2) Square roots modulo composite n(ch.3.5.2) Key generation Encryption and Decryption

8.3 Rabin public-key encryption Square root calculation

8.3 Rabin public-key encryption Security of Rabin public-key encryption The task faced by a passive adversary is SQROOT problem that computing square roots modulo n. This problem is computationally equivalent Hence, factoring n is computationally intractable, the encryption scheme is provably secure against a passive adversary. Rabin encryption scheme succumbs to a chosen-chiphertext attack. Small encryption exponents, forward search attack and be circumvented by salting . Multiplicative property can be avoided by adding redundancy.

8.4 ElGamal public-key encryption Computational problem Discrete logarithm problem(ch.3.6) Diffie-Hellman problem(ch.3.7) Key generation

8.4 ElGamal public-key encryption Encryption and Decryption Proof of works

8.4 ElGamal public-key encryption Efficiency of ElGamal encryption Randomized encryption The fundamental idea behind randomized encryption techniques is to use randomization to increase the cryptographic security of an encryption process through one or more of the following methods

8.4 ElGamal public-key encryption  

8.4.2 Generalized ElGamal encryption In case of the cyclic group G satisfy the following condition, ElGamal encryption scheme is also applied. Key generation

8.4.2 Generalized ElGamal encryption Encryption and Decryption

8.5 McEliece public-key encryption Computational problem Linear code decoding problem Key generation

8.5 McEliece public-key encryption Encryption and Decryption Proof of works

8.5 McEliece public-key encryption Security of McEliese encryption

8.6 Knapsack public-key encryption Computational problem Subset sum problem Merkle-Hellman knapsack encryption Superincreasing sequece Superincreasing subset sum problem

8.6 Knapsack public-key encryption Key generation

8.6 Knapsack public-key encryption Encryption and Decryption Proof of work

8.6 Knapsack public-key encryption Insecurity of Merkle-Hellman knapsack encryption

8.6 Knapsack public-key encryption Chor-Rivest public-key encryption Key generation

8.6 Knapsack public-key encryption

8.6 Knapsack public-key encryption Decryption

8.6 Knapsack public-key encryption Proof of work

8.6 Knapsack public-key encryption Security of Chor-Rivest encryption

8.7 Probabilistic public-key encryption