Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.

Slides:



Advertisements
Similar presentations
RSA.
Advertisements

CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Public Key Encryption Algorithm
Computer Science CSC 405By Dr. Peng Ning1 CSC 405 Introduction to Computer Security Topic 2. Basic Cryptography (Part II)
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Introduction to - Cryptography - PKI (Public Key Infrastructure) - Secure with PGP (Pretty Good Privacy) Dr.Tech. Göran Pulkkis Arcada Polytechnic.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
1. RSA basics 2. Key generation 3. What it would take to break RSA
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Chapter 3 Encryption Algorithms & Systems (Part C)
Public Key Algorithms 4/17/2017 M. Chatterjee.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
1 NTRU: A Ring-Based Public Key Cryptosystem Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman LNCS 1423, 1998.
ASYMMETRIC CIPHERS.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Lecture 5 Overview Does DES Work? Differential Cryptanalysis Idea – Use two plaintext that barely differ – Study the difference in the corresponding.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Network Encryption Vince Ceccarelli Group 7 TC 200.
Brute Force Password Cracking and its Role in Penetration Testing Andrew Keener and Uche Iheadindu.
Introduction to Cryptography Techniques How secure is that banking network traffic?
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Implementing RSA Encryption in Java
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Based on Bruce Schneier Chapter 7: Key Length Dulal C. Kar.
DES Attacks and Triple DES
Public-Key Encryption
1 Public-Key Cryptography and Message Authentication.
1 Number Theory and Advanced Cryptography 5. Cryptanalysis of RSA Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
RSA Prepared by: SITI ZAINAH ADNAN
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Lecture 8 Overview. Analysis of Algorithms Algorithms – Time Complexity – Space Complexity An algorithm whose time complexity is bounded by a polynomial.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 4 Overview. Data Encryption Standard Combination of substitution and transposition – Repeated for 16 cycles – Provides confusion and diffusion.
DES: Data Encryption Standard
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 6. RSA Use in Encryption to encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = M e mod n, where 0≤M
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
ICS 454 Principles of Cryptography
ICS 454 Principles of Cryptography
Presentation transcript:

Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong

Outline of Presentation Introduction Cracking RSA –Overview of RSA –Factoring integers –Number theory Cracking DES –Overview of DES –Brute force attack on DES

Introduction A cryptographic algorithm is usually well- known and security is provided by keeping secret some private information: some private key. A cryptographic system is said to be strong if it is very difficult to “break”.

Overview of RSA Encrypt a message using public key and decrypt using secret private key. Public key is a pair of integers (e, n) where n is the product of 2 large prime numbers. Private key is the pair of integers (d, n) where n = p * q, and e * d  1 mod ((p  1) * (q  1)) The length of n is an indication of the strength of RSA and is usually expressed in number of bits.

Factoring Integers

Cracking RSA digit number (n) Factors: Method used is called Generalized Number Field Sieve

The Theory Theorem: Given a non-prime integer n, if x 2  y 2 mod n, and x   y mod n, then GCD(x+y, n) is a proper factor of n, and so is GCD(x  y, n).

An Example Consider n = , note that mod = and mod = , GCD( ,  ) = GCD( , ) = 3001 and = 3001 * 4001

Our Efforts on Factorization Primary purpose is to learn how to implement factorization algorithms. Still in very early stage, currently working on an implementation of Multiple Polynomial Quadratic Sieve.

Overview of DES Based on a 64-bit secret key which is used both for encryption and decryption. The actual key is 56-bit since one of the bits in each 8-bit units is actually a parity bit and is not used for encryption/decryption. Messages are encrypted in blocks of 64-bit units.

Brute Force Attacks on DES Try all possible keys until a “match” is found. Early 1998, 40 days using 50,000 CPUs on the Internet, about 85% of the key space searched. July 1998, 56 hours using specially designed hardware (EFF DES Cracker) which costs about US$250,000.

Our Efforts on Cracking 40-bit DES Demonstration only, not optimized. Check first 4 bytes of “decrypted” message against a set of known “headers” for conformance, “yes” means highly probable that message is cracked. Use idle times of about 50 workstations in the Department (most more than 3 years old), about 80% of key space searched in about 15 days.