Some basic terminology

Slides:



Advertisements
Similar presentations
Cryptography Made Easy Stuart Reges Principal Lecturer University of Washington.
Advertisements

BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CRYPTOGRAPHY Modern techniques. Computers and Cryptography Computers allow more sophisticated enciphering than mechanical devices Computers are faster.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
Cryptography and Internet Security How mathematics makes it safe to shop on-line John Lindsay Orr University of Nebraska - Lincoln.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Public Key Cryptography
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
RSA Encryption William Lu. RSA Background  Basic technique first discovered in 1973 by Clifford Cocks of CESG (part of British GCHQ)  Invented in 1977.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Cryptography Bryan Pearsaul. Outline What is Cryptology? Symmetric Ciphers Asymmetric Ciphers Diffie-Hellman RSA (Rivest/Shamir/Adleman) Moral.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
Great Theoretical Ideas in Computer Science.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Encryption Coursepak little bit in chap 10 of reed.
1 Applications of Number Theory CS 202 Epp section 10.4 Aaron Bloomfield.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Darci Miyashiro Math 480 April 29, 2013
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
What is RSA RSA is a system employed to create the encrypted message in which the key used for encryption is different from that used to decrypt. It is.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
Encryption.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Chaos, Communication and Consciousness Module PH19510 Lecture 13 Encryption in the Computer Age.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
1 Applications of Number Theory CS/APMA 202 Rosen section 2.6 Aaron Bloomfield.
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
What is the Smallest RSA Private Key Why is there, at all, such a thing? Why is it not 42? Why is the smallest public key not 35? Or,
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Digital Signatures.
Public Key Cryptosystem
RSA Slides by Kent Seamons and Tim van der Horst
Privacy & Security.
Public Key Encryption and Digital Signatures
Public-key Cryptography
(Tuesday, 20 October, 7:30-9PM) Encryption-Decryption
Public Key Encryption and the RSA Algorithm
Chap 6: Security and Protection
Modular Arithmetic and RSA Encryption
Cryptography.
Real-world Security of Public Key Crypto
CSE 321 Discrete Structures
Appendix 5: Cryptography p
CS 115: COMPUTING FOR The Socio-Techno Web
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Chapter 3 - Public-Key Cryptography & Authentication
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Oblivious Transfer.
Presentation transcript:

Some basic terminology Alice wants to send a secret message to Bob Eve is eavesdropping Cryptographers tell Alice and Bob how to encode their messages Cryptanalysts help Eve to break the code Historic battle between the cryptographers and the cryptanalysts that continues today

Public Key Encryption Proposed by Diffie, Hellman, Merkle First big idea: use a function that cannot be reversed (a humpty dumpty function): Alice tells Bob a function to apply using a public key, and Eve can’t compute the inverse Second big idea: use asymmetric keys (sender and receiver use different keys): Alice has a private key to compute the inverse Key benefit: doesn't require the sharing of a secret key

RSA Encryption Named for Ron Rivest, Adi Shamir, and Leonard Adleman Invented in 1977, still the premier approach Based on Fermat's Little Theorem: ap-11 (mod p) for prime p, gcd(a, p) = 1 Slight variation: a(p-1)(q-1)1 (mod pq) for distinct primes p and q, gcd(a,pq) = 1 Requires large primes (100+ digit primes)

Why does it work? Original message is carried to the e power, then to the d power: (msge)d = msged Remember how we picked e and d: msged = msgk(p-1)(q-1) + 1 Apply some simple algebra: msged = (msg(p-1)(q-1))k  msg1 Applying Fermat's Little Theorem: msged = (1)k  msg1 = msg

Politics of Cryptography British actually discovered RSA first but kept it secret Phil Zimmerman tried to bring cryptography to the masses with PGP and ended up being investigated as an arms dealer by the FBI and a grand jury The NSA hires more mathematicians than any other organization

Exploring further Simon Singh, The Code Book RSA Factoring Challenge (unfortunately the prizes have been withdrawn) Shor's algorithm would break RSA if only we had a quantum computer Java's BigInteger: isProbablePrime, nextProbablePrime, modPow