RSA Encryption William Lu. RSA Background  Basic technique first discovered in 1973 by Clifford Cocks of CESG (part of British GCHQ)  Invented in 1977.

Slides:



Advertisements
Similar presentations
CS555Spring 2012/Topic 171 Cryptography CS 555 Topic 17: Textbook RSA encryption.
Advertisements

CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Data encryption with big prime numbers
Public Key Encryption Algorithm
Session 4 Asymmetric ciphers.
Attacks on Digital Signature Algorithm: RSA
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
Public Key Cryptography
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography & Number Theory
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
RSA Encryption Caitlin O’Dwyer. What is an RSA Number? An RSA number n is a number s.t. n=pq Where p and q are distinct, large, prime integers.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Prime Numbers Prime numbers only have divisors of 1 and self
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
RSA Ramki Thurimella.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Midterm Review Cryptography & Network Security
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
A Method for Obtaining Digital Signatures and Public-key Cryptosystems
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
What is RSA RSA is a system employed to create the encrypted message in which the key used for encryption is different from that used to decrypt. It is.
1 Number Theory and Advanced Cryptography 5. Cryptanalysis of RSA Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Public Key (RSA) Day 27. Objective Students will be able to… …understand how RSA is used for encryption and decryption. …understand some of the challenges.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
RSA The algorithm was publicly described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Partly used for PGP (Pretty Good Privacy) to encrypt.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
UNIVERSITY OF BIELSKO- BIALA AKADEMIA TECHNICZNO-HUMANISTYCZNA Faculty of Mechanical Engineering and Computer Science.
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Assignment #3 Solutions January 24, Practical Aspects of Modern Cryptography Problem #1 Use Fermat’s Little Theorem and induction on k to prove.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Copyright © Zeph Grunschlag, RSA Encryption Zeph Grunschlag.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
RSA Slides by Kent Seamons and Tim van der Horst
Public Key Encryption and Digital Signatures
Modular Arithmetic and RSA Encryption
Real-world Security of Public Key Crypto
Rivest, Shamir and Adleman
Analysis of the RSA Encryption Algorithm
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Introduction to Cryptography
Presentation transcript:

RSA Encryption William Lu

RSA Background  Basic technique first discovered in 1973 by Clifford Cocks of CESG (part of British GCHQ)  Invented in 1977 by Ron Rivest, Adi Shamir and Len Adleman

RSA Uses  Public key encryption  Digital signatures

RSA Algorithm  Generate two large random primes, p and q, of approximately the same size –e.g. for 1024 bit encryption, p and q should be about 512 bits each  Compute n = pq and φ = (p-1)(q-1)  Choose e where 1<e<φ such that gcd(e,φ) = 1  Compute d where 1<d<φ such that ed = 1 mod φ

RSA Algorithm  Public key = (e,n)  Private key = (d,n)

Generate Primes  Get a pseudo random number  Use Fermat’s Little Theorem to test for prime –For prime n and any a, a n mod n = a –For composite n and any a, a n mod n ≠ a –BUT –If a n mod n = a, n could be a composite

Generate Primes  Does Fermat’s Little Theorem guarantee primes? –NO!  What is it for? –With enough rounds, n is probably prime –Much faster then testing with all primes < n

Generate Exponents e and d  For public exponent, e, pick any prime –Common choices are 3, 17 and ( )  For secret exponent, d, compute the modular inverse of e mod φ –Use Extended Euclidean Algorithm

Extended Euclidean Algorithm  To find inverse of e mod n: –Find quotient and remainder of n/e at each step –Also carry an auxiliary number u i = u i-2 – u i-1 q i-2 mod n –Initialize u 0 = 0 and u 1 = 1 –For each step use the previous e as the current n and the previous remainder as the current e –Repeat until e = 0 and the auxiliary number is the inverse of e mod n

Extended Euclidean Algorithm nequotientremainderauxiliary Inverse of 5 mod 72

Encryption/Decryption  To encrypt message m –Public key = (e,n) –c = m e mod n  To decrypt cipher c –Private key = (d,n) –m = c d mod n

Encryption/Decryption  Public key = (5,91)  Private key = (29,91)  To encrypt message 17 –c = 17 5 mod 91 –c = 75  To decrypt cipher 75 –m = mod 91 –m = 17

Signature  To sign message m –Private key = (d,n) –[m] = m d mod n  To verify signature –Public key = (e,n) –{m} = m e mod n

References  RSA Algorithm –DI Management Services  Fermat’s Little Theorem –Mathworld  Extended Euclidean Algorithm –Wolfgang Stöcher at Profactor Research –Bill Cherowitzo’s references at the University of Colorado at Denver Ph. D (1983) in mathematics at Columbia University