SlideShare a Scribd company logo
Presented By
Vinayak Raja
Sachin Sharma
Manvika Singh
1
RSA Public Key Encryption
Algorithm
The best known public key cryptosystem is RSA - named after its
authors, Rivest, Shamir and Adelman
2
Public-Key Cryptography
• Public-key (or two-key) cryptography involves the use
of two keys:
• A public-key, which may be known by anybody, and can
be used to encrypt messages, and verify signatures
• A private-key, known only to the recipient, used to decrypt
messages, and sign (create) signatures
3
Public-Key Cryptography
Requirements
• The public-key is easily computed from the private
key and other information about the cipher
• However, knowing the public-key and public
description of the cipher, it is still computationally
infeasible to compute the private key
• Thus the public-key may be distributed to anyone
wishing to communicate securely with its owner
(although secure distribution of the public-key is a
non-trivial problem - the key distribution problem)
4
5
6
Application of Public-Key Ciphers
• Three important uses of public-key algorithms:
• Public-Key Distribution Schemes (PKDS) - where the
scheme is used to securely exchange a single piece of
information (whose value depends on the two parties, but
cannot be set).
• Signature Schemes - used to create a digital signature only,
where the private-key signs (create) signatures, and the public-
key verifies signatures
• Public Key Schemes (PKS) - used for encryption, where the
public-key encrypts messages, and the private-key decrypts
messages.
7
RSA Alogarthim
RSA (Rivest-Shamir-Adelman) is the most commonly used public
key algorithm.
Can be used both for encryption and for digitally signing.
It is generally considered to be secure when sufficiently long keys
are used (512 bits is insecure, 768 bits is moderately secure, and
1024 bits is good, for now).
The security of RSA relies on the difficulty of factoring large
integers. Dramatic advances in factoring large integers would make
RSA vulnerable.
RSA is currently the most important public key algorithm. It is
patented in the United States (expires year 2000), and free elsewhere.
8
RSA Algorithm
First choose two large prime numbers, p and q, and
find their product, n. n is also called modulus in RSA
jargon.
Compute z = (p-1)(q-1)
Next choose a number e, relatively prime to z = (p-1)
(q-1) - this is the encryption key.
Finally compute d such that the product of e and d is
congruent to 1 mod ((p-1)(q-1)). This is the decryption
key.
9
RSAAlgorithm
10
RSA Algorithm
Obviously, d can only be recovered if you reveal p and
q, or if p and q are recovered from n, the modulus.
Since we are assuming the factorization of n to be too
hard to attempt, d cannot be recovered from e. Or so
it is currently speculated. It has not, so far, been
proven.
Now e and n together form the public key, while d
and n together form the private key.
11
RSA Key Generation
To use the scheme, first generate keys:
Key-Generation by each user consists of:
selecting two large primes at random (~100 digit), p, q
calculating the system modulus n=p.q and p, q are primes
selecting at random the encryption key e,
e < n, gcd(e, φ(n)) = 1
12
RSA Key Generation (cont’d)
Solving the congruence to find the decryption key d:
e.d ≡ 1 mod φ(n) 0 <= d <= n
Publishing the public encryption key: Kpub={e,n}
Securing the private decryption key: Kpvt={d,p,q}
13
Encryption with RSA
To encrypt a plaintext message block m, compute
C=Me
mod n
To decrypt the block, compute
M=Cd
mod n
Each plaintext block must be smaller than the value of
n.
14
RSA Example
p = 3
q = 11
n = p X q = 33 -- This is the modulus
z = (p-1) X (q -1) = 20 -- This is the totient function φ(n).
There are 20 relative primes to 33. What are they? 1, 2, 4, 5, 7, 8,
10, 13, 14, 16, 17, 19, 20, 23, 25, 26, 28, 29, 31, 32
d = 7 -- 7 and 20 have no common factors but 1
7e = 1 mod 20
e = 3
C = Pe
(mod n)
P = Cd
(mod n)
15
16
RSA Weaknesses
At present, 512 bit keys are considered weak, 1024
bit keys are probably secure enough for most
purposes, and 2048 bit keys are likely to remain
secure for decades.
RSA is very vulnerable to chosen plaintext attacks.
There is also a new timing attack that can be used to
break many implementations of RSA.
 The RSA algorithm is believed to be safe when used
properly, but one must be very careful when using it
to avoid these attacks.
17
The Previous History of Factoring
• The security of the RSA cryptosystem therefore
depends on the fact, that it is practically impossible
to factor the large known modulus n. So nobody
can infer the two primes p and q from his or her
knowledge of the publicly known modulus to gain the
secret key.
• 70-digit numbers will be factored today (1998) on a
workstation within 10 hours.
• 100-digit numbers will be factored on a workstation
within 1 year.
18
How is RSA used for privacy in
practice?
In practice, RSA is often used together with a secret-key cryptosystem, such
as DES, to encrypt a message by means of an RSA digital envelope.
Suppose Alice wishes to send an encrypted message to Bob. She first
encrypts the message with DES, using a randomly chosen DES key. Then
she looks up Bob's public key and uses it to encrypt the DES key. The
DES-encrypted message and the RSA-encrypted DES key together form the
RSA digital envelope and are sent to Bob. Upon receiving the digital
envelope, Bob decrypts the DES key with his private key, then uses the
DES key to decrypt the message itself. This combines the high speed of
DES with the key-management convenience of RSA.
19
Official Standard
RSA is part of many official standards worldwide. The ISO (International
Standards Organization) 9796 standard lists
RSA as a compatible cryptographic algorithm, as does the ITU-T X.509
security standard.
RSA is part of the Society for Worldwide Interbank Financial
Telecommunications (SWIFT) standard, the French financial industry's
ETEBAC 5 standard, the ANSI X9.31 rDSA standard and the X9.44 draft
standard for the U.S. banking industry.
The Australian key management standard, AS2805.6.5.3, also specifies
RSA.
RSA is found in Internet standards and proposed protocols including
S/MIME IPSec, and TLS, the Internet standards-track successor to SSL, as
well as the PKCS standard for the software industry.
20
Applications
RSA is currently used in a wide variety of products, platforms, and
industries around the world. It is found in many commercial software
products and is planned to be in many more.
RSA is built into current operating systems by Microsoft, Apple, Sun, and
Novell. In hardware,
RSA can be found in secure telephones, on Ethernet network cards, and on
smart cards. In addition, RSA is incorporated into all of the major protocols
for secure Internet communications, including S/MIME, SSL and S/WAN.
21
Applications
It is also used internally in many institutions, including
branches of the U.S. government, major corporations, national
laboratories, and universities.
RSA technology is licensed by more than 350 companies. The
estimated installed base of RSA encryption engines is around
300 million, making it by far the most widely used public-key
cryptosystem in the world. This figure is expected to grow
rapidly as the Internet and the World Wide Web expand.
22
How Fast is RSA?
With the typical modular exponentiation algorithms
used to implement RSA, public key operations take
O(k2
) steps, private-key operations take O(k3
) steps,
and key generation takes O(k4
) steps, where k is the
number of bits in the modulus. "Fast multiplication"
techniques, such as FFT-based methods, require
asymptotically fewer steps.
23
How Fast is RSA?
The speed and efficiency of the many commercially available
software and hardware implementations of RSA are increasing
rapidly.
 On a 90 MHz Pentium, has a throughput for private-key
operations of 21.6 kbits per second with a 512-bit modulus and
7.4 kbits per second with a 1024-bit modulus.
The fastest RSA hardware has a throughput greater than 300
kbits per second with a 512-bit modulus, implying that it
performs over 500 RSA private-key operations per second.
24
25
Thank You
26

More Related Content

What's hot

Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
Komal Singh
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
Arpana shree
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
Abhishek Gautam
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
Hossain Md Shakhawat
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
DES
DESDES
Cryptography
CryptographyCryptography
Cryptography
prasham95
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
Farah Shaikh
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
Srinadh Muvva
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
SAurabh PRajapati
 

What's hot (20)

Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Cryptography
CryptographyCryptography
Cryptography
 
DES
DESDES
DES
 
Cryptography
CryptographyCryptography
Cryptography
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 

Viewers also liked

Rsa Algorithm
Rsa AlgorithmRsa Algorithm
Rsa Algorithm
Ashik Iqbal
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
Digital Signature
Digital SignatureDigital Signature
Digital Signature
saurav5884
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 
Diffie-Hellman key exchange
Diffie-Hellman key exchangeDiffie-Hellman key exchange
Diffie-Hellman key exchange
hughpearse
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
Qualcomm
 
Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Digital signature
Digital signatureDigital signature
Digital signature
Hossain Md Shakhawat
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
jolly9293
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
chenlahero
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
Asim Neupane
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
Ishwar Dayal
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access Controls
Salesforce Developers
 
Falcon authentication saml
Falcon authentication samlFalcon authentication saml
Falcon authentication saml
Katsumi Yamashita
 
Séverine DESOUSA : Le RSA en Saône et Loire : un dispositif de réponse à l'us...
Séverine DESOUSA : Le RSA en Saône et Loire : un dispositif de réponse à l'us...Séverine DESOUSA : Le RSA en Saône et Loire : un dispositif de réponse à l'us...
Séverine DESOUSA : Le RSA en Saône et Loire : un dispositif de réponse à l'us...
idealconnaissances
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
Fabio Pietrosanti
 
Digital signature
Digital signatureDigital signature
Digital signature
Praseela R
 

Viewers also liked (20)

Rsa Algorithm
Rsa AlgorithmRsa Algorithm
Rsa Algorithm
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Diffie-Hellman key exchange
Diffie-Hellman key exchangeDiffie-Hellman key exchange
Diffie-Hellman key exchange
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Diffie hellman
Diffie  hellmanDiffie  hellman
Diffie hellman
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access Controls
 
Falcon authentication saml
Falcon authentication samlFalcon authentication saml
Falcon authentication saml
 
Séverine DESOUSA : Le RSA en Saône et Loire : un dispositif de réponse à l'us...
Séverine DESOUSA : Le RSA en Saône et Loire : un dispositif de réponse à l'us...Séverine DESOUSA : Le RSA en Saône et Loire : un dispositif de réponse à l'us...
Séverine DESOUSA : Le RSA en Saône et Loire : un dispositif de réponse à l'us...
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Similar to Digital Signature Recognition using RSA Algorithm

Presentation
PresentationPresentation
Presentation
rokham khawaja
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
Tuhin_Das
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
LAKSHMI TEJA SAYABARAPU
 
Nwc rsa
Nwc rsaNwc rsa
Nwc rsa
anupamnm
 
Rsa
RsaRsa
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
Srilal Buddika
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
Mohsin Ali
 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
Mohamed Ramadan
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 
Cryptography & Security
Cryptography & SecurityCryptography & Security
Cryptography & Security
Chanaka Lasantha
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
journalBEEI
 
Answer questions 11-15 with a short paragraph of 5-9 lines.11.Publ.pdf
Answer questions 11-15 with a short paragraph of 5-9 lines.11.Publ.pdfAnswer questions 11-15 with a short paragraph of 5-9 lines.11.Publ.pdf
Answer questions 11-15 with a short paragraph of 5-9 lines.11.Publ.pdf
arpitaeron555
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
ncct
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
BhuvanaR13
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODV
ijsrd.com
 
Research on RSA
Research on RSAResearch on RSA
Research on RSA
faizmajeed
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
IJNSA Journal
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
IJNSA Journal
 

Similar to Digital Signature Recognition using RSA Algorithm (20)

Presentation
PresentationPresentation
Presentation
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
Nwc rsa
Nwc rsaNwc rsa
Nwc rsa
 
Rsa
RsaRsa
Rsa
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Cryptography & Security
Cryptography & SecurityCryptography & Security
Cryptography & Security
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
Answer questions 11-15 with a short paragraph of 5-9 lines.11.Publ.pdf
Answer questions 11-15 with a short paragraph of 5-9 lines.11.Publ.pdfAnswer questions 11-15 with a short paragraph of 5-9 lines.11.Publ.pdf
Answer questions 11-15 with a short paragraph of 5-9 lines.11.Publ.pdf
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODV
 
Research on RSA
Research on RSAResearch on RSA
Research on RSA
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

Digital Signature Recognition using RSA Algorithm

  • 1. Presented By Vinayak Raja Sachin Sharma Manvika Singh 1
  • 2. RSA Public Key Encryption Algorithm The best known public key cryptosystem is RSA - named after its authors, Rivest, Shamir and Adelman 2
  • 3. Public-Key Cryptography • Public-key (or two-key) cryptography involves the use of two keys: • A public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures • A private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures 3
  • 4. Public-Key Cryptography Requirements • The public-key is easily computed from the private key and other information about the cipher • However, knowing the public-key and public description of the cipher, it is still computationally infeasible to compute the private key • Thus the public-key may be distributed to anyone wishing to communicate securely with its owner (although secure distribution of the public-key is a non-trivial problem - the key distribution problem) 4
  • 5. 5
  • 6. 6
  • 7. Application of Public-Key Ciphers • Three important uses of public-key algorithms: • Public-Key Distribution Schemes (PKDS) - where the scheme is used to securely exchange a single piece of information (whose value depends on the two parties, but cannot be set). • Signature Schemes - used to create a digital signature only, where the private-key signs (create) signatures, and the public- key verifies signatures • Public Key Schemes (PKS) - used for encryption, where the public-key encrypts messages, and the private-key decrypts messages. 7
  • 8. RSA Alogarthim RSA (Rivest-Shamir-Adelman) is the most commonly used public key algorithm. Can be used both for encryption and for digitally signing. It is generally considered to be secure when sufficiently long keys are used (512 bits is insecure, 768 bits is moderately secure, and 1024 bits is good, for now). The security of RSA relies on the difficulty of factoring large integers. Dramatic advances in factoring large integers would make RSA vulnerable. RSA is currently the most important public key algorithm. It is patented in the United States (expires year 2000), and free elsewhere. 8
  • 9. RSA Algorithm First choose two large prime numbers, p and q, and find their product, n. n is also called modulus in RSA jargon. Compute z = (p-1)(q-1) Next choose a number e, relatively prime to z = (p-1) (q-1) - this is the encryption key. Finally compute d such that the product of e and d is congruent to 1 mod ((p-1)(q-1)). This is the decryption key. 9
  • 11. RSA Algorithm Obviously, d can only be recovered if you reveal p and q, or if p and q are recovered from n, the modulus. Since we are assuming the factorization of n to be too hard to attempt, d cannot be recovered from e. Or so it is currently speculated. It has not, so far, been proven. Now e and n together form the public key, while d and n together form the private key. 11
  • 12. RSA Key Generation To use the scheme, first generate keys: Key-Generation by each user consists of: selecting two large primes at random (~100 digit), p, q calculating the system modulus n=p.q and p, q are primes selecting at random the encryption key e, e < n, gcd(e, φ(n)) = 1 12
  • 13. RSA Key Generation (cont’d) Solving the congruence to find the decryption key d: e.d ≡ 1 mod φ(n) 0 <= d <= n Publishing the public encryption key: Kpub={e,n} Securing the private decryption key: Kpvt={d,p,q} 13
  • 14. Encryption with RSA To encrypt a plaintext message block m, compute C=Me mod n To decrypt the block, compute M=Cd mod n Each plaintext block must be smaller than the value of n. 14
  • 15. RSA Example p = 3 q = 11 n = p X q = 33 -- This is the modulus z = (p-1) X (q -1) = 20 -- This is the totient function φ(n). There are 20 relative primes to 33. What are they? 1, 2, 4, 5, 7, 8, 10, 13, 14, 16, 17, 19, 20, 23, 25, 26, 28, 29, 31, 32 d = 7 -- 7 and 20 have no common factors but 1 7e = 1 mod 20 e = 3 C = Pe (mod n) P = Cd (mod n) 15
  • 16. 16
  • 17. RSA Weaknesses At present, 512 bit keys are considered weak, 1024 bit keys are probably secure enough for most purposes, and 2048 bit keys are likely to remain secure for decades. RSA is very vulnerable to chosen plaintext attacks. There is also a new timing attack that can be used to break many implementations of RSA.  The RSA algorithm is believed to be safe when used properly, but one must be very careful when using it to avoid these attacks. 17
  • 18. The Previous History of Factoring • The security of the RSA cryptosystem therefore depends on the fact, that it is practically impossible to factor the large known modulus n. So nobody can infer the two primes p and q from his or her knowledge of the publicly known modulus to gain the secret key. • 70-digit numbers will be factored today (1998) on a workstation within 10 hours. • 100-digit numbers will be factored on a workstation within 1 year. 18
  • 19. How is RSA used for privacy in practice? In practice, RSA is often used together with a secret-key cryptosystem, such as DES, to encrypt a message by means of an RSA digital envelope. Suppose Alice wishes to send an encrypted message to Bob. She first encrypts the message with DES, using a randomly chosen DES key. Then she looks up Bob's public key and uses it to encrypt the DES key. The DES-encrypted message and the RSA-encrypted DES key together form the RSA digital envelope and are sent to Bob. Upon receiving the digital envelope, Bob decrypts the DES key with his private key, then uses the DES key to decrypt the message itself. This combines the high speed of DES with the key-management convenience of RSA. 19
  • 20. Official Standard RSA is part of many official standards worldwide. The ISO (International Standards Organization) 9796 standard lists RSA as a compatible cryptographic algorithm, as does the ITU-T X.509 security standard. RSA is part of the Society for Worldwide Interbank Financial Telecommunications (SWIFT) standard, the French financial industry's ETEBAC 5 standard, the ANSI X9.31 rDSA standard and the X9.44 draft standard for the U.S. banking industry. The Australian key management standard, AS2805.6.5.3, also specifies RSA. RSA is found in Internet standards and proposed protocols including S/MIME IPSec, and TLS, the Internet standards-track successor to SSL, as well as the PKCS standard for the software industry. 20
  • 21. Applications RSA is currently used in a wide variety of products, platforms, and industries around the world. It is found in many commercial software products and is planned to be in many more. RSA is built into current operating systems by Microsoft, Apple, Sun, and Novell. In hardware, RSA can be found in secure telephones, on Ethernet network cards, and on smart cards. In addition, RSA is incorporated into all of the major protocols for secure Internet communications, including S/MIME, SSL and S/WAN. 21
  • 22. Applications It is also used internally in many institutions, including branches of the U.S. government, major corporations, national laboratories, and universities. RSA technology is licensed by more than 350 companies. The estimated installed base of RSA encryption engines is around 300 million, making it by far the most widely used public-key cryptosystem in the world. This figure is expected to grow rapidly as the Internet and the World Wide Web expand. 22
  • 23. How Fast is RSA? With the typical modular exponentiation algorithms used to implement RSA, public key operations take O(k2 ) steps, private-key operations take O(k3 ) steps, and key generation takes O(k4 ) steps, where k is the number of bits in the modulus. "Fast multiplication" techniques, such as FFT-based methods, require asymptotically fewer steps. 23
  • 24. How Fast is RSA? The speed and efficiency of the many commercially available software and hardware implementations of RSA are increasing rapidly.  On a 90 MHz Pentium, has a throughput for private-key operations of 21.6 kbits per second with a 512-bit modulus and 7.4 kbits per second with a 1024-bit modulus. The fastest RSA hardware has a throughput greater than 300 kbits per second with a 512-bit modulus, implying that it performs over 500 RSA private-key operations per second. 24
  • 25. 25