Cryptology Design Fundamentals

Slides:



Advertisements
Similar presentations
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Advertisements

Public Key Encryption Algorithm
Primality Testing By Ho, Ching Hei Cheung, Wai Kwok.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
and Factoring Integers
Cryptography & Number Theory
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
Introduction to Algorithms Second Edition by Cormen, Leiserson, Rivest & Stein Chapter 31.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
1 Section Congruences In short, a congruence relation is an equivalence relation on the carrier of an algebra such that the operations of the algebra.
Module #9 – Number Theory 1/5/ Algorithms, The Integers and Matrices.
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
Information and Computer Security CPIS 312 Lab 8 1 Asymmetric Key Algorithms RSA Algorithm TRIGUI Mohamed Salim.
Chapter 3 The Fundamentals: Algorithms, the integers, and matrices Section 3.4: The integers and division Number theory: the part of mathematics involving.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-9 Public-Key Cryptography.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-12 Public-Key Cryptography.
Page : 1 Date : Duration : 90 Minutes Maximum marks 70% Vorname ……………………………………….. Nachname ……………………………………….. Matrikel-Nr. ………………………………………..
Feige-Fiat-Shamir Zero Knowledge Proof Based on difficulty of computing square roots mod a composite n Given two large primes p, q and n=p * q, computing.
Public-Key Cryptography ElGamal Public-Key Crypto-System
Public Key Encryption Major topics The RSA scheme was devised in 1978
Public Key Encryption.
Rabin Lock and Public-Key Systems
Mathematical Background: Extension Fields
Network Security Design Fundamentals Lecture-13
Public-Key Cryptography RSA Rivest-Shamir-Adelmann Public-Key System
RSA Public-Key Secrecy and Signature
DH Public-Key Exchange
Design Problems (Open book)
Factoring large integers
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Sample Solution Cryptology Design Fundamentals
Number Theory and Euclidean Algorithm
ElGamal Public-Key Systems over GF(p) & GF(2m)
Mathematical Background: Primes and (GF)
GCD and LCM relationship
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Sample Solution Cryptology Design Fundamentals
Cryptology Design Fundamentals
Sample Solution Final exam: Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology System Design Fundamentals
Network Security Tutorial-14 Design Fundamentals IPSEC, KERBEROS
Network Security Design Fundamentals Lecture-13
Cryptology Design Fundamentals
Network Security Tutorial-16 Design Fundamentals PGP ET-IDA-082
The RSA Public-Key Encryption Algorithm
Network Security Tutorial-16 Design Fundamentals PGP ET-IDA-082
Network Security Tutorial-14 Design Fundamentals IPSEC, KERBEROS
Diffie-Hellman Algorithm
Cryptology Design Fundamentals
Public-Key Cryptography Quadratic Residues and „Rabin Lock“
Mathematical Background: Primes and (GF)
Presentation transcript:

Cryptology Design Fundamentals Grundlagen des kryptographischen Systementwurfs Module ID: ET-IDA-048 11.12.2018, v28 Prof. W. Adi Tutorial-10 Rabin Lock for Public-Key Systems

Problem 10-1: Solution 10-1: YA = 272 mod 33 = 3 Set up a Rabin Pubic-Key secrecy system using for user A and B the prime numbers 7,3 and 11,3 respectively User A Encrypts the message M=3 to get the cryptogram YA and sends it to B Let user B decrypt the cryptogram YA Solution 10-1: Set up and calculate Cryptogram and decrypt the message M=3 for a user with the public key mb = 3x11=33 User B receives User A sends M to B Public directory ma = pa . qa=7x3 = 21 mb = pb . qb = 3 x 11 = 33 ma = 21 public key of A mb = 33 public key of B M = 3 = 011 M’= 011 011=27 3 YA = 272 mod 33 = 3 C mod mb 3 mod 33 (M’)2 mod mb M =27 mb = 33 Use square root Algorithm modulo m = p.q for known p and q. (exercise) mb = pb . qb= 3 x 11

r = c(p+1)/4 mod p => r = 33 mod 11 = 5 Solution Cont.: See square root algorithm calculations: Decryption: Take p = 11, q = 3, and n = 33. Then gcd(11,3) = (-1)*11 + (4)*3 = 1, so that a = -1 and b = 4. To decrypt compute the square root of C modulo 33: r = c(p+1)/4 mod p => r = 33 mod 11 = 5 s = c(q+1)/4 mod q => s = 31 mod 3 = 0 And x = (a*p*s + b*q*r) mod m => x = ((-1)*11*0 + 4*3*5) mod 33 = 27 y = (a*p*s - b*q*r) mod m => y = ((-1)*11*0 - 4*3*5) mod 33 = 6 These are two of the four square roots, and the remaining two are -x mod 33 = -27 mod 33 = 6 -y mod 33 = -6 mod 33 = 27 In binary, the four square roots are 27 = 0110112 6 = 0001102 27 = 0110112 One of these roots is M’. Only 27 has the required repetition redundancy, so this is the only possible message M’= 27 = 011011 => M = 011. The only sqare root with two equal halfs Is the correct result

Problem 10-2: Two square roots are somehow found in Zm in the following cases: 1 - √ 25 = 5 and 31 mod 39 2- √ 66 = 41 and 24 mod 85 3 - √ 54 = 33 and 36 mod 69 Try to factorize m = p  q in all cases. Hint: gcd [ m, (a+b) ] = p or q and roots a and b are distinct, that is a≠-b and a≠b (1) Solution 10-2: 31 ≠ -5 ≠ 5 mod 39 therefore factorization according to (1) That is gcd (39, (31 + 5) ) = 3 is one of the factors