This document provides an overview of RSA encryption. It discusses the history of cryptography from early ciphers like the Caesar cipher to the development of public-key cryptography. Researchers Ron Rivest, Adi Shamir, and Leonard Adleman developed the RSA algorithm in 1977, which introduced the first practical public-key encryption. The document then explains how the RSA algorithm works by generating a public and private key pair based on large prime numbers, and how encryption and decryption utilize these keys along with exponentiation and modulo arithmetic. Number theory concepts like Fermat's Little Theorem and Euler's Theorem are also discussed to explain why RSA provides a one-way function and ensures only the private key holder can decrypt messages.
Introduction to Cryptography and the Public Key InfrastructureMike Gates
A white paper introducing the basics of cryptography and the Public Key Infrastructure (PKI). Those just getting into the arena of cybersecurity or those just simply curious about the topic will likely learn something new.
Bt0088 cryptography and network security1Techglyphs
The document discusses various topics related to cryptography and network security including:
1. The need for network security to prevent damage to organizations from hostile software or intruders.
2. Security attacks are any actions that compromise information security, while vulnerabilities are weaknesses that can be exploited by threats to cause harm.
3. The difference between substitution and transposition techniques for encryption, where substitution exchanges letters and transposition rearranges them.
4. Caesar cipher encryption of a sample plaintext using a key of 3.
This document provides an overview of cryptography. It defines cryptography as the science of securing messages from attacks. It discusses basic cryptography terms like plain text, cipher text, encryption, decryption, and keys. It describes symmetric key cryptography, where the same key is used for encryption and decryption, and asymmetric key cryptography, which uses different public and private keys. It also covers traditional cipher techniques like substitution and transposition ciphers. The document concludes by listing some applications of cryptography like e-commerce, secure data, and access control.
Cryptography is the science of securing messages through encryption and decryption techniques to ensure confidentiality, integrity, and authentication. There are two main categories of cryptography - symmetric key cryptography where the same key is used by the sender and receiver, and asymmetric key cryptography where different public and private keys are used. Common techniques include substitution ciphers which replace letters with other letters or symbols, and transposition ciphers which rearrange the positions of letters in a message. The keys and algorithms used aim to protect data from unauthorized parties.
This seminar report discusses symmetric key cryptography and proposes a new symmetric key algorithm. It begins with an introduction to cryptography and the importance of security. It then describes the two main types of cryptography: symmetric key and asymmetric key. Symmetric key cryptography uses a single key for both encryption and decryption, while asymmetric key uses different public and private keys. The report proposes a new symmetric key algorithm that uses simple steps of generating binary values, reversing numbers, dividing, and adding remainders and quotients. It claims this new algorithm is well-suited for encrypting small amounts of data in a cost-effective way. The report concludes the algorithm is simple but secure due to reverse operations, and the next step is developing a public
Pertemuan 4 information hiding (cryptography)newbie2019
The document discusses various topics in network security and cryptography. It begins by introducing cryptography and its basic concepts, including encryption, decryption, ciphers, and cryptosystems. It then discusses the goals of cryptography in providing confidentiality, integrity, authentication, and non-repudiation. The document outlines the main types of cryptography: symmetric key cryptography using a shared private key, asymmetric key cryptography using public/private key pairs, and hash functions which generate unique fingerprints of data. Examples of algorithms for each type are also provided.
Cryptography is the process of encrypting and decrypting data to protect it from unauthorized access. The document discusses the history of cryptography from early substitution ciphers to modern algorithms like AES. It describes symmetric cryptography which uses a single key and asymmetric cryptography which uses public/private key pairs. Popular algorithms for encryption, digital signatures, and hashing are also outlined along with attacks that can compromise cryptosystems like brute force and man-in-the-middle attacks.
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
This document proposes a Robust Key-Aggregate Cryptosystem (RKAC) that allows flexible and efficient assignment of decryption rights for encrypted data stored in cloud storage. The RKAC produces constant-sized ciphertexts such that a constant-sized aggregate decryption key can decrypt any subset of ciphertexts. This allows the data owner to share access to selected encrypted files by sending a single small aggregate key to authorized users, without decrypting the files themselves or distributing individual keys. The RKAC is described as providing a secure and flexible method for sharing encrypted data stored in the cloud.
Introduction to Cryptography and the Public Key InfrastructureMike Gates
A white paper introducing the basics of cryptography and the Public Key Infrastructure (PKI). Those just getting into the arena of cybersecurity or those just simply curious about the topic will likely learn something new.
Bt0088 cryptography and network security1Techglyphs
The document discusses various topics related to cryptography and network security including:
1. The need for network security to prevent damage to organizations from hostile software or intruders.
2. Security attacks are any actions that compromise information security, while vulnerabilities are weaknesses that can be exploited by threats to cause harm.
3. The difference between substitution and transposition techniques for encryption, where substitution exchanges letters and transposition rearranges them.
4. Caesar cipher encryption of a sample plaintext using a key of 3.
This document provides an overview of cryptography. It defines cryptography as the science of securing messages from attacks. It discusses basic cryptography terms like plain text, cipher text, encryption, decryption, and keys. It describes symmetric key cryptography, where the same key is used for encryption and decryption, and asymmetric key cryptography, which uses different public and private keys. It also covers traditional cipher techniques like substitution and transposition ciphers. The document concludes by listing some applications of cryptography like e-commerce, secure data, and access control.
Cryptography is the science of securing messages through encryption and decryption techniques to ensure confidentiality, integrity, and authentication. There are two main categories of cryptography - symmetric key cryptography where the same key is used by the sender and receiver, and asymmetric key cryptography where different public and private keys are used. Common techniques include substitution ciphers which replace letters with other letters or symbols, and transposition ciphers which rearrange the positions of letters in a message. The keys and algorithms used aim to protect data from unauthorized parties.
This seminar report discusses symmetric key cryptography and proposes a new symmetric key algorithm. It begins with an introduction to cryptography and the importance of security. It then describes the two main types of cryptography: symmetric key and asymmetric key. Symmetric key cryptography uses a single key for both encryption and decryption, while asymmetric key uses different public and private keys. The report proposes a new symmetric key algorithm that uses simple steps of generating binary values, reversing numbers, dividing, and adding remainders and quotients. It claims this new algorithm is well-suited for encrypting small amounts of data in a cost-effective way. The report concludes the algorithm is simple but secure due to reverse operations, and the next step is developing a public
Pertemuan 4 information hiding (cryptography)newbie2019
The document discusses various topics in network security and cryptography. It begins by introducing cryptography and its basic concepts, including encryption, decryption, ciphers, and cryptosystems. It then discusses the goals of cryptography in providing confidentiality, integrity, authentication, and non-repudiation. The document outlines the main types of cryptography: symmetric key cryptography using a shared private key, asymmetric key cryptography using public/private key pairs, and hash functions which generate unique fingerprints of data. Examples of algorithms for each type are also provided.
Cryptography is the process of encrypting and decrypting data to protect it from unauthorized access. The document discusses the history of cryptography from early substitution ciphers to modern algorithms like AES. It describes symmetric cryptography which uses a single key and asymmetric cryptography which uses public/private key pairs. Popular algorithms for encryption, digital signatures, and hashing are also outlined along with attacks that can compromise cryptosystems like brute force and man-in-the-middle attacks.
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
This document proposes a Robust Key-Aggregate Cryptosystem (RKAC) that allows flexible and efficient assignment of decryption rights for encrypted data stored in cloud storage. The RKAC produces constant-sized ciphertexts such that a constant-sized aggregate decryption key can decrypt any subset of ciphertexts. This allows the data owner to share access to selected encrypted files by sending a single small aggregate key to authorized users, without decrypting the files themselves or distributing individual keys. The RKAC is described as providing a secure and flexible method for sharing encrypted data stored in the cloud.
The document describes the history and types of cryptography. It discusses symmetric and asymmetric cryptography algorithms such as DES, AES, RSA, and Diffie-Hellman. It also covers cryptanalysis techniques like brute force attacks and digital signatures. Public key infrastructure (PKI) uses digital certificates to authenticate users, while protocols like PGP, S/MIME, and PEM can encrypt email messages.
This document proposes enhancing an existing "Odd-Even Transposition Technique" for encrypting plaintext. The enhancement applies the "Rail-Fence Technique" to the cipher text for added complexity. The procedure involves numbering words in the plaintext as odd or even, arranging characters in a table based on their number, then reversing columns and words to generate the cipher text. Applying Rail-Fence Technique to the resulting cipher text further scrambles the text. The example provided encrypts the plaintext "change never informs its arrival" using this two-step process.
The document discusses post-quantum cryptography and the threats posed by quantum computers. It explains that quantum computers could break current asymmetric cryptographic algorithms like RSA and ECC that secure digital communications. It identifies various attack vectors like the TLS/SSL handshake and digital certificate chain of trust. It also discusses the need for quantum-safe cryptographic systems and how organizations are preparing for a post-quantum future through approaches like hybrid certificates.
This document provides an overview of network security and cryptography. It discusses the history and basic concepts of networking and security. The document covers risk management, network threats like viruses and denial of service attacks. It also explains different network security methods like virtual private networks (VPNs), firewalls, and IPSec. Cryptography techniques like secret key cryptography, public key cryptography, hash functions, and authentication methods are summarized. Popular cryptographic algorithms and protocols like PGP, SHA, and AAA servers are also mentioned.
The document describes a thesis submitted by Amogh Mahapatra and Rajballav Dash for their Bachelor of Technology degree. It examines using the Hill cipher technique and self-repetitive matrices for data encryption and decryption. Specifically, it proposes an innovation to the conventional Hill cipher method using the concept of self-repetitive matrices. This approach is mathematically derived and implemented to simulate a communication channel with compression techniques. The method aims to address issues with inverting the Hill cipher's multiplicative matrix by using periodically repeating matrices.
a performance analysis of generalized key scheme block cipher (gksbc) algorit...INFOGAIN PUBLICATION
Information is a commodity. Information has economic value and production of it incurs cost. Securing the information is posing a considerable challenge. The cryptographic technology plays a leading role in securing the owners right on produced information. A continuous development of new encryption systems are necessitated with the advancement in security and efficiency needs. Cryptanalytic studies have demonstrated the superior capability of recently developed Generalized Key Scheme Block Cipher (GKSBC) algorithm in terms of stability, execution time and encryption quality compared to standard security algorithms. This paper proposes to evaluate the enduring capacity of GKSBC to various cryptanalytic attacks viz., Brute – Force Attack, Differential Cryptanalysis, Integral Cryptanalysis, Linear Cryptanalysis and Rectangle attack. None of the traditional attacks are designed to decrypt GKSBC encryption as the use of key scheme is different in it and therefore robust to the conventional cryptanalytic attacks.
Our wish here is to present some functional components, which are essential to the implementation of cryptographic protocols, such as those underlying the BlockChain.
BeeBryte - Energy Intelligence & Automation
www.beebryte.com
This document discusses the implementation of a hybrid cryptography algorithm combining DES and IDEA. It begins by providing background on encryption, key escrow schemes, and the need for stronger algorithms. It then separately describes DES and IDEA, including their structure, performance analysis, and types of cryptanalysis attacks they are susceptible to. The document proposes a new hybrid algorithm combining DES and IDEA to improve security and integrity.
Today we use cryptography in almost everywhere. From surfing the web over https, to working remotely over ssh. However, many of us do not appreciate the subtleties of crypto primitives, and the lack of correct and updated resources leads to design and development of vulnerable applications. In this talk, we cover the building block of modern crypto, and how to develop secure applications in Python.
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
This document summarizes previous research that has surveyed and compared various symmetric key cryptographic techniques. Several studies analyzed the performance of algorithms like DES, 3DES, AES, Blowfish, RC4 in terms of encryption/decryption time, memory usage, power consumption, throughput, and security against attacks. Most found that Blowfish had among the best performance overall, being fast and requiring few resources while maintaining strong security. AES generally required more processing power and time than alternatives like DES or RC4. The performance of algorithms could also vary based on file/data type, size, and the computing platform or operating system used.
Evolution of Cryptography and Cryptographic techniquesMona Rajput
1) Cryptography originated from the inherent human needs to communicate selectively and share information privately.
2) Early forms of cryptography included hieroglyphs and cipher techniques used by ancient Egyptian and Roman civilizations.
3) Modern cryptography is based on mathematical concepts from fields like number theory and uses algorithms like symmetric encryption, asymmetric encryption, hashing, and steganography to provide security services like confidentiality, integrity, authentication, and non-repudiation.
Encryption works by encoding information in such a way that only those with the key can decode it. There are two main types: symmetric-key encryption where both parties have the same key, and public-key encryption where each party has a public and private key. Popular encryption standards and protocols include AES, SSL/TLS, and algorithms like DES which use varying length encryption keys to encrypt data for transmission.
Cryptography is a process that scrambles information to make it unreadable except by authorized parties. It has four basic parts: plaintext, ciphertext, cryptographic algorithms, and keys. Public key cryptography uses two keys - a private key that remains secret, and a public key that can be openly distributed. This allows secure transmission without pre-sharing secret keys. While public key cryptography has advantages for Internet use, it has disadvantages of slower transmission speeds and larger key sizes compared to symmetric cryptography.
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystemsijtsrd
Computer and network security system are needed to protect data during their transmissions and to guarantee that data are authentic. Cryptography is useful not only for proving data to be secure but also for ensuring that data have not altered. So, it is needed to implement the public key cryptosystem in computer and network security system. In cryptography, symmetric key cryptosystems are faster than public key asymmetric cryptosystems. But public key cryptosystems are more secure than symmetric key cryptosystems and widely used in computer and network security system. This describes the comparison of RSA Rivest, Shame, Adelman public key cryptosystem and ElGamal public key cryptosystem. RSA public key cryptosystem is faster than ElGamal in encryption and decryption. This paper also describes the encryption decryption time comparison of RSA and ElGamal. Kyaw Myo Thu | Kyaw Swar Hlaing | Nay Aung Aung "Time Performance Analysis of RSA and Elgamal Public-Key Cryptosystems" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28096.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/28096/time-performance-analysis-of-rsa-and-elgamal-public-key-cryptosystems/kyaw-myo-thu
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsTharindu Weerasinghe
The document analyzes the secrecy and performance of symmetric key encryption algorithms including block ciphers (DES, TripleDES, AES), stream ciphers (RC2, RC4) and hybrid algorithms combining block and stream ciphers (TripleDES+RC4, AES+RC4). The analysis is conducted based on two measurement criteria (secrecy of ciphers and encryption time) under two circumstances (variable input plaintext size and variable input plaintext length representing passwords). Results are presented in a table showing average secrecy values for each algorithm over varying input data sizes. The tool created allows users to select an algorithm and see corresponding performance and secrecy results.
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
This document discusses surreptitiously weakening cryptographic systems through sabotage. It provides an overview of this domain using historical examples to develop a taxonomy for comparing different approaches to sabotage. The taxonomy characterizes weaknesses along dimensions like secrecy, utility, and scope. Understanding avenues for and defenses against deliberate cryptographic weakening is important given allegations that governments have subverted cryptographic standards.
This document discusses the importance of cryptography and PKI for ensuring security, privacy, and authentication in digital communications. It addresses the three main goals of cryptography - confidentiality, integrity, and availability. The document then provides an overview of cryptographic algorithms, including symmetric and asymmetric encryption as well as hash functions. It also discusses common cryptanalytic attacks and how the strength of encryption increases exponentially with longer key sizes, making brute-force attacks infeasible for sufficiently long keys.
This document discusses the use of number theory in cryptography. It begins by describing several historical ciphers such as the Caesar cipher, Morse code, the Enigma machine, public key cryptography, and the Scytale cipher. It then explains how number theory is applied in some of these ciphers, such as how the Caesar cipher uses modulo arithmetic, how RSA public key cryptography is based on the difficulty of factoring large numbers, and how the Enigma machine's encryption can be expressed mathematically as a product of permutations. The document concludes by noting the vast number of possible settings for the Enigma machine.
This document discusses the RSA network security approach. It begins with an introduction to RSA, describing how it uses large prime numbers and exponentiation to encrypt and decrypt messages. It also discusses how RSA can be used for both encryption and digital signatures to provide authentication. The document then covers symmetric and public key cryptography concepts before focusing more on the specifics of the RSA algorithm and its use for secure network communications.
The document describes the history and types of cryptography. It discusses symmetric and asymmetric cryptography algorithms such as DES, AES, RSA, and Diffie-Hellman. It also covers cryptanalysis techniques like brute force attacks and digital signatures. Public key infrastructure (PKI) uses digital certificates to authenticate users, while protocols like PGP, S/MIME, and PEM can encrypt email messages.
This document proposes enhancing an existing "Odd-Even Transposition Technique" for encrypting plaintext. The enhancement applies the "Rail-Fence Technique" to the cipher text for added complexity. The procedure involves numbering words in the plaintext as odd or even, arranging characters in a table based on their number, then reversing columns and words to generate the cipher text. Applying Rail-Fence Technique to the resulting cipher text further scrambles the text. The example provided encrypts the plaintext "change never informs its arrival" using this two-step process.
The document discusses post-quantum cryptography and the threats posed by quantum computers. It explains that quantum computers could break current asymmetric cryptographic algorithms like RSA and ECC that secure digital communications. It identifies various attack vectors like the TLS/SSL handshake and digital certificate chain of trust. It also discusses the need for quantum-safe cryptographic systems and how organizations are preparing for a post-quantum future through approaches like hybrid certificates.
This document provides an overview of network security and cryptography. It discusses the history and basic concepts of networking and security. The document covers risk management, network threats like viruses and denial of service attacks. It also explains different network security methods like virtual private networks (VPNs), firewalls, and IPSec. Cryptography techniques like secret key cryptography, public key cryptography, hash functions, and authentication methods are summarized. Popular cryptographic algorithms and protocols like PGP, SHA, and AAA servers are also mentioned.
The document describes a thesis submitted by Amogh Mahapatra and Rajballav Dash for their Bachelor of Technology degree. It examines using the Hill cipher technique and self-repetitive matrices for data encryption and decryption. Specifically, it proposes an innovation to the conventional Hill cipher method using the concept of self-repetitive matrices. This approach is mathematically derived and implemented to simulate a communication channel with compression techniques. The method aims to address issues with inverting the Hill cipher's multiplicative matrix by using periodically repeating matrices.
a performance analysis of generalized key scheme block cipher (gksbc) algorit...INFOGAIN PUBLICATION
Information is a commodity. Information has economic value and production of it incurs cost. Securing the information is posing a considerable challenge. The cryptographic technology plays a leading role in securing the owners right on produced information. A continuous development of new encryption systems are necessitated with the advancement in security and efficiency needs. Cryptanalytic studies have demonstrated the superior capability of recently developed Generalized Key Scheme Block Cipher (GKSBC) algorithm in terms of stability, execution time and encryption quality compared to standard security algorithms. This paper proposes to evaluate the enduring capacity of GKSBC to various cryptanalytic attacks viz., Brute – Force Attack, Differential Cryptanalysis, Integral Cryptanalysis, Linear Cryptanalysis and Rectangle attack. None of the traditional attacks are designed to decrypt GKSBC encryption as the use of key scheme is different in it and therefore robust to the conventional cryptanalytic attacks.
Our wish here is to present some functional components, which are essential to the implementation of cryptographic protocols, such as those underlying the BlockChain.
BeeBryte - Energy Intelligence & Automation
www.beebryte.com
This document discusses the implementation of a hybrid cryptography algorithm combining DES and IDEA. It begins by providing background on encryption, key escrow schemes, and the need for stronger algorithms. It then separately describes DES and IDEA, including their structure, performance analysis, and types of cryptanalysis attacks they are susceptible to. The document proposes a new hybrid algorithm combining DES and IDEA to improve security and integrity.
Today we use cryptography in almost everywhere. From surfing the web over https, to working remotely over ssh. However, many of us do not appreciate the subtleties of crypto primitives, and the lack of correct and updated resources leads to design and development of vulnerable applications. In this talk, we cover the building block of modern crypto, and how to develop secure applications in Python.
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
This document summarizes previous research that has surveyed and compared various symmetric key cryptographic techniques. Several studies analyzed the performance of algorithms like DES, 3DES, AES, Blowfish, RC4 in terms of encryption/decryption time, memory usage, power consumption, throughput, and security against attacks. Most found that Blowfish had among the best performance overall, being fast and requiring few resources while maintaining strong security. AES generally required more processing power and time than alternatives like DES or RC4. The performance of algorithms could also vary based on file/data type, size, and the computing platform or operating system used.
Evolution of Cryptography and Cryptographic techniquesMona Rajput
1) Cryptography originated from the inherent human needs to communicate selectively and share information privately.
2) Early forms of cryptography included hieroglyphs and cipher techniques used by ancient Egyptian and Roman civilizations.
3) Modern cryptography is based on mathematical concepts from fields like number theory and uses algorithms like symmetric encryption, asymmetric encryption, hashing, and steganography to provide security services like confidentiality, integrity, authentication, and non-repudiation.
Encryption works by encoding information in such a way that only those with the key can decode it. There are two main types: symmetric-key encryption where both parties have the same key, and public-key encryption where each party has a public and private key. Popular encryption standards and protocols include AES, SSL/TLS, and algorithms like DES which use varying length encryption keys to encrypt data for transmission.
Cryptography is a process that scrambles information to make it unreadable except by authorized parties. It has four basic parts: plaintext, ciphertext, cryptographic algorithms, and keys. Public key cryptography uses two keys - a private key that remains secret, and a public key that can be openly distributed. This allows secure transmission without pre-sharing secret keys. While public key cryptography has advantages for Internet use, it has disadvantages of slower transmission speeds and larger key sizes compared to symmetric cryptography.
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystemsijtsrd
Computer and network security system are needed to protect data during their transmissions and to guarantee that data are authentic. Cryptography is useful not only for proving data to be secure but also for ensuring that data have not altered. So, it is needed to implement the public key cryptosystem in computer and network security system. In cryptography, symmetric key cryptosystems are faster than public key asymmetric cryptosystems. But public key cryptosystems are more secure than symmetric key cryptosystems and widely used in computer and network security system. This describes the comparison of RSA Rivest, Shame, Adelman public key cryptosystem and ElGamal public key cryptosystem. RSA public key cryptosystem is faster than ElGamal in encryption and decryption. This paper also describes the encryption decryption time comparison of RSA and ElGamal. Kyaw Myo Thu | Kyaw Swar Hlaing | Nay Aung Aung "Time Performance Analysis of RSA and Elgamal Public-Key Cryptosystems" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28096.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/28096/time-performance-analysis-of-rsa-and-elgamal-public-key-cryptosystems/kyaw-myo-thu
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsTharindu Weerasinghe
The document analyzes the secrecy and performance of symmetric key encryption algorithms including block ciphers (DES, TripleDES, AES), stream ciphers (RC2, RC4) and hybrid algorithms combining block and stream ciphers (TripleDES+RC4, AES+RC4). The analysis is conducted based on two measurement criteria (secrecy of ciphers and encryption time) under two circumstances (variable input plaintext size and variable input plaintext length representing passwords). Results are presented in a table showing average secrecy values for each algorithm over varying input data sizes. The tool created allows users to select an algorithm and see corresponding performance and secrecy results.
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
This document discusses surreptitiously weakening cryptographic systems through sabotage. It provides an overview of this domain using historical examples to develop a taxonomy for comparing different approaches to sabotage. The taxonomy characterizes weaknesses along dimensions like secrecy, utility, and scope. Understanding avenues for and defenses against deliberate cryptographic weakening is important given allegations that governments have subverted cryptographic standards.
This document discusses the importance of cryptography and PKI for ensuring security, privacy, and authentication in digital communications. It addresses the three main goals of cryptography - confidentiality, integrity, and availability. The document then provides an overview of cryptographic algorithms, including symmetric and asymmetric encryption as well as hash functions. It also discusses common cryptanalytic attacks and how the strength of encryption increases exponentially with longer key sizes, making brute-force attacks infeasible for sufficiently long keys.
This document discusses the use of number theory in cryptography. It begins by describing several historical ciphers such as the Caesar cipher, Morse code, the Enigma machine, public key cryptography, and the Scytale cipher. It then explains how number theory is applied in some of these ciphers, such as how the Caesar cipher uses modulo arithmetic, how RSA public key cryptography is based on the difficulty of factoring large numbers, and how the Enigma machine's encryption can be expressed mathematically as a product of permutations. The document concludes by noting the vast number of possible settings for the Enigma machine.
This document discusses the RSA network security approach. It begins with an introduction to RSA, describing how it uses large prime numbers and exponentiation to encrypt and decrypt messages. It also discusses how RSA can be used for both encryption and digital signatures to provide authentication. The document then covers symmetric and public key cryptography concepts before focusing more on the specifics of the RSA algorithm and its use for secure network communications.
This document discusses the application of number theory in cryptography. It begins by describing several historical ciphers such as the Caesar cipher, Morse code, the Enigma machine, and public key cryptography. It then examines how number theory underpins various ciphers, such as how the Caesar cipher uses modular arithmetic and how the RSA algorithm relies on the difficulty of factoring large numbers. The document concludes by discussing future work exploring other ciphers and their implementation in programming languages like MATLAB.
RSA is a public-key cryptosystem that uses public and private key pairs to encrypt and decrypt messages. The public key is used to encrypt messages and can be shared widely, while the private key is used to decrypt messages and must be kept secret. RSA works because it is computationally infeasible to factor the product of two large prime numbers, even though it is easy to multiply them together.
This document provides an introduction and table of contents to cryptography. It discusses the main goals of cryptography which are confidentiality, data integrity, authentication, and non-repudiation. It then defines key vocabulary terms used in cryptography such as plaintext, ciphertext, encryption, decryption, stream ciphers, block ciphers, and cryptosystems. Finally, it provides a brief high-level history of cryptography mentioning examples from 400 BC Spartan sky tale cipher to Julius Caesar's substitution cipher.
Answer questions 11-15 with a short paragraph of 5-9 lines.11.Publ.pdfarpitaeron555
Answer questions 11-15 with a short paragraph of 5-9 lines.
11.Public Key Cryptography:
Examples are:
12.Steganography is
Example of steganography is:
13.Symmetric Key Algorithms:
Examples are:
14.Discuss the following concepts: RSA (Rivest, Shamir, Adleman):
15.What are PGP key sizes:
Solution
Answers:
11.Public Key Cryptography:
-> Public Key Cryptography was discovered by R. Rivest, A. Shamir and L.Adleman .
->This method has been widely used to ensure security and secrecy in electronic communication
and particularly where financial transactions are involved.
->The private key pair is used to decrypt messages, and this key will only work if the public key
of the same site was used to encrypt the message. That is to say, Site B\'s public key is obtained
from a directory, then used by Site A to encrypt a message for them.
-> The Public Key Cryptography is to send messages in such a way that only the person who
receives them can understand them even if the method of encryption is discovered by \'an
enemy\' who intercepts the messages.
-> The method depends on the fact that while it is easy to calculate the product of two large
prime numbers.
example:
->Let two primes be a= 7 and b= 13. Thus, modulus n = ab = 7 x 13 = 91.
12)Steganography is
->Steganography is the hiding of a secret message within an ordinary message and the extraction
of it at its destination.
->Steganography takes cryptography a step farther by hiding an encrypted message so that no
one suspects it exists.
-> The difference between steganography and cryptography is that in cryptography, one can tell
that a message has been encrypted, but he cannot decode the message without knowing the
proper key.
-> In steganography, the message itself may not be difficult to decode, but most people would
not detect the presence of the message.
example:
For example, one could hide a text message within a paragraph of words, so that by isolating
every 10thword, the secret message can be detected.
13)Symmetric Key Algorithms:
-> symmetric key algorithms are used primarily for the bulk encryption of data or data streams.
->These algorithms are designed to be very fast and have a large number of possible keys.
-> it is used for the same cryptographic keys for both encryption ofplaintext and decryption of
ciphertext.
->The keys may be identical or there may be a simple transformation to go between the two
keys.
Types of symmetric-key algorithms:
a)Stream ciphers encrypt the digits (typically bytes) of a message one at a time.
b)Block ciphers take a number of bits and encrypt them as a single unit, padding the plaintext so
that it is a multiple of the block size. Blocks of 64 bits were commonly used.
-> Symmetric cryptography was well suited for organizations such as governments, military, and
big financial corporations were involved in the classified communication.
14) RSA:
->This cryptosystem is one the initial system. It remains most employed cryptosystem even
today. The system was invented by.
This document discusses cryptography and the Caesar cipher. It begins by defining cryptography as the encoding of messages to achieve secure communication and outlines its goals of confidentiality, integrity, and availability. The document then describes the Caesar cipher technique, in which each letter is shifted a fixed number of positions in the alphabet. It provides an example of encrypting a message with a shift of 11. The document explains that the Caesar cipher is vulnerable to brute force and statistical cryptanalysis due to its small key space and predictable letter frequencies. It concludes that more advanced algorithms are needed for secure encryption in the digital age.
Alex WANG - What is the most effective cryptosystem for public-key encryption?AlexWang212277
The document discusses several cryptosystems used for public-key encryption, including RSA, Diffie-Hellman key exchange, and elliptic curve cryptography. It provides background on necessary mathematical concepts like modular arithmetic, primes, and discrete logarithms. The author analyzes the security, efficiency, and ability to withstand large adversaries of each cryptosystem to determine the most effective for public-key encryption.
This document provides an overview of cryptography concepts and algorithms. It discusses symmetric and asymmetric encryption algorithms such as DES, AES, RSA. It also covers hashing algorithms like MD5 and SHA which are used to generate cryptographic checksums of documents. The key ideas are that encryption encodes information, decryption decodes it, symmetric algorithms use the same key for both, and asymmetric algorithms use different public/private keys for encryption and decryption respectively.
Cryptography and Symmetric Key Algorithms
Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.
OR
The art of creating and implementing secret codes and ciphers is known as cryptography.
Sri Hari Uppalapati gave a presentation on the One Time Pad (OTP) encryption method. OTP uses a randomly generated key that is as long as the plaintext message. The key is used to encrypt the message one time and then discarded, making it impossible to decrypt the ciphertext without the key. OTP is information theoretically secure if implemented correctly, but it is not practical for most uses due to the key management issues. The presentation received average to good peer reviews, with comments noting the clear explanations but room for improvement. Reviewers suggested providing more examples or comparisons to other methods.
Symmetric key encryption uses a secret key that is shared between two computers to encrypt and decrypt messages sent between them. Public key encryption addresses the weakness of needing to securely share a key beforehand by using a hashing algorithm to generate keys from input values, making it nearly impossible to derive the original input without knowing the data used to create the hash. A popular implementation of public key encryption is Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS), which are Internet security protocols used by browsers and servers to transmit sensitive information securely.
This document contains a question bank with answers related to cyber security. It discusses topics like the CIA triad of confidentiality, integrity and availability, authentication and authorization. It also defines terms like availability, integrity, non-repudiation and confidentiality. Examples are provided for different authentication factors like something you know, something you have and something you are. The document also discusses symmetric and asymmetric encryption, firewalls and the fundamentals of the domain name system.
cryptography presentation this about how cryptography worksvimalguptaofficial
Cryptography is the process of encrypting information to hide its meaning and involves techniques like cipher systems that scramble letters and numbers. Different encryption methods have been used throughout history from simple substitution ciphers like the Caesar cipher used by Julius Caesar to modern techniques relying on complex mathematics. Alan Turing helped crack the German Enigma code during World War II by designing the bombe machine to determine the settings of the Enigma rotors and help decrypt messages.
The document provides an overview of a course on PKI (Public Key Infrastructure) technology. It outlines the topics that will be covered over two days, including secret key cryptography algorithms like AES and RSA, digital certificates, certificate authorities, and practical PKI applications like S/MIME, SSL, and IPSEC. The objectives of the course are to understand cryptographic fundamentals, public key infrastructure elements and how they interact, and why PKI is useful for enabling e-commerce and enhancing security.
A Literature Review of Some Modern RSA Variantsijsrd.com
This document provides a literature review of modern variants of the RSA cryptosystem. It discusses several variants proposed in other research papers that aim to address weaknesses in the original RSA algorithm, such as improving security against fault-based attacks. The document analyzes the merits and drawbacks of each variant, such as increased computation time or improved security levels. It concludes that RSA remains very popular for encryption and decryption due to its strong security with large key sizes, and more research is still needed to develop variants with even stronger security.
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
Cryptography defines different methods and technologies used in ensuring communication between two parties over any communication medium is secure, especially in presence of a third part. This is achieved through the use of several methods, such as encryption, decryption, signing, generating of pseudo-random numbers, among many others. Cryptography uses a key, or some sort of a password to either encrypt or decrypt a message that needs to be kept secret. This is made possible using two classes of key-based encryption and decryption algorithms, namely symmetric and asymmetric algorithms. The best known and the most widely used public key system is RSA. This algorithm comprises of three phases, which are the key generation phase, encryption phase, and the decryption phase. Owing to the advancement in computing technology, RSA is prone to some security risks, which makes it less secure. The following paper preview different proposals on different methods used to enhance the RSA algorithm and increase its security. Some of these enhancements include combining the RSA algorithm with Diffie-Hellman or ElGamal algorithm, modification of RSA to include three or four prime numbers, offline storage of generated keys, a secured algorithm for RSA where the message can be encrypted using dual encryption keys, etc.
1. RSA Encryption
Brandon Liang
MAT255 Number Theory
Davidson College
May 13, 2015
Contents
1 Introduction 1
1.1 Early Application of Cryptography . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 From “Caesar Cipher” to “Public Key Cryptography” to “RSA” . . . . . . . 3
1.3 “RSA” and RSA Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2 RSA Algorithm 6
2.1 How It Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 Generating Public and Private Keys . . . . . . . . . . . . . . . . . . . . . . . 7
2.3 Why It Works–Number Theory behind RSA . . . . . . . . . . . . . . . . . . 7
2.4 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.5 Why RSA is Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3 Further Exploration of RSA 10
3.1 Attacks in History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4 References and Bibliography 12
Abstract
This article briefly outlines the history and development of RSA encryption and how
it is stands out compared to other earlier cryptographic methods. It then explains the
algorithm and provides examples to help readers better understand RSA encryption.
In the end, the article will list one well-known attack on RSA cryptosystem.
1 Introduction
1.1 Early Application of Cryptography
Ever since events are recorded in human civilization, there has been a need of cryptography.
To give a formal definition of cryptography, it is the enciphering and deciphering of messages
1
2. in secret code or cipher1
. An informal interpretation could be the protection and secrecy
of information and message traveling from the sender to the desired audience or receiver
through a public space. The effectiveness of a cryptosystem is measured by the difficulty to
decipher the encoded message by the general public. Here the process of enciphering is also
known as “Encrypting” and the process of deciphering is also known as “Decrypting”.
For clarity purpose, a bit is known as the number of digits by a number and one byte consists
of 8 bits.
In CSC121, we had a homework problem called “Caesar Cipher” 2
where we were to
crack one of the oldest and most well-known encryption schemes. The given text contains
information just like normal words, symbols and punctuations but the only distinction is
that every single letter is shifted by the same amount to a new letter. For instance, if the
shift amount is 1, then “a” would be enciphered to “b”. The trick here is that since there
are only 26 English letters and each letter can only be shifted/enciphered to another letter,
one is able to crack the ciphered text by trying at most 26 shift amounts to see which shift
amount produces the most English-like text.
In the following illustration, there is a left shift amount of 3 where, for instance, the letter
“E” is encrypted as “B”.
3
Here is an example of a ciphered text and the corresponding deciphered/plain text with
a right shift amount of 34
:
Ciphertext: WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ
Plaintext: THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG
1
“cryptography.” Merriam-Webster.com
2
“It is named after Julius Caesar who is believed to have used the technique to protect important military
secrets.” Hw6.pdf. CSC121
3
“Caesar Cipher.” Wikipedia
4
“Caesar Cipher.” Wikipedia
2
3. Even though the cipher text can be deciphered relatively quickly since there are only 26
possible shift amounts, this example illustrates how early cryptography was first applied and
practiced to protect the secrecy of information and messages.
1.2 From “Caesar Cipher” to “Public Key Cryptography” to “RSA”
So the essential question arrives: How do we ensure a ciphered message doesn’t get deci-
phered that quickly, or at all? This touches base on the essence of cryptography – protection
and secrecy of information.
If a ciphered message can be deciphered rather quickly and effortlessly by anyone, then
cryptography becomes pointless. In the “Imitation Game”5
, Alan Turing was able to use
his Turing machine and just a slight piece of clue to crack the secret message generated
by Enigma and help the Allied defeat the Nazi. However, if the desired audience of a ci-
phered text is not able to decrypt the message efficiently, it will also hurt the purpose of
cryptography, since it may remain an unsolvable puzzle. Thus, the historical development of
cryptography had always been trying to achieve these two themes: safety and efficiency. It
needs to be difficult for all but some selectively. In other words, before the best encryption
method was published (spoiler alert: RSA Encryption!), researchers had tried to come up
with a cryptographic method that ensures not anyone but only the desired audience can
decrypt the ciphered message.
However, the restraint remained. all the cryptosystems before RSA involve a public key
and a private key. The public key is for encryption and the private key is for decryption.
As an example, the shift amount in ”Caesar Cipher” is both the public and the private key.
Since the public key is identical to the private key in “Caesar Cipher”, there is no sense of
confidentiality in private key, which leads to little difficulty in depichering the “Caesar Ci-
pher”. Notice that the public key and private key are inverse functions of each other, because
the deciphered message has to match the original message. Hence, in all early cryptosys-
tems, encryption and decryption are considered symmetric, since the process of decryption
is simply the opposite or reverse of that of encryption.
Therefore, the challenge now becomes how to come up with a public and private key
system where the private key still reverses the effect of the public key but also preserves
confidentiality and secrecy for the receiver of the message against the general public.
5
“Imitation Game.” 2014
3
4. 6
Whitfield Diffie was able to find an asymmetric key, under collaboration with Martin
Hellman. In such cryptosystem, the public and private keys are distinct, where the private
key is the decryption key and the public key is the encryption key.7
For example, if Bob
wants to send a message to Alice, he is able to encrypt the message using Alices public key,
but not able to decrypt an encrypted message, since he doesn’t have the private key. Only
Alice can decrypt that message, because the private decryption key is asymmetric and thus
not open or easy to find. To break it down, this cryptosystem involves a one-way function,
“which is irreversible unless the decoder has a special piece of knowledge unknown to the
rest of the world–the private key.”8
9
6
“Symmetric Key Cryptography (Non-Technical).” abbicabandlng.wordpress.com
7
“The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank
8
“The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank
9
“Diffie-Hellman Key Exchange.” Stackoverflow
4
5. However, Diffie never came up with a specific one-way function. Nevertheless, his paper
(published in 1975) showed that there was indeed a solution to key distribution with an
asymmetric key system that relies on a one-way function and that sparked interest among
other mathematicians and scientists.10
By 1977, three researchers: Ron Rivest, Adi Shamir,
and Leonard Adleman, came up with a solution. And that marks the birth of RSA Encryp-
tion.
1.3 “RSA” and RSA Encryption
“RSA” stands for the acronym of the surnames of the three contributors: Ron Rivest, Adi
Shamir, and Leonard Adleman, who were all computer science professors and researchers at
Massachusetts Institute of Technology. The order of the names follows that on the original
paper they published in 1977, “A Method for Obtaining Digital Signatures and Public- Key
Cryptosystems”11
, where their algorithm of cryptosystem was first presented to the world.
12
(from left ro right: Adi Shamir, Ron Rivest and Leonard Adleman)
Rivest is a computer scientist with an exemplary ability to apply new ideas in new places. He
also kept up with the latest scientific papers, so as to lead ideas for the one-way function.13
Shamir, also a computer scientist, has a lightning intellect and ability to focus on the core
of a problem. He as well as Rivest generated ideas for the one-way function.14
Adleman,
however, is a mathematician with extraordinary stamina, rigor and patience. He was largely
10
“The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank
11
“A Method for Obtaining Digital Signatures and Public- Key Cryptosystems”, Rivest, Shamir, Adleman.
12
usc.edu
13
“The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank
14
“The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank
5
6. responsible for spotting the flaws within the ideas of Rivest and Shamir, and ensured that
they did not follow false leads.15
As ”inventors”, Rivest and Shamir spent a year coming up
with ideas, and Adleman, as a ”proofreader”, spent a year shooting them down.
One night in April, 1977, Rivest found the answer to the question that had bothered the
three of them for a long time: Is it possible to find a one-way function that can be reversed
only if the receiver has some special information? He then formalized the solution with the
help of Shamir and Adleman.16
The system was later named “RSA”, for Rivest, Shamir,
and Adleman, and its success in finding a one-way function makes it stand out as the best
and most commonly-used cryptosystem.
2 RSA Algorithm
2.1 How It Works
17
Here we use Bob and Alice again to explain how RSA encryption works. It involves 6 key
elements:
p, q, n, φ(n), e, d
If Bob wants to send a secret message to Alice, Alice will need to generate the public and
private keys first, since Bob will need this public key to encrypt his message.
So Alice first chooses two random primes p and q. The larger the primes, the safer the
encryption.18
Then she multiplies p and q to get n = pq and also the Euler Phi Function,
φ(n) = (p−1)(q −1), which is also known as Totient. Alice then chooses a random exponent
e such that 2 ≤ e < φ(n) and gcd(e, φ(n)) = 1. This e, is one of the public keys as it is the
encryption exponent. She then finds a d such that ed ≡ 1 (mod φ(n)). This d then becomes
one of the private keys, since it is the decryption exponent.
Alice then uses the 6 elements to produce the public and private keys:
Public Keys: {e, n}
Private Keys: {d, p, q}
Now, Bob has access to the public keys. He uses the provided encryption exponent, e, and
n to encipher his message m into a ciphered text, c:
c ≡ me
(mod n )
Alice then gets the ciphertext, c and uses her decryption exponent in the private keys, d, to
decipher the ciphertext c:
m ≡ cd
(mod n )
15
“The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank
16
“The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank
17
“The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank
18
“A Method for Obtaining Digital Signatures and Public- Key Cryptosystems”, Rivest, Shamir, Adleman.
6
7. Since the private keys are never public, no one other than Alice, the desired receiver, will
be able to perform the computation efficiently and correctly. For others who don’t know
the private keys or the decryption exponent, the only way is to factor out n into all possible
combinations of two prime numbers in order to then find the Totient φ(n) and thus the
decryption exponenet d. The sections below will explain why this is not an easy or possible
approach.
2.2 Generating Public and Private Keys
Notice that in the process of generating the public and private keys, the choice of p and
q rather random, as long as they are large enough (explained later on). After computing
n = pq and φ(n) = (p − 1)(q − 1), the trick lies in the choice of the encryption exponenet e.
Since the encryption exponenet e satisfies the condition that gcd(e, φ(n)) = 1, where
≤ e < n, all possible values of e form a set for such encryption exponent and the size of the
set depends directly on the value of φ(n) = (p − 1)(q − 1). Let k be the cardinality of this
set, then Alice will have k distinct values available for e.
Finding the decryption exponent d associated with the encryption exponenet e is also a
critial step Alice needs to perform. To find d, Alice needs to solve the congruency equation
for d:
m ≡ cd
(mod n)
To solve for d, one will need to apply the Extended Euclidean Alogrithm. 19
2.3 Why It Works–Number Theory behind RSA
1). Fermat’s Little Theorem: If p is a prime and p does not divide a, then a is a generator
of p, thus ap−1
≡ 1 (mod p).20
This is the fundation of the next theorem, Euler’s Theorem. Its significance is that for any
prime number p, it is able to find a generator whose order is p − 1. Recall that order is the
smallest positive integer exponent to which the the base number can be raised to 1 congru-
ency modulu p.
2). Euler’s Theorem: If gcd(m,n) = 1, then mφ(n)
= 1 (mod n).21
Euler’s Theorem applies Fermat’s Little Theorem that if m and n are relatively prime to
each other, than m has an order of φ(n). Note that here n isn’t necessarily a prime number;
in fact, in RSA encryption, n is a composite since n = pq, which makes φ(n) = (p−1)(q −1)
since p and q are both primes.
If we raise both sides by a power of z (z ∈ N) and multiply both sides by m, the plain text,
19
“A Method for Obtaining Digital Signatures and Public- Key Cryptosystems”, Rivest, Shamir, Adleman.
20
“The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank
21
“The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank
7
8. we get
mzφ(n)
≡ 1z
= 1(mod n)
mzφ(n)+1
≡ m(mod n)
In generating the encryption and decryption exponenets, we have
c ≡ me
(mod n)
m ≡ cd
(mod n)
where ed ≡ 1 (mod φ(n))
We can rewrite ed as ed = zφ(n) + 1 (z ∈ N), then cd
= med
equals to med
= mzφ(n)+1
≡ m
(mod n), which means that the resulting decrypted message is m that matches the original
plain text.
Thus, Euler’s Theorem ensures the cumulative effect of encrypting the plain text to get
a ciphertext (c ≡ me
(mod n)) and decrypting the ciphertext (cd
≡ med
≡ m (mod n)
would return the same plain text. The signifiance of Euler’s Theorem is that it satisfies the
inverser-function relationship between encrypting and decrypting. Note that the encryption
exponent e and the decryption exponent d are multiplicative inverses of each other modulo
φ(n), since ed ≡ 1 (mod φ(n)).
3). Extended Euclidean Algorithm is applied to find the decryption exponent d, the
multiplicative inverse of the given encryption exponent e, such that ed ≡ 1 (mod φ(n)). In
other words, Euler’s Theorem ensures why RSA works and Extended Euclidean Alogrithm
is the mechanics to fulfill it.
Given ed ≡ 1 (mod φ(n)), we can rewrite it as ed + zφ(n) = 1 for some z ∈ Z. Then we
apply the Euclidean Algorithm to find the greatest common divisor of e and φ(n) and then
use the Extended Euclidean Algorithm to find d. The following illustration gives a perfect
example of how to use the Extended Euclidean Algorithm for such task:
Find d where 127d ≡ 1 ( mod 589) → 127d + 589z = 1
22
22
“Public-Key Cryptography for Dummies (RSA Version).” dengfengli.com
8
9. 2.4 Example
Now we give an example that involves small prime numbers p and q.(In real-world application,
p and q would be a lot larger as explained.)
We pick p = 5 and q = 11, thus n = pq = 55 and φ(n) = (p − 1)(q − 1) = 40.
Now we find e. Since gcd(e,40) = 1 and 2 ≤ e < 40, we pick e = 13. Now we need to find d.
13d ≡ 1 (mod 40) → 13d + 40z = 1. Use the Extended Euclidean Algorithm:
40 = 3 ∗ 13 + 1
13 = 13 ∗ 1 + 0
1 = 40 − 3 ∗ 13 → d = −3 ≡ 37 (mod 40)
Now we have the public keys: {e = 13,n = 55} and the private keys: {d = 37,p = 5,q = 11}.
Let m = 49 and Bob first encrypts this plain text using the encryption exponenet e and n
from the public keys: c ≡ me
= 4913
≡ 4 (mod 55).
Now Alice gets the ciphertext c = 4 and she uses the decryption exponent d from her private
key to decipher the text: m ≡ cd
= 437
≡ 49 ≡ m (mod 55).
Thus Alice gets the correct plain text from Bob through RSA encryption and decryption.
2.5 Why RSA is Safe
In the previous section we explained that RSA encryption is efficient for the desired audi-
ence/receiver who has the information of the private key and the decryption exponent, since
in the example we have shown that it’s a one-step squaring and modulo calculation (a large
number would take longer to compute, but still a constant number of step).
Then what about the general public who don’t know the decryption exponent and the
private keys? The answer is that they would most likely not going to crack the cipher text.
Suppose Emily somehow gets the ciphertext from Bob, c = 4, but she doesn’t know d, p
or q but e = 13 and n = 55. To get d, she first needs to know φ(n) which depends on p − 1
and q−1, where p and q are the prime factors of n. In this case specifically, n = 55, it’s fairly
easy to compute the possible pairs of two prime factors and then compute d from φ(n). This
is why in real-world application, someone would never choose two prime numbers too small
and trivial to encrypt the plain text. As a matter of fact, if n is relatively large composite,
it takes countless effort and time to get p and q. While such factorization isn’t impossible, it
certainly is hard, as the difficulty of factoring is based on and depends on the size of the two
prime numbers. In fact, factorization of n costs O(elog(n)3
) run-time complexity.23
Therefore,
when n is large enough, Emily will have a hard time finding p and q and thus φ(n) and d. The
following graph of run-time complexity analysis compares the run-time complexity of multi-
plying and factoring a prime number with respect to the size of that prime number (in bits):
23
“Public Key Cryptography: RSA and Lots of Number Theory.” Winlab.rutgers.edu
9
10. 24
The mathematical principle behind this is the fact that prime multiplication is easy, but
prime factorization is hard, especially factoring a large number. This principle is essentially
what makes RSA encryption a one-way function, which is Rivest’s breakthrough on that
night in April 1966.
3 Further Exploration of RSA
3.1 Attacks in History
There has been attacks to the RSA encryption system. One famous one is called Wiener’s
attack and also known as Low Private Exponenet attack since cryptologist Michael J. Wiener
shows that a small decryption exponenet d could result in a total collapse of the RSA cryp-
tosystem.25
24
“Time Complexity of Modern Cryptography.” Khanacademy.com
25
“Twenty Years of Attacks on the RSA Cryptosystem.” Dan Boneh.
10
11. Wiener’s attack can be summarized as a theorem: 26
Let N = pq with p < q < 2p. Let d <
1
3
N
1
4 .
Given (N, e) with ed ≡ 1 (mod φ(N)) Marvin can efficiently recover d.
Proof. (The following proof is a complete citation from “Twenty Years of Attacks on the
RSA Cryptosystem.”) 27
Given ed ≡ 1 (mod φ(N)), according to the Extended Euclidean Algorithm, there exists a
k such that ed − kφ(N) = 1. Therefore:
|
ed − kφ(N)
dφ(N)
| =
1
dφ(N)
|
e
φ(N)
−
k
d
| =
1
dφ(N)
Based on approximations using continued fractions, k
d
is an approximation of e
φ(N)
, thus
Marvin may use N to approximate φ(N).
Since φ(N) = N − p − 1 + 1 and p + q − 1 < 3
√
N, we have |N − φ(N)| < 3
√
N.
Replace φ(N) with N, we obtain:
|
e
N
−
k
d
| = |
ed − kφ(N) − kN + kφ(N)
Nd
= |
1 − k(N − φ(N))
Nd
≤ |
3k
√
N
Nd
=
3k
d
√
N
Now, kφ(N) = ed − 1 < ed. Since e < φ(N), we see that k < d < 1
3
N
1
4 . Hence we get:
|
e
N
−
k
d
| ≤
1
dN
1
4
<
1
2d2
.
Then Marvin just needs to compute the logN convergents of the continued fraction for e
N
.
One of these will eventually equal k
d
. Since ed − kφ(N) = 1, we have gcd(k,d)=1, and hence
k
d
is a reduced fraction. This is linear-time algorithm for recovering the secret decryption
exponent d.
From this we can see that a low decryption exponent may lead to system attack. There-
fore, it’s suggested that d, the decryption exponent must be at least 256 bits long in order
to avoid this attack, since typically N is 1024 bits. 28
Moreover, we can see that even though RSA has been the best cryptosystem there has
been, it still has potential flaws that can lead to information insecurity. Researchers and
developers are still working on making necessary implementations to fix the bugs that have
been found by the attackers over the past few decades.
26
“Twenty Years of Attacks on the RSA Cryptosystem.” Dan Boneh.
27
“Twenty Years of Attacks on the RSA Cryptosystem.” Dan Boneh.
28
“Twenty Years of Attacks on the RSA Cryptosystem.” Dan Boneh.
11
12. 4 References and Bibliography
1. “Cryptography.” Merriam-Webster.com. 2015
http://www.merriam-webster.com/dictionary/cryptography
2. Hw6.pdf. Tabitha Peck. CSC121. Davidson College
3-4. “Caesar Cipher.” Wikipedia.com. 2015
http://en.wikipedia.org/wiki/Caesarcipher
5. “Imitation Game.” Nora Grossman. Ido Ostrowsky. Teddy Schwarzman. (Producer),
Morten Tyldum. (Director). (2014). United States: Black Bear Pictures. Bristol Automo-
tive.
6. ”Symmetric Key Cryptography (Non-Technical).” abblcabandlng.wordpress.com
https://abbicabanding.wordpress.com/2009/04/30/symmetric-key-cryptography-non-technical/
7-8. “The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank. Univer-
sity of Chicago. Math Department.
http://www.math.uchicago.edu/ may/VIGRE/VIGRE2007/REUPapers/FINALAPP/Calderbank.pdf
9. ”Diffie-Hellman Key Exchange.” Stackoverflow.com
http://stackoverflow.com/questions/28015433/is-it-possible-to-hack-diffie-hellman-by-knowing-
the-prime-number-and-the-gene
10.“The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank. University
of Chicago. Math Department.
http://www.math.uchicago.edu/ may/VIGRE/VIGRE2007/REUPapers/FINALAPP/Calderbank.pdf
11. “A Method for Obtaining Digital Signatures and Public- Key Cryptosystems”. Ron
Rivest, Adi Shamir, Leonard Adleman. Drexel University. Computer Science Department.
1977.
12. http://www.usc.edu/dept/molecular-science/RSApics.htm
13-17. “The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank. Uni-
versity of Chicago. Math Department.
http://www.math.uchicago.edu/ may/VIGRE/VIGRE2007/REUPapers/FINALAPP/Calderbank.pdf
18-19. “A Method for Obtaining Digital Signatures and Public- Key Cryptosystems”. Ron
Rivest, Adi Shamir, Leonard Adleman. Drexel University. Computer Science Department.
1977.
20-21. “The RSA Cryptosystem: History, Algorithm, Primes.” Michael Calderbank. Uni-
versity of Chicago. Math Department.
http://www.math.uchicago.edu/ may/VIGRE/VIGRE2007/REUPapers/FINALAPP/Calderbank.pdf
22. “Public-Key Cryptography for Dummies (RSA Version).”
http://dengfengli.com/?p=6
23. “Public Key Cryptography: RSA and Lots of Number Theory.”
http://www.winlab.rutgers.edu/ trappe/Courses/AdvSec05/RSAandNumTheory.pdf
24. “Time Complexity of Modern Cryptography.”
https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/p/time-
complexity-exploration
25-28.“Twenty Years of Attacks on the RSA Cryptosystem.” Dan Boneh.
http://crypto.stanford.edu/ dabo/papers/RSA-survey.pdf
12