Download presentation

Presentation is loading. Please wait.

1
**Asymmetric-Key Cryptography**

GROUP MEMBER :- SOURAV SHASHANK SURAJ YADAV SONAL RATHI SUBHAM SINGHAL

2
**Asymmetric key cryptography uses two separate keys: one private and one public.**

Locking and unlocking in asymmetric-key cryptosystem

3
**General idea of asymmetric-key cryptosystem**

4
**C = f (Kpublic , P) P = g(Kprivate , C)**

Plaintext/Ciphertext Unlike in symmetric-key cryptography, plaintext and ciphertext are treated as integers in asymmetric-key cryptography. Encryption/Decryption C = f (Kpublic , P) P = g(Kprivate , C)

5
**C M Public Key (asymmetric): Requirements:**

1. For every message M, encrypting with public key and then decrypting resulting ciphertext with matching private key results in M. 2. Encryption and Decryption can be efficiently applied to M 3. It is impractical to derive decryption key from encryption key. Sender Receiver (encryption) (public key of Receiver) C M (decryption) (private key of Receiver)

6
**Combining Public/Private Key Systems**

Public key encryption is more expensive than symmetric key encryption For efficiency, combine the two approaches (1) A B (2) Use public key encryption for authentication; once authenticated, transfer a shared secret symmetric key (2) Use symmetric key for encrypting subsequent data transmissions

7
**RivestShamirAdelman (RSA) Method**

Named after the designers: Rivest, Shamir, and Adleman Public-key cryptosystem and digital signature scheme. Based on difficulty of factoring large integers For large primes p & q, n = pq Public key e and private key d calculated

8
RSA Key Generation Every participant must generate a Public and Private key: 1. Let p and q be large prime numbers, randomly chosen from the set of all large prime numbers. 2. Compute n = pq. 3. Choose any large integer, d, so that: GCD( d, ϕ(n)) = (where ϕ(n) = (p1)(q1) ) 4. Compute e = d-1 (mod ϕ(n)). 5. Publish n and e. Keep p, q and d secret. Note: Step 4 can be written as: Find e so that: e x d = 1 (modulo ϕ(n)) If we can obtain p and q, and we have (n, e), we can find d

9
**RivestShamirAdelman (RSA) Method**

Assume A wants to send something confidentially to B: A takes M, computes C = Me mod n, where (e, n) is B’s public key. Sends C to B B takes C, finds M = Cd mod n, where (d, n) is B’s private key + Confidentiality B A M M C Me mod n Cd mod n (e, n) (d, n) Encryption Key for user B (B’s Public Key) Decryption Key for user B (B’s PrivateKey)

10
**RSA Method Example: 1. p = 5, q = 11 and n = 55.**

(p1)x(q1) = 4 x 10 = 40 2. A valid d is 23 since GCD(40, 23) = 1 3. Then e = 7 since: 23 x 7 = 161 modulo 40 = 1 in other words e = 23-1 (mod 40) = 7

11
**Topics discussed in this section:**

ELGAMAL CRYPTOSYSTEM Besides RSA another public-key cryptosystem is ElGamal. ElGamal is based on the discrete logarithm problem discussed. Topics discussed in this section: ElGamal Cryptosystem Procedure Proof Analysis

12
**Key generation, encryption, and decryption in ElGamal**

13
Key Generation

15
Note The bit-operation complexity of encryption or decryption in ElGamal cryptosystem is polynomial.

16
**Proof of ElGamal Cryptosystem**

17
**Here is a trivial example. Bob chooses p = 11 and e1 = 2**

Here is a trivial example. Bob chooses p = 11 and e1 = 2. and d = 3 e2 = e1d = 8. So the public keys are (2, 8, 11) and the private key is 3. Alice chooses r = 4 and calculates C1 and C2 for the plaintext 7. Bob receives the ciphertexts (5 and 6) and calculates the plaintext.

18
Questions?

Similar presentations

© 2017 SlidePlayer.com Inc.

All rights reserved.

Ads by Google