Public Key Encryption Algorithm

Slides:



Advertisements
Similar presentations
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Advertisements

Asymmetric-Key Cryptography
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Attacks on Digital Signature Algorithm: RSA
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
The Algebra of Encryption CS 6910 Semester Research and Project University of Colorado at Colorado Springs By Cliff McCullough 20 July 2011.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Public Key Algorithms 4/17/2017 M. Chatterjee.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
RSA Encryption Caitlin O’Dwyer. What is an RSA Number? An RSA number n is a number s.t. n=pq Where p and q are distinct, large, prime integers.
ASYMMETRIC CIPHERS.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Codes, Ciphers, and Cryptography-RSA Encryption
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
RSA Numbers by: Brandon Hacay & Conrad Allen. History of RSA Numbers The letters in “RSA” are simply the initials of the people who are credited as having.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Prime Numbers Prime numbers only have divisors of 1 and self
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
RSA and its Mathematics Behind
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Midterm Review Cryptography & Network Security
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Darci Miyashiro Math 480 April 29, 2013
Public-Key Encryption
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Presented by Katherine Heller COSC 4765 University of Wyoming April 26, 2011 Image source: PC Dynamics, Inc.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
RSA The algorithm was publicly described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Partly used for PGP (Pretty Good Privacy) to encrypt.
Fall 2002CS 395: Computer Security1 Chapter 9: Public Key Cryptography.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Information and Computer Security CPIS 312 Lab 8 1 Asymmetric Key Algorithms RSA Algorithm TRIGUI Mohamed Salim.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Public Key Cryptography
Public Key Encryption.
Introduction to Cryptography
Rivest, Shamir and Adleman
Analysis of the RSA Encryption Algorithm
Introduction to Cryptography
The RSA Public-Key Encryption Algorithm
Presentation transcript:

Public Key Encryption Algorithm RSA Cryptography Public Key Encryption Algorithm

What is it? RSA – Rivest, Shamir, Adleman Algorithm for public key cryptography. Public-key cryptography refers to a cryptographic system requiring two separate keys, one to lock or encrypt the plaintext and one to unlock or decrypt the cypher text. Wildly used in e-commerce Involves 3 steps – key generation, encryption and decryption

http://en.wikipedia.org/wiki/File:Public_key_signing.svg

RSA involves a public key and a private key RSA involves a public key and a private key. The public key can be known to everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted using the private key. The keys for the RSA algorithm are generated the following way:

d * e = 1 modφ(n) therefore, d = e -1 (mod φ(n) ) Key Generation Two large distinct prime numbers p and q, chosen at random Block B of text has been encoded by some function g into an integer T such that T is an integer and 0 < T < n (Calculate n=pq, where n is the mod of p and q) Compute the Euler phi function. φ(n) = (p – 1)(q – 1) because n is the product of 2 primes. Choose an integer e such that 1 < e < φ(n) and gcd(e,φ(n)) = 1 (e and φ(n) are co-prime) gcd(e,φ(n)) = 1 means that 1 is a linear combination of e and φ(n): Use Euclidean algorithm to find unique value for d and such that 1 < d < φ(n) d * e = 1 modφ(n) therefore, d = e -1 (mod φ(n) ) Public key is pair of values (e,n). Private key is pair values (d,n)

Example 1 Select 2 prime numbers p=17, q=13 Calculate n = pq = 17x13 = 221 Calculate φ(n) = (p – 1)(q – 1) = 16x12 = 192 Select e such that e is relatively prime to φ(n) = 160 and less than φ(n) ; we choose e = 11

Example 1 cont’d So n = 221, φ(n) = 192, e = 11 Determine d such that de = 1(mod 221) and d<221 using extended Euclidean algorithm (pg 273) with 11 and 192 (gcd(192, 11)). 192 = (17 * 11) + 5 or 5 = 192 – (17 * 11) 11 = (2 * 5) + 1 or 1 = 11 – (2 * 5) 5 = (5 * 1) + 0 from which 1 = 11 – 2 * 5 = 11 – 2[192 – 17 * 11] = 35 * 11 – 2 * 192 Therefore, d = 35

Encryption Decryption Plaintext : T < n Cipher Text: C = T e (mod n) Decryption Cipher Text : C Plaintext : T = C d (mod n)

Example 1 Cont’d Encrypt: Plaintext : Let T = 8 < n Cipher Text: C = T e (mod n) = 8 11 (mod 221) = 83 * 83 * 83 * 82 mod 221 = 512 * 512 * 512 * 64 mod 221 =70 * 70 * 70 * 64 mod 221 = 4900 * 4480 mod 221 = 38 * 60 mod 221 = 2280 mod 221 = 70

Computational Aspects Exponentiation in Modular Arithmetic: [(a mod n) x (b mod n)]mod n = ( a x b ) mod n X16 = X1 x X2 x X3 x … x X15 x11 = x1+2+8 = (x)(x2)(x8)

Example 1 Cont’d Decrypt: Cipher Text : C = 70 Plaintext : T = C d (mod n) = 70 35 (mod 221) = (702)17 * 70 mod 221 = (4900)17 * 70 mod 221 = 3817 * 70 mod 221 = (382)8 * 38 * 70 mod 221 = (1444)8 * 38 * 70 mod 221 = (118)8 * 38 * 70 mod 221 = (1182)4 * 38 * 70 mod 221 = (13924) 4 * 38 * 70 mod 221 = 14 * 38 * 70 mod 221 = 2660 mod 221 = 8

Example 2 In a public key system using RSA, you interpret the ciphertext C=10 sent to a use whose public key is e = 5, n = 35. What is the plaintext M?

The Security of RSA Four approaches to attacking the RSA Algorithm are: Brute Force – trying all possible keys (small value of d is vulnerable to this) Mathematical Attacks – factoring the product of 2 primes (p and q should only differ in length by a few digits) Timing Attacks – Depend on running time of algorithms Chosen Ciphertext attacks – exploits properties of RSA system

Home Work Section 4.5 #20 and #21