RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Public Key Encryption Algorithm
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Public Encryption: RSA
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
RSA Encryption Caitlin O’Dwyer. What is an RSA Number? An RSA number n is a number s.t. n=pq Where p and q are distinct, large, prime integers.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
RSA Numbers by: Brandon Hacay & Conrad Allen. History of RSA Numbers The letters in “RSA” are simply the initials of the people who are credited as having.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
RSA and its Mathematics Behind
RSA Ramki Thurimella.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
RSA By: Abhishek Naik Viswanath Chennuru CPSC 624.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Midterm Review Cryptography & Network Security
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Darci Miyashiro Math 480 April 29, 2013
Public-Key Encryption
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
What is RSA RSA is a system employed to create the encrypted message in which the key used for encryption is different from that used to decrypt. It is.
Public Key (RSA) Day 27. Objective Students will be able to… …understand how RSA is used for encryption and decryption. …understand some of the challenges.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Cryptography & Network Security : Topic Seminar Description & Analysis Madhava.N 1RV06SCN05 2 nd Semester M.Tech CNE RVCE RSA ALGORITHM.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
RSA The algorithm was publicly described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Partly used for PGP (Pretty Good Privacy) to encrypt.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Fall 2002CS 395: Computer Security1 Chapter 9: Public Key Cryptography.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Implementation Issues for Public Key Algorithms
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 6. RSA Use in Encryption to encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = M e mod n, where 0≤M
CS480 Cryptography and Information Security
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
The RSA Public-Key Encryption Algorithm
Presentation transcript:

RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption

Outline Modular Logarithms as one way trapdoor functions RSA Encryption/decryption functions RSA Public/private key generation RSA as a block cipher Underlying mathematics

RSA History First widely used public key encryption algorithm – Developed for public use in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT – Developed secretly in 1973 by Clifford Cocks (British mathematician working for UK intelligence) – MIT granted a patent for RSA (expired in 2000) Still extensively used – Part of most cryptosystems (SSH, PGP, etc.)

Modular Exponentiation Encryption done with modular exponentiation C = P E mod n – Plaintext P and ciphertext C both large integers – Modulus n and exponent E are public key (also large integers) Modular exponentiation one way C = P E mod n easy to compute

Modular Logarithms “Modular logarithm” problem: P = E C mod n infeasible to compute – Given ciphertext C and public key E, n for what integer P does C = P E mod n? – Example: For what P does P 343 mod = 33677? – Would have to test all P < n to find a P such that C = P E mod n Trapdoor for decryption: Exists D such that P = C D mod n – n must be product of two primes p and q – D is secret private key based on E, p and q

RSA Illustration

RSA Key Generation (1) Select 2 large primes p and q – At least 2048 bits (616 decimal digits) Compute n = p  q Compute Φ(n) = (p -1)  (q -1) – Euler totient function – Cannot compute directly from n without factoring into p and q – Crucial that multiplication of large primes is one way!

RSA Key Generation (2) Select some E for encryption – 1 < E < Φ(n) – E is relatively prime to Φ(n) Compute D as E -1 mod Φ(n) – E  D mod Φ(n) = 1 Public key: E and n Private key: D

RSA Example Public key: n = (from 397  401) E = 343  note that these are too small in reality! Known to sender Bob Private key: D = 12007= mod (that is, 396 x 400) Known only by recipient Alice

Security of RSA Cryptographic attacks based on finding fast ways to solve underlying mathematics – Factorization – Discrete Logarithms Unsolved at this point Recommendations: – Large p and q (giving n of at least 4096 bits) – Don’t reuse same n too many times – Large E (at least )

11 Representing Plaintext Constraint: P < modulus n  4096 bits in RSA  512 bytes Block cipher: – Plaintext broken into 512 byte blocks – Represented as equivalent large number – Each number encrypted and transmitted in ECB mode Could theoretically use CBC mode, but won’t really use for long messages anyway

RSA Mathematics (1) Must show: P = C D mod n = (P E ) D mod n = P E  D mod n Where E  D mod Φ(n) = 1 Based on Euler’s theorem: If n = p  q and P < n Then P k  Φ(n) + 1 mod n = P for all integer k

RSA Mathematics (2) Proof (sort of): (k  Φ(n) + 1) mod Φ(n) = 1 Since k  Φ(n) is divisible by Φ(n) There exists some k such that E  D = k  Φ(n) + 1 Since also have E  D mod Φ(n) = 1 P E  D mod n = P Substituting E  D for k  Φ(n) + 1 in Euler’s Theorem

What’s Next Let me know if you have any questions Continue on to the next lecture on Implementing RSA