SlideShare a Scribd company logo
Public-Key
Cryptography
• Abdul Rehman
• 21014156-074
Topic:
Introduction
 Public-key Cryptography is asymmetric, involving the use of two separate
keys, in contrast to symmetric encryption, which uses only one key. The use
of two keys has profound consequences in the areas of confidentiality, key
distribution, and authentication.
 A message sender uses a recipients Public Key to encrypt the message.
 To decrypt sender's message only the recipients Private Key is used
 Asymmetric algorithms rely on one key for encryption and a different but
related key for decryption.
 Public-key algorithms are based on mathematical functions rather than on
substitution and permutation.
Principle of PKC
The concept of public-key cryptography evolved from an attempt to attack two of
the most difficult problems associated with symmetric encryption.
1. Key Distribution
• That the communicants has already shares a key or someone has distributed it
• How to secure communications in general without having to trust a Key Distribution
Center.
2. Digital Signatures
• How to Verify that a digital message had been sent by a particular person
Public Key Cryptosystem
Plaintext
This is the readable
message or data that is fed
into the algorithm as input.
Encryption
Algorithm
The encryption algorithm
performs various
transformations on the
plaintext.
Public Key
Key used for encryption or
for decryption.
Private Key
Key used for encryption or
for decryption.
Ciphertext
This is the encrypted
message produced as
output. It depends on the
plaintext and the key. For a
given message, two
different keys will produce
two different ciphertexts.
Decryption
Algorithm
This algorithm accepts the
ciphertext and the matching
key and produces the
original plaintext.
 A public-key encryption scheme has six ingredients.
Questions
Encryption with Public Key
Encryption with Private Key
Conventional and Public-Key Encryption
Conventional Encryption Public-Key Encryption
Needed to Work
• The same algorithm with the same key is used
for encryption and decryption.
Needed to Work
• One algorithm is used for encryption and a related
algorithm for decryption with a pair of keys, one
for encryption and one for decryption
• The sender and receiver must share the
algorithm and the key.
• The sender and receiver must each have one of
the matched pair of keys (not the same one).
Needed for Security:
• The key must be kept secret.
Needed for Security
• One of the two keys must be kept secret.
• It must be impossible or at least impractical to
decipher a message if the key is kept secret.
• It must be impossible or at least impractical to
decipher a message if one of the keys is kept
secret.
• Knowledge of the algorithm plus samples of
ciphertext must be insufficient to determine the
key
• Knowledge of the algorithm plus one of the keys
plus samples of ciphertext must be insufficient to
determine the other key
Confidentiality
• This figure provides
confidentiality because two
related keys are used one
used for encryption and
the other being used for
decryption
Authentication
• There is no protection of
confidentiality because
any observer can decrypt
the message by using the
sender’s public key
Authentication and Secrecy
Source A Destination B
It is, however, possible to
provide both the authentication
function and confidentiality by a
double use of the public-key
scheme
Z = E(PUb, E(PRa,X))
X = D(PUa, D(PRb,Z))
In this case, we begin as before
by encrypting a message, using
the sender’s private key. This
provides the digital signature.
Next, we encrypt again, using
the receiver’s public key. The
final ciphertext can be
decrypted only by the intended
receiver, who alone has the
matching private key. Thus,
PKC
Categories
THE SENDER ENCRYPTS
A MESSAGE WITH THE
RECIPIENT’S PUBLIC
KEY, AND THE
RECIPIENT DECRYPTS
THE MESSAGE WITH THE
RECIPIENT’S PRIVATE
KEY.
THE SENDER “SIGNS” A
MESSAGE WITH ITS
PRIVATE KEY. SIGNING
IS ACHIEVED BY A
CRYPTOGRAPHIC
ALGORITHM APPLIED TO
THE MESSAGE OR TO A
SMALL BLOCK OF DATA
THAT IS A FUNCTION OF
THE MESSAGE.
TWO SIDES COOPERATE
TO EXCHANGE A
SESSION KEY, WHICH IS
A SECRET KEY FOR
SYMMETRIC
ENCRYPTION
GENERATED FOR USE
FOR A PARTICULAR
TRANSACTION (OR
SESSION) AND VALID
FOR A SHORT PERIOD
OF TIME. SEVERAL
DIFFERENT
APPROACHES ARE
POSSIBLE, INVOLVING
THE PRIVATE KEY(S) OF
ONE OR BOTH PARTIES
Public-Key cryptosystems can be classified in to Three
categorizes
ENCRYPTION/
DECRYPTION:
Digital
signature:
Key
exchange:
Requirements for
PKC
1. It is computationally easy for a party B to generate a key pair (public key PUb, private key
PRb).
2. It is computationally easy for a sender A, knowing the public key and the message to be
encrypted, M, to generate the corresponding ciphertext: C = E(PUb, M)
3. It is computationally easy for the receiver B to decrypt the resulting ciphertext using the private
key to recover the original message: M = D(PRb, C) = D[PRb, E(PUb, M)]
4. It is computationally infeasible for an adversary, knowing the public key, PUb, to determine the
private key, PRb
5. It is computationally infeasible for an adversary, knowing the public key, PUb, and a ciphertext,
C, to recover the original message, M.
6. The two keys can be applied in either order: M = D[PUb, E(PRb, M)] = D[PRb, E(PUb, M)
Application for PKC
Algorithm Encryption / Decryption Digital Signature Key Exchange
RSA Yes Yes Yes
Elliptic Curve Yes Yes Yes
Diffie–Hellman No No Yes
DSS No Yes No
Trap-door one-way
function
Public-Key
Cryptoanalysis
Try every Possible key Until an intelligible translation of the
cyphertext into plaintext is obtained.
Exhausted Key search and Guessing.
• Brute-Force Attack:
• Man-In-Middle Attack:
Combining known plaintext and chosen plaintext attacks by
performing computations in both directions to find matching
pairs.
• Known Plaintext Attack :
 In a known plaintext attack, the cryptanalyst possesses
knowledge of both the plaintext and the corresponding
ciphertext. The objective is to determine the secret key or find
vulnerabilities in the encryption algorithm.
• Chosen Plaintext Attack
In a chosen plaintext attack, the cryptanalyst has the ability to
select specific plaintexts and obtain their corresponding
ciphertexts from the encryption system.

More Related Content

Similar to Public-Key Cryptography.pptx

Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PayalChopra9
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Ch9
Ch9Ch9
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
MohamedNowfeek1
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
Durgesh Malviya
 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
SHUBHA CHATURVEDI
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
so6281019
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
Jayanth Dwijesh H P
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
Rutvik Mehta
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
NSC PPT 463.pdf
NSC PPT 463.pdfNSC PPT 463.pdf
NSC PPT 463.pdf
RajeshAzmeera1
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
PrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
BARATH800940
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
priyapavi96
 
Network security
Network securityNetwork security
Network security
Perfect Training Center
 
Cryptography 1
Cryptography 1Cryptography 1
Cryptography 1
bhanu7161
 

Similar to Public-Key Cryptography.pptx (20)

Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Ch9
Ch9Ch9
Ch9
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
NSC PPT 463.pdf
NSC PPT 463.pdfNSC PPT 463.pdf
NSC PPT 463.pdf
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
 
Network security
Network securityNetwork security
Network security
 
Cryptography 1
Cryptography 1Cryptography 1
Cryptography 1
 

Recently uploaded

Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 

Public-Key Cryptography.pptx

  • 3. Introduction  Public-key Cryptography is asymmetric, involving the use of two separate keys, in contrast to symmetric encryption, which uses only one key. The use of two keys has profound consequences in the areas of confidentiality, key distribution, and authentication.  A message sender uses a recipients Public Key to encrypt the message.  To decrypt sender's message only the recipients Private Key is used  Asymmetric algorithms rely on one key for encryption and a different but related key for decryption.  Public-key algorithms are based on mathematical functions rather than on substitution and permutation.
  • 4. Principle of PKC The concept of public-key cryptography evolved from an attempt to attack two of the most difficult problems associated with symmetric encryption. 1. Key Distribution • That the communicants has already shares a key or someone has distributed it • How to secure communications in general without having to trust a Key Distribution Center. 2. Digital Signatures • How to Verify that a digital message had been sent by a particular person
  • 5. Public Key Cryptosystem Plaintext This is the readable message or data that is fed into the algorithm as input. Encryption Algorithm The encryption algorithm performs various transformations on the plaintext. Public Key Key used for encryption or for decryption. Private Key Key used for encryption or for decryption. Ciphertext This is the encrypted message produced as output. It depends on the plaintext and the key. For a given message, two different keys will produce two different ciphertexts. Decryption Algorithm This algorithm accepts the ciphertext and the matching key and produces the original plaintext.  A public-key encryption scheme has six ingredients.
  • 9. Conventional and Public-Key Encryption Conventional Encryption Public-Key Encryption Needed to Work • The same algorithm with the same key is used for encryption and decryption. Needed to Work • One algorithm is used for encryption and a related algorithm for decryption with a pair of keys, one for encryption and one for decryption • The sender and receiver must share the algorithm and the key. • The sender and receiver must each have one of the matched pair of keys (not the same one). Needed for Security: • The key must be kept secret. Needed for Security • One of the two keys must be kept secret. • It must be impossible or at least impractical to decipher a message if the key is kept secret. • It must be impossible or at least impractical to decipher a message if one of the keys is kept secret. • Knowledge of the algorithm plus samples of ciphertext must be insufficient to determine the key • Knowledge of the algorithm plus one of the keys plus samples of ciphertext must be insufficient to determine the other key
  • 10. Confidentiality • This figure provides confidentiality because two related keys are used one used for encryption and the other being used for decryption
  • 11. Authentication • There is no protection of confidentiality because any observer can decrypt the message by using the sender’s public key
  • 12. Authentication and Secrecy Source A Destination B It is, however, possible to provide both the authentication function and confidentiality by a double use of the public-key scheme Z = E(PUb, E(PRa,X)) X = D(PUa, D(PRb,Z)) In this case, we begin as before by encrypting a message, using the sender’s private key. This provides the digital signature. Next, we encrypt again, using the receiver’s public key. The final ciphertext can be decrypted only by the intended receiver, who alone has the matching private key. Thus,
  • 13. PKC Categories THE SENDER ENCRYPTS A MESSAGE WITH THE RECIPIENT’S PUBLIC KEY, AND THE RECIPIENT DECRYPTS THE MESSAGE WITH THE RECIPIENT’S PRIVATE KEY. THE SENDER “SIGNS” A MESSAGE WITH ITS PRIVATE KEY. SIGNING IS ACHIEVED BY A CRYPTOGRAPHIC ALGORITHM APPLIED TO THE MESSAGE OR TO A SMALL BLOCK OF DATA THAT IS A FUNCTION OF THE MESSAGE. TWO SIDES COOPERATE TO EXCHANGE A SESSION KEY, WHICH IS A SECRET KEY FOR SYMMETRIC ENCRYPTION GENERATED FOR USE FOR A PARTICULAR TRANSACTION (OR SESSION) AND VALID FOR A SHORT PERIOD OF TIME. SEVERAL DIFFERENT APPROACHES ARE POSSIBLE, INVOLVING THE PRIVATE KEY(S) OF ONE OR BOTH PARTIES Public-Key cryptosystems can be classified in to Three categorizes ENCRYPTION/ DECRYPTION: Digital signature: Key exchange:
  • 14. Requirements for PKC 1. It is computationally easy for a party B to generate a key pair (public key PUb, private key PRb). 2. It is computationally easy for a sender A, knowing the public key and the message to be encrypted, M, to generate the corresponding ciphertext: C = E(PUb, M) 3. It is computationally easy for the receiver B to decrypt the resulting ciphertext using the private key to recover the original message: M = D(PRb, C) = D[PRb, E(PUb, M)] 4. It is computationally infeasible for an adversary, knowing the public key, PUb, to determine the private key, PRb 5. It is computationally infeasible for an adversary, knowing the public key, PUb, and a ciphertext, C, to recover the original message, M. 6. The two keys can be applied in either order: M = D[PUb, E(PRb, M)] = D[PRb, E(PUb, M)
  • 15. Application for PKC Algorithm Encryption / Decryption Digital Signature Key Exchange RSA Yes Yes Yes Elliptic Curve Yes Yes Yes Diffie–Hellman No No Yes DSS No Yes No
  • 17. Public-Key Cryptoanalysis Try every Possible key Until an intelligible translation of the cyphertext into plaintext is obtained. Exhausted Key search and Guessing. • Brute-Force Attack: • Man-In-Middle Attack: Combining known plaintext and chosen plaintext attacks by performing computations in both directions to find matching pairs. • Known Plaintext Attack :  In a known plaintext attack, the cryptanalyst possesses knowledge of both the plaintext and the corresponding ciphertext. The objective is to determine the secret key or find vulnerabilities in the encryption algorithm. • Chosen Plaintext Attack In a chosen plaintext attack, the cryptanalyst has the ability to select specific plaintexts and obtain their corresponding ciphertexts from the encryption system.