Modular Arithmetic and RSA Encryption

Slides:



Advertisements
Similar presentations
Cryptography Made Easy Stuart Reges Principal Lecturer University of Washington.
Advertisements

CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Data encryption with big prime numbers
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CRYPTOGRAPHY Modern techniques. Computers and Cryptography Computers allow more sophisticated enciphering than mechanical devices Computers are faster.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
Cryptography and Internet Security How mathematics makes it safe to shop on-line John Lindsay Orr University of Nebraska - Lincoln.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Public Key Cryptography
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
RSA Encryption William Lu. RSA Background  Basic technique first discovered in 1973 by Clifford Cocks of CESG (part of British GCHQ)  Invented in 1977.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
© Copyright Martin Tompa, 1999 Secret Codes, Unforgeable Signatures, and Coin Flipping on the Phone Martin Tompa Computer Science & Engineering University.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
Great Theoretical Ideas in Computer Science.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Encryption Coursepak little bit in chap 10 of reed.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Darci Miyashiro Math 480 April 29, 2013
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
What is RSA RSA is a system employed to create the encrypted message in which the key used for encryption is different from that used to decrypt. It is.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Secret Codes, Unforgeable Signatures, and Coin Flipping on the Phone Martin Tompa Computer Science & Engineering University of Washington.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Encryption on the Internet Jeff Cohen. Keeping Information Secret What information do we want to be secret? –Credit card number –Social security number.
Great Theoretical Ideas in Computer Science.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
Public Key Cryptosystem In Symmetric or Private Key cryptosystems the encryption and decryption keys are either the same or can be easily found from each.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
What is the Smallest RSA Private Key Why is there, at all, such a thing? Why is it not 42? Why is the smallest public key not 35? Or,
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Digital Signatures.
CS480 Cryptography and Information Security
Public Key Encryption.
Public Key Cryptosystem
RSA Slides by Kent Seamons and Tim van der Horst
Public Key Encryption and Digital Signatures
Public-Key Cryptography and RSA
Public-key Cryptography
(Tuesday, 20 October, 7:30-9PM) Encryption-Decryption
Public Key Encryption and the RSA Algorithm
Some basic terminology
Real-world Security of Public Key Crypto
Rivest, Shamir and Adleman
CSE 321 Discrete Structures
Practical Aspects of Modern Cryptography
Appendix 5: Cryptography p
CS 115: COMPUTING FOR The Socio-Techno Web
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
Lecture 6: Digital Signature
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Oblivious Transfer.
Presentation transcript:

Modular Arithmetic and RSA Encryption Stuart Reges Principal Lecturer University of Washington

Some basic terminology Alice wants to send a secret message to Bob Eve is eavesdropping Cryptographers tell Alice and Bob how to encode their messages Cryptanalysts help Eve to break the code Historic battle between the cryptographers and the cryptanalysts that continues today

Public Key Encryption Proposed by Diffie, Hellman, Merkle First big idea: use a function that cannot be reversed (a humpty dumpty function): Bob tells Alice a function to apply using a public key, and Eve can’t compute the inverse Second big idea: use asymmetric keys (sender and receiver use different keys): Bob has a private key to compute the inverse Primary benefit: doesn't require the sharing of a secret key

RSA Encryption Named for Ron Rivest, Adi Shamir, and Leonard Adleman Invented in 1977, still the premier approach Based on Fermat's Little Theorem: ap-11 (mod p) for prime p, gcd(a, p) = 1 Slight variation: a(p-1)(q-1)1 (mod pq) for distinct primes p and q, gcd(a,pq) = 1 Requires large primes (100+ digit primes)

Example of RSA Pick two primes p and q, compute n = pq Pick two numbers e and d, such that: ed = (p-1)(q-1)k + 1 (for some k) Publish n and e (public key), encode with: (original message)e mod n Keep d, p and q secret (private key), decode with: (encoded message)d mod n

Why does it work? Original message is carried to the e power, then to the d power: (msge)d = msged Remember how we picked e and d: msged = msg(p-1)(q-1)k + 1 Apply some simple algebra: msged = (msg(p-1)(q-1))k  msg1 Applying Fermat's Little Theorem: msged = (1)k  msg1 = msg