Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
This PPT explains about the term "Cryptography - Encryption & Decryption". This PPT is for beginners and for intermediate developers who want to learn about Cryptography. I have also explained about the various classes which .Net provides for encryption and decryption and some other terms like "AES" and "DES".
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
A brief introduction to Crytography,the various types of crytography and the advantages and disadvantages associated to using the following tyes with some part of the RSA algorithm
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
cmcs
MACs based on Block Ciphers
Digital Signature
Properties , Requirements and Security of Digital Signature
Various digital signature schemes ( Elgamal and Schnorr )
This PPT explains about the term "Cryptography - Encryption & Decryption". This PPT is for beginners and for intermediate developers who want to learn about Cryptography. I have also explained about the various classes which .Net provides for encryption and decryption and some other terms like "AES" and "DES".
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
A brief introduction to Crytography,the various types of crytography and the advantages and disadvantages associated to using the following tyes with some part of the RSA algorithm
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
cmcs
MACs based on Block Ciphers
Digital Signature
Properties , Requirements and Security of Digital Signature
Various digital signature schemes ( Elgamal and Schnorr )
Symmetric Cipher Model,BruteForce attack, Cryptanalysis,Advantages of Symmetric cryptosystem,Model of conventional Encryption, model of conventional cryptosystem,Cryptography,Ciphertext,Plaintext,Decryption algorithm,Diadvantages of Symmetric Cryptosystem,Types of attacks on encrypted messages,Average time required for exhaustive key search
Cryptography is a method of securing communications through some protocols in order to make the information secure or understandable only by the sender and the receiver.
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
Public-key cryptography, or asymmetric cryptography, is an encryption scheme that uses two mathematically related, but not identical, keys - a public key and a private key. Unlike symmetric key algorithms that rely on one key to both encrypt and decrypt, each key performs a unique function.
Information and network security 31 public key cryptographyVaibhav Khanna
Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, and private keys. The generation of such key pairs depends on cryptographic algorithms which are based on mathematical problems termed one-way function
Introduction to Cloud
Definition
Vision on Cloud Computing
A Closer Look-NewYork Times, Washington Post, private cloud,Public Cloud, Hybrid Cloud, Reference Model, Actors in Cloud Computing, Characteristics and Benefits, Challenges Ahead, History of Cloud Computing, Distributed system, Virtualization, PROS and CONS of Cloud Computing. Technology Examples
M. Florence Dayana - Hadoop Foundation for Analytics.pptxDr.Florence Dayana
Hadoop Foundation for Analytics
History of Hadoop
Features of Hadoop
Key Advantages of Hadoop
Why Hadoop
Versions of Hadoop
Eco Projects
Essential of Hadoop ecosystem
RDBMS versus Hadoop
Key Aspects of Hadoop
Components of Hadoop
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfDr.Florence Dayana
Logic Gates, Truth Table, AND Gate
Types of Digital Logic AND Gate, The 2-input and 3-input AND Gate, OR Gate, Types of Digital Logic AND Gate, The 2-input OR gate, The 3-input OR gate, NOT Gate, NAND Gate, The 2-input NAND Gate, The 3-input NAND Gate, NOR Gate, 2-input NOR gate
Just like other gates, XOR gate or Exclusive-OR gate
Reading, Pre Task, Reading Strategies, Types of reading, Reading Comprehension, Questions, Comparison, Group Discussion, Identify the Meaning, positive vibration, vocabulary
Listening, form of communication, Process Description, Definition, Model Video for Listening, Questions, Procedure for Flowchart, Pre Listening, Post Listening, Motivational video, comparison video
Input Devices-Keyboard, Mouse, Trackball, Joystick, Scanner and Types, Barcode Reader, Voice Recognition, Web Camera, Optical character recognition, Optical Mark recognition, Monitor, Printer and Types, Plotter
Definition, SSL Concepts Connection and Service, SSL Architecture, SSL Record Protocol, Record Format, Higher Layer Protocol, Handshake Protocol- Change Cipher Specification and lert Protocol
Introduction, networking, types of network, connections, packet switching, open systems, protocols, firewalls, mime types, addresses, domain name system
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Chapter 3 - Islamic Banking Products and Services.pptx
2. public key cryptography and RSA
1. NETWORK SECURITY
Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D).,
Head, Dept. of CA
Bon Secours College For Women
Thanjavur.
Class : II MSc., CS
Semester : III
Unit : II
Topic : Public Key Cryptography
2/15/2019 1
2. Public key Cryptography
•Public key cryptography (PKC) is
an encryption technique that uses a paired
public and private key algorithm for secure
data communication.
•A message sender uses a recipient's public
key to encrypt a message.
•To decrypt the sender's message, only the
recipient's private key may be used.
3. Principles of Public-Key Cryptosystems
• The concept of public-key cryptography evolved from an
attempt to attack two of the most difficult problems
associated with symmetric encryption:
• The communicants already shares a key or someone has been
distributed the key.
• How to secure communications in general without having to trust a
KDC with your key
Key distribution
• How to verify that a message comes intact from the claimed sender
Digital signatures
4. Public-Key Cryptosystems
• A public-key encryption scheme has six ingredients:
Plaintext
The
readable
message
or data
that is fed
into the
algorithm
as input
Encryption
algorithm
Performs
various
transform
-ations on
the
plaintext
Public key
Used for
encryption
or
decryption
Private key
Used for
encryption
or
decryption
Ciphertext
The
scrambled
message
produced
as output
Decryption
algorithm
Accepts
the
ciphertext
and the
matching
key and
produces
the
original
plaintext
7. Public-Key Cryptosystem:
encryption using public key -Secrecy
This figure provides confidentiality because two related key used for
encryption other being used for decryption
8. Public-Key Cryptosystem:
Encryption using private key -Authentication
There is no protection of confidentiality because any observer
can decrypt the message by using the sender’s public key
9. Public-Key Cryptosystem: Authentication
and Secrecy
we begin as before by encrypting a message, using the sender’s private
key. This provides the digital signature. Next, we encrypt again, using the
receiver’s public key. The final ciphertext can be decrypted only by the
intended receiver, who alone has the matching private key. Thus,
confidentiality is provided
10. Applications for Public-Key Cryptosystems
• Public-key cryptosystems can be classified into three categories:
• The sender encrypts a message
with the recipient’s public keyEncryption/decryption
• The sender “signs” a message
with its private keyDigital signature
• Two sides cooperate to
exchange a session keyKey exchange
12. Public-Key Requirements
Conditions that these algorithms must fulfil:
1. It is computationally easy for a party B to generate a pair (public-
key PUb, private key PRb)
2. It is computationally easy for a sender A, knowing the public key
and the message to be encrypted, to generate the corresponding
ciphertext
3. It is computationally easy for the receiver B to decrypt the
resulting ciphertext using the private key to recover the original
message
4. It is computationally infeasible for an adversary, knowing the
public key, to determine the private key.
5. It is computationally infeasible for an adversary, knowing the
public key and a ciphertext, to recover the original message.
6. The two keys can be applied in either order.
13. Public-Key Requirements
trap-door one-way function
•A trapdoor function is a function that is easy to
compute in one direction, yet difficult to compute in
the opposite direction (finding its inverse) without
special information, called the "trapdoor". Trapdoor
functions are widely used in cryptography.
•Y = f(X) easy
•X = f–1(Y) infeasible
14. Public-Key Requirements
A trap-door one-way function is a family of
invertible functions fk, such that
Y = fk(X) easy, if k and X are known
X = fk
–1(Y) easy, if k and Y are known
X = fk
–1(Y) infeasible, if Y known but k not
known
A practical public-key scheme depends on a
suitable trap-door one-way function
15. Rivest-Shamir-Adleman (RSA) Scheme
•RSA is the algorithm used by modern computers to
encrypt and decrypt messages. It is an asymmetric
cryptographic algorithm.
•Asymmetric means that there are two different keys.
This is also called public key cryptography, because
one of them can be given to everyone. The other key
must be kept private.
•One of the first successful responses to the challenge
was Developed in 1977 at MIT by Ron Rivest, Adi
Shamir & Len Adleman
16. RSA Algorithm
•Plaintext is encrypted in blocks with each block having a
binary value less than some number n
•Encryption and decryption are of the following form, for
some plaintext block M and cipher text block C
C = Memod n
M = Cd mod n = (Me)d mod n = Med mod n
•Both sender and receiver must know the value of n
•The sender knows the value of e, and only the receiver knows
the value of d
•This is a public-key encryption algorithm with a public key
of PU={e,n} and a private key of PR={d,n}
17. Algorithm Requirements
• For this algorithm to be satisfactory for public-key encryption, the
following requirements must be met:
1. It is possible to find values of e, d, n
such that Med mod n = M for all M<n
2. It is relatively easy to calculate Me mod n
and Cd mod n for all values of M < n
3. It is infeasible to determine d given e
and n
21. The Security of RSA
Five possible
approaches to
attacking RSA
are:
Brute force
• Involves trying all
possible private
keys
Mathematical attacks
• There are several
approaches, all
equivalent in effort to
factoring the product
of two primes
Timing attacks
• These depend on the
running time of the
decryption algorithm
Hardware fault-based
attack
• This involves inducing
hardware faults in the
processor that is
generating digital
signatures
Chosen ciphertext
attacks
• This type of attack
exploits properties
of the RSA algorithm
22. Optimal Asymmetric Encryption Padding
(OAEP)
•Optimal Asymmetric Encryption Padding
(OAEP) is a padding scheme often used
together with RSA encryption.
•The OAEP algorithm is a form of Feistel
network which uses a pair of random oracles
G and H to process the plaintext prior to
asymmetric encryption.
24. Figure shows OAEP encryption.
1. As a first step, the message M to be encrypted is padded.
A set of optional parameters, P, is passed through a hash
function, H.
2. The output is then padded with zeros to get the desired length in the
overall data block (DB).
3.Next, a random seed is generated and passed through
another hash function, called the mask generating function (MGF).
4. The resulting hash value is bit-by-bit XORed with DB to produce a
maskedDB.
5.The maskedDB is in turn passed through the MGF to form a hash that is
XORed with the seed to produce the masked seed.
6. The concatenation of the masked-seed and the maskedDB forms the
encoded message EM.
Note that the EM includes the padded message, masked by the seed, and
the seed, masked by the maskedDB. The EM is then encrypted using
RSA.