PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Public Key Cryptography
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Cryptography and Network Security Chapter 9 5th Edition by William Stallings Lecture slides by Lawrie Brown.
The RSA Algorithm JooSeok Song Tue.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
RSA Ramki Thurimella.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Midterm Review Cryptography & Network Security
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Public-Key Encryption
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography and Network Security Public Key Cryptography and RSA.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Fall 2002CS 395: Computer Security1 Chapter 9: Public Key Cryptography.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
@Yuan Xue CS 285 Network Security Public-Key Cryptography Yuan Xue Fall 2012.
Public Key Encryption ● Diffie and Hellman – 1976 Famous Paper: New Directions In Cryptography New Directions In Cryptography ● First revolutionary.
Overview Modern public-key cryptosystems: RSA
Public Key Cryptography
Public Key Encryption.
Visit for more Learning Resources
Asymmetric-Key Cryptography
RSA Slides by Kent Seamons and Tim van der Horst
1. Public Key Encryption (A Simple Case)
Lecture 5 RSA DR. Nermin Hamza.
Privacy & Security.
Public Key Encryption and Digital Signatures
Public-Key Cryptography and RSA
Public-key Cryptography
The RSA Algorithm JooSeok Song Tue.
رمزنگاري كليد عمومي بهروز ترك‏لاداني 1.
Private-Key Cryptography
The RSA Algorithm JooSeok Song Tue.
Analysis of the RSA Encryption Algorithm
Public-Key Cryptography and Message Authentication
NET 311 Information Security
Chapter 3 - Public-Key Cryptography & Authentication
Introduction to Cryptography
The RSA Public-Key Encryption Algorithm
Presentation transcript:

PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description Security

PUBLIC-KEY CRYPTOGRAPHY (PKC) – A New Idea Historically – Symmetric-Key (one key) substitution (confusion) permutation (diffusion) More Recently – Asymmetric-Key (two keys)

MISCONCEPTIONS PKC vs Symmetric Encryption PKC more secure than symmetric encryp. WRONG!! PKC more useful than symmetric encryp. WRONG!! – PKC costly PKC doesn’t need complicated protocol WRONG!!

PKC - USES Key Management Signature

Plaintext – input to encryp. algorithm output from decryp. algorithm PKC – SIX INGREDIENTS Plaintext – input to encryp. algorithm output from decryp. algorithm Encryp. Algorithm – acts on plaintext - controlled by public or private key Public and Private Key - one for encryption - one for decryption Ciphertext – output from encryp. algorithm input to decryp. algorithm Decryp. Algorithm – acts on ciphertext

Each user generates two related keys - PUBLIC and PRIVATE PKC – STEPS Each user generates two related keys - PUBLIC and PRIVATE 2. Each user makes: public key  PUBLIC private key  PRIVATE access  ALL public keys 3. BOB: Encr(plaintext,PUBLICAlice) ciphertext ALICE 4. ALICE: Decr(ciphertext,PRIVATEAlice)

PKC for a) ENCRYPTION b) AUTHENTICATION

KEYS EASILY UPDATED ANY Private/Public key pair can be changed. At ANY TIME, ANY Private/Public key pair can be changed. Public key should be made public IMMEDIATELY

Asymmetric-Key (PKC): One PRIVATE KEY One PUBLIC KEY CIPHER TERMINOLOGY Symmetric-Key: One SECRET KEY Asymmetric-Key (PKC): One PRIVATE KEY One PUBLIC KEY

CONFIDENTIALITY

AUTHENTICATION (source) (Integrity/Signature)

CONFIDENTIALITY and AUTHENTICATION

APPLICATIONS OF PKC Encryp./Decryp. Sender encrypts with RECIPIENT’S PUBLIC key. Applied to ALL of message. Digital Signature Sender signs with SENDER’S PRIVATE key. Applied to ALL or PART of message. Key Exchange Uses one or more PRIVATE keys. Several approaches

APPLICATIONS OF PKC Table 9.2

ONE-WAY FUNCTION Every value has an inverse Y = F(X)  X = F-1(Y) Y = F(X) - easy X = F-1(Y) - infeasible easy – polynomial time (poly in message length) infeasible - > poly time (e.g. exp. in message length)

TRAP-DOOR ONE-WAY FUNCTION (e.g. PKC) Y = fk(X) - easy if k and X known X = fk-1(Y) - easy if k and Y known X = fk-1(Y) - infeasible if only Y known

PKC – THE PROBLEM OF KEY SIZE Brute-Force Attack  Use LARGE keys But, PKC COMPLEXITY GROWS fast with key size So, PKC TOO COMPLEX encryp/decryp PKC only for key management and signature

RSA ALGORITHM PKC: 1960’s (NSA) 1970 Ellis – CESG 1976 Diffie and Hellman RSA: 1973 Cocks – CESG 1977 Rivest, Shamir, Adleman - MIT

RSA Plaintext and Ciphertext integers between 0 and n-1 i.e. k bits, 2k < n <2k+1 Encryption: C = Me mod n Decryption: M = Cd mod n = (Me)d mod n = Med mod n

RSA (continued) Receiver knows n,d  PUBLIC key, KU = {e,n} Sender knows n,e Receiver knows n,d  PUBLIC key, KU = {e,n}  PRIVATE key, KR = {d}

PKC REQUIREMENTS OF RSA 1. There exists e,d,n s.t. Med = M mod n 2. Easy to calculate Me and Cd given {M,e} or {C,d}, resp. 3. Infeasible to find d given {e,n}

EXAMPLE p = 17, q = 11 n = p.q = 187 mod p = 17, {1,6,62,63,64,65,66,67,68,69,610,611,612,613,614,615} = {1,6,2,12,4,7,8,14,16,11,15,5,13,10,9,3} Mod p = 11 {1,2,4,8,5,10,9,7,3,6}

EXAMPLE 57 = (6,2), 572 = (2,4), 573 = (12,8), 574 = (4,5)

EXAMPLE Chinese Remainder Theorem We want number, g, between 1 and 186 s.t. g mod 17 = 6, g mod 11 = 2 Use CRT: g = 154.6 + 34.2 mod 187 = 57

EXAMPLE RSA COMPUTATION

SECURITY OF RSA Brute-Force Attacks – try all possible private keys. Mathematical Attacks - all equivalent to factoring n. Timing Attacks - depend on running time of decryption algorithm.

Progress in Factorisation Table 9.3

MIPS-years NEEDED TO FACTOR

TIMING ATTACKS ON RSA - countermeasures For Decryption: Constant exponentiation time Random delay Blinding Generate random r C’ = Cre M’ = C’d M = M’r-1