Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r 175753411947 p q p q p q p and q prime.

Slides:



Advertisements
Similar presentations
Public Key Cryptosystem
Advertisements

RSA and Public Key Cryptography Oct Nathanael Paul.
RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
Data Security 1 El_Gamal Cryptography. Data Security2 Introduction El_Gamal is a public-key cryptosystem technique El_Gamal is a public-key cryptosystem.
Data encryption with big prime numbers
Public Key Encryption Algorithm
Primality Testing By Ho, Ching Hei Cheung, Wai Kwok.
7. Asymmetric encryption-
Great Theoretical Ideas in Computer Science.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
Public Key Cryptography
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Public Key Algorithms 4/17/2017 M. Chatterjee.
CPE5021 Advanced Network Security --- Advanced Cryptography: RSA and its implementation --- Lecture 1.1 Last lecture we saw the data encryption standard.
Objective: Learn to multiply and divide integers.
Lecture 6: Public Key Cryptography
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
CSE 321 Discrete Structures Winter 2008 Lecture 10 Number Theory: Primality.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Prime Numbers Prime numbers only have divisors of 1 and self
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Implementing RSA Encryption in Java
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Public-Key Encryption
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
MA/CSSE 473 Day 10 Primality testing summary Data Encryption RSA.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Encryption on the Internet Jeff Cohen. Keeping Information Secret What information do we want to be secret? –Credit card number –Social security number.
RSA Encryption © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Week 4 - Wednesday.  What did we talk about last time?  Finished DES  AES.
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
Chapter 1 Algorithms with Numbers. Bases and Logs How many digits does it take to represent the number N >= 0 in base 2? With k digits the largest number.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 6. RSA Use in Encryption to encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = M e mod n, where 0≤M
Information and Computer Security CPIS 312 Lab 8 1 Asymmetric Key Algorithms RSA Algorithm TRIGUI Mohamed Salim.
Public Key Cryptography
Mathematics of Cryptography
Asymmetric-Key Cryptography
Public Key Cryptosystems - RSA
Rivest, Shamir and Adleman
Analysis of the RSA Encryption Algorithm
Introduction to Cryptography
Presentation transcript:

Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r p q p q p q p and q prime

Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r p q p q p q p and q prime Compute numbers n = p*q

Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r p q p q p q p and q prime Choose e prime relative to (p-1)(q-1)

Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r p q p q p q p and q prime Publish pair as the public key

Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r p q p q p q p and q prime Find d such that (e*d -1) is divisible by (p-1)(q-1)

Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r p q p q p q p and q prime Keep as the private key

Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r Toss p and q

Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r m mod

Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r m mod ( ) 1667 mod 2337

Public Key Cryptosystems - RSA, signing Receiver Sender Eavesdroppe r m mod

Public Key Cryptosystems - RSA, signing Receiver Sender Eavesdroppe r m mod ( ) 23 mod 2337

Public Key Cryptosystems - RSA, exponentiating mod 78837

Public Key Cryptosystems - RSA, exponentiating mod Yikes!

Public Key Cryptosystems - RSA, exponentiating mod mod That is, do the modular reduction after each multiplication.

Public Key Cryptosystems - RSA, find primes 2 Probability that a random number n is prime: 1/ln(n) For 100 digit number this is 1/230.

Public Key Cryptosystems - RSA, find primes 2 Probability that a random number n is prime: 1/ln(n) For 100 digit number this is 1/230. But how to test for being prime?

Public Key Cryptosystems - RSA, find primes 2 Probability that a random number n is prime: 1/ln(n) For 100 digit number this is 1/230. But how to test for being prime? If p is prime and 0 < a < p, then a p-1 = 1 mod p Ex: 3 (5-1) = 81 = 1 mod 5 36 (29-1) = = 1 mod 29

Public Key Cryptosystems - RSA, find primes 2 Probability that a random number n is prime: 1/ln(n) For 100 digit number this is 1/230. But how to test for being prime? If p is prime and 0 < a < p, then a p-1 = 1 mod p Ex: 3 (5-1) = 81 = 1 mod 5 36 (29-1) = = 1 mod 29 Pr(p isn't prime but a p-1 = 1 mod p) = 1/

Public Key Cryptosystems - RSA, find primes Can always express a number n-1 as 2 b c for some odd number c. ex: 48 = Then can compute a n-1 mod n by computing a c mod n and squaring the result b times. If the result is not 1 then n is not prime.

Public Key Cryptosystems - RSA, find primes Choose a random odd integer p to test. Calculate b = # times 2 divides p-1. Calculate m such that p = m. Choose a random integer a such that 0 < a < p. If a ≡ 1 mod p || a ≡ -1 mod p, for some 0 ≤ j≤b-1, then p passes the test. A prime will pass the test for all a. b m 2 m j

Public Key Cryptosystems - RSA, find primes Choose a random odd integer p to test. Calculate b = # times 2 divides p-1. Calculate m such that p = m. Choose a random integer a such that 0 < a < p. If a ≡ 1 mod p || a ≡ -1 mod p, for some 0 ≤ j≤b-1, then p passes the test. A prime will pass the test for all a. A non prime number passes the test for at most 1/4 of all possible a. So, repeat N times and probability of error is (1/4). b m 2 m j N

Public Key Cryptosystems - RSA, picking d and e Choose e first, then find p and q so (p-1) and (q-1) are relatively prime to e RSA is no less secure if e is always the same and small Popular values for e are 3 and For e = 3, though, must pad message or else ciphertext = plaintext Choose p ≡ 2 mod 3 so p-1 = 1 mod 3 So, choose random odd number, multiply by 3 and add 2, then test for primality Or, start with any random number, multiply by 6 and add 5