Download presentation
Presentation is loading. Please wait.
Published byBarnard Sharp Modified over 9 years ago
1
Cryptography Chapter 7 Part 3 Pages 812 to 833
2
Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation Scalability – N(N-1)/2 secret keys Secure key distribution – Secure courier?
3
Diffie-Hellman Algorithm First asymmetric Subject to man-in-the-middle attack – Figure 7-20 on page 814
4
RSA 1978 MIT – Ron Rivest, Adi Shamir, Leonard Adleman De facto asymmetric standard RSA works – Pages 816-7
5
RSA Security = difficulty in factor large numbers into a product of primes One-way function – Multiplying two primes is easy. Factoring is hard. If someone figures out an efficient way of factoring, RSA would be broken Key exchange protocol for AES
6
ECC Elliptic Curve Cryptosystem Discete Logarithms of Elliptic Curves Figure 7-21 on page 819 More efficient than RSA Limited processing, storage, power supply and bandwidth devices such as cellular telephones
7
Hash Algorithms MD-5 – 128-bits – Ron Rivest – Subject to collisions SHA-1 – 160-bits – NSA, NIST
8
Hash Algorithms SHA-2 – SHA-256, SHA-384, SHA-512 SHA-3 – NIST draft
9
Message Authentication Code MAC – Figure 7-22a on page 822 – Man-in-the-middle attack – Integrity – Can detect only unintentional modification
10
HMAC Hash MAC – Figure 7-22b on page 822 – Integrity and data origin authentication CBC-MAC – Figure 7-23 on page 824
11
Collision Two message produce the same hash value Birthday attack – Same birthday as you > 50%? 253 – Two people with same birthday > 50%? 23 2^(n/2) – SHA-1 (160-bits) 2^80
12
Digital Signatures Figure 7-24 on page 830 Provides authentication, non-repudiations, and integrity
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.