Lecture 11-12 Implementations. The efficiency of a particular cryptographic scheme based on any one of the algebraic structures will depend on a number.

Slides:



Advertisements
Similar presentations
Asymptotically Optimal Communication for Torus- Based Cryptography David Woodruff MIT Joint work with Marten van Dijk Philips/MIT.
Advertisements

Public Key Cryptography The RSA Cryptosystem. by William M. Faucette Department of Mathematics State University of West Georgia.
COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.
RSA cryptosystem 1 q The most important public-key cryptosystem is the RSA cryptosystem on which one can also illustrate a variety of important ideas of.
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Data encryption with big prime numbers
Public Key Encryption Algorithm
Session 4 Asymmetric ciphers.
Efficient generation of cryptographically strong elliptic curves Shahar Papini Michael Krel Instructor : Barukh Ziv 1.
and Factoring Integers (I)
Attacks on Digital Signature Algorithm: RSA
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
CSE115/ENGR160 Discrete Mathematics 03/17/11 Ming-Hsuan Yang UC Merced 1.
Authenticating streamed data in the presence of random packet loss March 17th, Philippe Golle, Stanford University.
and Factoring Integers
Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
RSA Encryption William Lu. RSA Background  Basic technique first discovered in 1973 by Clifford Cocks of CESG (part of British GCHQ)  Invented in 1977.
CSC2110 Discrete Mathematics Tutorial 6 Chinese Remainder Theorem, RSA and Primality Test Hackson Leung.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
RSA Encryption Caitlin O’Dwyer. What is an RSA Number? An RSA number n is a number s.t. n=pq Where p and q are distinct, large, prime integers.
ASYMMETRIC CIPHERS.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
The RSA Algorithm Rocky K. C. Chang, March
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Introduction to Modular Arithmetic and Public Key Cryptography.
MATH 224 – Discrete Mathematics
RSA and its Mathematics Behind
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Lecture 2 Basic Number Theory and Algebra. In modern cryptographic systems,the messages are represented by numerical values prior to being encrypted and.
ECE 8053 Introduction to Computer Arithmetic (Website: Course & Text Content: Part 1: Number Representation.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Some Perspectives on Smart Card Cryptography
Research on the Discrete Logarithm Problem Wang Ping Meng Xuemei
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Optimizing Robustness while Generating Shared Secret Safe Primes Emil Ong and John Kubiatowicz University of California, Berkeley.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Prepared by Dr. Lamiaa Elshenawy
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 7 – The RSA Cryptosystem.
Implementation of Public Key Encryption Algorithms
COM 5336 Lecture 8 Digital Signatures
1 Cryptanalysis Lab Elliptic Curves. Cryptanalysis Lab Elliptic Curves 2 Outline [1] Elliptic Curves over R [2] Elliptic Curves over GF(p) [3] Properties.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Chapter 1 Algorithms with Numbers. Bases and Logs How many digits does it take to represent the number N >= 0 in base 2? With k digits the largest number.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 6. RSA Use in Encryption to encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = M e mod n, where 0≤M
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Overview Modern public-key cryptosystems: RSA
Attacks on Public Key Encryption Algorithms
D. Cheung – IQC/UWaterloo, Canada D. K. Pradhan – UBristol, UK
PUBLIC-KEY ENCRYPTION Focusing on RSA
RSA and El Gamal Cryptosystems
Efficient CRT-Based RSA Cryptosystems
Rivest, Shamir and Adleman
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Introduction to Cryptography
Presentation transcript:

Lecture Implementations

The efficiency of a particular cryptographic scheme based on any one of the algebraic structures will depend on a number of factors, such as parameter size, time- memory tradeoffs, processing power available, software and/or hardware optimization, and mathematical algorithms. This lecture is concerned primarily with mathematical algorithms for efficiently carrying out computations in the underlying algebraic structure.

The algorithms described in this lecture are those which, for the most part, have received considerable attention in the literature. Although some attempt is made to point out their relative merits, no detailed comparisons are given.

Outline  Prime Number Issue  Exponentiation  Exponent Recoding  Multi-Exponentiation  Chinese Remainder Theorem for RSA  Montgomery Reduction Method

1 Prime Number Issue

1.1 Miller-Rabin Test

1.1 Miller-Rabin Test (Continued)

1.2 Prime Number Generation Prime number generation differs from primality testing as before, but may and typically does involve the latter. The former allows the construction of candidates of a fixed form which may lead to more efficient testing than possible for random candidates.

1.2.1 Random Search for Probable Primes

1.2.1 Random Search for Probable Primes (Continued)

1.2.2 Strong Primes

1.2.2 Strong Primes (Continued)

1.2.3 Generating DSA Primes

1.2.3 Generating DSA Primes (Continued)

2 Exponentiation

2.1 Problem Model Addition Chains

2.1.2 Addition–Subtraction Chains

2.1.3 Addition Sequences and Vector Addition Chains

2.1.3 Addition Sequences and Vector Addition Chains (Continued)

2.2 Techniques for General Exponentiation The Binary Method

2.2.1 The Binary Method (Continued)

2.2.2 k-ary Method

2.2.2 k-ary Method (Continued)

2.2.3 Sliding-Window Exponentiation

2.2.3 Sliding-Window Exponentiation (Continued)

2.3 Fixed-Exponent Exponentiation Algorithms There are numerous situations in which a number of exponentiations by a fixed exponent must be performed. Examples include RSA encryption and decryption, and ElGamal decryption.

2.3 Fixed-Exponent Exponentiation Algorithms (Continued)

2.4 Fixed-Base Exponentiation Algorithms

2.4.1 Fixed-Base Windowing Method

2.4.1 Fixed-Base Windowing Method (Continued)

2.4.2 Fixed-Base Euclidean Method

2.4.2 Fixed-Base Euclidean Method (Continued)

3 Exponent Recoding Another approach to reducing the number of multiplications in the basic binary method is to replace the binary representation of the exponent e with a representation which has fewer non-zero terms. Since the binary representation is unique, finding a representation with fewer non-zero components necessitates the use of digits besides 0 and 1. Transforming an exponent from one representation to another is called exponent recoding.

3.1 Signed-Digit Representation

3.1 Signed-Digit Representation (Continued)

Table look-up for the non-adjacent form exponent recoding.

3.1 Signed-Digit Representation (Continued)

3.2 The Binary Method Using NAF

4 Multi-Exponentiation There are a number of situations which require computation of the product of several exponentials with distinct bases and distinct exponents, for example, verification of ElGamal signatures. Rather than computing each exponential separately, we consider the method to do them simultaneously.

4.1 Shamir Trick

4.1 Shamir Trick (Continued)

4.2 Extended Shamir Trick

5 Chinese Remainder Theorem for RSA

5 Chinese Remainder Theorem for RSA (Continued)

6 Montgomery Reduction Method

6.1 Montgomery Multiplication

6.1 Montgomery Multiplication (Continued)

6.2 Montgomery Exponentiation

6.2 Montgomery Exponentiation (Continued)

Thank you!