SlideShare a Scribd company logo
Public Key 
Algorithm 
By 
Pankaj Jatav (110101168) 
Rahul Kumar (120101813) 
Rahul Aggarwal 
(110101189) 
Prateek Pandey 
(110101180)
Cryptography 
 The art of the Secret (crypto-) writing (-graphy). It enables you to 
store information or transmit 
it across insecure networks, so that it cannot be read by anyone 
except the intended recipient.
TERMINOLOGY 
 Plain Text:- The message or data that is to be transmitted over the 
network. 
 Cipher :- A mapping algorithm which is used to encrypt or decrypt 
the message. 
 Key : A key is a number (or a set of numbers) that the cipher 
implements to encrypt or decrypt a message. 
To encrypt a message we need to convert the plaintext to ciphertext 
using an encryption algorithm and encryption key whereas to 
decrypt the message we require a decryption algorithm and a 
decryption key to reveal the plaintext
Symmetric Key Cryptography 
 Symmetric-key cryptography refers to encryption methods in which 
both the sender and receiver share the same key (or, less 
commonly, in which their keys are different, but related in an easily 
computable way). This was the only kind of encryption publicly 
known until June 1976. 
5
Symmetric Key Cryptography 
System
Asymmetric Key Cryptography 
Asymmetric cryptography or public-key cryptography is cryptography 
in which a pair of keys is used to encrypt and decrypt a message so 
that it arrives securely. Initially, a network user receives a public and 
private key pair from a certificate authority. Any other user who wants 
to send an encrypted message can get the intended recipient's public 
key from a public directory. They use this key to encrypt the message, 
and they send it to the recipient. When the recipient gets the message, 
they decrypt it with their private key, which no one else should have 
access to. 
7
ASYMMETRIC KEY 
Cryptography System
Why use Public Key 
Algorithms??
ASYMMETRIC KEY 
Cryptography System
Public Key Algorithms 
 Proposed by Diffie and Hellman in 1976. 
 The encryption algorithm must meet 3 requirements: 
1. D(E(P))=P 
2. It is Exceedingly difficult to deduce D from E. 
3. E cannot be broken by a chosen plaintext attack.
Public key blueprint 
 The keys used to encrypt and decrypt are 
different. 
 Anyone who wants to be a receiver needs to 
“publish” an encryption key, which is known as 
the public key. 
 Anyone who wants to be a receiver needs a 
unique decryption key, which is known as the 
private key. 
 It should not be possible to deduce the plaintext 
from knowledge of the ciphertext and the public 
key. 
 Some guarantee needs to be offered of the 
authenticity of a public key. 
13
Public Key Algorithms 
Algorithms Satisfying all three requirements 
are: 
 RSA 
 ElGamal
RSA 
Given by Rivest, Shamir & Adleman of MIT in 
1977 
Best known & widely used public-key scheme 
Based on exponentiation in a finite field over 
integers modulo a prime 
Uses large integers (eg. 1024 bits) 
Security due to cost of factoring large numbers
RSA 
 Choose two large prime numbers p, q. (e.g., 
1024 bits each) 
 Compute n = p*q and z = (p-1)(q-1). 
 Choose d (with d<n) that has no common 
factors with z. (e, z are “relatively prime”). 
 Choose e such that ed-1 is exactly divisible by 
z. (in other words: ed mod z = 1 ).
RSA: Encryption, decryption 
 Given (n,e) and (n,d) as computed above 
 Dividing Plain Text into Blocks: 0<=P<n 
 To encrypt message P (<n), compute 
e 
C = M (mod 
n) 
 To decrypt received bit pattern, C, compute 
d 
M = C (mod 
n) 
 Public key is (n,e). 
 Private key is (n,d).
RSA example: 
Let us choose p=3 and q=11. 
Then n=33 and z=20. 
d=7 (so d, z relatively prime). 
e=3 (so ed-1 exactly divisible by z). 
Encrypting messages: 
M M 
e 
C = Me mod n 
19 6859 28 
d 
C C 
M = Cd mod n 
28 13492928512 19 
Encrypt: 
Decrypt:
RSA Issues 
 RSA is computationally intense. 
 Commonly used key lengths are 1024 
bits 
 The plain text should be smaller than 
the key length 
 The encrypted text is of the same size 
as the key length 
 Generally used to encrypt secret keys. 
 Basis: Factoring a big number is hard
Summary 
 Public key systems replace the problem of distributing 
symmetric keys with one of authenticating public keys 
 Public key encryption algorithms need to be trapdoor one-way 
functions 
 RSA is a public key encryption algorithm whose security is 
believed to be based on the problem of factoring large 
numbers 
 ElGamal is a public key encryption algorithm whose 
security is believed to be based on the discrete logarithm 
problem 
 RSA is generally favoured over ElGamal for practical rather 
than security reasons 
 RSA and ElGamal are less efficient and fast to operate 
than most symmetric encryption algorithms because they 
involve modular exponentiation 
 DH key exchange is an important protocol on which many 
real key exchange protocols are based
Thank You
Attacks on RSA 
 Smooth Number Attack: 
 If you sign m1 and m2 
 S1 = md 
1 mod n 
 S2 = m2d mod n 
 Attacker can sign m1m2, m1/m2, m12, m1jm2k 
 Easy to do if mi’s are small (smooth) numbers. 
 Cube Root Problem of RSA 
 If public exponent e=3: 
 hde mod n = h 
 hd mod n = h1/3 
 Simply compute h1/3 mod n

More Related Content

What's hot

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
Adarsh Patel
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4koolkampus
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
Arun ACE
 
S/MIME
S/MIMES/MIME
S/MIME
maria azam
 
Confusion and Diffusion.pptx
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptx
bcanawakadalcollege
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
Twinkal Harsora
 
Rc4
Rc4Rc4
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
Sou Jana
 

What's hot (20)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
IP Security
IP SecurityIP Security
IP Security
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Kerberos
KerberosKerberos
Kerberos
 
S/MIME
S/MIMES/MIME
S/MIME
 
Confusion and Diffusion.pptx
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptx
 
cryptography
cryptographycryptography
cryptography
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Rc4
Rc4Rc4
Rc4
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
 

Similar to Public key algorithm

PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
RizwanBasha12
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
 
Rsa
RsaRsa
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
Amlan Patel
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
Mohsin Ali
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
BhuvanaR13
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
DHANABALSUBRAMANIAN
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
IJECEIAES
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
ChandraB15
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
Pavithra renu
 
Encryption
EncryptionEncryption
Encryption
Naiyan Noor
 
Pooguzhali
PooguzhaliPooguzhali
Ch34508510
Ch34508510Ch34508510
Ch34508510
IJERA Editor
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Basic techniques in cryptography
Basic techniques in cryptographyBasic techniques in cryptography
Basic techniques in cryptography
Shraddha Gupta
 

Similar to Public key algorithm (20)

PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Rsa
RsaRsa
Rsa
 
Rsa
RsaRsa
Rsa
 
Ch09
Ch09Ch09
Ch09
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Pooguzhali
PooguzhaliPooguzhali
Pooguzhali
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Basic techniques in cryptography
Basic techniques in cryptographyBasic techniques in cryptography
Basic techniques in cryptography
 

Recently uploaded

01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx
benykoy2024
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Ethernet Routing and switching chapter 1.ppt
Ethernet Routing and switching chapter 1.pptEthernet Routing and switching chapter 1.ppt
Ethernet Routing and switching chapter 1.ppt
azkamurat
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 

Recently uploaded (20)

01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Ethernet Routing and switching chapter 1.ppt
Ethernet Routing and switching chapter 1.pptEthernet Routing and switching chapter 1.ppt
Ethernet Routing and switching chapter 1.ppt
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 

Public key algorithm

  • 1. Public Key Algorithm By Pankaj Jatav (110101168) Rahul Kumar (120101813) Rahul Aggarwal (110101189) Prateek Pandey (110101180)
  • 2. Cryptography  The art of the Secret (crypto-) writing (-graphy). It enables you to store information or transmit it across insecure networks, so that it cannot be read by anyone except the intended recipient.
  • 3.
  • 4. TERMINOLOGY  Plain Text:- The message or data that is to be transmitted over the network.  Cipher :- A mapping algorithm which is used to encrypt or decrypt the message.  Key : A key is a number (or a set of numbers) that the cipher implements to encrypt or decrypt a message. To encrypt a message we need to convert the plaintext to ciphertext using an encryption algorithm and encryption key whereas to decrypt the message we require a decryption algorithm and a decryption key to reveal the plaintext
  • 5. Symmetric Key Cryptography  Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). This was the only kind of encryption publicly known until June 1976. 5
  • 7. Asymmetric Key Cryptography Asymmetric cryptography or public-key cryptography is cryptography in which a pair of keys is used to encrypt and decrypt a message so that it arrives securely. Initially, a network user receives a public and private key pair from a certificate authority. Any other user who wants to send an encrypted message can get the intended recipient's public key from a public directory. They use this key to encrypt the message, and they send it to the recipient. When the recipient gets the message, they decrypt it with their private key, which no one else should have access to. 7
  • 9. Why use Public Key Algorithms??
  • 11. Public Key Algorithms  Proposed by Diffie and Hellman in 1976.  The encryption algorithm must meet 3 requirements: 1. D(E(P))=P 2. It is Exceedingly difficult to deduce D from E. 3. E cannot be broken by a chosen plaintext attack.
  • 12.
  • 13. Public key blueprint  The keys used to encrypt and decrypt are different.  Anyone who wants to be a receiver needs to “publish” an encryption key, which is known as the public key.  Anyone who wants to be a receiver needs a unique decryption key, which is known as the private key.  It should not be possible to deduce the plaintext from knowledge of the ciphertext and the public key.  Some guarantee needs to be offered of the authenticity of a public key. 13
  • 14. Public Key Algorithms Algorithms Satisfying all three requirements are:  RSA  ElGamal
  • 15. RSA Given by Rivest, Shamir & Adleman of MIT in 1977 Best known & widely used public-key scheme Based on exponentiation in a finite field over integers modulo a prime Uses large integers (eg. 1024 bits) Security due to cost of factoring large numbers
  • 16. RSA  Choose two large prime numbers p, q. (e.g., 1024 bits each)  Compute n = p*q and z = (p-1)(q-1).  Choose d (with d<n) that has no common factors with z. (e, z are “relatively prime”).  Choose e such that ed-1 is exactly divisible by z. (in other words: ed mod z = 1 ).
  • 17. RSA: Encryption, decryption  Given (n,e) and (n,d) as computed above  Dividing Plain Text into Blocks: 0<=P<n  To encrypt message P (<n), compute e C = M (mod n)  To decrypt received bit pattern, C, compute d M = C (mod n)  Public key is (n,e).  Private key is (n,d).
  • 18. RSA example: Let us choose p=3 and q=11. Then n=33 and z=20. d=7 (so d, z relatively prime). e=3 (so ed-1 exactly divisible by z). Encrypting messages: M M e C = Me mod n 19 6859 28 d C C M = Cd mod n 28 13492928512 19 Encrypt: Decrypt:
  • 19. RSA Issues  RSA is computationally intense.  Commonly used key lengths are 1024 bits  The plain text should be smaller than the key length  The encrypted text is of the same size as the key length  Generally used to encrypt secret keys.  Basis: Factoring a big number is hard
  • 20. Summary  Public key systems replace the problem of distributing symmetric keys with one of authenticating public keys  Public key encryption algorithms need to be trapdoor one-way functions  RSA is a public key encryption algorithm whose security is believed to be based on the problem of factoring large numbers  ElGamal is a public key encryption algorithm whose security is believed to be based on the discrete logarithm problem  RSA is generally favoured over ElGamal for practical rather than security reasons  RSA and ElGamal are less efficient and fast to operate than most symmetric encryption algorithms because they involve modular exponentiation  DH key exchange is an important protocol on which many real key exchange protocols are based
  • 22. Attacks on RSA  Smooth Number Attack:  If you sign m1 and m2  S1 = md 1 mod n  S2 = m2d mod n  Attacker can sign m1m2, m1/m2, m12, m1jm2k  Easy to do if mi’s are small (smooth) numbers.  Cube Root Problem of RSA  If public exponent e=3:  hde mod n = h  hd mod n = h1/3  Simply compute h1/3 mod n

Editor's Notes

  1. CASE-1: According to No cryptography. CASE-2: According to symmetrical cryptography
  2. The first requirement says that if we apply D to an encrypted message, E(P), we get the original plaintext message, P, back. Without this property, the legitimate receiver could not decrypt the ciphertext. The second requirement speaks for itself. The third requirement is needed because, as we shall see in a moment, intruders may experiment with the algorithm to their hearts’ content. Under these conditions, there is no reason that the encryption key cannot be made public.
  3. How system behave in public key algorithm