Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.

Slides:



Advertisements
Similar presentations
Public Key Cryptosystem
Advertisements

Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
7. Asymmetric encryption-
Session 4 Asymmetric ciphers.
Public Key Algorithms …….. RAIT M. Chatterjee.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Topic 5 Essential Public Key Crypto Methods.
Chapter 3 Encryption Algorithms & Systems (Part B)
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Diffie-Hellman Key Exchange
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
ASYMMETRIC CIPHERS.
Introduction to Public Key Cryptography
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
Application of Elliptic Curves to Cryptography
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 21 Public-Key Cryptography and Message Authentication.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
Elliptic Curve Cryptography
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
Public Key Cryptosystem In Symmetric or Private Key cryptosystems the encryption and decryption keys are either the same or can be easily found from each.
Lecture 6. RSA Use in Encryption to encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = M e mod n, where 0≤M
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
CS480 Cryptography and Information Security
Asymmetric-Key Cryptography
Attacks on Public Key Encryption Algorithms
Asymmetric-Key Cryptography
Introduction to Elliptic Curve Cryptography
Symmetric-Key Cryptography
Presentation transcript:

Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption

Outline Basic concepts and goals of public key encryption One-way functions Trapdoor functions

Public/Private Key Pairs Recipient (Alice) generates key pair: – Public key k PU Does not have to be kept secret Distributed to all senders (such as Bob) – Private key k PR Kept secret by Alice

Public Key Encryption Bob uses Alice’s public key k PU to encrypt message – C = E(k PU, P) Alice uses her private key k PR to decrypt message – P = D(k PR, C)

Public Key Security Central idea: Adversary cannot determine private key from corresponding public key – Could theoretically find private key, but computationally infeasible to do so – Cannot read intercepted messages encrypted with public key

Public and Symmetric Keys Problem: How to securely distribute a symmetric key K S ? Solution: 1.Use public key encryption to securely send it 2.Use faster symmetric key algorithm (like AES) to securely transmit the rest of the message

Public Key Math Public key algorithms are mathematical functions of integer numbers – Keys are large numbers (hundreds of digits long) – Plaintext translated to large numbers (not bits) – Encryption is a mathematical function of plaintext and key which creates another large number as ciphertext

One-Way Functions One-way functions: – Function: y = f (x) – Inverse function: x = f -1 (y) Given x, y = f (x) very easy to compute Given y, x = f -1 (y) computationally infeasible to compute Example: Factoring – p and q are very large prime numbers – n = p x q is easy to compute – Factoring n into p and q infeasible Must try almost all possible p and q

9 Trapdoor One-Way Functions Trapdoor functions: Given one-way function: y = f (x) There exists some “secret trapdoor” that allows x = f -1 (y) to be easily computed Example (very simple): n = p x q product of two large primes Factoring n into p and q to find p infeasible Finding p is easy if know q – q is a “trapdoor” for finding p from n

Trapdoor Functions and Private Keys Idea behind public-key encryption: Encryption function C = E (K PU, P) must be one way – Must not be able to compute P from C Must have trapdoor to allow decryption – Must be able to easily compute P from C if know trapdoor Trapdoor = private key

Types of Trapdoor One-Way Functions Discrete Logarithms – RSA, Rabin, ElGamal, Diffie-Hellman – Easy to implement, well understood Elliptic Curve – Discrete logarithms represented as curves – Much faster than discrete logarithms NP-Complete problems – Example: “knapsack problem”, Merkle and Hellman (1978) – Exponential time to solve problem – Easy to confirm solution if given

What’s Next Let me know if you have any questions Continue on to the next lecture on RSA Public Key Encryption