Public Key Cryptosystem

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

Cryptography encryption authentication digital signatures
RSA.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
1 Pretty Good Privacy (PGP) Security for Electronic .
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Public Key Encryptions CS461/ECE422 Fall Reading Material Text Chapters 2 and 20 Handbook of Applied Cryptography, Chapter 8 –
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r p q p q p q p and q prime.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
Digital Signature Algorithm (DSA) Kenan Gençol presented in the course BIL617 Cryptology instructed by Asst.Prof.Dr. Nuray AT Department of Computer Engineering,
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Diffie-Hellman Key Exchange
Lecture 6: Public Key Cryptography
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
The RSA Algorithm Rocky K. C. Chang, March
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
Application of Elliptic Curves to Cryptography
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
Chapter 21 Public-Key Cryptography and Message Authentication.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Elliptic Curve Cryptography
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
1 Cryptanalysis Lab Elliptic Curves. Cryptanalysis Lab Elliptic Curves 2 Outline [1] Elliptic Curves over R [2] Elliptic Curves over GF(p) [3] Properties.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
INCS 741: Cryptography Overview and Basic Concepts.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Asymmetric-Key Cryptography
RSA and El Gamal Cryptosystems
The Application of Elliptic Curves Cryptography in Embedded Systems
How to Use Charm Crypto Lib
Presentation transcript:

Public Key Cryptosystem El Gamel Public Key Cryptosystem

The Discrete Log Problem The El Gamel public key cryptosystem is based upon the difficulty of solving the discrete logarithm problem (DLP) which is as follows: Given a prime p and values g and y, find x such that y = gx mod p

For a small value of p, it is easy to solve a DLP by trial and error or exhaustive search. For example, given p = 11, g = 2 and y = 9, we can try different values of x until we reach the correct solution for 2x mod 11 = 9 However, for a large value of p, i.e., if p has around 100 decimal digits, then it is not possible to solve a DLP using current technology.

El Gamel El Gamel is a public key cryptosystem with security which relies on the difficulty of solving a discrete log problem. If you can solve the DLP then you can crack El Gamel.

El Gamel Key Generation Bob generates public and private keys as follows: He picks a large random prime p He finds a generator g mod p (i.e. gx mod p gives a different answer for every value of x, which means that gp-1 mod p is the first time the answer is 1).

He picks a random number a between 1 and p-1. He computes y = ga mod p The public key is (p, g, y) The private key is a

El Gamel Encryption If Alice wants to send Bob a message, she looks up Bob’s public key (p, g, y) and breaks the message up into blocks with each block less than p. Then for each message block m she takes the following steps:

She generates a random number k between 1 and p-1. She computes r = gk mod p x = yk mod p c = (m * x) mod p She sends Bob the values r and c.

El Gamel Decryption Bob receives the ciphertext (r,c) from Alice. He decrypts it as follows: He computes ra mod p = x {ra = (gk)a = gka = gak = (ga)k = yk = x} Now he can solve c = (m * x) mod p to find the value of m. Only Bob can do this because only Bob knows the value of the private key a.

Comparing RSA and El Gamel Security based on the difficulty of the factorisation problem. The ciphertext is just one value c which is roughly the same size as the message m. El Gamel Security based on the difficulty of the discrete log problem. The ciphertext is two values c and r and so is twice the size of the message m.

RSA The encryption and decryption algorithms are the same (modular exponentiation). RSA is a patented algorithm. El Gamel The encryption and decryption algorithms are different (although both take about the same time to perform). El Gamel has no patent. This gives it a financial advantage over RSA.

The Elliptic Curve DLP A further advantage of the El Gamel cryptosystem, is that it can be generalised to a cryptosystem based on the discrete log problem for elliptic curves. This appears to be even harder to solve which means that the prime used can be smaller and so encryption is faster.

Applications of public key cryptosystems. Public key cryptosystems are generally less efficient but more secure than symmetric key cryptosystems. In practise public key systems are used for Digital signatures Key exchange

Digital Signatures A digital signature for a message from a particular sender is a cryptographic value which depends upon both the message and the sender. A digital signature provides data integrity (proof that the message hasn’t been altered) and non-repudiation (proof of origin - the sender cannot deny sending the message).

To digitally sign a message m using a public key cryptosystem, Bob simply encrypts the message m using his private key to get a signature s. Bob then sends Alice both the message and the signature (m,s). Alice decrypts the signature using Bob’s public key. If the decrypted signature is the same as the message m then Alice accepts the message is genuine and from Bob.

Digital Signature using RSA Bob takes a message m and uses his private key d to compute the signature s = md mod n 2. Bob sends Alice the pair (m,s) Alice decrypts the signature s using Bob’s public key e to compute m1 = se mod n If m1= m then Alice accepts the message as genuine because only Bob knows the private key d which works in conjunction with the public key (n,e).

DSS Recall that in the El Gamel public key cryptosystem, the algorithms for encryption and decryption are not the same. This means that using El Gamel for digital signatures is not as straight forward as using RSA. However, the Digital Signature Standard (DSS) is an alternative signature scheme to RSA which is based upon El Gamel.