Download presentation
Presentation is loading. Please wait.
Published byLinda Morrison Modified over 9 years ago
1
Improving Encryption Algorithms Betty Huang Computer Systems Lab 2009-2010
2
Abstract The RSA encryption algorithm is commonly used in public security due to the asymmetric nature of the cipher. The procedure is deceptively simple, though; given two random (large) prime numbers p and q, of which n = pq, and message m, the encrypted text is defined as c = m e (mod n). E is some number that is coprime to the totient(n). The public key (n, e), however, makes it difficult for the user to find the private key (n, d), due to the fact that given only n, it is extremely difficult to find the prime factors p and q. The fastest methods currently have O(sqrt(n)) complexity, but require expensive resources and technology (Kaliski). The aim of this paper is to improve on the factorization process required by the RSA encryption algorithm.
3
Background Purpose of Encryption Algorithms One-way functions Hash functions: MD5, SHA family Block Cipher: DES, Blowfish
4
RSA Rivest, Shamir, Adleman Asymmetric Block Cipher Different Keys for Encryption/Decryption
5
Block Ciphers A block cipher consists of two paired algorithms, one for encryption, E, and the other for decryption, E-1. Both algorithms accept two inputs: an input block of size n bits and a key of size k bits, yielding an n-bit output block. For any one fixed key, decryption is the inverse function of encryption, so that for any block M and key K. M is termed the plaintext and C the ciphertext.
6
Process Initialization: n = pq, with p and q primes e relatively prime to φ(n) = (p − 1) (q − 1) d inverse of e in Zφ(n) Keys: Public key: (n, e) Private key: (n, d) Encryption: Message M 1 < M < N C = M^e mod n Decryption: M = C^d mod n
7
An Example Setup: p = 7, q = 17 n = 7*17 = 119 φ(n) = 6*16 = 96 e = 5 d = 77 Keys: public key: (119, 5) private key: 77 Encryption: M = 19 C = 195 mod 119 = 66 Decryption: C = 6677 mod 119 = 19
8
Algorithms Prime Generation Primality Tests (Miller-Rabin, etc) GCD Euler’s Totient Function Modular Multiplicative Inverse Integer Factorization (QS, Lenstra)
9
Development
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.