Rivest, Shamir and Adleman

Slides:



Advertisements
Similar presentations
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Advertisements

CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r p q p q p q p and q prime.
Public Key Encryption Algorithm
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Public Key Cryptography
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
RSA Encryption William Lu. RSA Background  Basic technique first discovered in 1973 by Clifford Cocks of CESG (part of British GCHQ)  Invented in 1977.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Codes, Ciphers, and Cryptography-RSA Encryption
Introduction to Public Key Cryptography
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Darci Miyashiro Math 480 April 29, 2013
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
1 Number Theory and Advanced Cryptography 5. Cryptanalysis of RSA Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Public Key (RSA) Day 27. Objective Students will be able to… …understand how RSA is used for encryption and decryption. …understand some of the challenges.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Presented by Katherine Heller COSC 4765 University of Wyoming April 26, 2011 Image source: PC Dynamics, Inc.
CSC 386 – Computer Security Scott Heggen. Agenda Exploring that locked box thing from Friday?
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Public Key Cryptography
Public Key Encryption.
Chapter 8: Network Security
Public Key Cryptosystem
Asymmetric-Key Cryptography
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public Key Encryption and Digital Signatures
Public-key Cryptography
Chapter 8: Network Security
Chap 6: Security and Protection
Cryptography in .Net CS 795.
Real-world Security of Public Key Crypto
Number Theory and Euclidean Algorithm
PART VII Security.
Analysis of the RSA Encryption Algorithm
The Application of Elliptic Curves Cryptography in Embedded Systems
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Chapter 3 - Public-Key Cryptography & Authentication
Introduction to Algorithms Second Edition by
Chapter 8: Network Security
Security: Public Key Cryptography
The RSA Public-Key Encryption Algorithm
Chapter 8: Network Security
Presentation transcript:

Rivest, Shamir and Adleman 1978 - 1979 RSA Rivest, Shamir and Adleman 1978 - 1979

Rivest Shamir Adleman

Depends on the difficulty of factoring really large numbers. Security Depends on the difficulty of factoring really large numbers.

Key Pair Choose 2 random large (300 to 600 digits) prime numbers, p and q. p and q should be of equal length Compute n = pq Randomly choose e such that e and (p – 1)(q – 1) are relatively prime Compute d such that ed = 1 mod ((p – 1)(q - 1))

Keys e is the encryption key d is the decryption key d = e-1 mod ((p – 1)(q – 1)) e and n are the public key d is the private key Throw p and q away (securely)

Message Preparation The message m must be divided into blocks smaller than n. For 2048 bit keys message blocks should be around 1024 bytes. Pad with zeros

Encryption Message block mi Cipher text ci ci = mi e mod n

Decryption Message block mi Cipher text ci mi = ci d mod n

Common Public Keys 3, 17, and 65537 (216 + 1) 11, 1001, 10000000000000001 Remember the security depends on factoring n = p q

Computation 600 digits raised to 600 digits is a lot of multiplication! Montgomery’s method depends on the binary representation of e. Using all of the tricks RSA is about 10,000 to 100,000 times more computationally intensive than DES or AES