Presentation is loading. Please wait.

Presentation is loading. Please wait.

RSA Encryption & Cryptography

Similar presentations


Presentation on theme: "RSA Encryption & Cryptography"— Presentation transcript:

1 RSA Encryption & Cryptography
Ryan Koon Mariko Nihonyanagi Lynette Rota

2 Definition Cryptography is the use of math for information security.
This includes data integrity, confidentiality, entity authentication, and data origin authentication. Today’s cryptography depends on the existence of difficult algorithmic problems. The word cryptology comes from the Greek word kryptós logos, meaning ‘hidden word’.

3 Biographies Three inventers of RSA Public-key Crytposystem.
Ronald L. Rivest – PHD from Stanford, In 2007 he received the Computers, Freedom and Privacy Conference "Distinguished Innovator" award. Adi Shamir – PHD from the Weizmann Institute, recipient of many awards including the IEEE's W.R.G. Baker Prize, holder of many patents and publications. Len Adleman – PHD from UC Berkley, known for first use of DNA to compute an algorithm.

4 Public Key Encryption

5 RSA Background RSA is one of the best-known public-key cryptosystems.
Cryptography itself has a long history, dating from some 4,000 years ago in ancient Egypt. In 1977, the U.S. adopted DES, the Data Encryption Standard for use with all unclassified information. RSA now uses the digital signature, which was first standardized in 1991. Research in cryptography continues to this day.

6 Real World Cryptography Applications
RSA can be used for secure communication (e.g. cellular phones), identification, authentication (e.g. digital signatures), secret sharing, electronic commerce, certification, secure electronic mail, key recovery, and secure computer access. Other uses of cryptography include , online banking, online trading, online credit cards transactions, satellite and cable television. RSA can be used at automatic teller machine (ATM) machines. The ATM card, or the public key is associated with the personal identification number (PIN), or the private key. It is used for Ethernet network cards, smart cards, secure telephones, and protocols for secure Internet communications RSA is a standard cryptosystem that has been used by over 700 companies.

7 RSA Devices RSA is used for Secure ID’s, only allowing access for a limited amount of time.

8 The RSA Cipher Generate your Private and Public Keys
RSA Cryptography is an asymmetric encryption system (also known as public-key cryptography) meaning that the formulas used to derive the encrypted and decrypted messages use different keys. Below is RSA’s way of generating the private and public keys for the decryption and encryption algorithms. Choose two different, very large prime numbers p, and q. Computer n = p*q n is used as the modulus for the public and private keys. Compute the totient using n, p and q: Ø(n) = (p-1)(q-1). Choose an integer e such that 1<e< Ø(n) , and e and Ø(n) share no factors other than 1 (i.e. e and φ(n) are coprime) e is released as the public key exponent Compute d to satisfy the congruence relation de ≡ 1 (mod Ø(n)) ; i.e. for some integer de = 1+kØ(n) . d is kept as the private key exponent The public key consists of the modulus n and the public (or encryption) exponent e. The private key consists of the modulus n and the private (or decryption) exponent d which must be kept secret.

9 The RSA Cipher

10 Encryption/Decryption
Step 1: Transmit your public key (n & e) Step 2: Sender changes their message into a number such that the resulting number is less than p*q. This is done through a hash function, using a hash table Step 3: Sender generates their cipher-text using the RSA encryption formula: c=me mod n Step 4: Transmit result to recipient. Decryption (Assuming a transmitted message using your public key has been received) Perform: m=cd mod n In this case, d is the private key that the recipient withheld. The result will be the original number the sender had before they input it into the encryption formula.

11 Security of RSA RSA is an extremely secure cipher system because the numbers chosen to determine its asymmetric keys are extremely large prime numbers. Some can reach up to 1000 decimal digits, or over 3000 bits in binary. Decrypting an RSA cipher-text is thought to be infeasible at best. Partial decryptions can be possible, but well made padding schemes protect cipher-texts in this way. Additionally, attempting to find out what numbers were chosen originally would let you solve the decryption near instantly. However, attempting to find out which numbers create a certain modulus is very difficult since in modular arithmetic many numbers (coprime or not) have a congruence relationship. Currently, RSA offers prize money to individuals who can find the factors to crack their private key ciphers.

12 Demonstration http://www.securecottage.com/demo/rsa2.html

13 References (2007). RSA laboratories. Retrieved November 12, 2007, from Daubechies, I.. (2003). Math alive. Princeton University. Retrieved November 12, 2007, from Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (2001). Handbook of applied cryptography. University of Waterloo. Retrieved November 12, 2007, from Ray, I. (2006). Public key cryptography. Colorado State University. Retrieved November 12, 2007, from Rivest, R. L. (2007). Ronald L. Rivest: HomePage. massachusetts institute of technology. Retrieved November 12, 2007, from Wikipedia Users. (2007). Ron Rivest. Wikipedia: The Free Encyclopedia. Retrieved November 12, 2007, from Wikipedia Users. (2007). RSA. Wikipedia: The Free Encyclopedia. Retrieved November 12, 2007, from Images: (2007). Computer ethernet cable connection. iStock International Inc. Retrieved November 12, 2007, from Bowen, J. (2007). How ATMs work. HowStuffWorks, Inc. Retrieved November 12, 2007, from Cherowitzo, B. (2001). The University of Colorado Denver. Retrieved November 12, 2007, from Higgs, B. J. (2006). Cryptography through the ages: A layman's view. University of Basel. Retrieved November 12, 2007, from


Download ppt "RSA Encryption & Cryptography"

Similar presentations


Ads by Google