We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAmia Hammond
Modified over 4 years ago
Asymmetric Encryption Prof. Ravi Sandhu
2 © Ravi Sandhu PUBLIC KEY ENCRYPTION Encryption Algorithm E Decryption Algorithm D Plain- text Plain- text Ciphertext INSECURE CHANNEL B's Public Key B's Private Key RELIABLE CHANNEL A A B B
3 © Ravi Sandhu PUBLIC KEY CRYPTOSYSTEM solves the key distribution problem provided there is a reliable channel for communication of public keys requires reliable dissemination of 1 public key/party scales well for large-scale systems
4 © Ravi Sandhu PUBLIC KEY ENCRYPTION confidentiality based on infeasibility of computing B's private key from B's public key key sizes are large (512 bits and above) to make this computation infeasible
5 © Ravi Sandhu SPEED OF PUBLIC KEY VERSUS SECRET KEY Public key runs at kilobits/second think modem connection Secret key runs at megabits/second and even gigabits/second think LAN or disk connection This large difference in speed is likely to remain independent of technology advances
6 © Ravi Sandhu RSA public key is (n,e) private key is d encrypt: C = M e mod n decrypt: M = C d mod n
7 © Ravi Sandhu GENERATION OF RSA KEYS choose 2 large (100 digit) prime numbers p and q compute n = p * q pick e relatively prime to (p-1)*(q-1) compute d, e*d = 1 mod (p-1)*(q-1) publish (n,e) keep d secret (and discard p, q)
8 © Ravi Sandhu PROTECTION OF RSA KEYS compute d, e*d = 1 mod (p-1)*(q-1) if factorization of n into p*q is known, this is easy to do security of RSA is no better than the difficulty of factoring n into p, q
9 © Ravi Sandhu RSA KEY SIZE key size of RSA is selected by the user casual384 bits commercial512 bits military1024 bits
Chapter 3 Public Key Cryptography and Message authentication.
Symmetric Message Authentication Codes Prof. Ravi Sandhu.
Symmetric Encryption Prof. Ravi Sandhu.
Asymmetric Digital Signatures And Key Exchange Prof. Ravi Sandhu.
PKI Introduction Ravi Sandhu 2 © Ravi Sandhu 2002 CRYPTOGRAPHIC TECHNOLOGY PROS AND CONS SECRET KEY SYMMETRIC KEY Faster Not scalable No digital signatures.
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Public Key Cryptosystem
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
7. Asymmetric encryption-
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
Public Key Cryptography
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
© 2018 SlidePlayer.com Inc. All rights reserved.