SlideShare a Scribd company logo
left footer right footer – 1 / 19
An Introduction to RSA
David Boyhan
August 5, 2008
For 2000 Years ...
left footer right footer – 2 / 19
• Encryption was symmetric:
◦ E(M, k) → C
◦ D(C, k) → M
• The same key k is used for both steps
• Example: Caeser’s Shift Cipher, with k = 3
◦ DM HURTS MY BRAIN ⇒ GP KXUWV OB EUDLQ
• Symmetric Ciphers:
◦ Are subject to interception
◦ Require expensive key distribution
• The same issue exists for steganography and one-time pads.
Diffie & Hellman Invent PKC
left footer right footer – 3 / 19
• In 1977, Whitfield Diffie and Martin Hellman published New Directions in
Cryptography proposing a public-key cryptography scheme.
• They propose:
◦ E(M, e) → C
◦ D(C, d) → M
◦ D(C, e) → M
• One key e locks
• One key d unlocks
• e is the public key. d is the private key
• They keys are linked, but d cannot be derived from e.
Trap Door Problems
left footer right footer – 4 / 19
Diffie & Hellman suggest use of trap door or one-way problems.
Example:
1. Multiply 13,719 by 23,546 to get 323,041,293
2. Now, factor 323,041,292 into it’s prime factors of 32
∗ 17 ∗ 47 ∗ 167 ∗ 269
Diffie & Merkle attempt use of knapsack problems for the trap door. This is proven to
be cryptographically insecure.
Enter RSA
left footer right footer – 5 / 19
• In 1978, Ronald Rivest, Adi Shamir and Leonard Adelman (RSA) publish A
Method for Obtaining Digital Signatures and Public-Key Cryptosystems. This
becomes the de facto standardforstandard for public-key cryptography for 30
years.
• The trap-door is based on factoring of large numbers and modular mathematical
inverse.
• The basic algorithm requires creation/selection of 5 integers:
◦ p and q are large prime numbers
◦ n which is generated by p · q
◦ d which is relatively prime to (p − 1) · (q − 1)
◦ e which is generated by d and n
• M is the original message. C is the cipher-text
The RSA Algorithm
left footer right footer – 6 / 19
The algorithm is amazingly simple:
“. . ., the result (the ciphertext C) is the remainder when Me
is divided by
n. To decrypt the ciphertext, raise it to another power d again modulo n .”
E(M) = Me
(mod n) = C
D(C) = Cd
(mod n) = M
The Hard Parts ...
left footer right footer – 7 / 19
• Selecting p and q requires rapid testing for primality. This is not too hard.
• Selecting d as gcd(d, ((p − 1) · (q − 1)) = 1 requires basic algorithm (min is
fine, Euclid’s Algorithm is also used)
• Creating e is the complex part (at least for me), because:
e is the multiplicative inverse of d mod ((p − 1) · (q − 1)
• To find modular multiplicative inverse, we need to fine e such that
d · e = 1 mod ((p − 1) · (q − 1))
• To do that, we need Euler’s Totient and Euler’s Generalization of Fermat’s Little
Theorem
Euler’s Totient
left footer right footer – 8 / 19
• Euler’s Totient of n, φ(n), is defined as the number of positive integers less than
n that are relatively prime to n.
• if n is prime then φ(n) is simply (n − 1). If both p and q and prime, then it’s
easy to see that φ(p · q) will be ((p − 1) · (q − 1)).
• Example if n is not prime - there are 4 numbers that are relatively prime to 12,
being (1, 5, 7, 11). Therefore φ(12) is 4.
• Calculating Euler’s Totient φ(n) can be done through the prime factorization of
nsuch that n = pk1
1 · · · pkr
r
Euler’s Totient (continued)
left footer right footer – 9 / 19
• We then identify the distinct primes and compute φ(n) using the following
formula:
n
p|n
1 −
1
p
• Therefore, for example, 12 = 22
31
so the Totient would be
12 · (1 −
1
2
) · (1 −
1
3
) = 12 ∗
1
2
∗
2
3
= 4.
• Similarly, because the prime factorization of 54 = 21
33
then φ(54) would also
be 54 ∗
1
2
∗
2
3
= 18.
Euler’s Generalization of Fermat’s Little Theorem
left footer right footer – 10 / 19
• Euler’s Generalization of Fermat’s Little Theorem states that: if gcd(d, z) = 1
then dφ(z)
mod z = 1. This is a condition we have already satisfied with dand
((p − 1) · (q − 1).
• Substituting ((p − 1) · (q − 1))for z we can see, using Fermat’s Little Theorem
that:
1 = dφ((p−1)·(q−1))
mod ((q − 1) · (p − 1))
Euler’s Generalization (continued)
left footer right footer – 16 / 19
• We also know that based on the definition of multiplicative modular inverse that:
e · d = 1(mod(p − 1) · (q − 1))
e · d · d−1
= d−1
· 1(mod(p − 1) · (q − 1))
Substituting in dφ((p−1)·(q−1))
mod ((q − 1) · (p − 1))for 1(mod(p − 1) · (q − 1)),
we get:
e · 1 = dφ((p−1)·(q−1))−1
mod (p − 1) · (q − 1)
Example
left footer right footer – 17 / 19
• To create n we’ll use: p = 5, q = 11. n = p · q = 5 · 11 = 55.
• Pick random number that is relatively prime to ((p − 1) · (q − 1)) = d = 7.
• We calculate e using d and Euler’s Generalization of Fermat’s Little Theorem.
Accordingly:
e = dφ((p−1)·(q−1))−1
mod ((p − 1) · (q − 1)) = 7φ(4∗10)−1
mod 4 ∗ 10
• 40 = 23
∗ 51
, therefore, φ(40) = 40 ∗ (1 −
1
2
) ∗ (1 −
1
5
) = 40 ∗
1
2
∗
4
5
= 16
• Therefore, e = 715
mod 40 and e = 23
Example - Continued
left footer right footer – 18 / 19
• Finally we’ll start with plain-text message M:DM HURTS MY BRAIN
• For the purposes of this example, we’ll use the integers 1-26 to represent the
alphabet and remove all spaces. However, under normal circumstances, ASCII
would be used instead. Therefore, M becomes: D M H U R T S M Y B R A I N
⇒04 13 08 21 18 20 19 13 25 02 18 01 09 14
• First encrypted block C1 = 0423
(mod 5)5 = 09
• The entire message is encrypted as:09 52 17 21 02 25 39 52 05 08 02 01 14 49
• To decrypt, reverse the process with D(C) = Cd
(mod n) = M
The Consequences of RSA
left footer right footer – 19 / 19
• $33 billion in e-commerce transactions for 1st quarter 2008
• In 1991 PGP makes strong cryptography available to everyone
• Philip Zimmermann gets sued and investigated by the FBI
• The US Government proposes the Clipper Chip
• Philip Zimmermann gets an RSA license and the FBI drops the case
• The US Government drops Clipper Chip
• PGP and GNU Privacy Guard are world-wide
• The 2008 Summer Olympics remain ...

More Related Content

What's hot

Distorted diffeomorphisms and path connectedness of Z^d actions on 1-manifolds
Distorted diffeomorphisms and path connectedness of Z^d actions on 1-manifoldsDistorted diffeomorphisms and path connectedness of Z^d actions on 1-manifolds
Distorted diffeomorphisms and path connectedness of Z^d actions on 1-manifolds
Andrius Navas
 
Skiena algorithm 2007 lecture12 topological sort connectivity
Skiena algorithm 2007 lecture12 topological sort connectivitySkiena algorithm 2007 lecture12 topological sort connectivity
Skiena algorithm 2007 lecture12 topological sort connectivityzukun
 
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
Mumbai B.Sc.IT Study
 
Data Compression (Huffman)
Data Compression (Huffman)Data Compression (Huffman)
Data Compression (Huffman)Ali Mehmood
 
Complex Integral
Complex IntegralComplex Integral
Complex Integral
Mikołaj Hajduk
 
CoqでGCの証明をしてみたよ(LT)
CoqでGCの証明をしてみたよ(LT)CoqでGCの証明をしてみたよ(LT)
CoqでGCの証明をしてみたよ(LT)Hiroki Mizuno
 
Depth first search [dfs]
Depth first search [dfs]Depth first search [dfs]
Depth first search [dfs]
DEEPIKA T
 
Interference Management for Multi-hop Networks
Interference Management for Multi-hop NetworksInterference Management for Multi-hop Networks
Interference Management for Multi-hop Networks
Mohamed Seif
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In CryptographyAadya Vatsa
 
Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...
Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...
Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...
Alexander Litvinenko
 
7th PreAlg - L56--Feb7
7th PreAlg - L56--Feb77th PreAlg - L56--Feb7
7th PreAlg - L56--Feb7jdurst65
 
Calc224FinalExamReview
Calc224FinalExamReviewCalc224FinalExamReview
Calc224FinalExamReviewTori Peña
 
Directed Acyclic Graph
Directed Acyclic Graph Directed Acyclic Graph
Directed Acyclic Graph
AJAL A J
 
Presentation on Breadth First Search (BFS)
Presentation on Breadth First Search (BFS)Presentation on Breadth First Search (BFS)
Presentation on Breadth First Search (BFS)
Shuvongkor Barman
 
3XRC4
3XRC43XRC4

What's hot (20)

Alg2 lesson 7-2
Alg2 lesson 7-2Alg2 lesson 7-2
Alg2 lesson 7-2
 
Distorted diffeomorphisms and path connectedness of Z^d actions on 1-manifolds
Distorted diffeomorphisms and path connectedness of Z^d actions on 1-manifoldsDistorted diffeomorphisms and path connectedness of Z^d actions on 1-manifolds
Distorted diffeomorphisms and path connectedness of Z^d actions on 1-manifolds
 
Skiena algorithm 2007 lecture12 topological sort connectivity
Skiena algorithm 2007 lecture12 topological sort connectivitySkiena algorithm 2007 lecture12 topological sort connectivity
Skiena algorithm 2007 lecture12 topological sort connectivity
 
Close Graph
Close GraphClose Graph
Close Graph
 
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
[Question Paper] Fundamentals of Digital Computing (Revised Course) [April / ...
 
Alg2 lesson 5-4
Alg2 lesson 5-4Alg2 lesson 5-4
Alg2 lesson 5-4
 
Data Compression (Huffman)
Data Compression (Huffman)Data Compression (Huffman)
Data Compression (Huffman)
 
Complex Integral
Complex IntegralComplex Integral
Complex Integral
 
CoqでGCの証明をしてみたよ(LT)
CoqでGCの証明をしてみたよ(LT)CoqでGCの証明をしてみたよ(LT)
CoqでGCの証明をしてみたよ(LT)
 
Data structure
Data structureData structure
Data structure
 
Depth first search [dfs]
Depth first search [dfs]Depth first search [dfs]
Depth first search [dfs]
 
Interference Management for Multi-hop Networks
Interference Management for Multi-hop NetworksInterference Management for Multi-hop Networks
Interference Management for Multi-hop Networks
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...
Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...
Possible applications of low-rank tensors in statistics and UQ (my talk in Bo...
 
7th PreAlg - L56--Feb7
7th PreAlg - L56--Feb77th PreAlg - L56--Feb7
7th PreAlg - L56--Feb7
 
Calc224FinalExamReview
Calc224FinalExamReviewCalc224FinalExamReview
Calc224FinalExamReview
 
Chap 9
Chap 9Chap 9
Chap 9
 
Directed Acyclic Graph
Directed Acyclic Graph Directed Acyclic Graph
Directed Acyclic Graph
 
Presentation on Breadth First Search (BFS)
Presentation on Breadth First Search (BFS)Presentation on Breadth First Search (BFS)
Presentation on Breadth First Search (BFS)
 
3XRC4
3XRC43XRC4
3XRC4
 

Similar to Slides to RSA Presentation

2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiouvafopoulos
 
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Joshua Holden
 
ch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.pptch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.ppt
tahirnaquash2
 
An Introduction to RSA Public-Key Cryptography
An Introduction to RSA Public-Key CryptographyAn Introduction to RSA Public-Key Cryptography
An Introduction to RSA Public-Key Cryptography
David Boyhan, JD, CIPP
 
EULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMEULER AND FERMAT THEOREM
EULER AND FERMAT THEOREM
ankita pandey
 
CNIT 141: 9. Elliptic Curve Cryptosystems
CNIT 141: 9. Elliptic Curve CryptosystemsCNIT 141: 9. Elliptic Curve Cryptosystems
CNIT 141: 9. Elliptic Curve Cryptosystems
Sam Bowne
 
Cryptanalysis Project Report
Cryptanalysis Project ReportCryptanalysis Project Report
Cryptanalysis Project Report
shahparin
 
Assignment 2 (1) (1).docx
Assignment 2 (1) (1).docxAssignment 2 (1) (1).docx
Assignment 2 (1) (1).docx
pinstechwork
 
Dependency Analysis of RSA Private Variables
Dependency Analysis of RSA Private VariablesDependency Analysis of RSA Private Variables
Dependency Analysis of RSA Private Variables
Dharmalingam Ganesan
 
Eulers totient
Eulers totientEulers totient
Eulers totient
SampadaZalte
 
Modular Arithmetic concept in mathematics
Modular Arithmetic concept in mathematicsModular Arithmetic concept in mathematics
Modular Arithmetic concept in mathematics
IdcIdk1
 
Modular Arithmetic and congruence of integers.ppt
Modular Arithmetic and congruence of integers.pptModular Arithmetic and congruence of integers.ppt
Modular Arithmetic and congruence of integers.ppt
JayLagman3
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsDiscrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
NIT Sikkim
 

Similar to Slides to RSA Presentation (20)

2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
Understanding the Magic: Teaching Cryptography with Just the Right Amount of ...
 
Ecc2
Ecc2Ecc2
Ecc2
 
ch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.pptch08 modified.pptmodified.pptmodified.ppt
ch08 modified.pptmodified.pptmodified.ppt
 
An Introduction to RSA Public-Key Cryptography
An Introduction to RSA Public-Key CryptographyAn Introduction to RSA Public-Key Cryptography
An Introduction to RSA Public-Key Cryptography
 
P10co982 (2)
P10co982 (2)P10co982 (2)
P10co982 (2)
 
EULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMEULER AND FERMAT THEOREM
EULER AND FERMAT THEOREM
 
CNIT 141: 9. Elliptic Curve Cryptosystems
CNIT 141: 9. Elliptic Curve CryptosystemsCNIT 141: 9. Elliptic Curve Cryptosystems
CNIT 141: 9. Elliptic Curve Cryptosystems
 
Muchtadi
MuchtadiMuchtadi
Muchtadi
 
Cryptanalysis Project Report
Cryptanalysis Project ReportCryptanalysis Project Report
Cryptanalysis Project Report
 
Assignment 2 (1) (1).docx
Assignment 2 (1) (1).docxAssignment 2 (1) (1).docx
Assignment 2 (1) (1).docx
 
Ch08
Ch08Ch08
Ch08
 
Dependency Analysis of RSA Private Variables
Dependency Analysis of RSA Private VariablesDependency Analysis of RSA Private Variables
Dependency Analysis of RSA Private Variables
 
Eulers totient
Eulers totientEulers totient
Eulers totient
 
Modular Arithmetic concept in mathematics
Modular Arithmetic concept in mathematicsModular Arithmetic concept in mathematics
Modular Arithmetic concept in mathematics
 
Modular Arithmetic and congruence of integers.ppt
Modular Arithmetic and congruence of integers.pptModular Arithmetic and congruence of integers.ppt
Modular Arithmetic and congruence of integers.ppt
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Rsa
RsaRsa
Rsa
 
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsDiscrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
 

Recently uploaded

extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
DiyaBiswas10
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
yusufzako14
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SELF-EXPLANATORY
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
IqrimaNabilatulhusni
 
insect taxonomy importance systematics and classification
insect taxonomy importance systematics and classificationinsect taxonomy importance systematics and classification
insect taxonomy importance systematics and classification
anitaento25
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
Columbia Weather Systems
 
Richard's entangled aventures in wonderland
Richard's entangled aventures in wonderlandRichard's entangled aventures in wonderland
Richard's entangled aventures in wonderland
Richard Gill
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
muralinath2
 
filosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptxfilosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptx
IvanMallco1
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
University of Maribor
 
Citrus Greening Disease and its Management
Citrus Greening Disease and its ManagementCitrus Greening Disease and its Management
Citrus Greening Disease and its Management
subedisuryaofficial
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
AlguinaldoKong
 
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCINGRNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
AADYARAJPANDEY1
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
pablovgd
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
YOGESH DOGRA
 
What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.
moosaasad1975
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
SAMIR PANDA
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
Areesha Ahmad
 
Comparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebratesComparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebrates
sachin783648
 

Recently uploaded (20)

extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
 
insect taxonomy importance systematics and classification
insect taxonomy importance systematics and classificationinsect taxonomy importance systematics and classification
insect taxonomy importance systematics and classification
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
 
Richard's entangled aventures in wonderland
Richard's entangled aventures in wonderlandRichard's entangled aventures in wonderland
Richard's entangled aventures in wonderland
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
 
filosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptxfilosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptx
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
 
Citrus Greening Disease and its Management
Citrus Greening Disease and its ManagementCitrus Greening Disease and its Management
Citrus Greening Disease and its Management
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
 
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCINGRNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
 
What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
 
Comparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebratesComparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebrates
 

Slides to RSA Presentation

  • 1. left footer right footer – 1 / 19 An Introduction to RSA David Boyhan August 5, 2008
  • 2. For 2000 Years ... left footer right footer – 2 / 19 • Encryption was symmetric: ◦ E(M, k) → C ◦ D(C, k) → M • The same key k is used for both steps • Example: Caeser’s Shift Cipher, with k = 3 ◦ DM HURTS MY BRAIN ⇒ GP KXUWV OB EUDLQ • Symmetric Ciphers: ◦ Are subject to interception ◦ Require expensive key distribution • The same issue exists for steganography and one-time pads.
  • 3. Diffie & Hellman Invent PKC left footer right footer – 3 / 19 • In 1977, Whitfield Diffie and Martin Hellman published New Directions in Cryptography proposing a public-key cryptography scheme. • They propose: ◦ E(M, e) → C ◦ D(C, d) → M ◦ D(C, e) → M • One key e locks • One key d unlocks • e is the public key. d is the private key • They keys are linked, but d cannot be derived from e.
  • 4. Trap Door Problems left footer right footer – 4 / 19 Diffie & Hellman suggest use of trap door or one-way problems. Example: 1. Multiply 13,719 by 23,546 to get 323,041,293 2. Now, factor 323,041,292 into it’s prime factors of 32 ∗ 17 ∗ 47 ∗ 167 ∗ 269 Diffie & Merkle attempt use of knapsack problems for the trap door. This is proven to be cryptographically insecure.
  • 5. Enter RSA left footer right footer – 5 / 19 • In 1978, Ronald Rivest, Adi Shamir and Leonard Adelman (RSA) publish A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. This becomes the de facto standardforstandard for public-key cryptography for 30 years. • The trap-door is based on factoring of large numbers and modular mathematical inverse. • The basic algorithm requires creation/selection of 5 integers: ◦ p and q are large prime numbers ◦ n which is generated by p · q ◦ d which is relatively prime to (p − 1) · (q − 1) ◦ e which is generated by d and n • M is the original message. C is the cipher-text
  • 6. The RSA Algorithm left footer right footer – 6 / 19 The algorithm is amazingly simple: “. . ., the result (the ciphertext C) is the remainder when Me is divided by n. To decrypt the ciphertext, raise it to another power d again modulo n .” E(M) = Me (mod n) = C D(C) = Cd (mod n) = M
  • 7. The Hard Parts ... left footer right footer – 7 / 19 • Selecting p and q requires rapid testing for primality. This is not too hard. • Selecting d as gcd(d, ((p − 1) · (q − 1)) = 1 requires basic algorithm (min is fine, Euclid’s Algorithm is also used) • Creating e is the complex part (at least for me), because: e is the multiplicative inverse of d mod ((p − 1) · (q − 1) • To find modular multiplicative inverse, we need to fine e such that d · e = 1 mod ((p − 1) · (q − 1)) • To do that, we need Euler’s Totient and Euler’s Generalization of Fermat’s Little Theorem
  • 8. Euler’s Totient left footer right footer – 8 / 19 • Euler’s Totient of n, φ(n), is defined as the number of positive integers less than n that are relatively prime to n. • if n is prime then φ(n) is simply (n − 1). If both p and q and prime, then it’s easy to see that φ(p · q) will be ((p − 1) · (q − 1)). • Example if n is not prime - there are 4 numbers that are relatively prime to 12, being (1, 5, 7, 11). Therefore φ(12) is 4. • Calculating Euler’s Totient φ(n) can be done through the prime factorization of nsuch that n = pk1 1 · · · pkr r
  • 9. Euler’s Totient (continued) left footer right footer – 9 / 19 • We then identify the distinct primes and compute φ(n) using the following formula: n p|n 1 − 1 p • Therefore, for example, 12 = 22 31 so the Totient would be 12 · (1 − 1 2 ) · (1 − 1 3 ) = 12 ∗ 1 2 ∗ 2 3 = 4. • Similarly, because the prime factorization of 54 = 21 33 then φ(54) would also be 54 ∗ 1 2 ∗ 2 3 = 18.
  • 10. Euler’s Generalization of Fermat’s Little Theorem left footer right footer – 10 / 19 • Euler’s Generalization of Fermat’s Little Theorem states that: if gcd(d, z) = 1 then dφ(z) mod z = 1. This is a condition we have already satisfied with dand ((p − 1) · (q − 1). • Substituting ((p − 1) · (q − 1))for z we can see, using Fermat’s Little Theorem that: 1 = dφ((p−1)·(q−1)) mod ((q − 1) · (p − 1))
  • 11. Euler’s Generalization (continued) left footer right footer – 16 / 19 • We also know that based on the definition of multiplicative modular inverse that: e · d = 1(mod(p − 1) · (q − 1)) e · d · d−1 = d−1 · 1(mod(p − 1) · (q − 1)) Substituting in dφ((p−1)·(q−1)) mod ((q − 1) · (p − 1))for 1(mod(p − 1) · (q − 1)), we get: e · 1 = dφ((p−1)·(q−1))−1 mod (p − 1) · (q − 1)
  • 12. Example left footer right footer – 17 / 19 • To create n we’ll use: p = 5, q = 11. n = p · q = 5 · 11 = 55. • Pick random number that is relatively prime to ((p − 1) · (q − 1)) = d = 7. • We calculate e using d and Euler’s Generalization of Fermat’s Little Theorem. Accordingly: e = dφ((p−1)·(q−1))−1 mod ((p − 1) · (q − 1)) = 7φ(4∗10)−1 mod 4 ∗ 10 • 40 = 23 ∗ 51 , therefore, φ(40) = 40 ∗ (1 − 1 2 ) ∗ (1 − 1 5 ) = 40 ∗ 1 2 ∗ 4 5 = 16 • Therefore, e = 715 mod 40 and e = 23
  • 13. Example - Continued left footer right footer – 18 / 19 • Finally we’ll start with plain-text message M:DM HURTS MY BRAIN • For the purposes of this example, we’ll use the integers 1-26 to represent the alphabet and remove all spaces. However, under normal circumstances, ASCII would be used instead. Therefore, M becomes: D M H U R T S M Y B R A I N ⇒04 13 08 21 18 20 19 13 25 02 18 01 09 14 • First encrypted block C1 = 0423 (mod 5)5 = 09 • The entire message is encrypted as:09 52 17 21 02 25 39 52 05 08 02 01 14 49 • To decrypt, reverse the process with D(C) = Cd (mod n) = M
  • 14. The Consequences of RSA left footer right footer – 19 / 19 • $33 billion in e-commerce transactions for 1st quarter 2008 • In 1991 PGP makes strong cryptography available to everyone • Philip Zimmermann gets sued and investigated by the FBI • The US Government proposes the Clipper Chip • Philip Zimmermann gets an RSA license and the FBI drops the case • The US Government drops Clipper Chip • PGP and GNU Privacy Guard are world-wide • The 2008 Summer Olympics remain ...