RSA Encryption © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.

Slides:



Advertisements
Similar presentations
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Advertisements

Digital Signatures. Anononymity and the Internet.
Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r p q p q p q p and q prime.
22C:19 Discrete Structures Integers and Modular Arithmetic
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
Public Key Encryption Algorithm
Shared Secrets Keeping secrets on the web. Encryption Goal : hidden in plain sight.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
COMP 170 L2 Page 1 Part 2 of Course Chapter 2 of Textbook.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Chapter 3 Encryption Algorithms & Systems (Part B)
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
ASYMMETRIC CIPHERS.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
Introduction to Modular Arithmetic and Public Key Cryptography.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
RSA and its Mathematics Behind
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Systems of Equations as Matrices and Hill Cipher.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Midterm Review Cryptography & Network Security
Implementing RSA Encryption in Java
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Operators in Python. Arithmetic operators Some operators in Python will look familiar (+, -, *, /) Others are new to you (%, //, **) All of these do work.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Presented by Katherine Heller COSC 4765 University of Wyoming April 26, 2011 Image source: PC Dynamics, Inc.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
MAT 1000 Mathematics in Today's World Winter 2015.
James C. Bradas, Ph.D. Engineering & Analysis Operation 18 June 2009 Public Key Encryption.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Internet Engineering Czesław Smutnicki Discrete Mathematics – Numbers Theory.
Addition Multiplication Subtraction Division. 1.If the signs are the same, add the numbers and keep the same sign = = If the.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Maths Methods for Addition, Subtraction, Multiplication and Division for Year 5 and 6.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
Digital Signatures.
#2.5 Long Division.
Strategies Number – addition, subtraction, multiplication and division
PART VII Security.
Rivest, Shamir and Adleman
Square root Least number Multiply & Divide.
Multiply and divide Expressions
Introduction to Cryptography
DIRECTED NUMBERS.
Warm Up Honors Algebra 2 11/3/17
Presentation transcript:

RSA Encryption © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

Private Key Encryption –Example: Caesar cipher –Triple DES is the modern standard Public Key Encryption –Example: RSA –Pair of keys: one public + one private Encryption Schemes

RSA is used for the signed certificate and to transmit a shared key Triple DES used for remainder of a secured connection to increase speed of encryption/decryption Real World: RSA, then Triple DES

Step 1: Pick prime numbers p and q Step 2: Calculate the modulus n=pq Example: p = 5q = 7 n = 35 Keys will be (35, ?) and (35, ?) Notice: product of primes is shared publicly! How Does RSA Work? To Make Keys:

Step 3: Subtract one from each prime number and multiply. The product is "phi". Example: p = 5q = 7 n = 35 p-1 = 5-1 = 4q -1 = 7-1 = 6 phi = 4*6 = 24 How Does RSA Work? To Make Keys:

Step 4: Look at numbers that are 1 more than multiples of phi. Factor one of them. Example: p = 5q = 7 n = 35 phi = 24 1 more than multiples of phi: 24+1, 48+1, 72+1, 96+1, 120+1, 144+1, … We use and factor it into 145=5*29 Keys will be (35, 5) and (35, 29) How Does RSA Work? To Make Keys:

That list 24+1, 48+1, 72+1, 96+1, 120+1, 144+1, … uses remainder division, also known as modulus division or clock arithmetic. In Python the modulus operator is %: In[] : 47%4 Out[]: 3 47 divided by 4 has remainder 3. Useful for checking a factor: n%2==0 is True if and only if n is even. An Aside: Modulus division

Step 1: A message has to be broken into numbers that are each less than the modulus. Example: "CAT"  3 – 1 – 20 Step 2: Raise each number to the power of the second part of the key. Example using key (35, 5): "CAT"  3 5 – 1 5 – 20 5  243 – 1 – How Does RSA Work? To Use Keys:

Step 3: Find remainder of each number divided by the first part of the key. Example using key (35, 5): "CAT"  3 5 – 1 5 – 20 5  243 – 1 –  243%35 – 1%35 – %35  33 – 1 – 20 The ciphertext! How Does RSA Work? To Use Keys: