Rachana Y. Patil 1 1.

Slides:



Advertisements
Similar presentations
Asymmetric-Key Cryptography
Advertisements

Public Key Encryption Algorithm
7. Asymmetric encryption-
Public Key Algorithms …….. RAIT M. Chatterjee.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Pass in HW6 now Can use up to 2 late days Can use up to 2 late days But one incentive not to burn them all: teams will get to pick their presentation day.
Public Key Cryptography
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Introduction to Public Key Cryptography
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Chapter 13 Digital Signature
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Encryption Coursepak little bit in chap 10 of reed.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Asymmetric-Key Cryptography.
Darci Miyashiro Math 480 April 29, 2013
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
Cryptography and Network Security Public Key Cryptography and RSA.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
CPIS 312 Chapter Four: PUBLIC KEY CRYPTO. Index 2 A.Introduction A.1 Asymmetric Key Cryptography- Introduction A.2 General ideas about the Public Key.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
CS480 Cryptography and Information Security
Asymmetric-Key Cryptography
Public Key Cryptosystem
Symmetric-Key Cryptography
NET 311 Information Security
NET 311 Information Security
Chapter 13 Digital Signature
Chapter 29 Cryptography and Network Security
Symmetric-Key Cryptography
Presentation transcript:

Rachana Y. Patil 1 1

Symmetric-key cryptography is based on sharing secrecy; Symmetric and asymmetric-key cryptography will exist in parallel and continue to serve the community. We actually believe that they are complements of each other; the advantages of one can compensate for the disadvantages of the other. Symmetric-key cryptography is based on sharing secrecy; asymmetric-key cryptography is based on personal secrecy. 10.2 2

Asymmetric key cryptography uses two separate keys: one private and one public. Locking and unlocking in asymmetric-key cryptosystem 10.3 3

General idea of asymmetric-key cryptosystem 10.4 4

C = f (Kpublic , P) P = g(Kprivate , C) Plaintext/Ciphertext Unlike in symmetric-key cryptography, plaintext and ciphertext are treated as integers in asymmetric-key cryptography. Encryption/Decryption C = f (Kpublic , P) P = g(Kprivate , C) 10.5 5

RSA CRYPTOSYSTEM The most common public-key algorithm is the RSA cryptosystem, named for its inventors (Rivest, Shamir, and Adleman). 07/20/10

RSA CRYPTOSYSTEM

Procedure Encryption, decryption, and key generation in RSA

RSA Algorithm

Encryption

Decryption

Example Bob chooses 7 and 11 as p and q and calculates n = 77. The value of f(n) = (7 − 1)(11 − 1) or 60. Now he chooses two exponents, e and d, from Z60∗. If he chooses e to be 13, then d is 37. Note that e × d mod 60 = 1 (they are inverses of each Now imagine that Alice wants to send the plaintext 5 to Bob. She uses the public exponent 13 to encrypt 5. Bob receives the ciphertext 26 and uses the private key 37 to decipher the ciphertext:

Example Now assume that another person, John, wants to send a message to Bob. John can use the same public key announced by Bob (probably on his website), 13; John’s plaintext is 63. John calculates the following: Bob receives the ciphertext 28 and uses his private key 37 to decipher the ciphertext:

n=221 e=5 find d p=19 q=23 e=3 find Ø(n) and d e=17 n=187 find d Example n=221 e=5 find d p=19 q=23 e=3 find Ø(n) and d e=17 n=187 find d n=19519 e=17 find d 07/20/10

Attacks on RSA

ELGAMAL CRYPTOSYSTEM

Key Generation

Encryption

Decryption

Bob chooses p = 11 and e1 = 2. and d = 3 e2 = e1d = 8 Bob chooses p = 11 and e1 = 2. and d = 3 e2 = e1d = 8. So the public keys are (2, 8, 11) and the private key is 3. Alice chooses r = 4 and calculates C1 and C2 for the plaintext 7. Bob receives the ciphertexts (5 and 6) and calculates the plaintext.

In ElGamal,given the prime p=31 Example In ElGamal,given the prime p=31 Choose an appropriate e1 and d,then calculate e2 Encrypt the plaintext message 5 Decrypt the ciphertext to obtain the plaintext 07/20/10

SYMMETRIC-KEY AGREEMENT Alice and Bob can create a session key between themselves. This method of session-key creation is referred to as the symmetric-key agreement.

Diffie-Hellman Key Agreement

Note The symmetric (shared) key in the Diffie-Hellman method is K = gxy mod p.

Example Assume that g = 7 and p = 23. The steps are as follows: Alice chooses x = 3 and calculates R1 = 73 mod 23 = 21. Bob chooses y = 6 and calculates R2 = 76 mod 23 = 4. Alice sends the number 21 to Bob. Bob sends the number 4 to Alice. Alice calculates the symmetric key K = 43 mod 23 = 18. Bob calculates the symmetric key K = 216 mod 23 = 18. The value of K is the same for both Alice and Bob; gxy mod p = 718 mod 35 = 18.

Example Alice and Bob decide to use diffie hellman key exchange protocol To agree upon a common key, they choose p=13 and g=2.Each chooses his own secret number and exchange the numbers 6 and 11. What will be the common secret key they derived? What are their secret numbers? Can intruder M gain any knowledge from the protocol run if he sees P,g and the two public key 6 and 11? If yes show how

Digital Signature The digital signature process. The sender uses a signing algorithm to sign the message. The message and the signature are sent to the receiver. The receiver receives the message and the signature and applies the verifying algorithm to the combination. If the result is true, the message is accepted; otherwise, it is rejected.

The digital signature process.

A digital signature needs a public-key system. Need for Keys Note A digital signature needs a public-key system. The signer signs with her private key; the verifier verifies with the signer’s public key. 13.29 29

the private and public keys of the sender. Note A cryptosystem uses the private and public keys of the receiver: a digital signature uses the private and public keys of the sender. 13.30 30

DIGITAL SIGNATURE SCHEMES Several digital signature schemes have evolved during the last few decades. Some of them have been implemented. 13.31 31

RSA Digital Signature Scheme 13.32 32

In the RSA digital signature scheme, d is private; e and n are public. Key Generation Key generation in the RSA digital signature scheme is exactly the same as key generation in the RSA Note In the RSA digital signature scheme, d is private; e and n are public. 13.33 33

Signing and Verifying RSA digital signature scheme 13.34 34

Example Alice selects n=221 and e=15.Find Private key of Alice. If Alice wants to send message M=11 to Bob. Calculate The Signature and show Bob can Verify the message. 07/20/10

ElGamal Digital Signature Scheme General idea behind the ElGamal digital signature scheme 13.36 36

Key Generation The key generation procedure here is exactly the same as the one used in the cryptosystem. Note In ElGamal digital signature scheme, (e1, e2, p) is Alice’s public key; d is her private key. 13.37 37

Verifying and Signing ElGamal digital signature scheme 13.38 38

Example Bob chooses p=11,e1=2,r=9,d=8 and sign message M=5 using Elgamal digital signature scheme. Calculate s1 and s2 and show how Alice can verify the signature Alice chooses p=23,e1=5,d=3 a random number 9 and sign message M=7 before sending it to bob. Calculate s1 and s2 and show how bob can verify the signature. 07/20/10