SlideShare a Scribd company logo
1 of 19
Public Key
Cryptography
Bryan Pearsaul
Outline
• What is Cryptology?
• Symmetric Ciphers
• Asymmetric Ciphers
• Diffie-Hellman
• RSA (Rivest/Shamir/Adleman)
• Moral Issues
Outline
• Summary
• References
What is Cryptology?
• The science of keeping data secure
• Two transformation algorithms:
Enciphering and Deciphering
• Symmetric ciphers
• Asymmetric ciphers
Symmetric Ciphers
• Also known as private key
• Both parties must agree on the key
in advance
• D_K(E_K(P)) = P
• Not very computationally intensive
• Key must be securely sent to both parties
Symmetric Cipher Example
• k = 4
Enciphering
E
E_K(X)
Deciphering
D
D_K(E_K(X)) = X
X
K
• Turn plaintext SECRET into
ciphertext
• S+4=W, E+4=I, C+4=G, R+4=V, E+4=I,
T+4=X
Symmetric Cipher Example
• Much more elaborate transformations
are available
• Some that are so complicated that
even if the transformation was
public a key would still be needed
• Still require a distributed key
Asymmetric cipher
• Also known as public key
Enciphering
E
E_K(X)
Deciphering
D
D_K’(E_K(X)) = X
X
K’
K
• Two keys: public k, private k’
• Private key not required for both
parties
• More computationally intensive
Diffie-Hellman
• One of the first public key
cryptographic systems
• Developed by Martin Hellman, Ralph
Merkle, and Whitfield Diffie at
Stanford University in 1976
Diffie-Hellman
• Based on a special case of the
subset-sum, or knapsack, problem
Subset-sum Problem
5
8
4
11
6
20
Diffie-Hellman Example
• Block cipher
• Block size of 7 bits. Possible 27 combinations
• Private key (a’1, a’2, … , a’n) of 7 integers: (1, 2, 5, 11, 32, 87, 141)
• Chose two special integers, w and m, such that w and m are relatively prime,
meaning gcd(w,m) = 1: w = 901, m = 1234
• Public key (a1, a2, … , an) of 7 integers using the equation: ai = w * a’i mod m:
(901, 568, 803, 39, 450, 645, 1173)
• Partition SECRET into 7 bit blocks each block consisting of xn bits (x1, x2, …, xn)
S
1010011
E
1000101
C
1000011
R
1010010
E
1000101
T
1010100
• Bx = ∑ xiai
i=1
n
• S = 1 X (901) + 0 X (568) + 1 X (803) + 0 X (39) + 0 X (450) + 1 X (645) + 1 X (1173)
• S = 3522
Diffie-Hellman Example
• Encrypted blocks Bx received. Special version of subset-sum problem
• Which subset of (a’1, a’2, … , a’n) sums to B’x where B’x = Bx * w-1 mod m
• w-1 is the modular inverse of w for m, w * w-1 mod m = 1
• B’x = 3522 X (901)-1 mod 1234
• B’x = 3522 X 1171 mod 1234
• B’x = 234
1. sum ← 0
2. for i = n step -1 until 1 do
if ai + sum <= B’x
then sum ← sum + ai;
subset(i) ← 1
else subset(i) ← 0
3. if sum = B’x then exit with subset
else exit with “failure”
• Private key (1, 2, 5, 11, 32, 87, 141), B’x = 234, find subset (1, 0, 1, 0, 0, 1, 1) = S
Diffie-Hellman
• An algorithm that solves the
particular problem on which a
cryptographic system is based.
• An algorithm which solves NP-
complete problems quickly
• Two possible points of vulnerability
RSA
• Factorization so far is unsolvable in
polynomial-time
• Based on the difficulty of factoring
large numbers
• Developed by Ron Rivest, Adi
Shamir, and Leonard Adleman at
MIT in 1977.
RSA Example
• Find two large prime integers, p and q, and form product n = pq
• Find a random integer, e, that is relatively prime to Ф(n) = (p-1)(q-1)
• p and q are kept private, (n,e) are the public key
• Message is partitioned into blocks, b, such that b < n
• Each block is encrypted using the equation: c = be mod n
• For the private key, calculate integer d which is the modular inverse of e
for Ф(n), or e * d mod Ф(n) = 1
• Once d is calculated it becomes your private key and all records of
p and q should be destroyed
• Each encrypted block, c, is decrypted using the equation: b = cd mod n
• p = 61, q = 53, n = 3233, Ф(n) = 3120, e = 17, d = 2753
• encrypt(123) = 12317 mod 3233 = 855
• decrypt(855) = 8552753 mod 3233 = 123
RSA
• Factorization cannot be done in
polynomial-time
• Factoring is required to break the
system
• Security of RSA relies on two
assumptions
Moral Issues
• Information Theft
• Who does the data belong to?
• Privacy
Summary
• Diffie-Hellman and RSA
• Symmetric and Asymmetric ciphers
– Pros and Cons
• Cryptology
• Moral Issues
References
• A. Shamir, “A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman
Cryptosystem", Advances in Cryptology - CRYPTO '82 Proceedings, pp. 279-288,
Plenum Press, 1983. IEEE Transactions on Information Theory, Vol. IT-30, pp. 699-
704, 1984.
• A.K. Dewdney, The New Turning Omnibus, pp. 250-257, Henry Holt and Company,
2001.
• RSA Cryptosystem, http://primes.utm.edu/glossary/page.php?sort=RSA.
• Cryptology FAQ, http://www.faqs.org/faqs/cryptography-faq/part06/.
• The Extended Euclidian Algorithm,
http://www.grc.nasa.gov/WWW/price000/pfc/htc/zz_xeuclidalg.html.

More Related Content

Similar to Public_Key_Cryptography in crypto analysis.ppt

Similar to Public_Key_Cryptography in crypto analysis.ppt (20)

Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
 
Lecture6 rsa
Lecture6 rsaLecture6 rsa
Lecture6 rsa
 
Computing on Encrypted Data
Computing on Encrypted DataComputing on Encrypted Data
Computing on Encrypted Data
 
Cybersecurity cyberlab3
Cybersecurity cyberlab3Cybersecurity cyberlab3
Cybersecurity cyberlab3
 
Computer security
Computer securityComputer security
Computer security
 
Computer security
Computer securityComputer security
Computer security
 
Computer security
Computer security Computer security
Computer security
 
Computer security
Computer securityComputer security
Computer security
 
Computer security
Computer security Computer security
Computer security
 
Computer security
Computer securityComputer security
Computer security
 
Computer security
Computer securityComputer security
Computer security
 
Common Crypto Pitfalls
Common Crypto PitfallsCommon Crypto Pitfalls
Common Crypto Pitfalls
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
New ppt.ppt
New ppt.pptNew ppt.ppt
New ppt.ppt
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
RSA
RSARSA
RSA
 
OS ppt Modified.pptx
OS ppt Modified.pptxOS ppt Modified.pptx
OS ppt Modified.pptx
 
section-8.ppt
section-8.pptsection-8.ppt
section-8.ppt
 
Cryptography-101
Cryptography-101Cryptography-101
Cryptography-101
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 

More from ImmanImman6

KMC-machine complex for internet sharing.ppt
KMC-machine complex for internet sharing.pptKMC-machine complex for internet sharing.ppt
KMC-machine complex for internet sharing.pptImmanImman6
 
Nursery school system management ppt.pptx
Nursery school system management ppt.pptxNursery school system management ppt.pptx
Nursery school system management ppt.pptxImmanImman6
 
Colorful Modern Group Project Creative Presentation.pdf
Colorful Modern Group Project Creative Presentation.pdfColorful Modern Group Project Creative Presentation.pdf
Colorful Modern Group Project Creative Presentation.pdfImmanImman6
 
Real time driver drawiness detection.pptx
Real time driver drawiness detection.pptxReal time driver drawiness detection.pptx
Real time driver drawiness detection.pptxImmanImman6
 
foot crime final for awareness site .pptx
foot crime final for awareness site .pptxfoot crime final for awareness site .pptx
foot crime final for awareness site .pptxImmanImman6
 
Phaemacy management system in php admin.pdf
Phaemacy management system in php admin.pdfPhaemacy management system in php admin.pdf
Phaemacy management system in php admin.pdfImmanImman6
 

More from ImmanImman6 (6)

KMC-machine complex for internet sharing.ppt
KMC-machine complex for internet sharing.pptKMC-machine complex for internet sharing.ppt
KMC-machine complex for internet sharing.ppt
 
Nursery school system management ppt.pptx
Nursery school system management ppt.pptxNursery school system management ppt.pptx
Nursery school system management ppt.pptx
 
Colorful Modern Group Project Creative Presentation.pdf
Colorful Modern Group Project Creative Presentation.pdfColorful Modern Group Project Creative Presentation.pdf
Colorful Modern Group Project Creative Presentation.pdf
 
Real time driver drawiness detection.pptx
Real time driver drawiness detection.pptxReal time driver drawiness detection.pptx
Real time driver drawiness detection.pptx
 
foot crime final for awareness site .pptx
foot crime final for awareness site .pptxfoot crime final for awareness site .pptx
foot crime final for awareness site .pptx
 
Phaemacy management system in php admin.pdf
Phaemacy management system in php admin.pdfPhaemacy management system in php admin.pdf
Phaemacy management system in php admin.pdf
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Public_Key_Cryptography in crypto analysis.ppt

  • 2. Outline • What is Cryptology? • Symmetric Ciphers • Asymmetric Ciphers • Diffie-Hellman • RSA (Rivest/Shamir/Adleman) • Moral Issues
  • 4. What is Cryptology? • The science of keeping data secure • Two transformation algorithms: Enciphering and Deciphering • Symmetric ciphers • Asymmetric ciphers
  • 5. Symmetric Ciphers • Also known as private key • Both parties must agree on the key in advance • D_K(E_K(P)) = P • Not very computationally intensive • Key must be securely sent to both parties
  • 6. Symmetric Cipher Example • k = 4 Enciphering E E_K(X) Deciphering D D_K(E_K(X)) = X X K • Turn plaintext SECRET into ciphertext • S+4=W, E+4=I, C+4=G, R+4=V, E+4=I, T+4=X
  • 7. Symmetric Cipher Example • Much more elaborate transformations are available • Some that are so complicated that even if the transformation was public a key would still be needed • Still require a distributed key
  • 8. Asymmetric cipher • Also known as public key Enciphering E E_K(X) Deciphering D D_K’(E_K(X)) = X X K’ K • Two keys: public k, private k’ • Private key not required for both parties • More computationally intensive
  • 9. Diffie-Hellman • One of the first public key cryptographic systems • Developed by Martin Hellman, Ralph Merkle, and Whitfield Diffie at Stanford University in 1976
  • 10. Diffie-Hellman • Based on a special case of the subset-sum, or knapsack, problem Subset-sum Problem 5 8 4 11 6 20
  • 11. Diffie-Hellman Example • Block cipher • Block size of 7 bits. Possible 27 combinations • Private key (a’1, a’2, … , a’n) of 7 integers: (1, 2, 5, 11, 32, 87, 141) • Chose two special integers, w and m, such that w and m are relatively prime, meaning gcd(w,m) = 1: w = 901, m = 1234 • Public key (a1, a2, … , an) of 7 integers using the equation: ai = w * a’i mod m: (901, 568, 803, 39, 450, 645, 1173) • Partition SECRET into 7 bit blocks each block consisting of xn bits (x1, x2, …, xn) S 1010011 E 1000101 C 1000011 R 1010010 E 1000101 T 1010100 • Bx = ∑ xiai i=1 n • S = 1 X (901) + 0 X (568) + 1 X (803) + 0 X (39) + 0 X (450) + 1 X (645) + 1 X (1173) • S = 3522
  • 12. Diffie-Hellman Example • Encrypted blocks Bx received. Special version of subset-sum problem • Which subset of (a’1, a’2, … , a’n) sums to B’x where B’x = Bx * w-1 mod m • w-1 is the modular inverse of w for m, w * w-1 mod m = 1 • B’x = 3522 X (901)-1 mod 1234 • B’x = 3522 X 1171 mod 1234 • B’x = 234 1. sum ← 0 2. for i = n step -1 until 1 do if ai + sum <= B’x then sum ← sum + ai; subset(i) ← 1 else subset(i) ← 0 3. if sum = B’x then exit with subset else exit with “failure” • Private key (1, 2, 5, 11, 32, 87, 141), B’x = 234, find subset (1, 0, 1, 0, 0, 1, 1) = S
  • 13. Diffie-Hellman • An algorithm that solves the particular problem on which a cryptographic system is based. • An algorithm which solves NP- complete problems quickly • Two possible points of vulnerability
  • 14. RSA • Factorization so far is unsolvable in polynomial-time • Based on the difficulty of factoring large numbers • Developed by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT in 1977.
  • 15. RSA Example • Find two large prime integers, p and q, and form product n = pq • Find a random integer, e, that is relatively prime to Ф(n) = (p-1)(q-1) • p and q are kept private, (n,e) are the public key • Message is partitioned into blocks, b, such that b < n • Each block is encrypted using the equation: c = be mod n • For the private key, calculate integer d which is the modular inverse of e for Ф(n), or e * d mod Ф(n) = 1 • Once d is calculated it becomes your private key and all records of p and q should be destroyed • Each encrypted block, c, is decrypted using the equation: b = cd mod n • p = 61, q = 53, n = 3233, Ф(n) = 3120, e = 17, d = 2753 • encrypt(123) = 12317 mod 3233 = 855 • decrypt(855) = 8552753 mod 3233 = 123
  • 16. RSA • Factorization cannot be done in polynomial-time • Factoring is required to break the system • Security of RSA relies on two assumptions
  • 17. Moral Issues • Information Theft • Who does the data belong to? • Privacy
  • 18. Summary • Diffie-Hellman and RSA • Symmetric and Asymmetric ciphers – Pros and Cons • Cryptology • Moral Issues
  • 19. References • A. Shamir, “A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem", Advances in Cryptology - CRYPTO '82 Proceedings, pp. 279-288, Plenum Press, 1983. IEEE Transactions on Information Theory, Vol. IT-30, pp. 699- 704, 1984. • A.K. Dewdney, The New Turning Omnibus, pp. 250-257, Henry Holt and Company, 2001. • RSA Cryptosystem, http://primes.utm.edu/glossary/page.php?sort=RSA. • Cryptology FAQ, http://www.faqs.org/faqs/cryptography-faq/part06/. • The Extended Euclidian Algorithm, http://www.grc.nasa.gov/WWW/price000/pfc/htc/zz_xeuclidalg.html.