Introduction to Algorithms Second Edition by

Slides:



Advertisements
Similar presentations
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Public Key Encryption Algorithm
hap8.html#chap8ex5.
7. Asymmetric encryption-
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public Key Cryptography
Public Encryption: RSA
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Codes, Ciphers, and Cryptography-RSA Encryption
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
RSA and its Mathematics Behind
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Introduction to Algorithms Second Edition by Cormen, Leiserson, Rivest & Stein Chapter 31.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Darci Miyashiro Math 480 April 29, 2013
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
What is RSA RSA is a system employed to create the encrypted message in which the key used for encryption is different from that used to decrypt. It is.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Cryptography & Network Security : Topic Seminar Description & Analysis Madhava.N 1RV06SCN05 2 nd Semester M.Tech CNE RVCE RSA ALGORITHM.
1 Network and Computer Security (CS 475) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson.
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
UNIVERSITY OF BIELSKO- BIALA AKADEMIA TECHNICZNO-HUMANISTYCZNA Faculty of Mechanical Engineering and Computer Science.
Great Theoretical Ideas in Computer Science.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
What is the Smallest RSA Private Key Why is there, at all, such a thing? Why is it not 42? Why is the smallest public key not 35? Or,
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Public Key Cryptography
Asymmetric-Key Cryptography
Public Key Encryption.
Chapter Applications of Number Theory Some Useful Results
Public Key Cryptosystem
RSA Slides by Kent Seamons and Tim van der Horst
Lecture 5 RSA DR. Nermin Hamza.
Advanced Algorithms Analysis and Design
RSA Preliminaries.
RSA and El Gamal Cryptosystems
Public-key Cryptography
Taehyung Kim HPC Lab. POSTECH
RSA Cryptosystem Bits PCs Memory MB ,000 4GB 1,020
Private-Key Cryptography
Number Theory and Euclidean Algorithm
ICS 353: Design and Analysis of Algorithms
Rivest, Shamir and Adleman
Analysis of the RSA Encryption Algorithm
Symmetric-Key Cryptography
Systems Architecture I
Where Complexity Finally Comes In Handy…
CSCI284 Spring 2009 GWU Sections 5.1, 5.2.2, 5.3
Symmetric-Key Cryptography
Where Complexity Finally Comes In Handy…
Oblivious Transfer.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
The RSA Public-Key Encryption Algorithm
Where Complexity Finally Comes In Handy…
Presentation transcript:

Introduction to Algorithms Second Edition by Cormen, Leiserson, Rivest & Stein Chapter 31

Using the definition of multiplication modulo n, we define the multiplicative group modulo n as . The elements of this group are the set of elements in Zn that are relatively prime to n:

An example of such a group is The size of is denoted (n). This function, known as Euler's phi function, satisfies the equation where p runs over all the primes dividing n (including n itself)

For example, since the prime divisors of 45 are 3 and 5,

The RSA cryptosystem-(1) The RSA system, named after its inventors Ron Rivest, Adi Shamir, and Len Adleman, was the first public-key cryptosystem and is still most important Its security is closely related to the difficulty of finding the factorization of a composite integer that is the product of two large primes

The RSA cryptosystem-(2) We explain how Bob generates his private and public RSA keys n=pq, where p, q are randomly and independently two large prime numbers Bob also chooses an integer e with 1<e<(n)=(p-1)(q-1) and gcd(e, (n))=1 Bob computes an integer d with 1<d<(n)=(p-1)(q-1) and de=1 mod (p-1)(q-1), since gcd(e, (p-1)(q-1))=1, such a number d exists

The RSA cryptosystem-(3) Bob’s public key is the pair (n,e), his private key is d The number n is called the RSA modulus, e is called the encryption exponent, and d is called the decryption exponent

The RSA cryptosystem-(4) Encryption: A plaintext m is encrypted by computing c=me mod n, 0m<n The ciphertext is c, if Alice knows the public key (n,e), she can encrypt efficient

The RSA cryptosystem-(5) Decryption: The decryption of RSA is based on the following theorem: (me)d mod n =m for any integer m with 0m<n Proof: since ed=1 mod (p-1)(q-1), there is an integer l with ed=1+l(p-1)(q-1) Therefore (me)d=med=m1+l(p-1)(q-1)=m(m(p-1)(q-1))l It follows that med=m(m(p-1))(q-1)l=m mod p Analogously, we see that (me)d=m mod q Because p and q are distinct prime numbers, we obtain (me)d=m mod n The assertion follows form the fact that 0m<n

The RSA cryptosystem-(6) Example: Bob choose p=11 and q=23, then n=pq=253 and (p-1)(q-1)=220, the smallest possible e is 3, then d=147 We know the plaintext space is {0,1,…,252}, encrypting m=165, we obtain 1653 mod 253=110 Then 110147 mod 253=165

The RSA cryptosystem-(7) Security of the secret We show that computing d from (n,e) is as difficult as finding the prime factors p and q of n There is no proof that factoring RSA modules is difficult, however, if the factor p and q of the RSA module n are sufficiently large, then nobody yet knows how to factor n

Powers of an element Just as it is natural to consider the multiples of a given element a, modulo n, it is often natural to consider the sequence of powers of a, modulo n, where : a0,a1,a2,a3,... , modulo n. Indexing from 0, the 0th value in this sequence is a0 mod n = 1, and the ith value is ai mod n.

Example . For example, the powers of 3 modulo 7 are i 0 1 2 3 4 5 6 7 8 9 10 11 ...----------------------------------------------- 3imod 7 1 3 2 6 4 5 1 3 2 6 4 5 ...

Theorem(Euler) For any integer n > 1,

Theorem(Fermat) If p is prime, then