ONE WAY FUNCTIONS SECURITY PROTOCOLS CLASS PRESENTATION.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
RSA.
1 Complexity ©D.Moshkovitz Cryptography Where Complexity Finally Comes In Handy…
CS555Spring 2012/Topic 171 Cryptography CS 555 Topic 17: Textbook RSA encryption.
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Public Key Encryption Algorithm
Computer Science CSC 405By Dr. Peng Ning1 CSC 405 Introduction to Computer Security Topic 2. Basic Cryptography (Part II)
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
7. Asymmetric encryption-
Session 4 Asymmetric ciphers.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Public Encryption: RSA
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Dan Boneh Intro. Number Theory Intractable problems Online Cryptography Course Dan Boneh.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
RSA Prepared by: SITI ZAINAH ADNAN
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
Cryptographic Hash Functions and Protocol Analysis
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Data Integrity / Data Authentication. Definition Authentication (Signature) algorithm - A Verification algorithm - V Authentication key – k Verification.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
PUBLIC-KEY ENCRYPTION Focusing on RSA
Public Key Encryption and Digital Signatures
ICS 454 Principles of Cryptography
Rivest, Shamir and Adleman
Analysis of the RSA Encryption Algorithm
ICS 454 Principles of Cryptography
Where Complexity Finally Comes In Handy…
Symmetric-Key Cryptography
Where Complexity Finally Comes In Handy…
Hashing Hash are the auxiliary values that are used in cryptography.
Introduction to Cryptography
The RSA Public-Key Encryption Algorithm
Where Complexity Finally Comes In Handy…
Presentation transcript:

ONE WAY FUNCTIONS SECURITY PROTOCOLS CLASS PRESENTATION

INTRODUCTION A One - Way function is a function which is easy to compute but difficult to invert. Two conditions for function f - Easy to compute - Difficult to invert

INTRODUCTION A One - Way function is a function which is easy to compute but difficult to invert. Two conditions for function f - Easy to compute There exists a polynomial-time algorithm that on input x outputs f (x) - Difficult to invert Every probabilistic polynomial-time algorithm trying, on input y to find an inverse of y under f, may succeed only with negligible probability.

TYPES OF ONE - WAY FUNCTIONS Strong One - Way Functions: These are easy to compute and hard to invert functions. Any efficient algorithm has negligible success in inverting such functions. Weak One - Way Functions: These are easy to compute and slightly hard to invert functions. All efficient inverting algorithms fail to invert such functions with some non-negligible probability.

TYPES OF ONE - WAY FUNCTIONS Fixed Length One - Way functions Variable Length One - Way Functions

CANDIDATES OF ONE - WAY FUNCTIONS 1.Integer Factorization: The time required to factorize an integer N runs into a very high order dependent on the second biggest prime factor P of the given integer N. The function f mult = x. y which is the product of the integers x and y, can be computed in polynomial time. But assuming the intractability of factoring and the “density of primes “theorem it follows that f mult is at least weakly One - Way. Using more sophisticated arguments, it can be shown that f mult is strongly One - Way. 2.Decoding of Random Linear Codes

VARIATIONS OF ONE - WAY FUNCTIONS Universal One - Way Functions One - Way Functions as Collections –The RSA function –The Rabin function –Discrete Logarithms Trapdoor One - Way Functions Clawfree One - Way Functions

VARIATIONS OF ONE - WAY FUNCTIONS Universal One - Way Functions There exist One - Way functions if and only if there exists One - Way functions which can be evaluated by a quadratic time algorithm (the existence of such a specific time bound is important). Such One - Way functions are called Universal One - Way functions.

VARIATIONS OF ONE - WAY FUNCTIONS One - Way Functions as Collections Instead of viewing One - Way functions as functions operating on an infinite domain, infinite collections of functions each operating on a finite domain are considered. The functions in the collection share a single evaluating algorithm which when inputted a succinct representation of a function and an element in its domain return the value of the specified function at the given point. –The RSA function –The Rabin function –Discrete Logarithms

VARIATIONS OF ONE - WAY FUNCTIONS Trapdoor One - Way Functions These are collections of functions, {fi}, with the extra property that fi is efficiently inverted once given as auxiliary input a “trapdoor” for the index i. The trapdoor of index I, denoted by t(i), cannot be efficiently computed from i. e.g. the RSA trapdoor: The algorithm of the RSA collection is modified to output the index (N.e) and the trapdoor (N,d), where d = e -1 mod (P-1)*(Q-1). F RSA ((N,d), F RSA ((N,e),x)) = x ed mod N

VARIATIONS OF ONE - WAY FUNCTIONS Clawfree One - Way Functions A Clawfree collection of functions consists of a set of pairs of functions which are easy to evaluate, both have the same range, and yet it is infeasible to find a range element together with pre-images of it under each of these functions. E.g. the DLP Clawfree collection, the Factoring Clawfree collection

EXAMPLES OF ONE - WAY FUNCTIONS Hash Function A hash function H accepts a variable-size message M as input and outputs a fixed-size representation H(M) of M. RSA Function 1977 by Ron Rivest, Adi Shamir and L. Adleman

HASH FUNCTION - A Hash Value is generated by a function H of the form h = H(M), where M is the variable length message and h is the fixed length Hash Value. -This hash value is appended to the message at the source at a time when the message is assumed or known to be correct. -The receiver authenticates the message by recomputing the Hash value.

HASH FUNCTION… PROPERTIES -H can be applied to a block data of any size. -H produces a fixed-length output. -H(x) is relatively easy to compute for any given x. -For any given code h, it is computationally infeasible to find x such that H(x) = h -> ONE - WAY property. -For any given block x, it is computationally infeasible to find y≠x with H(y)=H(x) ->Weak Collision Resistance. -It is computationally infeasible to find any pair (x,y) such that H(x)=H(y)->Strong Collision Resistance.

RSA ENCRYPTION Steps: 1.The first task is to select n. n is normally very large (approx 200 digits) and is a product of two large primes p and q (typically 100 digits each). 2.Next a large integer e is chosen such that e is relatively prime to (p-1) * (q-1). e is usually picked as a prime larger than both (p-1) and (q-1). 3.Next d is selected such that: e * d = 1 mod (p-1) * (q-1) The message is then encrypted using the encryption formula mentioned above. e and d are called public and private exponents.

RSA ENCRYPTION… AN EXAMPLE 1.p = 11 and q = 13---both primes n = p*q = 143 and(p-1).(q-1) = Choose e such that it is relatively prime to (p-1).(q-1) Say e = d = e -1 mod (p-1) * (q-1) = 11. Let message to be encrypted be letter ‘H’ -> number 7 if we map A to Z from 0 to 25. Encryption:E(‘H’) = E(7) => 7 11 mod 143 = 106 Decryption:D(106)=> mod 143 = 7 => ‘H’

RSA ENCRYPTION… AN EXAMPLE C = M e mod nM = C d mod n Public key: (5,119)Private key: (77,119) 19 5 = = with remainder 119 of 66 Plain Text = = remainder of Plain Text 19 Cipher text