Download presentation

Presentation is loading. Please wait.

1
**Asymmetric-Key Cryptography**

GROUP MEMBER :- SOURAV SHASHANK SURAJ YADAV SONAL RATHI SUBHAM SINGHAL

2
**Asymmetric key cryptography uses two separate keys: one private and one public.**

Locking and unlocking in asymmetric-key cryptosystem

3
**General idea of asymmetric-key cryptosystem**

4
**C = f (Kpublic , P) P = g(Kprivate , C)**

Plaintext/Ciphertext Unlike in symmetric-key cryptography, plaintext and ciphertext are treated as integers in asymmetric-key cryptography. Encryption/Decryption C = f (Kpublic , P) P = g(Kprivate , C)

5
**C M Public Key (asymmetric): Requirements:**

1. For every message M, encrypting with public key and then decrypting resulting ciphertext with matching private key results in M. 2. Encryption and Decryption can be efficiently applied to M 3. It is impractical to derive decryption key from encryption key. Sender Receiver (encryption) (public key of Receiver) C M (decryption) (private key of Receiver)

6
**Combining Public/Private Key Systems**

Public key encryption is more expensive than symmetric key encryption For efficiency, combine the two approaches (1) A B (2) Use public key encryption for authentication; once authenticated, transfer a shared secret symmetric key (2) Use symmetric key for encrypting subsequent data transmissions

7
**RivestShamirAdelman (RSA) Method**

Named after the designers: Rivest, Shamir, and Adleman Public-key cryptosystem and digital signature scheme. Based on difficulty of factoring large integers For large primes p & q, n = pq Public key e and private key d calculated

8
RSA Key Generation Every participant must generate a Public and Private key: 1. Let p and q be large prime numbers, randomly chosen from the set of all large prime numbers. 2. Compute n = pq. 3. Choose any large integer, d, so that: GCD( d, ϕ(n)) = (where ϕ(n) = (p1)(q1) ) 4. Compute e = d-1 (mod ϕ(n)). 5. Publish n and e. Keep p, q and d secret. Note: Step 4 can be written as: Find e so that: e x d = 1 (modulo ϕ(n)) If we can obtain p and q, and we have (n, e), we can find d

9
**RivestShamirAdelman (RSA) Method**

Assume A wants to send something confidentially to B: A takes M, computes C = Me mod n, where (e, n) is B’s public key. Sends C to B B takes C, finds M = Cd mod n, where (d, n) is B’s private key + Confidentiality B A M M C Me mod n Cd mod n (e, n) (d, n) Encryption Key for user B (B’s Public Key) Decryption Key for user B (B’s PrivateKey)

10
**RSA Method Example: 1. p = 5, q = 11 and n = 55.**

(p1)x(q1) = 4 x 10 = 40 2. A valid d is 23 since GCD(40, 23) = 1 3. Then e = 7 since: 23 x 7 = 161 modulo 40 = 1 in other words e = 23-1 (mod 40) = 7

11
**Topics discussed in this section:**

ELGAMAL CRYPTOSYSTEM Besides RSA another public-key cryptosystem is ElGamal. ElGamal is based on the discrete logarithm problem discussed. Topics discussed in this section: ElGamal Cryptosystem Procedure Proof Analysis

12
**Key generation, encryption, and decryption in ElGamal**

13
Key Generation

15
Note The bit-operation complexity of encryption or decryption in ElGamal cryptosystem is polynomial.

16
**Proof of ElGamal Cryptosystem**

17
**Here is a trivial example. Bob chooses p = 11 and e1 = 2**

Here is a trivial example. Bob chooses p = 11 and e1 = 2. and d = 3 e2 = e1d = 8. So the public keys are (2, 8, 11) and the private key is 3. Alice chooses r = 4 and calculates C1 and C2 for the plaintext 7. Bob receives the ciphertexts (5 and 6) and calculates the plaintext.

18
Questions?

Similar presentations

OK

Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.

Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.

© 2017 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Ppt on renewable energy Ppt on principles of peace building organizations Ppt on power diode characteristics Ppt on energy giving food proteins Ppt on international financial markets Free ppt on moving coil galvanometer principle Ppt on isobars and isotopes of carbon Ppt on photo editing Pps to ppt online Ppt on mary kay ash