RSA Encryption & Cryptography

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Abdullah Sheneamer CS591-F2010 Project of semester Presentation University of Colorado, Colorado Springs Dr. Edward RSA Problem and Inside PK Cryptography.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Public Encryption: RSA
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
Public Key Cryptography and the RSA Algorithm Cryptography and Network Security by William Stallings Lecture slides by Lawrie Brown Edited by Dick Steflik.
RSA and its Mathematics Behind
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
RSA By: Abhishek Naik Viswanath Chennuru CPSC 624.
Public-Key Cryptography CS110 Fall Conventional Encryption.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Darci Miyashiro Math 480 April 29, 2013
Public-Key Encryption
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
RSA Prepared by: SITI ZAINAH ADNAN
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Cryptography & Network Security : Topic Seminar Description & Analysis Madhava.N 1RV06SCN05 2 nd Semester M.Tech CNE RVCE RSA ALGORITHM.
Cryptography and Network Security Public Key Cryptography and RSA.
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
RSA The algorithm was publicly described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Partly used for PGP (Pretty Good Privacy) to encrypt.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
UNIVERSITY OF BIELSKO- BIALA AKADEMIA TECHNICZNO-HUMANISTYCZNA Faculty of Mechanical Engineering and Computer Science.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Public Key Encryption and Digital Signatures
Cryptography and Security Technologies
Presentation transcript:

RSA Encryption & Cryptography Ryan Koon Mariko Nihonyanagi Lynette Rota

Definition Cryptography is the use of math for information security. This includes data integrity, confidentiality, entity authentication, and data origin authentication. Today’s cryptography depends on the existence of difficult algorithmic problems. The word cryptology comes from the Greek word kryptós logos, meaning ‘hidden word’.

Biographies Three inventers of RSA Public-key Crytposystem. Ronald L. Rivest – PHD from Stanford, In 2007 he received the Computers, Freedom and Privacy Conference "Distinguished Innovator" award. Adi Shamir – PHD from the Weizmann Institute, recipient of many awards including the IEEE's W.R.G. Baker Prize, holder of many patents and publications. Len Adleman – PHD from UC Berkley, known for first use of DNA to compute an algorithm.

Public Key Encryption

RSA Background RSA is one of the best-known public-key cryptosystems. Cryptography itself has a long history, dating from some 4,000 years ago in ancient Egypt. In 1977, the U.S. adopted DES, the Data Encryption Standard for use with all unclassified information. RSA now uses the digital signature, which was first standardized in 1991. Research in cryptography continues to this day.

Real World Cryptography Applications RSA can be used for secure communication (e.g. cellular phones), identification, authentication (e.g. digital signatures), secret sharing, electronic commerce, certification, secure electronic mail, key recovery, and secure computer access. Other uses of cryptography include e-mail, online banking, online trading, online credit cards transactions, satellite and cable television. RSA can be used at automatic teller machine (ATM) machines. The ATM card, or the public key is associated with the personal identification number (PIN), or the private key. It is used for Ethernet network cards, smart cards, secure telephones, and protocols for secure Internet communications RSA is a standard cryptosystem that has been used by over 700 companies.

RSA Devices RSA is used for Secure ID’s, only allowing access for a limited amount of time.

The RSA Cipher Generate your Private and Public Keys RSA Cryptography is an asymmetric encryption system (also known as public-key cryptography) meaning that the formulas used to derive the encrypted and decrypted messages use different keys. Below is RSA’s way of generating the private and public keys for the decryption and encryption algorithms. Choose two different, very large prime numbers p, and q. Computer n = p*q n is used as the modulus for the public and private keys. Compute the totient using n, p and q: Ø(n) = (p-1)(q-1). Choose an integer e such that 1<e< Ø(n) , and e and Ø(n) share no factors other than 1 (i.e. e and φ(n) are coprime) e is released as the public key exponent Compute d to satisfy the congruence relation de ≡ 1 (mod Ø(n)) ; i.e. for some integer de = 1+kØ(n) . d is kept as the private key exponent The public key consists of the modulus n and the public (or encryption) exponent e. The private key consists of the modulus n and the private (or decryption) exponent d which must be kept secret.

The RSA Cipher

Encryption/Decryption Step 1: Transmit your public key (n & e) Step 2: Sender changes their message into a number such that the resulting number is less than p*q. This is done through a hash function, using a hash table Step 3: Sender generates their cipher-text using the RSA encryption formula: c=me mod n Step 4: Transmit result to recipient. Decryption (Assuming a transmitted message using your public key has been received) Perform: m=cd mod n In this case, d is the private key that the recipient withheld. The result will be the original number the sender had before they input it into the encryption formula.

Security of RSA RSA is an extremely secure cipher system because the numbers chosen to determine its asymmetric keys are extremely large prime numbers. Some can reach up to 1000 decimal digits, or over 3000 bits in binary. Decrypting an RSA cipher-text is thought to be infeasible at best. Partial decryptions can be possible, but well made padding schemes protect cipher-texts in this way. Additionally, attempting to find out what numbers were chosen originally would let you solve the decryption near instantly. However, attempting to find out which numbers create a certain modulus is very difficult since in modular arithmetic many numbers (coprime or not) have a congruence relationship. Currently, RSA offers prize money to individuals who can find the factors to crack their private key ciphers.

Demonstration http://www.securecottage.com/demo/rsa2.html http://www.gax.nl/wiskundePO/#

References (2007). RSA laboratories. Retrieved November 12, 2007, from http://www.rsa.com/rsalabs/ Daubechies, I.. (2003). Math alive. Princeton University. Retrieved November 12, 2007, from http://www.math.princeton.edu/matalive/Crypto/ Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (2001). Handbook of applied cryptography. University of Waterloo. Retrieved November 12, 2007, from http://www.cacr.math.uwaterloo.ca/hac/ Ray, I. (2006). Public key cryptography. Colorado State University. Retrieved November 12, 2007, from http://www.cs.colostate.edu/~cs556dl/lecture-notes/rsa.pdf Rivest, R. L. (2007). Ronald L. Rivest: HomePage. massachusetts institute of technology. Retrieved November 12, 2007, from http://people.csail.mit.edu/rivest/ Wikipedia Users. (2007). Ron Rivest. Wikipedia: The Free Encyclopedia. Retrieved November 12, 2007, from http://en.wikipedia.org/wiki/Ron_Rivest Wikipedia Users. (2007). RSA. Wikipedia: The Free Encyclopedia. Retrieved November 12, 2007, from http://en.wikipedia.org/wiki/RSA Images: (2007). Computer ethernet cable connection. iStock International Inc. Retrieved November 12, 2007, from http://www.istockphoto.com/file_closeup/?id=3597040&refnum=1816354 Bowen, J. (2007). How ATMs work. HowStuffWorks, Inc. Retrieved November 12, 2007, from http://money.howstuffworks.com/atm1.htm Cherowitzo, B. (2001). The University of Colorado Denver. Retrieved November 12, 2007, from http://www-math.cudenver.edu/~wcherowi/clock.gif Higgs, B. J. (2006). Cryptography through the ages: A layman's view. University of Basel. Retrieved November 12, 2007, from http://informatik.unibas.ch/lehre/ss07/cs221/_Downloads/cs221-20070615-history-6up.pdf