We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAmia Hammond
Modified over 3 years ago
Asymmetric Encryption Prof. Ravi Sandhu
2 © Ravi Sandhu PUBLIC KEY ENCRYPTION Encryption Algorithm E Decryption Algorithm D Plain- text Plain- text Ciphertext INSECURE CHANNEL B's Public Key B's Private Key RELIABLE CHANNEL A A B B
3 © Ravi Sandhu PUBLIC KEY CRYPTOSYSTEM solves the key distribution problem provided there is a reliable channel for communication of public keys requires reliable dissemination of 1 public key/party scales well for large-scale systems
4 © Ravi Sandhu PUBLIC KEY ENCRYPTION confidentiality based on infeasibility of computing B's private key from B's public key key sizes are large (512 bits and above) to make this computation infeasible
5 © Ravi Sandhu SPEED OF PUBLIC KEY VERSUS SECRET KEY Public key runs at kilobits/second think modem connection Secret key runs at megabits/second and even gigabits/second think LAN or disk connection This large difference in speed is likely to remain independent of technology advances
6 © Ravi Sandhu RSA public key is (n,e) private key is d encrypt: C = M e mod n decrypt: M = C d mod n
7 © Ravi Sandhu GENERATION OF RSA KEYS choose 2 large (100 digit) prime numbers p and q compute n = p * q pick e relatively prime to (p-1)*(q-1) compute d, e*d = 1 mod (p-1)*(q-1) publish (n,e) keep d secret (and discard p, q)
8 © Ravi Sandhu PROTECTION OF RSA KEYS compute d, e*d = 1 mod (p-1)*(q-1) if factorization of n into p*q is known, this is easy to do security of RSA is no better than the difficulty of factoring n into p, q
9 © Ravi Sandhu RSA KEY SIZE key size of RSA is selected by the user casual384 bits commercial512 bits military1024 bits
Asymmetric Digital Signatures And Key Exchange Prof. Ravi Sandhu.
1 Public-Key Cryptography and Message Authentication.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
8. Cryptography part 21 Public Key Model. 8. Cryptography part 22 Public Key Encryption.
Computer Science CPSC415 Biometrics and Cryptography1 Introduction to Public Key Cryptography Lecture 4.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Encryption on the Internet Jeff Cohen. Keeping Information Secret What information do we want to be secret? –Credit card number –Social security number.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction Requirements for RSA Ingredients for RSA RSA Algorithm RSA Example Problems on RSA.
1 ISA 562 Information Security Theory & Practice Public Key Cryptosystem Chapter 9 of Bishop ’ s Book.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Cryptography Readings Encryption, Decryption, & Digital Certificates.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
“RSA”. RSA by Rivest, Shamir & Adleman of MIT in 1977 best known & widely used public-key scheme RSA is a block cipher, plain & cipher text are.
1 CIS 5371 Cryptography 7. Asymmetric encryption-.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Cryptography and Network Security Public Key Cryptography and RSA.
1 El Gamel Public Key Cryptosystem. 2 The Discrete Log Problem The El Gamel public key cryptosystem is based upon the difficulty of solving the discrete.
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
© 2017 SlidePlayer.com Inc. All rights reserved.