The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Public Key Cryptography and the RSA Algorithm
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 19,20, and 21: April 5, 10, and 12, 2007 Cryptographic Primitives.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Chapter3 Public-Key Cryptography and Message Authentication.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Public Key Cryptography Bryan Pearsaul. Outline What is Cryptology? Symmetric Ciphers Asymmetric Ciphers Diffie-Hellman RSA (Rivest/Shamir/Adleman) Moral.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
CSCI 398 Research Topics in Computer Science Yana Kortsarts Computer Science Department Widener University Chester, PA.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Rachana Y. Patil 1 1.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
Merkle-Hellman Knapsack Cryptosystem Merkle offered $100 award for breaking singly - iterated knapsack Singly-iterated Merkle - Hellman KC was broken by.
RSA Ramki Thurimella.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Chapter 21 Public-Key Cryptography and Message Authentication.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Merkle-Hellman Knapsack Cryptosystem
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Cryptography and Network Security Public Key Cryptography and RSA.
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Public Key Cryptosystem In Symmetric or Private Key cryptosystems the encryption and decryption keys are either the same or can be easily found from each.
Public Key Encryption.
Public Key Cryptosystem
Privacy & Security.
Public Key Encryption and the RSA Algorithm
NET 311 Information Security
NET 311 Information Security
Presentation transcript:

The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao

Initial Discoveries Public key cryptography was born in May 1975, the child of two problems: Key distribution:if two people who have never met before are to communicate privately using conventional cryptographic means, they must somehow agree in advance on a key that will be known to themselves and to no one else. Signatures:could a method to provide the recipient of a purely digital electronic message with a way of demonstrating to other people that it had come from a particular person, just as a written signature on a letter.

Public-Key Cryptosystem A public-key cryptosystem is a cryptosystem in which keys come in inverse pairs and each pair of keys has two properties: Anything encrypted with one key can be decrypted with the other. Given one member of the pair, the public key, it is infeasible to discover the other, the secret key.

Solutions to the original problems One subscriber can send a private message to another simply by looking up the address’s public key and using it to encrypt the message. Only the holder of the corresponding secret key can read such a message. A subscriber can sign a message by encrypting it with his own secret key.

Ralph Merkle is the single most inventive character in the public-key saga. Merkle’s approach is to communicate a cryptographic key from one person to another by hiding it in a large collection of puzzles. Merkle’s Approach

Exponential Key Exchange In 1976, Diffie and Hellman published exponential key exchange algorithm in the paper New Directions in Cryptography. The purpose of the algorithm is to enable two users to exchange a key securely that can then be used for subsequent encryption of message.

If Y =  X mod q, for 1 < X < q-1 Where  is a fixed primitive element of GF(q) (that is the power of  produce all the nonzero elements 1,2, …, q-1 of GF(q)), then X = log  Y over GF(q), for 1 < Y < q-1 Alice selects a random X A and keeps it secret, but sends Y A =  X A mod q Bob selects a random X B and keeps it secret, but sends Y B =  X B mod q Alice computes K AB, K AB = Y B X A mod q =(  X B ) X A mod q =  X B X A mod q Bob computes K AB, K AB = Y A X B mod q Exponential Key Exchange

Trap-Door Knapsacks Later in 1976, Ralph Merkle began work on his best known contribution to public-key cryptosystem: building trapdoors into the knapsack one-way function to produce the trap-door knapsack public-key cryptosystem.

Trap-Door Knapsacks, Con’t The algorithm for generating keys: The public cargo vector or enciphering key a is a = wa’mod m Alice publishes a transposed version of a as her public key. When Bob wants to send the message x to Alice he computes and sends S = a · x Because S’ = w -1 S mod m = w -1  a i x i mod m = w -1  (wa i ’mod m)x i mod m =  (w -1 wa i ’mod m)x i mod m =  a i ’x i mod m = a’ · x When m >  a i ’, Alice can use her secret information, w -1 and m, to transform any message S that has been enciphered with her public key into S’ = w -1 · S and solve the knapsack problem S’ = a’ · x to obtain x.

The RSA System In 1977, Ronald Rivest, Adi Shamir, and Leonard Adleman developed the Rivest-Shamir-Adleman (RSA) algorithm. The RSA cryptosystem is a block cipher in which the plaintexts and ciphertexts are integers between 0 and N-1 for some N. The RSA system makes use of the fact that finding large (e.g., 200 digits) prime number is easy, but that factoring the product of two such numbers appears computationally infeasible.

The McEliece Coding Scheme Robert J. McEliece built another public-key system by using the existence of a class of error correcting codes, the Goppa codes, for which a fast decoding algorithm is known. McEliece’s system has never achieved wide acceptance and has probably never even been considered for implementation in any real application.

The Fall of the Knapsacks In 1982, Adi Shamir sent out a research announcement: he had broken the single iteration Merkle-Hellman knapsack system. In 1984, Ernie Brickell announced the destruction of a knapsack system of forty iterations and a hundred weights in the cargo vector in about an hour of Cray-1 time.

Key Management The solution to the problem of key management using conventional cryptography is for the network to provide a key distribution center (KDC). In a conventional network, every subscriber shares explicitly a secret key with the KDC and can only authenticate message explicitly for him. In a public–key network, each subscriber has the public key of the KDC and thus the capacity to authenticate any message from the KDC, but no power to forge one.

Application and Implementation In the late 1970s, in need of digital signatures for nuclear command and control system, Sandia National Laboratories began both to develop the technology of public-key devices and to study the strength of the proposed systems. In 1979, Sandia announced a board implementation intended for the seismic monitoring application. At the same time, Ron Rivest and colleagues at MIT learned to design hardware and produced a board. The result was an experimental nMOS chip.

Application and Implementation, Con’t In 1980s, public-key cryptography finally achieved official acceptance. NSA began feasibility studies for a new secure phone’ system-- Future Secure Voice System using public key. RSA Data Security founded by Rivest, Shamir, and Adleman produced a stand-alone software package called Mailsafe for encrypting and signing electronic mail. Cylink is first to produce a commercially available RSA chip.

Multiplying, Factoring, and Finding Primes The successes of the RSA system and of exponential key exchange over prime fields have led to significant development in three areas: multiplying, factoring, and finding Primes. The result has been not only the development of a technical base for public-key cryptography, but an inspiration and source of support for number theory.

Where is Public-Key Going? In just ten years, public-key cryptography has gone from a novel concept to mainstay of cryptographic technology. Increasing use of the available public key systems in the 1980s will spread awareness of both their advantages and the performance shortcomings of the early examples. The research response to this awareness will probably produce better public key systems in time for use during the first half of the nineties.