Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.

Slides:



Advertisements
Similar presentations
Public Key Cryptosystem
Advertisements

Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Public Key Encryption Algorithm
7. Asymmetric encryption-
Public Key Algorithms …….. RAIT M. Chatterjee.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Pass in HW6 now Can use up to 2 late days Can use up to 2 late days But one incentive not to burn them all: teams will get to pick their presentation day.
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
The Diffie-Hellman Algorithm Riley Lochridge April 11, 2003.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
ASYMMETRIC CIPHERS.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Lecture 6: Public Key Cryptography
Introduction to Public Key Cryptography
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Midterm Review Cryptography & Network Security
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Chapter 21 Public-Key Cryptography and Message Authentication.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Darci Miyashiro Math 480 April 29, 2013
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
Elliptic Curve Cryptography
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Diffie-Hellman Key Exchange Color Mixing Example Rick Stroud 21 September 2015 CSCE 522.
Key Management Network Systems Security Mort Anvari.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
INCS 741: Cryptography Overview and Basic Concepts.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
CS480 Cryptography and Information Security
Basics of Cryptography
Appendix 5: Cryptography p
Presentation transcript:

Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012

Overview Today’s discussion Background: “key” cryptography concepts Diffie-Hellman key exchange Public key infrastructure (PKI) RSA key pair generation

Background A few “key” concepts Encryption: plaintext -> ciphertext Decryption: ciphertext -> plaintext Cryptographic function: mathematical function or algorithm used to encrypt/decrypt Key: parameter for a cryptographic function Symmetric vs. asymmetric keys

So four people walk into a bar… Alice, Bob, Eve, and Mallory Alice and Bob want to speak privately over a public channel Eve is always eavesdropping on Alice and Bob Mallory has malicious plans to interfere with Alice and Bob’s private conversation

Diffie-Hellman key exchange The concept

Diffie-Hellman key exchange The math: discrete logarithm problem

Diffie-Hellman key exchange The math: discrete logarithm in action

Diffie-Hellman key exchange Example using small numbers

RSA key generation The concept Alice generates a pair of keys, publishing one and keeping the other private Anyone may use the published key to encrypt messages intended for Alice Only Alice can decrypt messages encrypted with the public key (unless the private key was compromised somehow) Alice may also use the key pair to prove her identity

RSA key generation The math: factoring problem Computing the product of two prime numbers is easy (23*17 = 391) Factoring the product of two large prime numbers is “hard” Try factoring 123,018,668,453,011,775,513,049,495,838,496,2 72,077,285,356,959,533,479,219,732,245,215,17 2,640,050,726,365,751,874,520,219,978,646,938,995,647,494,277,406,384,592,519,255,732,630, 345,373,154,826,850,791,702,612,214,291,346,1 67,042,921,431,160,222,124,047,927,473,779,40 8,066,535,141,959,745,986,902,143,413

RSA key generation The math: public and private key pair

RSA key generation The math: “exponential” difficulty *Euclid’s or Stein’s algorithm are typically used to compute the GCD.

References Some light reading on the web RSA Laboratories: What is Diffie-Hellman?3.6.1 What is Diffie-Hellman? David A. Carts: A Review of the Diffie-Hellman Algorithm and its Use in Secure Internet Protocols.A Review of the Diffie-Hellman Algorithm and its Use in Secure Internet Protocols RSA Laboratories: What is the RSA Cryptosystem?What is the RSA Cryptosystem? RSA Laboratories: RSA Factoring Challenge.RSA Factoring Challenge BigPrimes.net: Prime Numbers Archive.Prime Numbers Archive