The RSA Public-Key Encryption Algorithm

Slides:



Advertisements
Similar presentations
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Advertisements

Public Key Encryption Algorithm
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Public Encryption: RSA
Cryptography and Network Security Chapter 9. Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Cryptography and Network Security Chapter 9 5th Edition by William Stallings Lecture slides by Lawrie Brown.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Introduction to Public Key Cryptography
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Chapter 12 Cryptography (slides edited by Erin Chambers)
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Public Key Cryptography and RSA” Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 11/9/2009 INCS 741: Cryptography 11/9/20091Dr. Monther.
Public-Key Encryption
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
RSA Prepared by: SITI ZAINAH ADNAN
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Cryptography & Network Security : Topic Seminar Description & Analysis Madhava.N 1RV06SCN05 2 nd Semester M.Tech CNE RVCE RSA ALGORITHM.
Cryptography and Network Security Public Key Cryptography and RSA.
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Fall 2002CS 395: Computer Security1 Chapter 9: Public Key Cryptography.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Public Key Cryptography
CS480 Cryptography and Information Security
Public Key Encryption.
Visit for more Learning Resources
1. Public Key Encryption (A Simple Case)
Lecture 5 RSA DR. Nermin Hamza.
MA/CSSE 473 Day 10 Data Encryption RSA.
RSA A public Key Algorithm.
The RSA Algorithm JooSeok Song Tue.
Chap 6: Security and Protection
Private-Key Cryptography
Number Theory and Euclidean Algorithm
PART VII Security.
Rivest, Shamir and Adleman
The RSA Algorithm JooSeok Song Tue.
RSA A public Key Algorthim.
Analysis of the RSA Encryption Algorithm
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Introduction to Cryptography
Stream Cipher Structure
Diffie-Hellman Algorithm
Presentation transcript:

The RSA Public-Key Encryption Algorithm Network Security

The RSA Public-Key Encryption Algorithm Objectives of the Topic After completing this topic, a student will be able to explain working of the RSA Public-Key encryption algorithm.

The RSA Public-Key Encryption Algorithm Figures and material in this topic have been adapted from “Network Security Essentials : Applications and Standards”, 2014, by William Stallings.

The RSA Public-Key Encryption Algorithm RSA is the best known, and widely used general public key encryption scheme. It was first published by Rivest, Shamir & Adleman of MIT in 1978.

The RSA Public-Key Encryption Algorithm The RSA scheme is a cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n. A typical size for n is 1024 bits, or 309 decimal digits. That is, n is less than 21024.

The RSA Public-Key Encryption Algorithm RSA is based on exponentiation in a finite (Galois) field over integers modulo a prime. Security due to cost of factoring large numbers.

The RSA Public-Key Encryption Algorithm Description Plaintext is encrypted in blocks, with each block having a binary value less than some number n. The block size must be less than or equal to log2(n) + 1; in practice, the block size is i bits, where 2i < n ≤2i+1.

The RSA Public-Key Encryption Algorithm Encryption and decryption are of the following form, for some plaintext block M and ciphertext block C. C = Me mod n M = Cd mod n = (Me)d mod n = Med mod n

The RSA Public-Key Encryption Algorithm Both sender and receiver must know the value of n. The sender knows the value of e, and only the receiver knows the value of d.

The RSA Public-Key Encryption Algorithm Here, the public key of PU = {e, n} and the private key of PR = {d, n}. For this algorithm to be satisfactory for public-key encryption, following requirements must be met:

The RSA Public-Key Encryption Algorithm 1. It is possible to find values of e, d, and n such that Med mod n = M for all M < n. 2. It is relatively easy to calculate Me mod n and Cd mod n for all values of M < n. 3. It is infeasible to determine d given e and n.

The RSA Public-Key Encryption Algorithm Summary

The RSA Public-Key Encryption Algorithm Example Key Generation 1. Select two prime numbers, p= 17 and q= 11. 2. Calculate n = pq = 17 × 11 = 187. 3. Calculate ⱷ(n) = (p-1)(q-1)= 16 × 10 =160.

The RSA Public-Key Encryption Algorithm 4. Select e such that e is relatively prime to ⱷ(n) = 160 and less than ⱷ(n); we choose e=7. 5. Determine d such that de mod 160 =1 and d < 160.The correct value is d=23, because 23 × 7=161= (1 × 160)+1.

The RSA Public-Key Encryption Algorithm The resulting keys are public key PU={7, 187} and private key PR= {23, 187}. Encryption Lets use these keys for a plaintext input of M = 88. Here, we need to calculate C= 887 mod 187.

The RSA Public-Key Encryption Algorithm Decryption We need to calculate M = 1123 mod 187 Above expressions can be evaluated by exploiting the properties of modular arithmetic.

The RSA Public-Key Encryption Algorithm The Security of RSA There are two possible approaches to defeating the RSA algorithm. The first is the brute-force approach: Try all possible private keys.

The RSA Public-Key Encryption Algorithm Thus, the larger the number of bits in e and d, the more secure the algorithm. However, because the calculations involved are complex, the larger the size of the key, the slower the system will run.

The RSA Public-Key Encryption Algorithm Most discussions of the cryptanalysis of RSA have focused on the task of factoring n into its two prime factors. For a large n with large prime factors, factoring is a hard problem.

The RSA Public-Key Encryption Algorithm A large key size such as a 1024-bit key size (about 300 decimal digits) is considered strong enough for virtually all applications. End