Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Digital Signatures. Anononymity and the Internet.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Public Key Encryption Algorithm
By Claudia Fiorini, Enrico Martinelli, Fabio Massacci
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Public Key Cryptography
Public Encryption: RSA
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Public Key Cryptography Bryan Pearsaul. Outline What is Cryptology? Symmetric Ciphers Asymmetric Ciphers Diffie-Hellman RSA (Rivest/Shamir/Adleman) Moral.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
RSA and its Mathematics Behind
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Darci Miyashiro Math 480 April 29, 2013
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
1 Number Theory and Advanced Cryptography 5. Cryptanalysis of RSA Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Overview Modern public-key cryptosystems: RSA
Public Key Cryptography
Digital Signatures.
CS480 Cryptography and Information Security
Asymmetric-Key Cryptography
Attacks on Public Key Encryption Algorithms
Public Key Cryptosystem
Asymmetric-Key Cryptography
RSA Slides by Kent Seamons and Tim van der Horst
1. Public Key Encryption (A Simple Case)
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public Key Encryption and the RSA Algorithm
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chap 6: Security and Protection
M3: Encryption r By Andrew Stringer.
Real-world Security of Public Key Crypto
PART VII Security.
Rivest, Shamir and Adleman
The Application of Elliptic Curves Cryptography in Embedded Systems
Appendix 5: Cryptography p
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
NET 311 Information Security
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Symmetric-Key Cryptography
Unit 2: Cryptography & Cryptographic Algorithm
Introduction to Cryptography
Fluency with Information Technology Lawrence Snyder
The RSA Public-Key Encryption Algorithm
Presentation transcript:

Cryptography By: Nick Belhumeur

Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption Example of Encryption Padding Schemes Padding Schemes Security Security

What is Cryptography? the science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then transforming that message back to its original form the science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then transforming that message back to its original form 2 types of cryptosystems: 2 types of cryptosystems: 1. Symmetric 2. Asymmetric

Symmetric Cryptosystems Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message Also known as “private key encryption” Also known as “private key encryption” Key sent with message for decryption Key sent with message for decryption Wouldn’t need if key could be sent securely with message Wouldn’t need if key could be sent securely with message

Asymmetric Cryptosystems asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it Also known as “public key encryption” Also known as “public key encryption” A reliable public key encryption: RSA A reliable public key encryption: RSA Ron Rivest, Adi Shamir, Leonard Adleman Ron Rivest, Adi Shamir, Leonard Adleman

What is RSA? A complex mathematical equation through which variables are used but are not all available to be sent to the recipient. A complex mathematical equation through which variables are used but are not all available to be sent to the recipient. The missing variable is calculated during the end process by various methods of the recipient computer. The missing variable is calculated during the end process by various methods of the recipient computer.

RSA Example Person A selects 2 prime numbers. Person A selects 2 prime numbers. P=23 and q=41 P=23 and q=41 This is normally a much larger number (1024 bits max) This is normally a much larger number (1024 bits max) Person A multiplies p and q Person A multiplies p and q Pq = (23)(41) = 943 Pq = (23)(41) = 943 This is the public key (943) This is the public key (943) This can be told to person B. This can be told to person B.

RSA Example Person A also chooses a number e. Person A also chooses a number e. e is relatively prime to (p-1)(q-1) e is relatively prime to (p-1)(q-1) (23-1)(41-1) = (22)(40) = 880 (23-1)(41-1) = (22)(40) = 880 e = 7 (randomly chosen, relatively prime) e = 7 (randomly chosen, relatively prime) Person A tells Person B e as well Person A tells Person B e as well Now, Person B can send a message to Person A with this information Now, Person B can send a message to Person A with this information

RSA Example Person B sends message m=35 Person B sends message m=35 Person B must calculate the value C Person B must calculate the value C C = M e (mod N) = 35 7 (mod 943) C = M e (mod N) = 35 7 (mod 943) 35 7 (mod 943) = (mod 943) 35 7 (mod 943) = (mod 943) = 545 = 545 Person B sends the encoding, 545, to Person A Person B sends the encoding, 545, to Person A

RSA Example Now Person A wants to decode 545 Now Person A wants to decode 545 To do this, A must find a number d To do this, A must find a number d such that ed = 1(mod(p-1)(q-1)) In our case… 7d = 1(mod 880) In our case… 7d = 1(mod 880) d = 503 d = 503 To find the decoding, A must calculate C d (mod N) = (mod 943) To find the decoding, A must calculate C d (mod N) = (mod 943) This looks like a bad calculation…but notice This looks like a bad calculation…but notice

RSA Example 503 = = The binary expression of 503!!! The binary expression of 503!!! = = = …545 1 = …545 1 We only care about the result of (mod 943) We only care about the result of (mod 943)

RSA Example Table generated by the binary expression of 503 Table generated by the binary expression of = = = = = = = = = 324

RSA Example The result we want from the previous table The result we want from the previous table (mod 943) = 324*18*215*795*857*400*923*545 (mod 493) = 35 This may seem complex, but is simple for a computer to calculate This may seem complex, but is simple for a computer to calculate N = 35 (Person A decrypted the message) N = 35 (Person A decrypted the message)

Important factors of RSA Plain-text attacks are potentially possible in discovering the private key to decrypt the message. Plain-text attacks are potentially possible in discovering the private key to decrypt the message. Additionally, there are other disadvantages to RSA that can compromise the private key. Additionally, there are other disadvantages to RSA that can compromise the private key.

Padding Schemes When RSA is used in practice, it is often combined with a padding scheme. When RSA is used in practice, it is often combined with a padding scheme. Similar to the “dear …” part of a letter Similar to the “dear …” part of a letter Is used to add a random size to the message so the hacker will not know the exact size of the entire message Is used to add a random size to the message so the hacker will not know the exact size of the entire message

Results of padding scheme This secures the RSA encryption method further by protecting it against some of the attacks that the RSA method would typically be weaker against. This secures the RSA encryption method further by protecting it against some of the attacks that the RSA method would typically be weaker against.

Plain-text attack Because RSA is a deterministic-based encryption method, there is no random component to encryption. Because RSA is a deterministic-based encryption method, there is no random component to encryption. This means a comparison of text to the encrypted text could potentially be enough to begin to crack the algorithm. This means a comparison of text to the encrypted text could potentially be enough to begin to crack the algorithm. The padding makes RSA semantically secure which means an attacker wouldn’t know the difference between two encryptions, even with the corresponding plain-texts. The padding makes RSA semantically secure which means an attacker wouldn’t know the difference between two encryptions, even with the corresponding plain-texts.

Security In choosing prime numbers for the RSA encryption, it would be easy to see that factoring n is the easiest way to crack the encryption. In choosing prime numbers for the RSA encryption, it would be easy to see that factoring n is the easiest way to crack the encryption. Get the prime numbers in doing so and you could potentially decrypt the message. Get the prime numbers in doing so and you could potentially decrypt the message. Remember: 1 – 1024bits for the key Remember: 1 – 1024bits for the key

Summary Definition of Cryptography Definition of Cryptography Types of cryptosystems Types of cryptosystems RSA Encryption RSA Encryption Padding Schemes Padding Schemes Security of RSA method Security of RSA method

Any Questions?