Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
7. Asymmetric encryption-
Session 4 Asymmetric ciphers.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Attacks on Digital Signature Algorithm: RSA
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Public Encryption: RSA
Cryptography & Number Theory
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
Public Key Algorithms 4/17/2017 M. Chatterjee.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Codes, Ciphers, and Cryptography-RSA Encryption
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Chapter 12 Cryptography (slides edited by Erin Chambers)
The RSA Algorithm Rocky K. C. Chang, March
Great Theoretical Ideas in Computer Science.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Encryption Coursepak little bit in chap 10 of reed.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Announcements: HW4 – DES due Thursday HW4 – DES due Thursday I have installed, or will install: Java, C (gcc), Python. What other languages? Please make.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Darci Miyashiro Math 480 April 29, 2013
1 Public-Key Cryptography and Message Authentication.
CSC 386 – Computer Security Scott Heggen. Agenda Exploring that locked box thing from Friday?
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
MA/CSSE 473 Day 10 Primality testing summary Data Encryption RSA.
Encryption.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Cryptography & Network Security : Topic Seminar Description & Analysis Madhava.N 1RV06SCN05 2 nd Semester M.Tech CNE RVCE RSA ALGORITHM.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Fall 2002CS 395: Computer Security1 Chapter 9: Public Key Cryptography.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Encryption on the Internet Jeff Cohen. Keeping Information Secret What information do we want to be secret? –Credit card number –Social security number.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
Cryptography RSA Algorithm BY : Wesam Fadheel Computer science department - WMU CS-6800 Advanced Theory of Computation Instructor: Dr. Elise De Doncker.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Public Key Cryptography
CS480 Cryptography and Information Security
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Modular Arithmetic and RSA Encryption
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Where Complexity Finally Comes In Handy…
Where Complexity Finally Comes In Handy…
Oblivious Transfer.
Where Complexity Finally Comes In Handy…
Presentation transcript:

Intro to Cryptography ICS 6D Sandy Irani

Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information, she does not learn the true message. message

Sending Numbers as Messages Modern cryptography is based on number theory Usually we want to send text messages. Need to convert text to a number and back. – Translation between text and numbers does not need to be secure. – Text to number function must be one-to-one so that translation back to text is well defined.

Sending Numbers as Messages Function mapping text to numbers – Could use ASCII representation of each characher – Simple example mapping {A, B,…, Z, _ } to {01,02,…,27} SEND_HELP

Sending Numbers as Messages Can break up message so that each individual message is a number in the range from 0 through N-1 for some large N. – Cryptographic scheme will use arithmetic mod N m: plaintext c: cyphertext – encrypt: ℤ N → ℤ N encrypt(m) = c – decrypt: ℤ N → ℤ N decrypt(c) = m

A Simple Cryptosystem Alice: message sender Bob: message received Alice and Bob meet in advance and agree on a secret key k ∈ ℤ N – Encrypt: c = (m+k) mod N – Decrypt: m = (c-k) mod N – Encrypt is one-to-one

A Simple Cryptosystem Alice and Bob meet in advance and agree on a secret key k ∈ ℤ N – Encrypt: c = (m+k) mod N – Decrypt: m = (c-k) mod N Not very secure – One (m,c) pair reveals k – Can infer k from many c’s. Example: N = 79, k = 55 m = 41

Public Key Cryptography Private key cryptography requires that communicating parties agree in advance on a secret key. Public key cryptography: – Bob publishes an encoding key (public key) so that anyone can send Bob a message encode(m, e) = c e: public key – Only Bob has the decryption key (private key) that can decode messages sent by the public key. decode(c, d) = m d: private key

Public Key Cryptography Security of a public key cryptosystem relies on the assumption that some functions are hard to compute: If Eve knows c, she can test all possible messages m to see if encrypt(m, e) = c. Prohibitively expensive if the space of all possible messages is large Assume that there is no fast way to directly compute the decryption function without knowing the private key in advance

RSA Bob picks two large prime numbers p and q Bob computes: – N = pq – φ = (p-1)(q-1) – Find e such that gcd(e, φ) = 1. (Usually e is prime) – Compute d = multiplicative inverse of e mod φ: de mod φ = 1 – Public key: e, N – Private key: d Anyone who knows p and q can compute d, the private key

RSA Bob picks to large prime numbers p and q Bob computes: – N = pq – φ = (p-1)(q-1) – Find e such that gcd(e, φ) = 1. (Usually e is prime) – Compute d = multiplicative inverse of e mod φ: de mod φ = 1 – Public key: e, N – Private key: d Encrypt m: c = m e mod N Decrypt c: m = c d mod N

RSA Example: p = 5, q = 11 Pick e = 37 and find d:

RSA Example: p = 5, q = 11 N = 55, φ = 40 Pick e = 37, so d = 13 – Encrypt m: c = m e mod N – Decrypt c: m = c d mod N m = 17

RSA: why does it work? Euler’s Theorem (special case): If p and q are prime and gcd(m,pq) = 1, then m (p-1)(q-1) mod pq = 1 Know: c = m e mod N want to know that m = c d mod N Also know that d·e mod (p-1)(q-1) = 1

RSA Example: p = 7, q = 13 Pick e = 41 and find d:

RSA Example: p = 7, q = 13, N = 91, φ = 72 Pick e = 41 d = 65 m = 55