Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.

Slides:



Advertisements
Similar presentations
CS555Spring 2012/Topic 171 Cryptography CS 555 Topic 17: Textbook RSA encryption.
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
RSA cryptosystem 1 q The most important public-key cryptosystem is the RSA cryptosystem on which one can also illustrate a variety of important ideas of.
Data encryption with big prime numbers
7. Asymmetric encryption-
1 The RSA Algorithm Supplementary Notes Prepared by Raymond Wong Presented by Raymond Wong.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Announcements:Questions? This week: Digital signatures, DSA Digital signatures, DSA DTTF/NB479: DszquphsbqizDay 29.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
The RSA Algorithm Based on the idea that factorization of integers into their prime factors is hard. ★ n=p . q, where p and q are distinct primes Proposed.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Rachana Y. Patil 1 1.
The RSA Algorithm Rocky K. C. Chang, March
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Great Theoretical Ideas in Computer Science.
RSA Ramki Thurimella.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Darci Miyashiro Math 480 April 29, 2013
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
MA/CSSE 473 Day 10 Primality testing summary Data Encryption RSA.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Great Theoretical Ideas in Computer Science.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Public Key Cryptosystem
RSA Slides by Kent Seamons and Tim van der Horst
Public Key Encryption and Digital Signatures
RSA and El Gamal Cryptosystems
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions

Diffie and Hellman (76) “New Directions in Cryptography” Split the Bob’s secret key K to two parts: K E, to be used for encrypting messages to Bob. K D, to be used for decrypting messages by Bob. K E can be made public (public key cryptography, assymetric cryptography)

Integer Multiplication & Factoring as a One Way Function. p,qp,q N=pq hard easy Q.: Can a public key system be based on this observation ?????

Excerpts from RSA paper ( CACM, 1978 ) The era of “electronic mail” may soon be uopn us; we must ensure that two important properties of the current “paper mail” system are preserved: (a) messages are private, and (b) messages can be signed. We demonstrate in this paper how to build these capabilities into an electronic mail system. At the heart of our proposal is a new encryption method. This method provides an implementation of a “public-key cryptosystem,” an elegant concept invented by Diffie and Hellman. Their article motivated our research, since they presented the concept but not any practical implementation of such system.

The Multiplicative Group Z pq * Let p and q be two large primes. Denote their product N = pq. The multiplicative group Z M * =Z pq * contains all integers in the range [ 1,pq-1 ] that are relatively prime to both p and q. The size of the group is  (pq) = (p-1) (q-1) = N - (p+q) + 1,  so for every x  Z pq *, x (p-1)(q-1) = 1.

Exponentiation in Z pq * Motivation: We want to exponentiation for encryption. Let e be an integer, 1 < e < (p-1) (q-1). Question: When is exponentiation to the e th power, x --> x e, a one-to-one op in Z pq * ?

Exponentiation in Z pq * Claim: If e is relatively prime to (p-1)(q-1) then x --> x e is a one-to-one op in Z pq * Constructive proof: Since gcd(e, (p-1)(q-1))=1, e has a multiplicative inverse mod (p-1)(q-1). Denote it by d, then ed=1 + C(p-1)(q-1). Let y=x e, then y d =(x e ) d =x 1+C(p-1)(q-1) =x meaning y --> y d is the inverse of x-->x e QED

RSA Public Key Cryptosystem Let N=pq be the product of two primes Choose e such that gcd(e,  (N))=1 Let d be such that de  1 mod  (N) The public key is (N,e) The private key is d Encryption of M  Z N * by C=E(M)=M e mod N Decryption of C  Z N * by M=D(C)=C d mod N “The above mentioned method should not be confused with the exponentiation technique presented by Diffie and Hellman to solve the key distribution problem”.

Constructing an instance of RSA PKC Alice first picks at random two large primes, p and q. Alice then picks at random a large d that is relatively prime to (p-1)(q-1) ( gcd(d,  (N))=1 ). Alice computes e such that de  1 mod  (N) Let N=pq be the product of p and q. Alice publishes the public key (N,e). Alice keeps the private key d, as well as the primes p, q and the number  (N), in a safe place.

A Small Example Let p=47, q=59, N=pq=2773.  (N)= 46*58=2668. Pick d=157, then 157* =1, so e=17 is the inverse of 157 mod For N =2773 we can encode two letters per Block, using a two digit number per letter: blank=00, A=01,B=02,…,Z=26. Message: ITS ALL GREEK TO ME is encoded

A Small Example N=2773, e=17 (10001 in binary). ITS ALL GREEK TO ME is encoded as First block M= 0920 encrypts to M e = M 17 = (((M 2 ) 2 ) 2 ) 2 * M = 948 (mod 2773) The whole message (10 blocks) is encrypted as Indeed 0948 d = =920 (mod 2773), etc.

RSA as a One Way Trapdoor Function. x x e mod N hard easy Easy with trapdoor info ( d )

Trap-Door OWF Definition: f:D  R is a trap-door one way function if there is a trap-door s such that: –Without knowledge of s, the function f is a one way function –Given s, inverting f is easy Example: f g,p (x) = g x mod p is not a trap- door one way function. Example: RSA is a trap-door OWF.

Attacks on RSA 1.Factor N=pq. This is believed hard unless p, q have some “bad” properties. To Avoid such primes, it is recommended to Take p, q large enough (100 digits each). Make sure p, q are not too close together. Make sure both (p-1), (q-1) have large prime factors (to foil Pollard’s rho algorithm).

Basic Scheme A public key encryption scheme includes the following elements: –A private key k –A public key k’ –An encryption algorithm, which is a trap door OWF. The trap-door info is the private key Public key is published Encryption uses the public key (anyone can encrypt) Decryption requires the private key

Properties of RSA The requirement (e,  (n))=1 is important for uniqueness Finding d, given p and q is easy. Finding d given only n and e is assumed to be hard (the RSA assumption) The public exponent e may be small. Typically its value is either 3 (problematic) or Each encryption involves several modular multiplications. Decryption is longer.

El-Gamal Encryption Constructed by El-Gamal in 1985 Similar to DH Alice publishes p, g as public parameters Alice chooses x as a private key and publishes g x mod p as a public key Encryption of m  Z p by sending (g y mod p, mg xy mod p) or (g y mod p, m+g xy mod p) Requires two exponentiations per each block transmitted.

Real World usage Two words: Key Exchange

Digital Signatures

Model A public key analog of MAC A digital signature scheme includes the following elements: –A private key k –A public key k’ –A signature algorithm Public key is published Signature requires private key Verification requires public key

Ramifications Commercial – anyone can sign a contract, check, statement etc. Signatures are necessary for e-commerce Legal – digital signatures can be binding in a court of law (unlike MACs) Legal signature laws of various types are appearing