POON TENG HIN.  RSA  Shamir’s Three-Pass Protocol  Other issues.

Slides:



Advertisements
Similar presentations
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Advertisements

CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Public Key Encryption Algorithm
hap8.html#chap8ex5.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Public Key Cryptography
Public Encryption: RSA
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
RSA Encryption William Lu. RSA Background  Basic technique first discovered in 1973 by Clifford Cocks of CESG (part of British GCHQ)  Invented in 1977.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Codes, Ciphers, and Cryptography-RSA Encryption
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
RSA and its Mathematics Behind
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
RSA By: Abhishek Naik Viswanath Chennuru CPSC 624.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Midterm Review Cryptography & Network Security
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
A Method for Obtaining Digital Signatures and Public-key Cryptosystems
Darci Miyashiro Math 480 April 29, 2013
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
What is RSA RSA is a system employed to create the encrypted message in which the key used for encryption is different from that used to decrypt. It is.
Public Key (RSA) Day 27. Objective Students will be able to… …understand how RSA is used for encryption and decryption. …understand some of the challenges.
RSA Prepared by: SITI ZAINAH ADNAN
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Cryptography & Network Security : Topic Seminar Description & Analysis Madhava.N 1RV06SCN05 2 nd Semester M.Tech CNE RVCE RSA ALGORITHM.
1 Network and Computer Security (CS 475) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
RSA The algorithm was publicly described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Partly used for PGP (Pretty Good Privacy) to encrypt.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
CS Modular Division and RSA1 RSA Public Key Encryption To do RSA we need fast Modular Exponentiation and Primality generation which we have shown.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
Information and Computer Security CPIS 312 Lab 8 1 Asymmetric Key Algorithms RSA Algorithm TRIGUI Mohamed Salim.
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Public Key Cryptography
Public Key Encryption.
Public Key Cryptosystem
RSA Slides by Kent Seamons and Tim van der Horst
Analysis of the RSA Encryption Algorithm
Presentation transcript:

POON TENG HIN

 RSA  Shamir’s Three-Pass Protocol  Other issues

 The locks in computer network  1-1 mapping function f so that c = f(m)

 The keys in computer network so that f -1 (c) = f -1 (f(m)) = (f -1 f)(m) = m

 Function  Modulo Operation  Greatest Common Divisor  Multiplicative Inverse  Number theory  Prime number

 (x × y) mod n = 1. The integer y is called a multiplicative inverse of x, usually denoted x−1 (it is unique if it exists).

People keep finding large prime numbers for computer Security. How the prime number are used?

 RSA is an algorithm for public-key cryptography  By Ron Rivest, Adi Shamir, Leonard Adleman

 Because of security, high strength  Encryption  Digital signatures  E.g electronic transactions,  software certification.

 Encryption: C = M e mod n  Decryption: M = C d mod n

 ABCDEFGHIJKLMNOPQRSTUVWXYZ  1234…………………………………26  Public key: n = 35, e = 5 C = M e mod n  Private key: d = 5 M = C d mod n  My word:  “ ”  “ ”  Also, try to give me your words

 p, q, (n) must be kept secret.  It is believed that determine (n) given n is equivalent to factoring n.  With presently known algorithms, determining d given e and n, appears to be at least as time-consuming as the factoring problem.  So use factoring as the benchmark for security evaluation.

 /HW/ASCII.html /HW/ASCII.html  A website of ASCII code

Plaintext: M ( M = {0,1}*) Cipher text: C (C = {0,1}*) It needs two distinct primes p and q Φ(n) = (p-1)(q-1) select an integer e such that gcd(e, Φ(n) ) = 1 Where n = pq, n>M Compute the d where ed = 1 (mod Φ(n)) Public key: (e,n) Private key: d

 Randomly choose p and q And n = p X q A sample n from RSA-576:

 gcd(e, Φ(n) ) = 1 and e > 1   A table to find e and d:

 Φ(n) is the number of positive integers less than n that is relative prime to n  Example Φ(6) :  the GCD(x,6) = 1 when x = 1,5 so Φ(6) = 2

Φ(p) = p-1 for any prime number p Φ(pq) = (p-1)(q-1) for any two distinct primes p and q

Euler’s: For every integer a and n that are relatively prime, a Φ(n) mod n = 1 Fermat’s : If n = p is prime, a p-1 mod p = 1

 ed = 1 (mod Φ(n)) or d = e -1 mod n  Such that ex + Φ(n) y = 1 and d is the value of x  One of the method is Euclidean algorithm

Fo example Φ(n) =20, e =3 Firstly, gcd(20,3) = 1 if the inverse exists. We use Euclidean algorithm: 20 = 3 x = 2 x = 3 – 1X2 = 3 – 1 X (20 – 6 X 3) = -1 X X 3 (ex + ny = 1) so d = 7

 66 = 1 × gcd(35, 31)  35 = 1 × gcd(31, 4)  31 = 7 × gcd(4, 3)  4 = 1 × gcd(3, 1)  3 = 3 × gcd(1, 0)  So,  gcd(66, 35) = gcd(35, 31) = gcd(31, 4) = gcd(4, 3) = gcd(3, 1) = gcd(1, 0) = 1.

 Encryption: C = M e mod n  Decryption: M = C d mod n Needs two distinct primes p and q And Φ(n) = (p-1)(q-1) select an integer e such that gcd(e, Φ(n) ) = 1 Where n = pq, n>M Compute the d where ed = 1 (mod Φ(n)) Public key: (e,n) Private key: d

 students.stanford.edu/~tjw/jsbn/rsa2.html students.stanford.edu/~tjw/jsbn/rsa2.html  /HW/RSAWorksheet.html /HW/RSAWorksheet.html

 1.A lock the box by his lock A  2.A  B (Box with lock A)  3.B lock the box by his lock B  4.B  A (Box with lock A & B)  5.A unlock his lock A  6.A  B (Box with lock B)  7. B unlock his lock B ~  ~finish~

 This is the protocol similar to the answer of the IQ question  This is different to RSA In this protocol, we need a prime p which is a public knowledge.

 A selects a random number a with gcd(a, p-1) = 1  B selects a random number b with gcd(b,p-1) = 1 a -1 and b -1 are the inverse of a and b of mod p-1

 A computes k 1 = k a mod p and send k 1 to B  B computes k 2 = k 1 b mod p and send k 2 to A  A computes k 3 = k 2 a-1 mod p and send k 3 to B  Finally, B computes k = k 3 b-1 mod p and get k.

 Q1.Using slide 13, what is the message under:  “ ”  “ ”  “”4 24  “ ”  Q2. Find d if Φ(n) = 58, e = 27 (use Euclidean algorithm)

 Others issues I would like to share.  I suggest you may think about them.

 Computer and Communications Security COMP364  By Prof. Cunsheng Ding

 People like math will like this game.

 Encryption: c = Ek(m), where Ek is usually applied to blocks of the plaintext m.  Decryption: m = Dk(c), where Dk is usually applied to blocks or characters of the ciphertext c.

 Example: Let d = 4 and define f by  i :  f(i) :  Then f is a permutation of Z 4.  The inverse permutation f−1 is given by  i :  f -1 (i) :

 E.g

A B C 1| plan1 plan3 plan2 2| plan2 plan1 plan3 3| plan3 plan2 plan1 Conclusion: Most people think that: plan1 is better than plan2 plan2 is better than plan3 plan3 is better than plan1

 ByeBye