1. RSA basics 2. Key generation 3. What it would take to break RSA

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Chapter 9
Advertisements

CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Public Key Encryption Algorithm
1 The RSA Algorithm Supplementary Notes Prepared by Raymond Wong Presented by Raymond Wong.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Foundations of Network and Computer Security J J ohn Black Lecture #13 Sep 26 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Public Key Cryptography
Cryptography in Subgroups of Z n * Jens Groth UCLA.
Cryptography and Network Security Chapter 9. Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively.
Public Key Cryptography and the RSA Algorithm
Cryptography & Number Theory
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
RSA Encryption William Lu. RSA Background  Basic technique first discovered in 1973 by Clifford Cocks of CESG (part of British GCHQ)  Invented in 1977.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Public Key Algorithms 4/17/2017 M. Chatterjee.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Lecture 6: Public Key Cryptography
Introduction to Public Key Cryptography
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Prime Numbers Prime numbers only have divisors of 1 and self
Cryptography A little number theory Public/private key cryptography –Based on slides of William Stallings and Lawrie Brown.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
Public Key Cryptography and the RSA Algorithm Cryptography and Network Security by William Stallings Lecture slides by Lawrie Brown Edited by Dick Steflik.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
RSA Parameter Generation Bob needs to: - find 2 large primes p,q - find e s.t. gcd(e, Á (pq))=1 Good news: - primes are fairly common: there are about.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Cryptography Lecture 7: RSA Primality Testing Piotr Faliszewski.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
A Method for Obtaining Digital Signatures and Public-key Cryptosystems
Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.
Public Key Cryptography and RSA” Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 11/9/2009 INCS 741: Cryptography 11/9/20091Dr. Monther.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
MA/CSSE 473 Day 10 Primality testing summary Data Encryption RSA.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography and Network Security Public Key Cryptography and RSA.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
RSA The algorithm was publicly described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Partly used for PGP (Pretty Good Privacy) to encrypt.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 6. RSA Use in Encryption to encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = M e mod n, where 0≤M
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Private-Key Cryptography
Rivest, Shamir and Adleman
Public-key encryption
Presentation transcript:

1. RSA basics 2. Key generation 3. What it would take to break RSA RSA encryption 1. RSA basics 2. Key generation 3. What it would take to break RSA

1. RSA basics Two large prime numbers (p, q): n = pq Small number e relatively prime to (p-1)(q-1) (e,n) is the public key Number d (multiplicative inverse of d, modulo (p-1)(q-1)) d e = 1 ( modulo (p-1)(q-1) ) (d,n) is the secret key It works because (Me)d = Med = M , [1] [1] Proof of RSA: http://cactus.eas.asu.edu/Partha/Teaching/Crypto.2000S/RSA-Proof.htm

1. RSA basics C  decrypt: M = SecretKey(C) = Cd (mod n) M  encrypt: C = PublicKey(M) = Me (mod n) M Public Key (e,n) C Secret key (d,n) M C  decrypt: M = SecretKey(C) = Cd (mod n)

2. Key generation Each pair public/private key requires two large primes (around 512 bits) RSA widely used  needs lots of large primes Primality tests: - try all possible factors (good for small numbers) - probable tests (may be enough) - recently shown (2002): primality can be proven in just polynomial time in the number of digits [2] [2] Agrawal, M., N. Kayal, and N. Saxena. Preprint. Primes is in P. Available at http://www.cse.iitk.ac.in/primality.pdf.

3. What it would take to break RSA What does “breaking RSA” mean? A: Factor n  find d C = Me (mod n)  computing e-th roots (mod n) B: Guessing the message C: Attacking a particular implementation

Experiment: Breaking DES using brute force Project statistics: Start of contest: January 29, 1997 Announcement of DESCHALL project: February 18, 1997 End of contest: June 17, 1997 Size of keyspace: 72,057,594,037,927,936 Keys searched: 17,731,502,968,143,872 Peak keys/day: 601,296,394,518,528 Peak keys/second: 7,000,000,000 (approx) Peak clients/day: 14,000 (approx, based on IP address) Total clients, since start: 78,000 (approx, based on IP address) The computer that found the key: CPU: Pentium 90 RAM: 16 megabytes Operating System: FreeBSD 2.2.1 Speed (keys/second): 250,000 (approx) Client: FreeBSD v0.214, built March 12, 1997 Owner: iNetZ Corporation, Salt Lake City, Utah Operator: Michael K. Sanders