We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAmia Hammond
Modified over 3 years ago
Asymmetric Encryption Prof. Ravi Sandhu
2 © Ravi Sandhu PUBLIC KEY ENCRYPTION Encryption Algorithm E Decryption Algorithm D Plain- text Plain- text Ciphertext INSECURE CHANNEL B's Public Key B's Private Key RELIABLE CHANNEL A A B B
3 © Ravi Sandhu PUBLIC KEY CRYPTOSYSTEM solves the key distribution problem provided there is a reliable channel for communication of public keys requires reliable dissemination of 1 public key/party scales well for large-scale systems
4 © Ravi Sandhu PUBLIC KEY ENCRYPTION confidentiality based on infeasibility of computing B's private key from B's public key key sizes are large (512 bits and above) to make this computation infeasible
5 © Ravi Sandhu SPEED OF PUBLIC KEY VERSUS SECRET KEY Public key runs at kilobits/second think modem connection Secret key runs at megabits/second and even gigabits/second think LAN or disk connection This large difference in speed is likely to remain independent of technology advances
6 © Ravi Sandhu RSA public key is (n,e) private key is d encrypt: C = M e mod n decrypt: M = C d mod n
7 © Ravi Sandhu GENERATION OF RSA KEYS choose 2 large (100 digit) prime numbers p and q compute n = p * q pick e relatively prime to (p-1)*(q-1) compute d, e*d = 1 mod (p-1)*(q-1) publish (n,e) keep d secret (and discard p, q)
8 © Ravi Sandhu PROTECTION OF RSA KEYS compute d, e*d = 1 mod (p-1)*(q-1) if factorization of n into p*q is known, this is easy to do security of RSA is no better than the difficulty of factoring n into p, q
9 © Ravi Sandhu RSA KEY SIZE key size of RSA is selected by the user casual384 bits commercial512 bits military1024 bits
Asymmetric Digital Signatures And Key Exchange Prof. Ravi Sandhu.
1 Public-Key Cryptography and Message Authentication.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Encryption on the Internet Jeff Cohen. Keeping Information Secret What information do we want to be secret? –Credit card number –Social security number.
“RSA”. RSA by Rivest, Shamir & Adleman of MIT in 1977 best known & widely used public-key scheme RSA is a block cipher, plain & cipher text are.
PKI Introduction Ravi Sandhu 2 © Ravi Sandhu 2002 CRYPTOGRAPHIC TECHNOLOGY PROS AND CONS SECRET KEY SYMMETRIC KEY Faster Not scalable No digital signatures.
Introduction Requirements for RSA Ingredients for RSA RSA Algorithm RSA Example Problems on RSA.
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Public Key Model 8. Cryptography part 2.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Symmetric Encryption Prof. Ravi Sandhu.
7. Asymmetric encryption-
Public-Key Cryptography CS110 Fall Conventional Encryption.
Darci Miyashiro Math 480 April 29, 2013
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
© 2017 SlidePlayer.com Inc. All rights reserved.