Introduction to Cryptography

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Cryptography and Network Security
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Cryptography and Network Security Chapter 9. Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Cryptography and Network Security Chapter 9 5th Edition by William Stallings Lecture slides by Lawrie Brown.
The RSA Algorithm JooSeok Song Tue.
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
ASYMMETRIC CIPHERS.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Prime Numbers Prime numbers only have divisors of 1 and self
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
Applied Cryptography (Public Key) RSA. Public Key Cryptography Every Egyptian received two names, which were known respectively as the true name and the.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Public Key Cryptography and RSA” Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 11/9/2009 INCS 741: Cryptography 11/9/20091Dr. Monther.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Public-Key Encryption
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Cryptography and Network Security Public Key Cryptography and RSA.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Fall 2002CS 395: Computer Security1 Chapter 9: Public Key Cryptography.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
@Yuan Xue CS 285 Network Security Public-Key Cryptography Yuan Xue Fall 2012.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Overview Modern public-key cryptosystems: RSA
Public Key Encryption.
Visit for more Learning Resources
Asymmetric-Key Cryptography
Lecture 5 RSA DR. Nermin Hamza.
Chapter 9 – Public Key Cryptography and RSA
Cryptography and Network Security
Public Key Encryption and Digital Signatures
Public-Key Cryptography and RSA
Public Key Encryption and the RSA Algorithm
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Public Key Cryptography
The RSA Algorithm JooSeok Song Tue.
Private-Key Cryptography
ICS 353: Design and Analysis of Algorithms
The RSA Algorithm JooSeok Song Tue.
“Public Key Cryptography” & “RSA”
NET 311 Information Security
NET 311 Information Security
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
The RSA Public-Key Encryption Algorithm
Presentation transcript:

Introduction to Cryptography Based on: William Stallings, Cryptography and Network Security

Public Key Cryptography and RSA Chapter 9 Public Key Cryptography and RSA

Misconceptions Concerning Public-Key Encryption Public-key encryption is more secure from cryptanalysis than symmetric encryption Public-key encryption has made symmetric encryption obsolete

Asymmetric Encryption Terminology

Principles of Public-Key Cryptosystems Public-key cryptography evolved from an attempt to address the two basic limitations of symmetric encryption: Whit Diffie and Martin Hellman proposed a method that addressed both problems and was radically different from all previous approaches to cryptography How to have secure communication without having to trust a KDC with your key Key distribution How to verify that a message comes intact from the claimed sender Digital signatures

Public-Key Cryptosystems Plaintext The input data Encryption algorithm Performs various transform-ations on the plaintext Public key Used for encryption Private key Used for decryption Ciphertext The output data Decryption algorithm

Public-Key Cryptography

Table 9.2 Conventional and Public-Key Encryption

Public-Key Cryptosystem: Secrecy

Public-Key Cryptosystem: Authentication Decryption Algorithm Decryption Algorithm Encryption Algorithm

Public-Key Cryptosystem: Authentication and Secrecy Algorithm Authentication Algorithm

Applications for Public-Key Cryptosystems Public-key cryptosystems can be classified into three categories: Some algorithms are suitable for all three applications, whereas others can be used only for one or two The sender encrypts a message with the recipient’s public key Encryption/decryption The sender “signs” a message with its private key Digital signature Two sides cooperate to exchange a session key Key exchange

Applications for Public-Key Cryptosystems

Public-Key Requirements Computationally easy for party B to generate a pair (public-key PUb, private key PRb) for sender A, knowing the public key and the message, to generate the corresponding ciphertext for receiver B to decrypt the resulting ciphertext using the private key to recover the original message Computationally infeasible for an adversary knowing the public key, to determine the private key knowing the public key and a ciphertext, to recover the original message

Public-Key Requirements Need a trap-door one-way function f : {0,1}n  {0,1}n is a one-way function if Y = f(X) can easily be computed for X in {0,1}n X = f–1(Y) infeasible for Y in {0,1}n A trap-door one-way function is a family of invertible functions fk, such that computing Y = fk(X) is easy, if k and X are known X = fk–1(Y) is easy, if k and Y are known X = fk–1(Y) infeasible, if Y is known but k not known A practical public-key scheme depends on a suitable trap- door one-way function

Rivest-Shamir-Adleman (RSA) Scheme Developed in 1977 by Ron Rivest, Adi Shamir & Len Adleman Most widely used general-purpose public-key encryption A cipher for which the plaintext and ciphertext are integers between 0 and n – 1 for some n A typical size for n is 1024 bits, or 309 decimal digits

RSA Algorithm Plaintext is encrypted in blocks with whose value less than some number n Encryption and decryption are of the following form, for plaintext block M and ciphertext block C C = Me mod n M = Cd mod n = (Me)d mod n = Med mod n Both sender and receiver must know the value of n The sender knows the value of e, and only the receiver knows the value of d This is a public-key encryption algorithm with a public key of PU={e,n} and a private key of PR={d,n}

Algorithm Requirements It should be possible to find values of e, d, n such that Med mod n = M for all M < n It should be relatively easy to calculate Me mod n and Cd mod n for all values of M < n It should be infeasible to determine d given e and n

Example of RSA Algorithm

Exponentiation in Modular Arithmetic Both encryption and decryption in RSA involve raising an integer to an integer power, mod n Can make use of a property of modular arithmetic: [(a mod n) x (b mod n)] mod n =(a x b) mod n With RSA you are dealing with potentially large exponents so efficiency of exponentiation is a consideration

Efficient Operation Using the Public Key To speed up the operation of the RSA algorithm using the public key, a specific choice of e is usually made The most common choice is 65537 (216 + 1) Two other popular choices are e=3 and e=17 Each of these choices has only two 1 bits, so the number of multiplications required to perform exponentiation is minimized

Efficient Operation Using the Private Key Decryption uses exponentiation to power d A small value of d is vulnerable to a brute-force attack and to other forms of cryptanalysis Can use the Chinese Remainder Theorem (CRT) to speed up computation The quantities d mod (p – 1) and d mod (q – 1) can be precalculated End result is that the calculation is approximately four times as fast as evaluating M = Cd mod n directly

Key Generation Before the application of the public-key cryptosystem each participant must generate a pair of keys: Determine two prime numbers p and q Select either e or d and calculate the other Because the value of n = pq will be known to any potential adversary, primes must be chosen from a sufficiently large set The method used for finding large primes must be reasonably efficient

Procedure for Picking a Prime Number Pick an odd integer n at random Pick an integer a < n at random Perform the probabilistic primality test with a as a parameter. If n fails the test, reject the value n and go to step 1 If n has passed a sufficient number of tests, accept n; otherwise, go to step 2

Five possible approaches to attacking RSA The Security of RSA Five possible approaches to attacking RSA Brute force Try all possible private keys Mathematical attacks Several approaches, all equivalent in effort to factoring the product of two primes Timing attacks Depend on the run time of the decryption algorithm Hardware fault-based attack Inducing hardware faults in the processor that is generating digital signatures Chosen ciphertext attacks Exploits properties of the RSA algorithm

Factoring Problem We can identify three approaches to attacking RSA mathematically: Factor n into its two prime factors. This enables calculation of (n) = (p – 1) x (q – 1), which in turn enables determination of d = e-1 (mod (n)) Determine (n) directly without first determining p and q. Again this enables determination of d = e-1 (mod (n)) Determine d directly without first determining (n)

Optimal Asymmetric Encryption Padding (OAEP)

Summary Public-key cryptosystems The RSA algorithm Applications for public- key cryptosystems Requirements for public-key cryptography Public-key cryptanalysis The RSA algorithm Description of the algorithm Computational aspects Security of RSA