Chapter 3 Encryption Algorithms & Systems (Part C)

Slides:



Advertisements
Similar presentations
Public Key Encryption Algorithm
Advertisements

Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Chapter 3 Encryption Algorithms & Systems (Part B)
SCSC 455 Computer Security
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Cryptography and Network Security Chapter 13
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
DSA (Digital Signature Algorithm) Tahani Aljehani.
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Digital Signatures: Mathematics Zdeněk Říha. Data authentication Data integrity + data origin Digital signature Asymmetric cryptography public and private.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Public Key Encryption Terminology RSA Hash functions CSCE Farkas.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Chapter 3 Encryption Algorithms & Systems. csci5233 computer security & integrity (Chap. 3) 2 Outline NP-completeness & Encryption Symmetric (secret key)
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
DIGITAL SIGNATURE IMPLEMENTATION
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Introduction Used for communication to verify
Analysis of the RSA Encryption Algorithm
Digital Signatures…!.
Chapter 3 - Public-Key Cryptography & Authentication
Presentation transcript:

Chapter 3 Encryption Algorithms & Systems (Part C)

csci5233 computer security & integrity (Chap. 3) 2 Outline

csci5233 computer security & integrity (Chap. 3) 3 RSA Encryption 1978: Rivest, Shamir, Adelman Public key encryption Remains secure to date Encryption key (e) and decryption key (d) are interchangeable. The two keys, e and d, are carefully chosen such that C = P e mod n (encryption) and P = C d mod n (decryption).

csci5233 computer security & integrity (Chap. 3) 4 Euler Totient Function  (n): the number of positive integers less than n and are relatively prime to n. If n is prime:  (n) = n – 1 When n = p * q, where both p and q are primes and p  q:  (n) =  (p) *  (q) = (p – 1) * (q – 1)

csci5233 computer security & integrity (Chap. 3) 5 RSA Encryption Public key = (e, n) Private key = (d, n) Step 1: Choose n, p, & q n = p * q, where both p and q are primes and p  q Example: n = 143 = p * q = 11 * 13

csci5233 computer security & integrity (Chap. 3) 6 RSA Encryption Step 2: Choose e. e is relatively prime to  (n). That is, e is relatively prime to (p-1)*(q-1). Example: e = 17, which is relatively prime to 10*12. Step 3: Compute d. d is the inverse of e mod (p-1)*(q-1). Use the algorithm on page 81 to compute inverses. Note: A Java implementation of the algorithm is available at the class page. Example: d = e -1 mod (p-1)*(q-1) = mod 120= 113

csci5233 computer security & integrity (Chap. 3) 7 RSA Encryption An example (pp.94-95): P = 7 Let n = 143, p = 11, q = 13, and e = 11. Note: e is relprime to (p-1)*(q-1). Then d = 11 Note: d is the inverse of e mod (p-1)*(q-1). Encryption: C = P e mod n = 7 11 mod 143 = 106 Decryption: P = C d mod n = mod 143 = 7

csci5233 computer security & integrity (Chap. 3) 8 RSA Encryption Another example: P = 7 Let n = 143, p = 11, q = 13, and e = 17. Note: e is relprime to (p-1)*(q-1). Then d = 113 Note: d is the inverse of e mod (p-1)*(q-1). Encryption: C = P e mod n = 7 17 mod 143 = 50 Decryption: P = C d mod n = mod 143 = 7

csci5233 computer security & integrity (Chap. 3) 9 RSA Encryption Still another example: P = 55 Let n = 285, p = 19, q = 17, and e = 37. Note: e is relprime to (p-1)*(q-1), 288. d = 109 Note: d is the inverse of e mod (p-1)*(q-1). Encryption: C = P e mod n = mod 288 = 55 Decryption: P = C d mod n = mod 288 = 55

csci5233 computer security & integrity (Chap. 3) 10 RSA Encryption The cryptographer’s job: –Find three primes, p, q, and e, where p * q = n and e is relatively prime to (p-1)*(q-1). –Compute d based on e and n. The challenge: p, q, and e must be large enough primes. See discussions on p.95.

csci5233 computer security & integrity (Chap. 3) 11 RSA Encryption The cryptanalyst’s job: P = C d mod n –Available: (e, n). –Find two primes p and q, such that p * q = n and e is relatively prime to (p-1)*(q-1). –Compute d: d = inverse (e, (p-1)*(q-1)) Q: Where’s the secrecy? Q: Given n and a prime e, how hard is it to find two distinct primes, p and q, such that p*q = n and (p- 1)*(q-1) is relprime to e?

csci5233 computer security & integrity (Chap. 3) 12 El Gamal Algorithm A public key algorithm 1984 Important in the U.S. DSS (Digital Signature Standard) Digital Signatures The sender computes the digital signature using his own private key. DS = E (Key priv, P) The receiver verifies the signature using the sender’s public key. P = D (Key pub, DS)

csci5233 computer security & integrity (Chap. 3) 13 El Gamal Algorithm To generate a key pair: –Choose a prime p and two integers, a and x, such that a < p and x < p. –The prime p should be chosen so that (p-1) has a large prime factor q. –Calculate the public key: y = a x mod p. –Private key: x –Public key: y

csci5233 computer security & integrity (Chap. 3) 14 El Gamal Algorithm (The sender) To sign a message m: –Choose a new random integer k, 0 < k < p-1 and k is relprime to (p-1). –Compute r = a k mod p. –Compute s = k -1 ( m – xr ) mod (p-1) –The message signature: r and s. Verification: A recipient use the public key (y) to compute ( y r r s ) mod p and determine if it is equivalent to a m mod p.

csci5233 computer security & integrity (Chap. 3) 15 Hash Algorithm A hash algorithm is a check function that protects data against modifications. C.f., checksum in network transmission Hash functions produce a reduced form of a body of data (called a digest or check value) such that most changes to the data will also change the reduced form. A cryptographic hash function uses a cryptographic function as part of the hash function. 1992: Secure Hash Algorithm (SHA)

csci5233 computer security & integrity (Chap. 3) 16 Secure Hash Algorithm (SHA) 1992: NIST Input data < 2 64 bits 160-bit digest Strength: diffusion, the avalanche effect See Fig. 3-9, p.99 C.f., MD4, MD5 Both MD5 and SHA are variants of the MD4 by Rivest. Strength: MD4 < MD5 < SHA

csci5233 computer security & integrity (Chap. 3) 17 Summary Public key encryption algorithms: Merkle-Hellman, RSA, El Gamal SHA Next: DES, Key Escrow