PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Cryptography and Network Security
Asymmetric-Key Cryptography
Public Key Encryption Algorithm
Network Security Hwajung Lee. What is Computer Networks? A collection of autonomous computers interconnected by a single technology –Interconnected via:
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Public Key Cryptography
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Chapter3 Public-Key Cryptography and Message Authentication.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Public Key Algorithms 4/17/2017 M. Chatterjee.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Cryptography and Network Security Chapter 9 5th Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
The RSA Algorithm JooSeok Song Tue.
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Rachana Y. Patil 1 1.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
RSA Ramki Thurimella.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Midterm Review Cryptography & Network Security
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Public-Key Encryption
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography & Network Security : Topic Seminar Description & Analysis Madhava.N 1RV06SCN05 2 nd Semester M.Tech CNE RVCE RSA ALGORITHM.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Cryptography and Network Security Public Key Cryptography and RSA.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Fall 2002CS 395: Computer Security1 Chapter 9: Public Key Cryptography.
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Introduction to Cryptography
Presentation transcript:

PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description Security

PUBLIC-KEY CRYPTOGRAPHY (PKC) – A New Idea Historically – Symmetric-Key (one key) substitution (confusion) permutation (diffusion) More Recently – Asymmetric-Key (two keys)

MISCONCEPTIONS PKC vs Symmetric Encryption MISCONCEPTIONS PKC vs Symmetric Encryption PKC more secure than symmetric encryp. WRONG!! PKC more useful than symmetric encryp. WRONG!! – PKC costly PKC doesn’t need complicated protocol WRONG!!

PKC - USES PKC - USES Key Management Signature

PKC – SIX INGREDIENTS PKC – SIX INGREDIENTS Plaintext – input to encryp. algorithm output from decryp. algorithm Encryp. Algorithm – acts on plaintext - controlled by public or private key Public and Private Key - one for encryption - one for decryption Ciphertext – output from encryp. algorithm input to decryp. algorithm Decryp. Algorithm – acts on ciphertext - controlled by public or private key

PKC – STEPS PKC – STEPS 1.Each user generates two related keys - PUBLIC and PRIVATE 2. Each user makes: public key  PUBLIC private key  PRIVATE access  ALL public keys 3. BOB: Encr ( plaintext,PUBLIC Alice )  ciphertext ALICE 4. ALICE: Decr ( ciphertext,PRIVATE Alice )

PKC for a) ENCRYPTION b) AUTHENTICATION

At ANY TIME, ANY Private/Public key pair can be changed. Public key should be made public IMMEDIATELY KEYS EASILY UPDATED

Symmetric-Key: One SECRET KEY Asymmetric-Key (PKC): One PRIVATE KEY One PUBLIC KEY CIPHER TERMINOLOGY CIPHER TERMINOLOGY

CONFIDENTIALITY

AUTHENTICATION (source) (Integrity/Signature)

CONFIDENTIALITY and AUTHENTICATION

Encryp./Decryp. Sender encrypts with RECIPIENT’S PUBLIC key. Applied to ALL of message. Digital Signature Sender signs with SENDER’S PRIVATE key. Applied to ALL or PART of message. Key Exchange Uses one or more PRIVATE keys. Several approaches APPLICATIONS OF PKC APPLICATIONS OF PKC

Table 9.2 APPLICATIONS OF PKC APPLICATIONS OF PKC

Every value has an inverse Y = F(X)  X = F -1 (Y) Y = F(X) - easy X = F -1 (Y) - infeasible easy – polynomial time (poly in message length) infeasible - > poly time (e.g. exp. in message length) ONE-WAY FUNCTION ONE-WAY FUNCTION

Y = f k (X) - easy if k and X known X = f k -1 (Y) - easy if k and Y known X = f k -1 (Y) - infeasible if only Y known TRAP-DOOR ONE-WAY FUNCTION (e.g. PKC) TRAP-DOOR ONE-WAY FUNCTION (e.g. PKC)

Brute-Force Attack  Use LARGE keys But, PKC COMPLEXITY GROWS fast with key size So, PKC TOO COMPLEX encryp/decryp PKC only for key management and signature PKC – THE PROBLEM OF KEY SIZE PKC – THE PROBLEM OF KEY SIZE

PKC: 1960’s (NSA) 1970 Ellis – CESG 1976 Diffie and Hellman RSA: 1973 Cocks – CESG 1977 Rivest, Shamir, Adleman - MIT RSA ALGORITHM RSA ALGORITHM

Plaintext and Ciphertext integers between 0 and n-1 i.e. k bits, 2 k < n <2 k+1 Encryption: C = M e mod n Decryption: M = C d mod n = (M e ) d mod n = M ed mod n RSA RSA

Sender knows n,e Receiver knows n,d  PUBLIC key, KU = {e,n}  PRIVATE key, KR = {d} RSA (continued) RSA (continued)

1. There exists e,d,n s.t. M ed = M mod n 2. Easy to calculate M e and C d given {M,e} or {C,d}, resp. 3. Infeasible to find d given {e,n} PKC REQUIREMENTS OF RSA PKC REQUIREMENTS OF RSA

p = 17, q = 11 n = p.q = 187 mod p = 17, {1,6,6 2,6 3,6 4,6 5,6 6,6 7,6 8,6 9,6 10,6 11,6 12,6 13,6 14,6 15 } = {1,6,2,12,4,7,8,14,16,11,15,5,13,10,9,3} Mod p = 11 {1,2,4,8,5,10,9,7,3,6} EXAMPLE EXAMPLE

57 = (6,2), 57 2 = (2,4), 57 3 = (12,8), 57 4 = (4,5) EXAMPLE

We want number, g, between 1 and 186 s.t. g mod 17 = 6, g mod 11 = 2 Use CRT: g = mod 187 = 57 EXAMPLE Chinese Remainder Theorem EXAMPLE Chinese Remainder Theorem

EXAMPLE RSA COMPUTATION

Brute-Force Attacks – try all possible private keys. Mathematical Attacks - all equivalent to factoring n. Timing Attacks - depend on running time of decryption algorithm. SECURITY OF RSA SECURITY OF RSA

Table 9.3 Progress in Factorisation Progress in Factorisation

MIPS-years NEEDED TO FACTOR

For Decryption: Constant exponentiation time Random delay Blinding Generate random r C’ = Cr e M’ = C’ d M = M’r -1 TIMING ATTACKS ON RSA - countermeasures