SlideShare a Scribd company logo
1 of 17
Public-Key
Cryptography
• Abdul Rehman
• 21014156-074
Topic:
Introduction
 Public-key Cryptography is asymmetric, involving the use of two separate
keys, in contrast to symmetric encryption, which uses only one key. The use
of two keys has profound consequences in the areas of confidentiality, key
distribution, and authentication.
 A message sender uses a recipients Public Key to encrypt the message.
 To decrypt sender's message only the recipients Private Key is used
 Asymmetric algorithms rely on one key for encryption and a different but
related key for decryption.
 Public-key algorithms are based on mathematical functions rather than on
substitution and permutation.
Principle of PKC
The concept of public-key cryptography evolved from an attempt to attack two of
the most difficult problems associated with symmetric encryption.
1. Key Distribution
• That the communicants has already shares a key or someone has distributed it
• How to secure communications in general without having to trust a Key Distribution
Center.
2. Digital Signatures
• How to Verify that a digital message had been sent by a particular person
Public Key Cryptosystem
Plaintext
This is the readable
message or data that is fed
into the algorithm as input.
Encryption
Algorithm
The encryption algorithm
performs various
transformations on the
plaintext.
Public Key
Key used for encryption or
for decryption.
Private Key
Key used for encryption or
for decryption.
Ciphertext
This is the encrypted
message produced as
output. It depends on the
plaintext and the key. For a
given message, two
different keys will produce
two different ciphertexts.
Decryption
Algorithm
This algorithm accepts the
ciphertext and the matching
key and produces the
original plaintext.
 A public-key encryption scheme has six ingredients.
Questions
Encryption with Public Key
Encryption with Private Key
Conventional and Public-Key Encryption
Conventional Encryption Public-Key Encryption
Needed to Work
• The same algorithm with the same key is used
for encryption and decryption.
Needed to Work
• One algorithm is used for encryption and a related
algorithm for decryption with a pair of keys, one
for encryption and one for decryption
• The sender and receiver must share the
algorithm and the key.
• The sender and receiver must each have one of
the matched pair of keys (not the same one).
Needed for Security:
• The key must be kept secret.
Needed for Security
• One of the two keys must be kept secret.
• It must be impossible or at least impractical to
decipher a message if the key is kept secret.
• It must be impossible or at least impractical to
decipher a message if one of the keys is kept
secret.
• Knowledge of the algorithm plus samples of
ciphertext must be insufficient to determine the
key
• Knowledge of the algorithm plus one of the keys
plus samples of ciphertext must be insufficient to
determine the other key
Confidentiality
• This figure provides
confidentiality because two
related keys are used one
used for encryption and
the other being used for
decryption
Authentication
• There is no protection of
confidentiality because
any observer can decrypt
the message by using the
sender’s public key
Authentication and Secrecy
Source A Destination B
It is, however, possible to
provide both the authentication
function and confidentiality by a
double use of the public-key
scheme
Z = E(PUb, E(PRa,X))
X = D(PUa, D(PRb,Z))
In this case, we begin as before
by encrypting a message, using
the sender’s private key. This
provides the digital signature.
Next, we encrypt again, using
the receiver’s public key. The
final ciphertext can be
decrypted only by the intended
receiver, who alone has the
matching private key. Thus,
PKC
Categories
THE SENDER ENCRYPTS
A MESSAGE WITH THE
RECIPIENT’S PUBLIC
KEY, AND THE
RECIPIENT DECRYPTS
THE MESSAGE WITH THE
RECIPIENT’S PRIVATE
KEY.
THE SENDER “SIGNS” A
MESSAGE WITH ITS
PRIVATE KEY. SIGNING
IS ACHIEVED BY A
CRYPTOGRAPHIC
ALGORITHM APPLIED TO
THE MESSAGE OR TO A
SMALL BLOCK OF DATA
THAT IS A FUNCTION OF
THE MESSAGE.
TWO SIDES COOPERATE
TO EXCHANGE A
SESSION KEY, WHICH IS
A SECRET KEY FOR
SYMMETRIC
ENCRYPTION
GENERATED FOR USE
FOR A PARTICULAR
TRANSACTION (OR
SESSION) AND VALID
FOR A SHORT PERIOD
OF TIME. SEVERAL
DIFFERENT
APPROACHES ARE
POSSIBLE, INVOLVING
THE PRIVATE KEY(S) OF
ONE OR BOTH PARTIES
Public-Key cryptosystems can be classified in to Three
categorizes
ENCRYPTION/
DECRYPTION:
Digital
signature:
Key
exchange:
Requirements for
PKC
1. It is computationally easy for a party B to generate a key pair (public key PUb, private key
PRb).
2. It is computationally easy for a sender A, knowing the public key and the message to be
encrypted, M, to generate the corresponding ciphertext: C = E(PUb, M)
3. It is computationally easy for the receiver B to decrypt the resulting ciphertext using the private
key to recover the original message: M = D(PRb, C) = D[PRb, E(PUb, M)]
4. It is computationally infeasible for an adversary, knowing the public key, PUb, to determine the
private key, PRb
5. It is computationally infeasible for an adversary, knowing the public key, PUb, and a ciphertext,
C, to recover the original message, M.
6. The two keys can be applied in either order: M = D[PUb, E(PRb, M)] = D[PRb, E(PUb, M)
Application for PKC
Algorithm Encryption / Decryption Digital Signature Key Exchange
RSA Yes Yes Yes
Elliptic Curve Yes Yes Yes
Diffie–Hellman No No Yes
DSS No Yes No
Trap-door one-way
function
Public-Key
Cryptoanalysis
Try every Possible key Until an intelligible translation of the
cyphertext into plaintext is obtained.
Exhausted Key search and Guessing.
• Brute-Force Attack:
• Man-In-Middle Attack:
Combining known plaintext and chosen plaintext attacks by
performing computations in both directions to find matching
pairs.
• Known Plaintext Attack :
 In a known plaintext attack, the cryptanalyst possesses
knowledge of both the plaintext and the corresponding
ciphertext. The objective is to determine the secret key or find
vulnerabilities in the encryption algorithm.
• Chosen Plaintext Attack
In a chosen plaintext attack, the cryptanalyst has the ability to
select specific plaintexts and obtain their corresponding
ciphertexts from the encryption system.

More Related Content

Similar to Public-Key Cryptography Explained

Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptPayalChopra9
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxMohamedNowfeek1
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography Durgesh Malviya
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.pptso6281019
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodelpriyapavi96
 
Cryptography 1
Cryptography 1Cryptography 1
Cryptography 1bhanu7161
 

Similar to Public-Key Cryptography Explained (20)

Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Ch9
Ch9Ch9
Ch9
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
NSC PPT 463.pdf
NSC PPT 463.pdfNSC PPT 463.pdf
NSC PPT 463.pdf
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
 
Network security
Network securityNetwork security
Network security
 
Cryptography 1
Cryptography 1Cryptography 1
Cryptography 1
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Public-Key Cryptography Explained

  • 3. Introduction  Public-key Cryptography is asymmetric, involving the use of two separate keys, in contrast to symmetric encryption, which uses only one key. The use of two keys has profound consequences in the areas of confidentiality, key distribution, and authentication.  A message sender uses a recipients Public Key to encrypt the message.  To decrypt sender's message only the recipients Private Key is used  Asymmetric algorithms rely on one key for encryption and a different but related key for decryption.  Public-key algorithms are based on mathematical functions rather than on substitution and permutation.
  • 4. Principle of PKC The concept of public-key cryptography evolved from an attempt to attack two of the most difficult problems associated with symmetric encryption. 1. Key Distribution • That the communicants has already shares a key or someone has distributed it • How to secure communications in general without having to trust a Key Distribution Center. 2. Digital Signatures • How to Verify that a digital message had been sent by a particular person
  • 5. Public Key Cryptosystem Plaintext This is the readable message or data that is fed into the algorithm as input. Encryption Algorithm The encryption algorithm performs various transformations on the plaintext. Public Key Key used for encryption or for decryption. Private Key Key used for encryption or for decryption. Ciphertext This is the encrypted message produced as output. It depends on the plaintext and the key. For a given message, two different keys will produce two different ciphertexts. Decryption Algorithm This algorithm accepts the ciphertext and the matching key and produces the original plaintext.  A public-key encryption scheme has six ingredients.
  • 9. Conventional and Public-Key Encryption Conventional Encryption Public-Key Encryption Needed to Work • The same algorithm with the same key is used for encryption and decryption. Needed to Work • One algorithm is used for encryption and a related algorithm for decryption with a pair of keys, one for encryption and one for decryption • The sender and receiver must share the algorithm and the key. • The sender and receiver must each have one of the matched pair of keys (not the same one). Needed for Security: • The key must be kept secret. Needed for Security • One of the two keys must be kept secret. • It must be impossible or at least impractical to decipher a message if the key is kept secret. • It must be impossible or at least impractical to decipher a message if one of the keys is kept secret. • Knowledge of the algorithm plus samples of ciphertext must be insufficient to determine the key • Knowledge of the algorithm plus one of the keys plus samples of ciphertext must be insufficient to determine the other key
  • 10. Confidentiality • This figure provides confidentiality because two related keys are used one used for encryption and the other being used for decryption
  • 11. Authentication • There is no protection of confidentiality because any observer can decrypt the message by using the sender’s public key
  • 12. Authentication and Secrecy Source A Destination B It is, however, possible to provide both the authentication function and confidentiality by a double use of the public-key scheme Z = E(PUb, E(PRa,X)) X = D(PUa, D(PRb,Z)) In this case, we begin as before by encrypting a message, using the sender’s private key. This provides the digital signature. Next, we encrypt again, using the receiver’s public key. The final ciphertext can be decrypted only by the intended receiver, who alone has the matching private key. Thus,
  • 13. PKC Categories THE SENDER ENCRYPTS A MESSAGE WITH THE RECIPIENT’S PUBLIC KEY, AND THE RECIPIENT DECRYPTS THE MESSAGE WITH THE RECIPIENT’S PRIVATE KEY. THE SENDER “SIGNS” A MESSAGE WITH ITS PRIVATE KEY. SIGNING IS ACHIEVED BY A CRYPTOGRAPHIC ALGORITHM APPLIED TO THE MESSAGE OR TO A SMALL BLOCK OF DATA THAT IS A FUNCTION OF THE MESSAGE. TWO SIDES COOPERATE TO EXCHANGE A SESSION KEY, WHICH IS A SECRET KEY FOR SYMMETRIC ENCRYPTION GENERATED FOR USE FOR A PARTICULAR TRANSACTION (OR SESSION) AND VALID FOR A SHORT PERIOD OF TIME. SEVERAL DIFFERENT APPROACHES ARE POSSIBLE, INVOLVING THE PRIVATE KEY(S) OF ONE OR BOTH PARTIES Public-Key cryptosystems can be classified in to Three categorizes ENCRYPTION/ DECRYPTION: Digital signature: Key exchange:
  • 14. Requirements for PKC 1. It is computationally easy for a party B to generate a key pair (public key PUb, private key PRb). 2. It is computationally easy for a sender A, knowing the public key and the message to be encrypted, M, to generate the corresponding ciphertext: C = E(PUb, M) 3. It is computationally easy for the receiver B to decrypt the resulting ciphertext using the private key to recover the original message: M = D(PRb, C) = D[PRb, E(PUb, M)] 4. It is computationally infeasible for an adversary, knowing the public key, PUb, to determine the private key, PRb 5. It is computationally infeasible for an adversary, knowing the public key, PUb, and a ciphertext, C, to recover the original message, M. 6. The two keys can be applied in either order: M = D[PUb, E(PRb, M)] = D[PRb, E(PUb, M)
  • 15. Application for PKC Algorithm Encryption / Decryption Digital Signature Key Exchange RSA Yes Yes Yes Elliptic Curve Yes Yes Yes Diffie–Hellman No No Yes DSS No Yes No
  • 17. Public-Key Cryptoanalysis Try every Possible key Until an intelligible translation of the cyphertext into plaintext is obtained. Exhausted Key search and Guessing. • Brute-Force Attack: • Man-In-Middle Attack: Combining known plaintext and chosen plaintext attacks by performing computations in both directions to find matching pairs. • Known Plaintext Attack :  In a known plaintext attack, the cryptanalyst possesses knowledge of both the plaintext and the corresponding ciphertext. The objective is to determine the secret key or find vulnerabilities in the encryption algorithm. • Chosen Plaintext Attack In a chosen plaintext attack, the cryptanalyst has the ability to select specific plaintexts and obtain their corresponding ciphertexts from the encryption system.