COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.

Slides:



Advertisements
Similar presentations
Public Key Cryptosystem
Advertisements

Public Key Cryptography The RSA Cryptosystem. by William M. Faucette Department of Mathematics State University of West Georgia.
Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Cryptography and Network Security Chapter 8 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Modified – Tom Noack.
RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
Cryptography and Network Security
Chapter 8 – Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other.
Chapter 8 Introduction to Number Theory. Prime Numbers prime numbers only have divisors of 1 and self –they cannot be written as a product of other numbers.
Data encryption with big prime numbers
22C:19 Discrete Structures Integers and Modular Arithmetic
Public Key Encryption Algorithm
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
1 The RSA Algorithm Supplementary Notes Prepared by Raymond Wong Presented by Raymond Wong.
Great Theoretical Ideas in Computer Science.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
COMP 170 L2 Page 1 Part 2 of Course Chapter 2 of Textbook.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
Chapter 8 – Introduction to Number Theory Prime Numbers
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2001 Lecture 7 Tuesday, 11/6/01 Number-Theoretic Algorithms Chapter.
Cryptography and Network Security Chapter 8. Chapter 8 – Introduction to Number Theory The Devil said to Daniel Webster: "Set me a task I can't carry.

Introduction to Modular Arithmetic and Public Key Cryptography.
COMP 170 L2 Page 1 L05: Inverses and GCDs l Objective: n When does have an inverse? n How to compute the inverse? n Need: Greatest common dividers (GCDs)
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
Section 4.3: Fermat’s Little Theorem Practice HW (not to hand in) From Barr Text p. 284 # 1, 2.
Great Theoretical Ideas in Computer Science.
RSA Ramki Thurimella.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
RSA Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
1 Network and Computer Security (CS 475) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
9/22/15UB Fall 2015 CSE565: S. Upadhyaya Lec 7.1 CSE565: Computer Security Lecture 7 Number Theory Concepts Shambhu Upadhyaya Computer Science & Eng. University.
1 Section Congruences In short, a congruence relation is an equivalence relation on the carrier of an algebra such that the operations of the algebra.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
The Euclidean Algorithm That’s right, it’s real..
Fermat’s Little Theorem The RSA Cryptosystem will require exponentiation to decrypt messages. Exponentiation Notation Example 1: Compute Exponentials Example.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
The Fundamentals: Algorithms, Integers, and Matrices CSC-2259 Discrete Structures Konstantin Busch - LSU1.
CS480 Cryptography and Information Security
L131 Exponential Inverses Finding modular inverses is good enough for decoding simple modular cryptography. However, in RSA encryption consists of exponentiating.
Lecture 6. RSA Use in Encryption to encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = M e mod n, where 0≤M
Copyright © Zeph Grunschlag, RSA Encryption Zeph Grunschlag.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Number-Theoretic Algorithms
Public Key Encryption Major topics The RSA scheme was devised in 1978
Chapter Applications of Number Theory Some Useful Results
ALGORITHM NUMBER THEORY
Week #5 – 23/25/27 September 2002 Prof. Marie desJardins
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Presentation transcript:

COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues

COMP 170 L2 Page 2 The RSA Algorithm l Exponentiation mod n l The RSA Cryptosystem l Correctness n Fermat’s Little Theorem n Decipherability of RSA n Security of RSA l Calculating exponentiation mod n efficiently l The Chinese Remainder Theorem

COMP 170 L2 Exponentiation mod n l Encryption with addition and multiplication mod n n Easy to find the way to decrypt l RSA: use exponentiation mod n

COMP 170 L2 Exponentiation mod n

COMP 170 L2

Corollary of Lemma 2.19

COMP 170 L2 Page 8 The RSA Algorithm l Exponentiation mod n l The RSA Cryptosystem l Correctness n Fermat’s Little Theorem n Decipherability of RSA n Security of RSA l Exponentiation mod n efficiently l The Chinese Remainder Theorem

COMP 170 L2 Public-Key Cryptography

COMP 170 L2 RSA Algorithm l Questions to answer

COMP 170 L2 One-Way Function

COMP 170 L2 RSA Algorithm l Builds a one-way function using n Exponentiation mod n n Prime numbers n gcd n Multiplicative inverse

COMP 170 L2 RSA Algorithm

COMP 170 L2 RSA Algorithm

COMP 170 L2 RSA Example l Key generation

COMP 170 L2 RSA Example l Encryption and decryption  Try:

COMP 170 L2 Page 17 The RSA Algorithm l Exponentiation mod n l The RSA Cryptosystem l Correctness n Fermat’s Little Theorem n Decipherability of RSA n Security of RSA l Exponentiation mod n efficiently l The Chinese Remainder Theorem

COMP 170 L2 A Lemma

COMP 170 L2

Fermat’s Little Theorem

COMP 170 L2

l What is a is a multiple of p?

COMP 170 L2 l Simplifies computation

COMP 170 L2

Page 25 The RSA Algorithm l Exponentiation mod n l The RSA Cryptosystem l Correctness n Fermat’s Little Theorem n Decipherability of RSA n Security of RSA l Exponentiation mod n efficiently l The Chinese Remainder Theorem

COMP 170 L2 Decipherability

COMP 170 L2

Decipherability

COMP 170 L2

Decipherability Proved!

COMP 170 L2

Page 35 The RSA Algorithm l Exponentiation mod n l The RSA Cryptosystem l Correctness n Fermat’s Little Theorem n Decipherability of RSA n Security of RSA l Exponentiation mod n efficiently l The Chinese Remainder Theorem

COMP 170 L2

Page 38 The RSA Algorithm l Exponentiation mod n l The RSA Cryptosystem l Correctness n Fermat’s Little Theorem n Decipherability of RSA n Security of RSA l Exponentiation mod n efficiently l The Chinese Remainder Theorem

COMP 170 L2 Exponentiation mod n efficiently Page 39

COMP 170 L2 Exponentiation mod n efficiently

COMP 170 L2 Exponentiation mod n efficiently

COMP 170 L2 Exponentiation mod n efficiently Page 42

COMP 170 L2 Complexity of Repeated Squaring Page 43

COMP 170 L2 Page 44 The RSA Algorithm l Exponentiation mod n l The RSA Cryptosystem l Correctness n Fermat’s Little Theorem n Decipherability of RSA n Security of RSA l Exponentiation mod n efficiently l The Chinese Remainder Theorem

COMP 170 L2 The Chinese Remainder Theorem

COMP 170 L2 The Chinese Remainder Theorem

COMP 170 L2 The Chinese Remainder Theorem

COMP 170 L2 The Chinese Remainder Theorem

COMP 170 L2 The Chinese Remainder Theorem

COMP 170 L2

The Chinese Remainder Theorem

COMP 170 L2 Past Exam Question

COMP 170 L2

Past Exam Question l About Chinese remainder theorem (CRT) l Think n 36 = 3 * 13, 5 = 3 * 17; not relatively prime, so cannot use CRT n Brute-force  x = q1 * => x mod 3 = 0  x = q2 * => x mod 3 = 2  Cannot have solution. n What is 12 is changed 11?

COMP 170 L2 l Think: n 35 = 5 * 7; 69 = 3 * 23 n Relatively prime. Also can apply CRT. Unique solution exists. l How to find the solution?