CSC 386 – Computer Security Scott Heggen. Agenda Exploring that locked box thing from Friday?

Slides:



Advertisements
Similar presentations
ONE WAY FUNCTIONS SECURITY PROTOCOLS CLASS PRESENTATION.
Advertisements

1 Complexity ©D.Moshkovitz Cryptography Where Complexity Finally Comes In Handy…
RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Asymmetric-Key Cryptography
Public Key Encryption Algorithm
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
Attacks on Digital Signature Algorithm: RSA
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
RSA Encryption William Lu. RSA Background  Basic technique first discovered in 1973 by Clifford Cocks of CESG (part of British GCHQ)  Invented in 1977.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Topic 5 Essential Public Key Crypto Methods.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Codes, Ciphers, and Cryptography-RSA Encryption
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Rachana Y. Patil 1 1.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
RSA By: Abhishek Naik Viswanath Chennuru CPSC 624.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Darci Miyashiro Math 480 April 29, 2013
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
What is RSA RSA is a system employed to create the encrypted message in which the key used for encryption is different from that used to decrypt. It is.
Public Key (RSA) Day 27. Objective Students will be able to… …understand how RSA is used for encryption and decryption. …understand some of the challenges.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Encryption.
CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Cryptography & Network Security : Topic Seminar Description & Analysis Madhava.N 1RV06SCN05 2 nd Semester M.Tech CNE RVCE RSA ALGORITHM.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)
1 Hello World and Welcome to The simple crypt Key=23 {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.
CS Modular Division and RSA1 RSA Public Key Encryption To do RSA we need fast Modular Exponentiation and Primality generation which we have shown.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
Information and Computer Security CPIS 312 Lab 8 1 Asymmetric Key Algorithms RSA Algorithm TRIGUI Mohamed Salim.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Public Key Cryptography
Public Key Encryption.
Chap 6: Security and Protection
Rivest, Shamir and Adleman
Analysis of the RSA Encryption Algorithm
Presentation transcript:

CSC 386 – Computer Security Scott Heggen

Agenda Exploring that locked box thing from Friday?

Rivest, Shamar, and Adleman (RSA) A public key encryption method Based on the fact that computers have trouble factoring large prime numbers Used extensively in many systems and protocols, such as SSH

RSA Step 1: Convert your text to numerical values. Usually this step is inherent, as everything is already represented as a number For this example, we will simplify things by assuming A = 1 B = 2 C = 3 …

RSA Step 2: Generate a pair of keys: Pick 2 very large random numbers p = 3 q = 11 Compute the product: n = 3 x 11 = 33 φ(n) = (p-1) × (q-1) = 2 × 10 = 20 Select a number less than φ(n), and relatively prime (few factors) e = 7 With very large values of p and q, n is extremely difficult for a computer to reverse! Public key!

RSA Compute the matching private key d, as the inverse of e mod φ(n): d = inv of e mod φ(n) = inv(7) mod 20 = 3 7 x 1 mod 20 = 7 7 x 2 mod 20 = 14 7 x 3 mod 20 = 1 Public key (e): (7, 33) Private key (d): (3, 33) p = 3 q = 11 φ(n) = 20 n = 33 e = 7 In other words: 7 x ? mod 20 = 1

RSA AliceBob C Eve Public key (e): (7, 33) Private key (d): (3, 33)

RSA Step 3 (Alice) Encrypt your message using the public key (e) C = m key mod n For A: C A = 1 7 mod 33 = 1 For B: C B = 2 7 mod 33 = 29 For C: C c = 3 7 mod 33 = 9 p = 3 q = 11 φ(n) = 20 n = 33 e = 7 d = 3 m = “abc” = 123 C = 1, 29, 9

RSA AliceBob C Eve Public key (e): (7, 33) Private key (d): (3, 33) Eve knows: C = 1, 29, 9 e = (7, 33)

RSA Step 4 (Bob) Decrypt the cipher using the private key (d) m = C key mod n For A: m A = 1 3 mod 33 = 1 For B: m B = 29 3 mod 33 = 2 For A: m C = 9 3 mod 33 = 3 p = 3 q = 11 n = 33 φ(n) = 20 e = 7 d = 3 C = 1, 29, 9 Eve knows: C = 1, 29, 9 e = (7, 33)

Next Class Quiz on RSA Be able to encrypt a message given a public key Be able to decrypt a message given a private key