Appendix 5: Cryptography p

Slides:



Advertisements
Similar presentations
RSA and Public Key Cryptography Oct Nathanael Paul.
Advertisements

IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Asymmetric-Key Cryptography
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Introduction to Public Key Cryptography
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Rachana Y. Patil 1 1.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Chapter 21 Public-Key Cryptography and Message Authentication.
Darci Miyashiro Math 480 April 29, 2013
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Encryption.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
@Yuan Xue CS 285 Network Security Public-Key Cryptography Yuan Xue Fall 2012.
Public Key Encryption ● Diffie and Hellman – 1976 Famous Paper: New Directions In Cryptography New Directions In Cryptography ● First revolutionary.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
RSA cryptosystem with large key length
Digital Signatures.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
CS480 Cryptography and Information Security
Practical Aspects of Modern Cryptography
Public Key Cryptosystem
Privacy & Security.
Boneh-Franklin Identity Based Encryption Scheme
Public Key Encryption Systems
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public-Key Cryptography and RSA
RSA A public Key Algorithm.
Public-key Cryptography
Public Key Encryption and the RSA Algorithm
Some basic terminology
Modular Arithmetic and RSA Encryption
Real-world Security of Public Key Crypto
Public Key Cryptography Diffie-Hellman, Discrete Log, RSA
Rivest, Shamir and Adleman
RSA A public Key Algorthim.
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
NET 311 Information Security
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Asymmetric Cryptographic Algorithms
Introduction to Cryptography
Modern Cryptography.
Public Key Encryption Systems
Presentation transcript:

Appendix 5: Cryptography p 640-644 Lewis Westfall The information presented here, although greatly condensed, comes almost entirely from the course textbook: Quantum Computation and Quantum Information by Nielsen & Chuang

Types of Cryptographic Systems Two common cryptographic Systems Symmetric systems use the same key to encrypt and decrypt Examples: DES and AES Asymmetric Sytems use one key to encrypt and another, but related, key to decrypt Examples: Diffie-Hellman-Merkle, RSA Quantum Compuring

Symmetric Key Cryptography Same key (k) used to encrypt and decrypt f(m,k) = e, f(e,k) = m Efficient Key must be secret Secure key distribution problem Quantum Compuring

Asymmetric Key Cryptography One key (k1) to encrypt Another key (k2) to decrypt f(m,K1) = e, f(e,K2) = m, f(e,k1) ≠ m Public key and private key Not as efficient as symmetric key cryptography Public key is published. Anyone can know it. Private key is secret. Either key can be the private or the public key Quantum Compuring

Asymmetric Key Cryptography Alice wants to send a message to Bob Alice encrypts the message using Bob’s public key Alice sends the encrypted message to Bob Bob decrypts the message using his private key Bob wants to send a message to Alice Bob encrypts the message using Alice’s public key Bob sends the message to Alice Alice decrypts the message with her private key Quantum Compuring

Asymmetric Key Cryptography Message/Signature authentication Bob wants to send a message to Alice that she knows is from him Bob calculates the message checksum Bob encrypts the message with Alice’s public key Bob encrypts the checksum with his private key Bob sends the message and checksum to Alice Quantum Compuring

Asymmetric Key Cryptography Alice decrypts the message using her private key Alice calculates the checksum Alice decrypts the checksum using Bob’s public key Alice compares the two checksums If the checksums match, the message was from Bob Quantum Compuring

RSA Cryptography Ronald Rivest, Adi Shamir, and Leonerd Adleman Public Key and Private key are related mathematically The relationship is very complex The security is in the difficulty to resolve the relationship. Quantum Compuring

RSA RSA uses the product of two prime numbers to create the keys Each prime number can have 200 or more digits The prime numbers are obtained Picking a possible prime number at random Primality test such as Miller-Rabin The security is that factoring large numbers is hard Quantum Compuring

Cracking RSA The most efficient algorithm for factoring large number is the number field sieve Quantum Fourier Transform An exponential improvement There are other points of attack     Quantum Compuring

Using Asymmetric Cryptography Symmetric cryptography is efficient Problem of secure key distribution Asymmetric cryptography is less efficient No key distribution problem Use asymmetric cryptography to send the symmetric key Quantum Compuring

RSA and Quantum Computing RSA keys are hard to factor using classical computers Quantum computers may be able to factor the product of two primes in a reasonable time frame Quantum cryptography may create stronger cryptography Quantum Compuring

References Quantum Computation and Quantum Information by Nielsen & Chuang Quantum Compuring