Darci Miyashiro Math 480 April 29, 2013

Slides:



Advertisements
Similar presentations
CS555Spring 2012/Topic 171 Cryptography CS 555 Topic 17: Textbook RSA encryption.
Advertisements

IS 302: Information Security and Trust Week 4: Asymmetric Encryption
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Asymmetric-Key Cryptography
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Public Key Encryption Algorithm
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Public Key Cryptography
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
RSA Encryption Caitlin O’Dwyer. What is an RSA Number? An RSA number n is a number s.t. n=pq Where p and q are distinct, large, prime integers.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Codes, Ciphers, and Cryptography-RSA Encryption
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Rachana Y. Patil 1 1.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
RSA Ramki Thurimella.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
What is RSA RSA is a system employed to create the encrypted message in which the key used for encryption is different from that used to decrypt. It is.
Public Key (RSA) Day 27. Objective Students will be able to… …understand how RSA is used for encryption and decryption. …understand some of the challenges.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
RSA Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013.
CSC 386 – Computer Security Scott Heggen. Agenda Exploring that locked box thing from Friday?
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
Encryption.
Cryptography & Network Security : Topic Seminar Description & Analysis Madhava.N 1RV06SCN05 2 nd Semester M.Tech CNE RVCE RSA ALGORITHM.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
Public Key Cryptosystem In Symmetric or Private Key cryptosystems the encryption and decryption keys are either the same or can be easily found from each.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Public Key Cryptography
CS480 Cryptography and Information Security
Public Key Encryption.
Public Key Cryptosystem
Asymmetric-Key Cryptography
Real-world Security of Public Key Crypto
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
Introduction to Algorithms Second Edition by
Presentation transcript:

Darci Miyashiro Math 480 April 29, 2013 RSA Encryption Darci Miyashiro Math 480 April 29, 2013

What is Cryptography? Keeping info. secure from unintended audiences Secure electronic transactions, wireless communications, passwords, etc. Encryption: plaintext ciphertext Decryption: ciphertext plaintext Key-based encryption: Secret Public The art and science of keeping info. secure from unintended audiences Use a key to: Encrypt: UNREADABLE data to READABLE code Decrypt: READABLE code to UNREADABLE data

Secret Key (Symmetric) Public Key (Asymmetric) 1 Key = encrypt & decrypt Advantage: Fast Disadvantage: Not safe Two separate keys 1 public key to encrypt 1 private key to decrypt Traditional cryptography Imagine a bank having to hand out different keys to each customer. It would be difficult to manage because we would have to exchange a single key between receiver and sender To solve key management problem the concept of public key cryptography introduced Need for sender & receiver to share “secret key” is eliminated Anyone can use public key, but only sole possession of private key can encrypt

Alice Bob Message: Hello Message: 13472 Message: Hello Decryption Key Note: Both Alice and bob have access to encryption key (in fact, everyone in the world has access to encryption key), but only Alice has possession of decryption key Encryption key Alice Bob

RSA Encryption Rivest, Ron Shamir, Adi Adleman, Leonard Most commonly used cryptosystem “Trap door function” In 1977 Rivest, Shamir, & Adleman from MIT published one of the first public key encryption system Trap door function is a one-way function which is easy to compute in one direction, but difficult to compute in the opposite direction The only way to eliminate difficulty is if you have secret key called the trap door Easy Hard Trap Door Easy

Prime Numbers Given two large prime numbers, p and q, we already know: Simple: Find product N, where N= p*q Difficult: Factor N, when p and q are unknown Mutliplication can be considered as one way functions RSA encryption relies on the fact that prime factorization is computationally very hard. 439 * 541 = Easy 237499 283 * 719 203477 Hard =

Generating Keys Let n = p* q Choose e such that gcd(e, Φ(n))=1 Public Key Private Key Let n = p* q Choose e such that gcd(e, Φ(n))=1 Choose two large prime integers p,q Find Φ(n)=Φ(pq) =Φ(p)*Φ(q)= (p-1)(q-1) Find d such that d is multiplicative inverse of e(modΦ(n)) de ≣ 1(mod Φ(n))

Encryption Function: Decryption Function: M = Plaintext C = Ciphertext p,q = prime #’s n = p*q e: gcd(e, Φ(n))=1 d: de ≣ 1(mod Φ(n)) Encryption Function: Decryption Function:

Example Message: “Hi” = 89 p = 11 q = 13 n = 11 * 13 = 143 Φ(143) = (11 – 1)(13 – 1) = 120 Set e = 7 d = 103

Hi 89 67 Hi 67 Hi = 89 89 = Hi Bob Alice p = 11 p = 13 Public Key n = 143 e = 7 Secret Key p = 11 p = 13 Φ(n) = 120 d = 103 Hi = 89 89 = Hi 89 Hi 67 Hi 67 Bob Alice

Conclusion Security relies on difficulty of factoring large #’s Simple idea -> Sophisticated algorithm Standard public key = 1024 bits…that’s 309 digits! RSA-1024: 135066410865995223349603216278805969938881475605667027524485143851526510604859533833940287150571909441798207282164471551373680419703964191743046496589274256239341020864383202110372958725762358509643110564073501508187510676594629205563685529475213500852879416377328533906109750544334999811150056977236890927563