Public Encryption: RSA

Slides:



Advertisements
Similar presentations
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Asymmetric-Key Cryptography
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Public Key Encryption Algorithm
hap8.html#chap8ex5.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Attacks on Digital Signature Algorithm: RSA
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Public Key Cryptography
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Codes, Ciphers, and Cryptography-RSA Encryption
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
RSA and its Mathematics Behind
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
RSA By: Abhishek Naik Viswanath Chennuru CPSC 624.
Cryptography Part 2: Modern Cryptosystems Jerzy Wojdyło September 21, 2001.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Midterm Review Cryptography & Network Security
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Cryptography Lecture 7: RSA Primality Testing Piotr Faliszewski.
Introduction to Algorithms Second Edition by Cormen, Leiserson, Rivest & Stein Chapter 31.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Darci Miyashiro Math 480 April 29, 2013
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
RSA Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Lecture 8 Overview. Analysis of Algorithms Algorithms – Time Complexity – Space Complexity An algorithm whose time complexity is bounded by a polynomial.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Cryptography Modern Cryptosystems. Asim Shahzad2 Overview  Classical Cryptography –Simple Cryptosystems –Cryptanalysis of Simple Cryptosystems  Shannon’s.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
UNIVERSITY OF BIELSKO- BIALA AKADEMIA TECHNICZNO-HUMANISTYCZNA Faculty of Mechanical Engineering and Computer Science.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
Cryptography RSA Algorithm BY : Wesam Fadheel Computer science department - WMU CS-6800 Advanced Theory of Computation Instructor: Dr. Elise De Doncker.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Public Key Cryptosystem
RSA Slides by Kent Seamons and Tim van der Horst
Modular Arithmetic and RSA Encryption
Real-world Security of Public Key Crypto
Appendix 5: Cryptography p
Introduction to Algorithms Second Edition by
Presentation transcript:

Public Encryption: RSA Jerzy Wojdyło Department of Mathematics Southeast Missouri State University

Symmetric Cryptosystem A symmetric cryptosystem is a five-tuple (P,C,K,E,D), where the following are satisfied: P is a finite set of possible plaintexts. C is a finite set of possible ciphertexts. K, the key space, is a finite set of possible keys KK, EKE (encryption rule), DKD (decryption rule). Each EK: PC and DK: CP are functions such that xP, DK(EK(x)) = x. (the same key in encryption and decryption) RSA, Jerzy Wojdylo, 9/21/01

Asymmetric Cryptosystem One key for encryption (public key) DIFFERENT key for decryption (private key) Decryption key CANNOT be deduced from the encryption key RSA, Jerzy Wojdylo, 9/21/01

Pierre de Fermat (1601-1665) Fermat’s Little Theorem Let p be prime, a  Z+, not a multiple of p. Then a p-1  1 (mod p). RSA, Jerzy Wojdylo, 9/21/01

Leonard Euler (1707 – 1783) Euler’s “phi” function : Z + Z + nZ+, (n) = |{z[1,n]: gcd(z, n) = 1}| . Examples: (2) = 1, (6) = 2, (7) = 6, (30) = 8 RSA, Jerzy Wojdylo, 9/21/01

Leonard Euler (1707 – 1783) Properties of the function : If p is a prime, then (p) = p – 1. If p is a prime and kZ+, then (pk) = pk – pk-1. a, bZ+, if gcd(a, b) = 1, then (ab) = (a)(b). RSA, Jerzy Wojdylo, 9/21/01

Leonard Euler (1707 – 1783) Euler’s Theorem a, nZ+, if gcd(a, n)=1 then a (n) 1 (mod n). Fermat’s Little Theorem Let p be prime, aZ+, a not a multiple of p. Then a p-1  1 (mod p). RSA, Jerzy Wojdylo, 9/21/01

RSA (public key encryption) Ron Rivest, Adi Shamir, Leonard Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”, Communications of the ACM, Vol. 21, no. 2, February 1978, 120-126. REVOLUTION! RSA cipher, RSA Security, www.rsa.com RSA, Jerzy Wojdylo, 9/21/01

RSA (public key encryption) Alice wants Bob to send her a message. She: selects two (large) primes p, q, TOP SECRET, computes n = pq and (n) = (p-1)(q-1), (n) also TOP SECRET, selects an integer e, 1 < e < (n), such that gcd(e, (n)) = 1, computes d, such that ed  1 (mod (n)), d also TOP SECRET, gives public key (e, n), keeps private key (d, n). RSA, Jerzy Wojdylo, 9/21/01

RSA (public key encryption) RSA in action Bob wants to send plaintext P, 0 < P < n. Encryption: E(e, n)(P) = C = Pe (mod n). Bob sends ciphertext C. Alice receives C. Decryption: D(d, n)(C) = Cd (mod n) = P (ha!) RSA, Jerzy Wojdylo, 9/21/01

RSA (public key encryption) Does it work? Yes! D(d, n)(C) = D(d, n)(P e) = (P e)d = P ed = = P k(n) +1 = ed  1 (mod (n)) = (P (n))k P   P (mod n). Euler’s Theorem a (n) 1 (mod n). RSA, Jerzy Wojdylo, 9/21/01

RSA (public key encryption) Example: p = 997, q = 991, n = 988027, (n) = 986040, e = 13, d = 303397. P = RSA = 181901 Encryption: E(e, n)(P) = C = Pe (mod n) = = 18190113 (mod 988027) = 941080. Decryption: D(d, n)(C) = Cd (mod n) = = 941080303397 (mod 988027) = 181901. RSA, Jerzy Wojdylo, 9/21/01

RSA (public key encryption) Is it secure? Yes, if p and q are large primes (over 150 decimal digits each). Factoring is a HARD problem, no known polynomial time algorithm. http://www.rsa.com/rsalabs/node.asp?id=2092 RSA is much slower than DES or AES. RSA, Jerzy Wojdylo, 9/21/01

RSA (public key encryption) Alice’s Signature Alice encrypts her signature S using her private key: E(d, n)(S) = T = Sd (mod n) and sends T to Bob. Bob decrypts T using Alice’s public key to authenticate her message: D(d, n)(T) = Td (mod n) = S. RSA, Jerzy Wojdylo, 9/21/01

The End Public Encryption: RSA