RSA By: Abhishek Naik Viswanath Chennuru CPSC 624.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Public Key Encryption Algorithm
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Public Encryption: RSA
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
RSA Encryption Caitlin O’Dwyer. What is an RSA Number? An RSA number n is a number s.t. n=pq Where p and q are distinct, large, prime integers.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
RSA Numbers by: Brandon Hacay & Conrad Allen. History of RSA Numbers The letters in “RSA” are simply the initials of the people who are credited as having.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Prime Numbers Prime numbers only have divisors of 1 and self
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
CS110: Computers and the Internet Encryption and Certificates.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
RSA Ramki Thurimella.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Encryption Coursepak little bit in chap 10 of reed.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Darci Miyashiro Math 480 April 29, 2013
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
RSA The algorithm was publicly described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Partly used for PGP (Pretty Good Privacy) to encrypt.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
Encryption CS110: Computer Science and the Internet.
UNIVERSITY OF BIELSKO- BIALA AKADEMIA TECHNICZNO-HUMANISTYCZNA Faculty of Mechanical Engineering and Computer Science.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
Lecture 6. RSA Use in Encryption to encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = M e mod n, where 0≤M
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public-key Cryptography
Introduction to Cryptography
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

RSA By: Abhishek Naik Viswanath Chennuru CPSC 624

C ONTENTS What is Encryption ? What is RSA ? Key Generation Encryption and Decryption Applications Attacks on RSA Conclusion

W HAT IS ENCRYPTION ? Transforming Plaintext using a Cipher such that only person with the key can read the information. Two types of Encryption are: Symmetric and Public key

W HY PUBLIC KEY ENCRYPTION ? Two different keys for encryption and decryption(public and private) No secret key exchange is necessary Anyone can encrypt using receivers public key but only he can decrypt

W HAT IS PUBLIC KEY ENCRYPTION ?

W HAT IS RSA? Named after Ron Rivest, Adi Shamir and Leonard Adleman, the inventors. Is a Public Key Algorithm first described in 1978 Based on the presumed difficulty of factoring large integers Used for Encryption and Authentication

S TEPS IN RSA Key generation Encryption Transmitting Decryption

K EY GENERATION IN RSA Two distinct prime numbers are chosen, p and q Compute n = pq. n is used as modulus for both private and public key Compute φ(n) = (p – 1)(q – 1), where φ is Euler's totient function.

K EY GENERATION IN RSA

E NCRYPTION AND DECRYPTION Encryption: To encrypt the plain text M using the public key (e, n), represent the message as an integer value between 0 and n – 1. This can be done by breaking the message into blocks and assigning values to it After the message is obtained in the necessary numeric format, it can be encrypted by raising it to the 2 e’th power modulo of n The resulting cipher text of the encryption will be integer values ranging between 0 and n – 1.

E NCRYPTION AND DECRYPTION Decryption: When the receiver gets the cipher text (C), it is decrypted using the private key (d, n). The cipher text is raised to another power d and then modulo n which gives back the plain text.

APPLICATIONS RSA is used in security protocols such as: IPSEC/IKE - IP data security TLS/SSL - transport data security (web) PGP - security SSH - terminal connection security SILC - conferencing service security

A PPLICATIONS Digital Signature: To verify the origin of the document and identity of the sender Based on both the document and the signer's private key Sender encrypts the message with the public key of the intended recipient Then encrypts the "digital fingerprint" of the document with his or her own private key Anyone with access to the public key of the signer may verify the signature

A TTACKS ON RSA Searching the Message Space If the message space is small, then one could simply try to encrypt every possible message block, until a match is found with one of the ciphertext blocks. Guessing d Known ciphertext attack. The attacker know both the private and public key. They then try to crack the key to discover the private exponent d. Cycle Attack Encrypt the ciphertext repeatedly and count the iterations, continue till the original text is found

A TTACKS ON RSA Common Modulus A weakness where users within an organization share a public modulus. Eavesdropping is easier Faulty Encryption During exchange of public keys, man in middle changes specific bits in the public key Low Exponent Based on Chinese Remainder Theorem, where if same message is encrypted 3 times with different types of moduli, we can retrieve the message

C ONCLUSION RSA has many advantages over symmetric key encryption, but it is considerably slower RSA Security claims that 1024 bit keys suffice for the current period and 2048 keys can be adopted in future After 2030, 3072-bit keys should be used

T HANK Y OU !