Abdullah Sheneamer CS591-F2010 Project of semester Presentation University of Colorado, Colorado Springs Dr. Edward RSA Problem and Inside PK Cryptography.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Chapter 9
Advertisements

Public Key Encryption Algorithm
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography and Network Security Chapter 9. Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Chapter 3 Encryption Algorithms & Systems (Part C)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Public Key Algorithms 4/17/2017 M. Chatterjee.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Network Security Chapter 9 5th Edition by William Stallings Lecture slides by Lawrie Brown.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
The RSA Algorithm JooSeok Song Tue.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
RSA Numbers by: Brandon Hacay & Conrad Allen. History of RSA Numbers The letters in “RSA” are simply the initials of the people who are credited as having.
RSA Encryption & Cryptography
Prime Numbers Prime numbers only have divisors of 1 and self
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
RSA and its Mathematics Behind
RSA Ramki Thurimella.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Public-Key Encryption
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Presented by Katherine Heller COSC 4765 University of Wyoming April 26, 2011 Image source: PC Dynamics, Inc.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Cryptography and Network Security Public Key Cryptography and RSA.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
RSA The algorithm was publicly described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Partly used for PGP (Pretty Good Privacy) to encrypt.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
James C. Bradas, Ph.D. Engineering & Analysis Operation 18 June 2009 Public Key Encryption.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
UNIVERSITY OF BIELSKO- BIALA AKADEMIA TECHNICZNO-HUMANISTYCZNA Faculty of Mechanical Engineering and Computer Science.
Cryptography and Network Security Chapter 9 Fourth Edition by William Stallings.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Public Key Cryptosystem In Symmetric or Private Key cryptosystems the encryption and decryption keys are either the same or can be easily found from each.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Public Key Cryptography
Public Key Encryption.
Private-Key Cryptography
Introduction to Cryptography
Presentation transcript:

Abdullah Sheneamer CS591-F2010 Project of semester Presentation University of Colorado, Colorado Springs Dr. Edward RSA Problem and Inside PK Cryptography

ROAD MAP Introduction. History. Factorization attacks on RSA. low public & private exponent RSA. Recovering the private key. Modular/Clock Arithmetic. Euler’s Totient function. Conclusion. 12/08/2010 Abdullah Sheneamer 2

Introduction RSA algorithm is used for both public key encryption and digital signature. RSA’s keys have length is 1024-bits. The goal of this paper shows RSA problem, the attacking the RSA and demonstrating some mathematical tools they use. And show some PK algorithms. The RSA problem is that when given public key (n,e) and C=M^e (mod n) then compute M. 12/08/2010 Abdullah Sheneamer 3

4

History In 1976, Stanford: Diffie, Hellman, and Merkle independently invent (and make public) a secret-key generation algorithm. In1977, MIT: Rivest, Shamir, and Adleman, based on difficulty of factoring large primes. In1978, Stanford: Merkle-Hellman public-key cryptosystem, based on knapsack (broken by Adi Shamir in 1982). 12/08/2010 Abdullah Sheneamer 5

Factorization attacks on RSA Factoring is splitting an integer into a set of smaller integers which, when multiplied together form the original integer. The problem: for example, 2*7 = 14. The factoring problem is to find 2 and 7 when given 14. Prime factorization requires splitting an integer into factors that are prime numbers. This problem in factoring that an RSA modulus would allow an attacker to figure out the private key from the public key. 12/08/2010 Abdullah Sheneamer 6

Factorization attacks on RSA 12/08/2010 Abdullah Sheneamer The solution: choose two large primes with a larger modulus for becoming a larger and so, the attacker needs more time to figure it out. Tow primes should be one is much smaller than other. If the two primes are extremely close or their difference is close to any predetermined amount, then there is a potential security risk, but the probability that two randomly chosen primes are so close is negligible. 7

Improvement of factoring capability Factoring has become easier last years. Why? * computer hardware became more powerful. * Computers became plentiful and inexpensive. Hardware improvement that allows an attacker to factor a number two digits longer than before. It can be solved by Quantum computing. 12/08/2010 Abdullah Sheneamer 8

low public & private exponent RSA The public exponent e is chosen to be a small value. Why? * Because using a small public exponent makes the public key encryption and public key signature verification faster and more efficient There are many RSA systems use e=3. but there is vulnerability with this attack. If the same message is encrypted 3 times with different keys (that is same exponent, different modulo) then we can retrieve the message. 12/08/2010 Abdullah Sheneamer 9

low public & private exponent RSA 12/08/2010 Abdullah Sheneamer The low private exponent RSA is not secure. The low private exponent RSA is not secure. Why? because when low exponent is used and a single message is encrypted by the sender directed for several recipients who have different public keys. 10

Recovering the private key If the attacker has computed the private key (n,d) from public key (n,e). The computing d could be solved by the attacker. The attacker could recover the private key if d is less than 160 bits. If the RSA parameters were chosen large enough, then the attacker can not solve the RSA problem. 12/08/2010 Abdullah Sheneamer 11

Modular or Clock Arithmetic What’s the Modular or Clock Arithmetic? 2:00 and 14:00 hours are the same. 2 º14 (mod 12) a º b (mod n) n is the modulus a is “congruent” to b, modulo n a - b is divisible by n a % n = b % n then: a º b (mod n), c º d (mod n) 12/08/2010 Abdullah Sheneamer 12

Euler’s Totient function What’s Euler’s Totient function? Why is the totient function important ? Its function is : For exmple: Then the these coprime of 36: 1, 5, 7, 11, 13, 17, 19, 23, 25, 29, 31, and /08/2010 Abdullah Sheneamer 13

Conclusion RSA problem is hard to solve when the modulous n is sufficiently large and randomly generated. The RSA problem is the main or the basis for the security o RSA public key encryption and RSA digital signature schemes. RSA problem for very small exponents would be easier than integer factoring. 12/08/2010 Abdullah Sheneamer 14

Some of References RSA Problem: Ronald L. Rivest, MIT Laboratory for Computer Science and Burt Kaliski, RSA Laboritories Dec 10, 2003 D. Boneh and R. Venkatesan. Breaking RSA may not be equivalent to factoring. In K. Nyberg, editor, Proc. EUROCRYPT ’98, pages 59–71. Springer, Dan Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, 46(2):203–213, /08/2010 Abdullah Sheneamer 15

Question ? 12/08/2010 Abdullah Sheneamer 16