SlideShare a Scribd company logo
PUBLIC KEY CRYPTOGRAPHY 
RSA ENCRYPTION ALGORITHM 
Meenakshi Shetti 
Muthu Gomahty V
CONTENTS 
• CRYPTOGRAPHY 
• WHAT IS A KEY ? 
• PRIVATE KEY CRYPTOGRAPHY 
• PUBLIC KEY CRYPTOGRAPHY 
• RSA ALGORITHM 
• ADVANTAGES 
• DISADVANTAGES 
• REFERENCES
CRYPTOGRAPHY 
•It’s a greek word which means hidden secret in 
writing 
•Cryptography is the practice and study of 
techniques for secure communication in the 
presence of third parties(called adversaries).
What is a “key”? 
A key is a piece of information (a parameter) that 
determines the functional output of a 
cryptographic algorithm or cipher.
PRIVATE KEY CRYPTOGRAPHY 
• Also called as Symmetric-key algorithms 
• They are a class of algorithms for cryptography that 
use the same cryptographic keys for both encryption 
of plaintext and decryption of ciphertext.
Public key cryptography 
• Also known as asymmetric cryptography 
• Refers to a cryptographic algorithm which requires two separate keys, one 
of which is secret (or private) and one of which is public.
Non secret ENCRYTION USING LOCK 
ALICE BOB
ENCRYPTION 
DECRYPTION
EVE 
ALICE BOB
TRAP DOOR –ONE WAY FUNCTION 
EASY 
HARD
EXPONENET 
REMAINDER 
12345 
mod 17 ≡ 135903 
346 mod 12 ≡10 
BASE 
MODULUS
memod N ≡ c
EASY 
memod N ≡ c 
HARD 
?emod N ≡ c
memod N ≡ c 
emod N- public key 
C -remainder 
m- message
me mod N ≡ c 
cd mod N ≡ m 
medmod N ≡ m 
e- encryption 
d - decryption
For computation of e and d 
STEP 1 -> PRIME FACTORIZATION 
STEP 2 -> PHI FUNCTION 
STEP 3-> EULER’S THEOREM
Multiplication of two extra large 
numbers are easy to compute. 
But prime factorization of a 
number is the hardness of the 
problem . 
Prime factorization is what used 
to build the trap door
STEP 1 -> PRIME FACTORIZATION 
P1 – 150 digits long 
P2 – 150 digits long 
P1 * P2 = N 
N- 300 digits long
STEP 2 -> PHI FUNCTION 
- breakability of a number 
Given a number N – it output’s how many integers are 
less than or equal to N that do not share a common 
factor with N 
ɸ[8] = 1 
2 
3 
4 
5 
6 
7 
8 
ɸ[8] = 1 
2 
3 
4 
5 
6 
7 
8 
We want to find ɸ[8] , 
we look at all integers 
from 1 to 8 , then we 
count how many 
integers does not 
share a factor greater 
than 1 
ɸ[8] = 4
• In the case of ɸ of a prime number – 
As prime numbers does not share common 
factor of any number greater than 
ɸ[P]=P-1 
i.e, ɸ[7] = 1 
2 
3 
4 
5 
6 
7 
As none of them share a common 
factor with 7 
ɸ[7] = 7-1 
ɸ[7] = 6
ɸ[N] is also multiplicative 
ɸ[A*B] = ɸ[A] * ɸ[B] 
= (A-1) * (B-1) 
ɸ[N] = ɸ[P1] * ɸ[P2] 
ɸ[N] = (P1-1) * (P2-1) 
77=7*11 
ɸ[7] = ɸ[7] * ɸ[11] 
ɸ[7] = (7-1) * (11-1) = 6 * 10 =60
STEP 3-> EULER’S THEOREM 
- Relation between the phi function and modular 
exponentiation 
mɸ[N]= 1 mod N 
Pick 2 numbers that do not share a common factor 
m=5, n=8 
5ɸ[8]= 1 mod 8 
54= 1 mod 8 
625=1 mod 8
Modify this equation using 2 simple rules 
1) 1k=1 
mk*ɸ[N]= 1 mod N 
We multiply eponent ɸ[N] by any number k, 
the solution is still 1 
2) 1*m=m 
m*mk*ɸ[N]= m mod N 
mk*ɸ[N]+1= m mod N
We now have an equation to find e and d which depends 
on ɸ[N] 
mk*ɸ[N]+1= m mod N 
me*d= m mod N 
Where d= k*ɸ[N]+1 
e 
Meaning d is ALICE’s private key . 
It is the trap door which will perform undo operation
EVE 
N=3127 
ALICE BOB 
P1=53 
d=2011 
P1=59 
N= 53* 59 
N=3127 
ɸ[N]=52*58 
e=3 
d=2*(3016)+1 
3 
d=2011 
e=3 
hi 
m=hi 
m=89 
893 mod 3127=1394 
c=1394 
ɸ[N]=3016 
cd mod N = m 
13942011 mod 3127 = 89 
m=89 
m=hi 
c=1394
• Any one wth N, e and c can find d if and only if they know 
the prime factorization of N 
• If N is large enough it requirs 100 to 1000 years to find 
factorize 
• It is the most widely used public key cryptography 
algorithm and most copied software in the history 
• Every internet user is using RSA whether they realise on 
the hardness of prime factorization which results in deep 
question of distribution of prime numbers.
APPLICATIONS 
• When it comes to assymetric cryptography the most 
popular and widely used application that comes to 
anyone's mind is PGP. PGP stands for “Pretty Good 
Privacy” and is the standard public key cryptography 
application used today. In the examples of this project 
we chose to use PGP Desktop. The reason for this 
choice is that PGP Desktop is easier to use than other 
text-based versions of PGP such as gnuPGP. PGP 
Desktop provides us with a very intuitive GUI 
accessible from the Windows Start Menu ,the PGP 
taskbar icon and from Windows explorer (shell 
integration). So from now on, every time we mention 
PGP, we will be referring to the PGP Desktop version.
ADVANTAGES 
1. Convenience: It solves the problem of distributing the key for encryption. 
2. Provides for message authentication: Public key encryption allows the use 
of digital signatures which enables the recipient of a message to verify that 
the message is truly from a particular sender. 
3. Detection of tampering: The use of digital signatures in public key 
encryption allows the receiver to detect if the message was altered in transit. 
A digitally signed message cannot be modified without invalidating the 
signature. 
4. Provide for non-repudiation: Digitally signing a message is akin to 
physically signing a document. It is an acknowledgement of the message and 
thus, the sender cannot deny it.
DISADVANTAGES 
1. Public keys should/must be authenticated: No one can be absolutely sure that a 
public key belongs to the person it specifies and so everyone must verify that their public 
keys belong to them. 
2. Slow: Public key encryption is slow compared to symmetric encryption. Not feasible for 
use in decrypting bulk messages. 
3. Uses up more computer resources: It requires a lot more computer supplies 
compared to single-key encryption. 
4. Widespread security compromise is possible: If an attacker determines a 
person's private key, his or her entire messages can be read. 
5. Loss of private key may be irreparable: The loss of a private key means that all 
received messages cannot be decrypted
REFERENCES 
1. Frederick J. Hirsch. "SSL/TLS Strong Encryption: An 
Introduction". Apache HTTP Server. Retrieved 
2013-04-17.. The first two sections contain a very 
good introduction to public-key cryptography. 
2. N. Ferguson; B. Schneier (2003). Practical 
Cryptography. Wiley. ISBN 0-471-22357-3. 
3. J. Katz; Y. Lindell (2007). Introduction to Modern 
Cryptography. CRC Press. ISBN 1-58488-551-3. 
4. A. J. Menezes; P. C. van Oorschot; S. A. 
Vanstone (1997). Handbook of Applied 
Cryptography. ISBN 0-8493-8523-7.
THANK YOU

More Related Content

What's hot

13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash functionMijanur Rahman Milon
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash functionChirag Patel
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Rsa algorithm (rivest shamir-adleman)
Rsa algorithm (rivest shamir-adleman)Rsa algorithm (rivest shamir-adleman)
Rsa algorithm (rivest shamir-adleman)ManishKumarGiri2
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
 

What's hot (20)

Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Hash Function
Hash Function Hash Function
Hash Function
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Cryptography
CryptographyCryptography
Cryptography
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Email security
Email securityEmail security
Email security
 
Rsa algorithm (rivest shamir-adleman)
Rsa algorithm (rivest shamir-adleman)Rsa algorithm (rivest shamir-adleman)
Rsa algorithm (rivest shamir-adleman)
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 

Viewers also liked

Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithmKomal Singh
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)SAurabh PRajapati
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYQualcomm
 
RSA криптосистем
RSA криптосистемRSA криптосистем
RSA криптосистемsodhero
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography rinnocente
 
IDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyIDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyShivashish Kumar
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptographyishmecse13
 
ContikiMAC : Radio Duty Cycling Protocol
ContikiMAC : Radio Duty Cycling ProtocolContikiMAC : Radio Duty Cycling Protocol
ContikiMAC : Radio Duty Cycling ProtocolSalah Amean
 

Viewers also liked (20)

Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
Rsa Algorithm
Rsa AlgorithmRsa Algorithm
Rsa Algorithm
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
RSA криптосистем
RSA криптосистемRSA криптосистем
RSA криптосистем
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
One-Time Pad Encryption
One-Time Pad EncryptionOne-Time Pad Encryption
One-Time Pad Encryption
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Rsa encryption
Rsa encryptionRsa encryption
Rsa encryption
 
IDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyIDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptography
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptography
 
ContikiMAC : Radio Duty Cycling Protocol
ContikiMAC : Radio Duty Cycling ProtocolContikiMAC : Radio Duty Cycling Protocol
ContikiMAC : Radio Duty Cycling Protocol
 

Similar to RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE

Similar to RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE (20)

3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Pooguzhali
PooguzhaliPooguzhali
Pooguzhali
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
Rsa
RsaRsa
Rsa
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Ch9
Ch9Ch9
Ch9
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Rsa
RsaRsa
Rsa
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
 
Network security
Network securityNetwork security
Network security
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
 
Cryptography & Security
Cryptography & SecurityCryptography & Security
Cryptography & Security
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 

More from Qualcomm

Robotic surgery
Robotic  surgeryRobotic  surgery
Robotic surgeryQualcomm
 
Augmented Reality - 8th Mass Media
Augmented Reality - 8th Mass MediaAugmented Reality - 8th Mass Media
Augmented Reality - 8th Mass MediaQualcomm
 
Environmenal degradation
Environmenal degradationEnvironmenal degradation
Environmenal degradationQualcomm
 
Environmental Degradation PPT
Environmental Degradation PPTEnvironmental Degradation PPT
Environmental Degradation PPTQualcomm
 
Augmented Reality pdf
Augmented Reality pdf Augmented Reality pdf
Augmented Reality pdf Qualcomm
 
Robotic Surgery by muthugomathy and meenakshi shetti.
Robotic Surgery by muthugomathy and meenakshi shetti.Robotic Surgery by muthugomathy and meenakshi shetti.
Robotic Surgery by muthugomathy and meenakshi shetti.Qualcomm
 

More from Qualcomm (6)

Robotic surgery
Robotic  surgeryRobotic  surgery
Robotic surgery
 
Augmented Reality - 8th Mass Media
Augmented Reality - 8th Mass MediaAugmented Reality - 8th Mass Media
Augmented Reality - 8th Mass Media
 
Environmenal degradation
Environmenal degradationEnvironmenal degradation
Environmenal degradation
 
Environmental Degradation PPT
Environmental Degradation PPTEnvironmental Degradation PPT
Environmental Degradation PPT
 
Augmented Reality pdf
Augmented Reality pdf Augmented Reality pdf
Augmented Reality pdf
 
Robotic Surgery by muthugomathy and meenakshi shetti.
Robotic Surgery by muthugomathy and meenakshi shetti.Robotic Surgery by muthugomathy and meenakshi shetti.
Robotic Surgery by muthugomathy and meenakshi shetti.
 

Recently uploaded

How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfPo-Chuan Chen
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfVivekanand Anglo Vedic Academy
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxShibin Azad
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfYibeltalNibretu
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXMIRIAMSALINAS13
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
 

Recently uploaded (20)

How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 

RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE

  • 1. PUBLIC KEY CRYPTOGRAPHY RSA ENCRYPTION ALGORITHM Meenakshi Shetti Muthu Gomahty V
  • 2. CONTENTS • CRYPTOGRAPHY • WHAT IS A KEY ? • PRIVATE KEY CRYPTOGRAPHY • PUBLIC KEY CRYPTOGRAPHY • RSA ALGORITHM • ADVANTAGES • DISADVANTAGES • REFERENCES
  • 3. CRYPTOGRAPHY •It’s a greek word which means hidden secret in writing •Cryptography is the practice and study of techniques for secure communication in the presence of third parties(called adversaries).
  • 4. What is a “key”? A key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher.
  • 5. PRIVATE KEY CRYPTOGRAPHY • Also called as Symmetric-key algorithms • They are a class of algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
  • 6. Public key cryptography • Also known as asymmetric cryptography • Refers to a cryptographic algorithm which requires two separate keys, one of which is secret (or private) and one of which is public.
  • 7. Non secret ENCRYTION USING LOCK ALICE BOB
  • 10. TRAP DOOR –ONE WAY FUNCTION EASY HARD
  • 11. EXPONENET REMAINDER 12345 mod 17 ≡ 135903 346 mod 12 ≡10 BASE MODULUS
  • 13. EASY memod N ≡ c HARD ?emod N ≡ c
  • 14. memod N ≡ c emod N- public key C -remainder m- message
  • 15. me mod N ≡ c cd mod N ≡ m medmod N ≡ m e- encryption d - decryption
  • 16. For computation of e and d STEP 1 -> PRIME FACTORIZATION STEP 2 -> PHI FUNCTION STEP 3-> EULER’S THEOREM
  • 17. Multiplication of two extra large numbers are easy to compute. But prime factorization of a number is the hardness of the problem . Prime factorization is what used to build the trap door
  • 18. STEP 1 -> PRIME FACTORIZATION P1 – 150 digits long P2 – 150 digits long P1 * P2 = N N- 300 digits long
  • 19. STEP 2 -> PHI FUNCTION - breakability of a number Given a number N – it output’s how many integers are less than or equal to N that do not share a common factor with N ɸ[8] = 1 2 3 4 5 6 7 8 ɸ[8] = 1 2 3 4 5 6 7 8 We want to find ɸ[8] , we look at all integers from 1 to 8 , then we count how many integers does not share a factor greater than 1 ɸ[8] = 4
  • 20. • In the case of ɸ of a prime number – As prime numbers does not share common factor of any number greater than ɸ[P]=P-1 i.e, ɸ[7] = 1 2 3 4 5 6 7 As none of them share a common factor with 7 ɸ[7] = 7-1 ɸ[7] = 6
  • 21. ɸ[N] is also multiplicative ɸ[A*B] = ɸ[A] * ɸ[B] = (A-1) * (B-1) ɸ[N] = ɸ[P1] * ɸ[P2] ɸ[N] = (P1-1) * (P2-1) 77=7*11 ɸ[7] = ɸ[7] * ɸ[11] ɸ[7] = (7-1) * (11-1) = 6 * 10 =60
  • 22. STEP 3-> EULER’S THEOREM - Relation between the phi function and modular exponentiation mɸ[N]= 1 mod N Pick 2 numbers that do not share a common factor m=5, n=8 5ɸ[8]= 1 mod 8 54= 1 mod 8 625=1 mod 8
  • 23. Modify this equation using 2 simple rules 1) 1k=1 mk*ɸ[N]= 1 mod N We multiply eponent ɸ[N] by any number k, the solution is still 1 2) 1*m=m m*mk*ɸ[N]= m mod N mk*ɸ[N]+1= m mod N
  • 24. We now have an equation to find e and d which depends on ɸ[N] mk*ɸ[N]+1= m mod N me*d= m mod N Where d= k*ɸ[N]+1 e Meaning d is ALICE’s private key . It is the trap door which will perform undo operation
  • 25. EVE N=3127 ALICE BOB P1=53 d=2011 P1=59 N= 53* 59 N=3127 ɸ[N]=52*58 e=3 d=2*(3016)+1 3 d=2011 e=3 hi m=hi m=89 893 mod 3127=1394 c=1394 ɸ[N]=3016 cd mod N = m 13942011 mod 3127 = 89 m=89 m=hi c=1394
  • 26. • Any one wth N, e and c can find d if and only if they know the prime factorization of N • If N is large enough it requirs 100 to 1000 years to find factorize • It is the most widely used public key cryptography algorithm and most copied software in the history • Every internet user is using RSA whether they realise on the hardness of prime factorization which results in deep question of distribution of prime numbers.
  • 27. APPLICATIONS • When it comes to assymetric cryptography the most popular and widely used application that comes to anyone's mind is PGP. PGP stands for “Pretty Good Privacy” and is the standard public key cryptography application used today. In the examples of this project we chose to use PGP Desktop. The reason for this choice is that PGP Desktop is easier to use than other text-based versions of PGP such as gnuPGP. PGP Desktop provides us with a very intuitive GUI accessible from the Windows Start Menu ,the PGP taskbar icon and from Windows explorer (shell integration). So from now on, every time we mention PGP, we will be referring to the PGP Desktop version.
  • 28. ADVANTAGES 1. Convenience: It solves the problem of distributing the key for encryption. 2. Provides for message authentication: Public key encryption allows the use of digital signatures which enables the recipient of a message to verify that the message is truly from a particular sender. 3. Detection of tampering: The use of digital signatures in public key encryption allows the receiver to detect if the message was altered in transit. A digitally signed message cannot be modified without invalidating the signature. 4. Provide for non-repudiation: Digitally signing a message is akin to physically signing a document. It is an acknowledgement of the message and thus, the sender cannot deny it.
  • 29. DISADVANTAGES 1. Public keys should/must be authenticated: No one can be absolutely sure that a public key belongs to the person it specifies and so everyone must verify that their public keys belong to them. 2. Slow: Public key encryption is slow compared to symmetric encryption. Not feasible for use in decrypting bulk messages. 3. Uses up more computer resources: It requires a lot more computer supplies compared to single-key encryption. 4. Widespread security compromise is possible: If an attacker determines a person's private key, his or her entire messages can be read. 5. Loss of private key may be irreparable: The loss of a private key means that all received messages cannot be decrypted
  • 30. REFERENCES 1. Frederick J. Hirsch. "SSL/TLS Strong Encryption: An Introduction". Apache HTTP Server. Retrieved 2013-04-17.. The first two sections contain a very good introduction to public-key cryptography. 2. N. Ferguson; B. Schneier (2003). Practical Cryptography. Wiley. ISBN 0-471-22357-3. 3. J. Katz; Y. Lindell (2007). Introduction to Modern Cryptography. CRC Press. ISBN 1-58488-551-3. 4. A. J. Menezes; P. C. van Oorschot; S. A. Vanstone (1997). Handbook of Applied Cryptography. ISBN 0-8493-8523-7.