Security in communication networks

Size: px
Start display at page:

Download "Security in communication networks"

Transcription

1 Security in communication networks by MARTIN E. HELLMAN Stanford University Stanford, California INTRODUCTION It may seem anomolous that electronic mail and other computer communication systems require cryptographic protection when almost no physical mail is given this protection. The difference is that computer readable traffic is extremely vulnerable to automatic sorting at very low cost. Physical mail would also need to be encrypted if it were all written on postcards and could be sorted at a cost of only $1 for several million pages. Even seemingly innocuous facts can be damaging when such vast amounts of data can be screened for all messages mentioning one of a list of key words (e.g., computer communications, electronic mail, EFT, etc.). Analog voice circuits are as vulnerable to wiretapping, but are expensive to sort. Fortunately, the digital nature of the data makes high grade encryption possible at low cost. Analog circuits are almost impossible to adequately secure without going through a digital interface and encryption. The National Bureau of Standards has promulgated a national data encryption standard which can be implemented on a single LSI chip. 1 In large quantities it should therefore cost on the order of $10, an insignificant addition to the cost of a computer terminal. While some have criticized the standard as being inadequately secure,2-4 this is not due to technical constraints, but rather appears to be a political problem. While the cost of the encryption hardware is not a barrier to the widespread use of cryptography in computer oriented systems, there are other costs and problems which must be considered. Key distribution is one such problem. 5 In a network with n users there are approximately n 2 /2 possible pairs of users who may wish to converse securely from all other users. The distribution of this many keys by courier, registered mail, etc. is clearly uneconomic even for n equal to one million. This problem can be solved by having the system itself distribute keys, encrypted in user specific system keys or passwords, but this requires the system to be secure. 6,7 A more useful approach was suggested by Diffie and Hellman 5 and Merkle. S They proposed that it is possible to converse securely over an insecure channel with no prearrangement through use of "public key systems." The second section describes the public key systems of References 5 and 8 as well as systems devised by Rivest, Shamir and Adleman, 9 McEliece,lO and Merkle and Hellman. 11 While none of these public key systems has been broken thus far, it is necessary that they withstand the test of time and concerted mock attacks by dedicated "opponents" before they can be trusted because no methods are currently known for proving even conventional cryptosystems secure. In this regard we applaud the work of Simmons and Norris 12 which looked for potential weaknesses in one of the public key systems. More such work is needed, and it would not be surprising if weaknesses were found in one or more of the currently known systems, much as conventional cryptography also went through a learning period. Digital signatures are discussed in the third section. Conventional cryptographic systems can prevent third party forgeries, but cannot settle disputes between the transmitter and receiver (e.g., a stock broker and his client) as to what message, if any, was sent. Solutions to this problem were first hypothesized by Diffie and Hellman 5 and found by Rivest, Shamir and Adleman 9 and Merkle and Hellman. 11 PUBLIC KEY SYSTEMS Merkle's public key systems is perhaps the simplest and least likely to yield to continued cryptanalytic efforts. Its disadvantage is that it is the most expensive. It depends on the existence of a one way function, a function that is easy to compute for all arguments in its domain but computationally infeasible to invert for almost all images in its range. Such functions have been discussed elsewhere and are as easy to develop as secure cryptosystems of the conventional, as opposed to public key, type. 5 Merkle goes a step further and describes a method for generating one way functions of controllable "one wayness" or difficulty of inversion. A mildly one way function can be used to generate a puzzle, a problem which is difficult, but not impossible, to solve and for which it is easy to check a supposed solution. User A generates m keys, k 1, k 2,, k m, and operates on them with a mildly one way function f(*) to obtain their images or puzzles, Y1' Y2'..., Ym' These images are transmitted to user B who selects one of them at random, say Yi' and solves the associated puzzle to obtain ~. The two users now share a key in common but A does not know which one it is. B therefore sends A the value z=g(~), where g(:) is a 1131

2 1132 National Computer Conference, 1978 true one way function. A then operates on k l, k 2, etc. with g(*) until he finds one which yields z. The successful key must be ~ provided g(*) is one-to-one. The cost to A is linearly proportional to m, the number of puzzles, because A must operate on m k's withf(*)-which is easy-to obtain the my's; he must store the m k's; and finally must operate on approximately ml2 of the k's with g(*)-again an easy task-before finding z as an image. A's transmission cost is also linearly proportional to m since he must send my's. B's dominant cost is in solving the one puzzle that he chose at random. By making the cost of solving a single puzzle proportional to m, the total cost to the two legitimate users is still only linear in m. An eavesdropper, however, must solve ml2 puzzles on the average before finding ~, so his cost is proportional to m 2. Thus as m tends to infinity the ratio of cryptanalytic cost to key exchange cost also tends to infinity. This method's weakness is in the relatively small ratio of costs (m 2 : m) and the fact that the key exchange cost is as much in transmission as in computation. (Transmission costs have not decreased as rapidly as computation costs.) The introduction of low cost, high bandwidth transmission media, such as fiber optics, may make this method more competitive. Merkle's paper 8 describes several very clever additions to this simple description, but the basic cost ratio is not changed. Diffie and Hellman 5 propose a method of public key exchange which requires 2 bl2 operations for cryptanalysis (using the best known algorithm) but only b 3 operations for key exchange, where b is the number of bits in the representation of the key. By choosing b =400, key exchange requires only 64 million gate operations and takes approximately one second in a special purpose LSI implementation. Cryptanalysis using currently known techniques requires approximately operations and words of memory and is therefore totally infeasible. This technique makes use of the apparent one wayness of the discrete exponential function y=a x mod q, where q is a large prime number of appropriate form 1?,,J:7 and a is a fixed ~mitive element of the finite field nf(q). Calculating y from x-with tacit knowledge of ailnd q-is relatively easy, and requires only three words /.ofmemory, each b bits)ong, and b 3 gate delays. Computing x from y is believed tibe much harder, and the best known algorithm l6,17 require~ memory and time proportional to 2b12. ' The two users and the cryptanalyst are assumed to know q and a. Each user generates a random number uniformly distributed between 2 and q-2. Call these values Xl and X2. The users -~~ep these values secret, but compute YI = a XI mod q aiid Y2 = a x2 mod q and exchange these values. The cryptanalyst therefore also learns YI and Y2, but cannot feasibly compute Xl or X2 therefrom. User 1 takes Y2 (which was sent to him) and Xl (which he has kept secret) and computes (Y2)Xl=(aX2)Xl=dxlX2) mod q. User 2 computes (Yl)X2 = (a Xl )X2 = dx1xl!). Both users are now in possession of a common number K= a< x l x 2) mod q which they use as the key in a normal cryptographic system. The cryptanalyst cannot compute K as any obvious function ofyi andy2 (e.g., Yl Y2 or (Yl )Y2) without first computing either Xl or X2, which is an infeasible task using the best known algorithms. There may be better algorithms for computing Xl and X2, or there may be some nonobvious method for computing K from YI and Y2 directly. As with all cryptographic systems, this one should be studied further to increase our trust in it. Merkle and Hellman 11 have proposed a public key method based on trap door knapsacks. Given a one-dimensional knapsack of length S and a set of n rods of lengths ai' ~,..., an' one version of the knapsack problem is to find a subset of the rods whose lengths sum to exactly S. Equivalently, find a binary n-vector X such that a*x=s. (The dot product of two vectors is denoted by *.) The knapsack problem is believed to be very difficult in general, and this belief is supported by its being an NPcomplete problem. 18 In a loose sense the NP-complete problems are the most difficult problems of a cryptographic nature. 5 A trap door knapsack vector a is one which has no apparent structure which can be used to simplify the solution process, but which possesses hidden (trap door) structure which allows rapid solution for x. As a small demonstration example, consider a=(5457, 1663, 216, 6013, 7439) and S = = 15115, corresponding to x=(o,i,o,i,i). It happens that if each component of a is multiplied by 3950 mod 8443 (the secret, trap door information) the vector a'=(171, 196, 457, 1191, 2410) results. This vector has the property that each component is larger than the sum of all the preceding components. Transforming S in a similar manner (multiplying it by 3950 mod 8443) yields S'=3797. Some thought shows that the solution to the problem S=a*x is the same as the solution to S' =a'*x, and that the solution to S' =a'*x is easily found because of the form of a'. X5 must be 1 because S'~lls '-if X5 were 0 then even if all other components of x were l' s the sum could not be large enough to yield S'. Subtracting a 5 ' from S' yields = 1387 which is the sum of a subset of the remaining components of a'. Because 1387~a4'=1191 we know that X4 must also equal 1. Subtracting a4' from 1387 yields 196. This is smaller than ll:j' =457 so X3 must equal o. It is equal to ~'=196 so X 2 must equal 1 and Xl must equal o. The determination of x is now complete and, as a quick check will show, correct for the original problem S =a*x as well. Of course the trap door knapsack vector a was not generated first. Rather a' was first chosen with the property that each component was larger than the sum of all preceding components and then transformed into the a vector by multiplying each component of a' by 2550 mod 8443 (2550 and 3950 are multiplicative inverses mod 8443). In a similar manner a program could easily be written to generate rather large trap door knapsack vectors from a random bit string. Any user of a computer system could then generate his own personal trap door knapsack vector regardless of his mathematical abilities. The program would also generate the secret multiplier and modulus which reduces the apparently difficult knapsack problem S=a*x to the trivial problem S' =a'*x. This program is assumed to be public knowledge but, even so, there is no apparent way for a cryptanalyst to easily solve for x only from knowledge of S and the public vector a. After generating a trap door knapsack vector a, the user

3 Security in Communication Networks 1133 can place it in a public file. Then anyone who wishes to send him information can do so by representing it in binary blocks of n bits each, and using these as x vectors to compute the sums S =a*x which are sent to the first user, who can easily recover the information x even though no one else can. Note that this system is different from either of the first two public key systems in that a normal cryptographic system is not needed. This is because the first two systems each generated a number that the two legitimate parties to the conversation could easily compute, but neither of the parties could determine that number on his own. In the trap door knapsack system x is determined entirely by one of the users. While it is not necessary for x to be used as the key in a normal cryptographic system, in practice, the speed advantages of conventional cryptographic systems will probably cause x to be used in that manner. This same remark applies to all of the currently known public key systems. The public key system due to Rivest, Shamir, and Adleman 9 can be regarded as a generalization of a conventional cryptographic system developed by Pohlig and Hellman. 16 Each user generates a pair of numbers E and n which are placed in a public file and which are used by others to encipher data they wish to send him. At the same time that E and n are generated, another number D is generated which is required for deciphering data. Clearly, it must be computationally infeasible to compute D from the public information E and n if the system is to be secure. As shown in Reference 9, computing D from E and n is equivalent to factoring n, and it is possible to choose n so that this is infeasible using the best known factoring algorithms. First two large prime numbers p and q are chosen and multiplied to produce n =pq. Then Euler's function m=phi(n)=(p-l)(q-l) is computed. Phi(n) is the number of integers between 1 and n which are relatively prime to n, and has the interesting property that almost any number between 1 and n when raised to the m power mod n equals 1 (the exceptions turn out not to affect the system and we therefore neglect them in what follows. 9). E is then chosen as a random number between 1 and m which is relatively prime to m, and D is computed using Euclid's algorithm to be the multiplicative inverse of E mod m. That is ED= km + 1 for some integer k. Enciphering requires only one exponentiation in modulo n arithmetic and is easily accomplished. Letting P denote the plaintext and C the ciphertext, C=pE mod n. (The plaintext must be represented as a sequence of integers each between 0 and n -1.) Deciphering is also easily accomplished in one exponentiation, p= CD mod n. To see that this really does undo the enciphering operation note that C D =(PE)D=pED=(pm)kPl=Pmod n, because pm=l. The most recently developed public key system is due to McEliece,lO and is based on algebraic coding theory. Goppa codes are highly efficient error correcting codes, both in their error correcting capacity and in the computation required to correct errors. The ease of error correction is destroyed, however, if the bits which make up a codeword are permuted prior to transmission. In McEliece's system a user's public enciphering key describes a scrambled Goppa - code, chosen at random from a large set of possible codes. Anyone can easily encode information (scrambling the Goppa code does not greatly affect the ease of encoding because the code is still linear), add a randomly generated error vector and transmit this to the user. But only the intended recipient knows the inverse permutation which allows the errors to be corrected easily. McEliece estimates that a block length of 1000 bits, with 500 information bits, should foil cryptanalysis using the best currently known attacks. The main problem is the storage of a 500 by 1000 bit generator matrix, requiring 500 kilobits of memory per user. SIGNATURES Written signatures are essential to our current methods of conducting business. They serve to indicate accountability and agreement on contracts, etc. Before electronic means can fully replace physical (hardcopy) forms of information, a digital equivalent to a written sjgnature is needed. A digital authenticator must be a number which is easily recognized without being known, because any number that is known can be forged by the intended recipient. While at first appearing to be a logical impossibility, digital signatures can be obtained from public key cryptosystems and probably in many other ways as well. 5 Rivest, Shamir, and Adleman's system 9 yields signatures most directly, merely by interchanging the enciphering and deciphering operations, so we only describe that method. When a user wishes to send a signed message M to someone else, he operates on it with his secret key D to obtain Y=M D mod n. The recipient can recover M through use of the public key E,n because ye mod n=m. The recipient saves Y as proof that message M was sent to him by the user whose public key is E,n. If the sender later disclaims having sent the message, the recipient gives Y to a "judge" who can access the public file and see that ye mod n does in fact equal a meaningful message with the right header information. Only the user who placed E,n in the public file knows D and could produce such a Y. In practice each block of the message will probably not be signed in this manner. Rather, to speed things up, the message will be sent in its untransformed state, and a one way hash total H of the message computed. 5 The signature will be Y=HD mod n. The recipient can easily check that H results when the public key E,n acts on Y, and that it is the same H as obtained from action of the hash function H on the message. The above discussion neglects the privacy problem which results if an eavesdropper may be listening. This problem is easily overcome by enciphering the message-signature combination in a normal or public key system. CONCLUSIONS Public key systems and digital signatures make teleprocessing systems vastly more useful for business and personal

4 1134 National Computer Conference, 1978 use, but care must be exercised, both at the technical and legal levels, to ensure that these advances are not used in a detrimental manner. For example, a user's secret key will probably be stored on a magnetic card which is needed to transact any business on the system. If the system becomes all pervasive in daily life, people may be expected to carry their cards with them constantly. It is only a small step to allow the police to demand the card as a form of universal identifier, without which a person becomes a nonperson. There are clearly dangers in such a system and adequate safeguards must be built in. EVen now, certain businesses (e.g., car rental, gas stations at night) will accept only credit cards. Further research is obviously needed at a technical level. The security levels of the currently known systems need better evaluation and new systems should be sought. These may be more efficient than the currently known systems, or needed in the unlikely event that holes are found in all of them. A major research goal is the establishment of provably secure systems, conventional, public key, and signature. That goal is more ambitious than solving one of the premier outstanding problems in computer science (the P=? NP problem) and must be viewed as long term. REFERENCES 1. National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publication 46, January Diffie, W. and M. E. Hellman, "Exhaustive Cryptanalysis of the NBS Data Encryption Standard," Computer, June 1977, pp G. B. Kolata, "Computer Encryption and the National Security Agency Connection," Science, Vol. 197, July 29, 1977, pp Morris, R., N. J. A. Sloane and A. D. Wyner, "Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard," Bell Laboratories Memorandum, November Also in Cryptologia, Vol. 1, July 1977, pp Diffie W. and M. E. Hellman, "New Directions in Cryptography," IEEE Trans. on Info. Theory, Vol. IT-22, November 1976, pp Brandstad, D., "Security Aspects of Computer Networks," AIAA Computer Network Conference, April Diffie, W. and M. E. Hellman, "Multiuser Cryptographic Techniques," National Computer Conference, AFIPS Conference Proceedings Vol. 45, June 1976, pp Merkle, R. C. "Secure Communication Over an Insecure Channel," to appear CACM, April Rivest, R., A. Shamir, and L. Adleman, "On Digital Signatures and Public-Key Cryptosystems," to appear CACM, February McEliece, R. J. "A Public Key System Based on Algebraic Coding Theory," JPL DSN Progress Report, Merkle, R. C. and M. E. Hellman, "Hiding Information and Signatures in Trap Door Knapsacks," to appear IEEE Trans. on Info. Theory. 12. Simmons, G. J. and M. J. Norris, "Preliminary Comments on the MIT Public-Key Cryptosystem," Cryptologia, Vol. 1, October 1977, pp Wilkes, M. V. Time Sharing Computer Systems, Elsevier, New York, Purdy, G. B. "A High Security Log-In Procedure," CACM, Vol. 17, August 1974, pp Evans, A. Jr., W. Kantrowitz, and E. Weiss, "A User Authentication System Not Requiring Secrecy in the Computer," CACM, Vol. 17, August 1974, pp Pohlig, S. C. and M. E. Hellman, "An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance," to appear IEEE Trans. on Info. Theory, Vol. IT-24, January Pohlig, S. C. Algebraic and Combinatoric Aspects of Cryptography, Ph.D. thesis, Stanford University, EE Dept., November Karp, R. M. "Reducibility Among Combinatorial Problems," in Complexity of Computer Computations, R. E. Miller and J. W. Thatcher, Eds. Plenum, New York, 1972, pp

5 PART IV-PEOPLE AND SOCIETY

6

The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

More information

Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography

Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt

More information

Notes on Network Security Prof. Hemant K. Soni

Notes on Network Security Prof. Hemant K. Soni Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications

More information

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Modern/Public-key cryptography started in 1976 with the publication of the following paper. W. Diffie

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

Cryptography and Network Security Chapter 9

Cryptography and Network Security Chapter 9 Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,

More information

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem

More information

Applied Cryptography Public Key Algorithms

Applied Cryptography Public Key Algorithms Applied Cryptography Public Key Algorithms Sape J. Mullender Huygens Systems Research Laboratory Universiteit Twente Enschede 1 Public Key Cryptography Independently invented by Whitfield Diffie & Martin

More information

Symmetric Key cryptosystem

Symmetric Key cryptosystem SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single

More information

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike

More information

How To Know If A Message Is From A Person Or A Machine

How To Know If A Message Is From A Person Or A Machine The RSA Algorithm Evgeny Milanov 3 June 2009 In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau

More information

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems A Method for Obtaining Digital Signatures and Public-Key Cryptosystems R.L. Rivest, A. Shamir, and L. Adleman Abstract An encryption method is presented with the novel property that publicly revealing

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

More information

Public Key (asymmetric) Cryptography

Public Key (asymmetric) Cryptography Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: luca.veltri@unipr.it) Course of Network Security,

More information

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

More information

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information The : Keeping Eve The Eavesdropper Away From Your Credit Card Information Department of Mathematics North Dakota State University 16 September 2010 Science Cafe Introduction Disclaimer: is not an internet

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

LUC: A New Public Key System

LUC: A New Public Key System LUC: A New Public Key System Peter J. Smith a and Michael J. J. Lennon b a LUC Partners, Auckland UniServices Ltd, The University of Auckland, Private Bag 92019, Auckland, New Zealand. b Department of

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared

More information

RSA Attacks. By Abdulaziz Alrasheed and Fatima

RSA Attacks. By Abdulaziz Alrasheed and Fatima RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.

More information

Lecture 6 - Cryptography

Lecture 6 - Cryptography Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about

More information

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret

More information

Network Security. HIT Shimrit Tzur-David

Network Security. HIT Shimrit Tzur-David Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

More information

The science of encryption: prime numbers and mod n arithmetic

The science of encryption: prime numbers and mod n arithmetic The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process

More information

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

A hard problem: Disclosing how to break public key cryptosystems

A hard problem: Disclosing how to break public key cryptosystems A hard problem: Disclosing how to break public key cryptosystems Audun Jøsang Abstract. New results in cryptanalysis are constantly being presented in the academic community, and this process poses no

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

Overview of Public-Key Cryptography

Overview of Public-Key Cryptography CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows

More information

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,

More information

SFWR ENG 4C03 - Computer Networks & Computer Security

SFWR ENG 4C03 - Computer Networks & Computer Security KEY MANAGEMENT SFWR ENG 4C03 - Computer Networks & Computer Security Researcher: Jayesh Patel Student No. 9909040 Revised: April 4, 2005 Introduction Key management deals with the secure generation, distribution,

More information

A New Generic Digital Signature Algorithm

A New Generic Digital Signature Algorithm Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Improvement of digital signature with message recovery using self-certified public keys and its variants

Improvement of digital signature with message recovery using self-certified public keys and its variants Applied Mathematics and Computation 159 (2004) 391 399 www.elsevier.com/locate/amc Improvement of digital signature with message recovery using self-certified public keys and its variants Zuhua Shao Department

More information

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies 1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?

More information

Elements of Applied Cryptography Public key encryption

Elements of Applied Cryptography Public key encryption Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let

More information

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: geswarkumar@gmail.com Every day, millions of people

More information

Public Key Cryptography and RSA. Review: Number Theory Basics

Public Key Cryptography and RSA. Review: Number Theory Basics Public Key Cryptography and RSA Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Review: Number Theory Basics Definition An integer n > 1 is called a prime number if its positive divisors are 1 and

More information

Cryptography: Authentication, Blind Signatures, and Digital Cash

Cryptography: Authentication, Blind Signatures, and Digital Cash Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,

More information

A Factoring and Discrete Logarithm based Cryptosystem

A Factoring and Discrete Logarithm based Cryptosystem Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques

More information

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms Principles of Public Key Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter : Security on Network and Transport

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

{(i,j) 1 < i,j < n} pairs, X and X i, such that X and X i differ. exclusive-or sums. ( ) ( i ) V = f x f x

{(i,j) 1 < i,j < n} pairs, X and X i, such that X and X i differ. exclusive-or sums. ( ) ( i ) V = f x f x ON THE DESIGN OF S-BOXES A. F. Webster and S. E. Tavares Department of Electrical Engineering Queen's University Kingston, Ont. Canada The ideas of completeness and the avalanche effect were first introduced

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

More information

1 Data Encryption Algorithm

1 Data Encryption Algorithm Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been

More information

Review of methods for secret sharing in cloud computing

Review of methods for secret sharing in cloud computing Review of methods for secret sharing in cloud computing Dnyaneshwar Supe Amit Srivastav Dr. Rajesh S. Prasad Abstract:- Cloud computing provides various IT services. Many companies especially those who

More information

Security for Computer Networks

Security for Computer Networks Security for Computer Networks An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer D. W. Davies Consultant for Data Security and W. L. Price National Physical Laboratory, Teddington,

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

Public Key Cryptography: RSA and Lots of Number Theory

Public Key Cryptography: RSA and Lots of Number Theory Public Key Cryptography: RSA and Lots of Number Theory Public vs. Private-Key Cryptography We have just discussed traditional symmetric cryptography: Uses a single key shared between sender and receiver

More information

A SOFTWARE COMPARISON OF RSA AND ECC

A SOFTWARE COMPARISON OF RSA AND ECC International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138

More information

Shor s algorithm and secret sharing

Shor s algorithm and secret sharing Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

Secure File Transfer Using USB

Secure File Transfer Using USB International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 Secure File Transfer Using USB Prof. R. M. Goudar, Tushar Jagdale, Ketan Kakade, Amol Kargal, Darshan Marode

More information

SECURITY IN NETWORKS

SECURITY IN NETWORKS SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

A Novel Approach to combine Public-key encryption with Symmetric-key encryption Volume 1, No. 4, June 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ A Novel Approach

More information

Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.

Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC. A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various

More information

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis by Susana Sin A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master

More information

Cryptography and Network Security Chapter 10

Cryptography and Network Security Chapter 10 Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central

More information

Software Tool for Implementing RSA Algorithm

Software Tool for Implementing RSA Algorithm Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key

More information

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

A New Efficient Digital Signature Scheme Algorithm based on Block cipher IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1

More information

An Introduction to Cryptography and Digital Signatures

An Introduction to Cryptography and Digital Signatures An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through

More information

Capture Resilient ElGamal Signature Protocols

Capture Resilient ElGamal Signature Protocols Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics acan@fen.bilkent.edu.tr 2 Bilkent University, Department

More information

Secure Large-Scale Bingo

Secure Large-Scale Bingo Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,

More information

Database Security and Authorization

Database Security and Authorization Database Security and Authorization 1 Database Security and Authorization 1.1 Introduction to Database Security Issues 1.2 Types of Security 1.3 Database Security and DBA 1.4 Access Protection, User Accounts,

More information

7! Cryptographic Techniques! A Brief Introduction

7! Cryptographic Techniques! A Brief Introduction 7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures

More information

Number Theory and Cryptography using PARI/GP

Number Theory and Cryptography using PARI/GP Number Theory and Cryptography using Minh Van Nguyen nguyenminh2@gmail.com 25 November 2008 This article uses to study elementary number theory and the RSA public key cryptosystem. Various commands will

More information

Digital Signatures. Meka N.L.Sneha. Indiana State University. nmeka@sycamores.indstate.edu. October 2015

Digital Signatures. Meka N.L.Sneha. Indiana State University. nmeka@sycamores.indstate.edu. October 2015 Digital Signatures Meka N.L.Sneha Indiana State University nmeka@sycamores.indstate.edu October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital

More information

Public Key Cryptography Overview

Public Key Cryptography Overview Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

More information

Cryptosystems. Digital Signatures with RSA and Other Public.Key DOROTHY E. DENNING RESEARCH CONTRIBUTIONS. Programming Techniques and Data Structures

Cryptosystems. Digital Signatures with RSA and Other Public.Key DOROTHY E. DENNING RESEARCH CONTRIBUTIONS. Programming Techniques and Data Structures RESEARCH CONTRIBUTIONS Programming Techniques and Data Structures Ellis Horowitz Editor Digital Signatures with RSA and Other Public.Key Cryptosystems DOROTHY E. DENNING ABSTRACT: Public-key signature

More information

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6. 1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks

More information

Constructing Digital Signatures from a One Way Function

Constructing Digital Signatures from a One Way Function Op. 52 Constructing Digital Signatures from a One Way Function Leslie Lamport Computer Science Laboratory SRI International 18 October 1979 CSL - 98 333 Ravenswood Ave. Menlo Park, California 94025 (415)

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

RSA Encryption. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003

RSA Encryption. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003 RSA Encryption Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003 1 Public Key Cryptography One of the biggest problems in cryptography is the distribution of keys.

More information

Elliptic Curve Cryptography

Elliptic Curve Cryptography Elliptic Curve Cryptography Elaine Brow, December 2010 Math 189A: Algebraic Geometry 1. Introduction to Public Key Cryptography To understand the motivation for elliptic curve cryptography, we must first

More information

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Encryption/Decryption using Public Key Cryptography Network Security Chapter 2 Basics 2.2 Public Key Cryptography

More information

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1 EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question

More information

Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme

Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Embedding more security in digital signature system by using combination of public

More information

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:

More information

Chapter 7: Network security

Chapter 7: Network security Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport

More information

Module: Applied Cryptography. Professor Patrick McDaniel Fall 2010. CSE543 - Introduction to Computer and Network Security

Module: Applied Cryptography. Professor Patrick McDaniel Fall 2010. CSE543 - Introduction to Computer and Network Security CSE543 - Introduction to Computer and Network Security Module: Applied Cryptography Professor Patrick McDaniel Fall 2010 Page 1 Key Distribution/Agreement Key Distribution is the process where we assign

More information

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn. CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.edu Slide 09-1 Overview Key exchange Session vs. interchange

More information

Lecture 3: One-Way Encryption, RSA Example

Lecture 3: One-Way Encryption, RSA Example ICS 180: Introduction to Cryptography April 13, 2004 Lecturer: Stanislaw Jarecki Lecture 3: One-Way Encryption, RSA Example 1 LECTURE SUMMARY We look at a different security property one might require

More information

Post-Quantum Cryptography #2

Post-Quantum Cryptography #2 Post-Quantum Cryptography #2 Prof. Claude Crépeau McGill University 49 Post-Quantum Cryptography Finite Fields based cryptography Codes Multi-variate Polynomials Integers based cryptography Approximate

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

More information

Pricing via Processing or Combatting Junk Mail

Pricing via Processing or Combatting Junk Mail Pricing via Processing or Combatting Junk Mail Cynthia Dwork Moni Naor Draft of full version Abstract We present a computational technique for combatting junk mail, in particular, and controlling access

More information

An Application of Visual Cryptography To Financial Documents

An Application of Visual Cryptography To Financial Documents An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University

More information

Hill s Cipher: Linear Algebra in Cryptography

Hill s Cipher: Linear Algebra in Cryptography Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a

More information

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security

More information

Public Key Cryptography of Digital Signatures

Public Key Cryptography of Digital Signatures ACTA UNIVERSITATIS APULENSIS No 13/2007 MATHEMATICAL FOUNDATION OF DIGITAL SIGNATURES Daniela Bojan and Sidonia Vultur Abstract.The new services available on the Internet have born the necessity of a permanent

More information

Message Authentication, Public-Key Ciphers, and Digital Signatures

Message Authentication, Public-Key Ciphers, and Digital Signatures Appendix D Message Authentication, Public-Key Ciphers, and Digital Signatures Message Authentication An authentic message is one that has arrived exactly as it was sent (without errors or alterations),

More information

Network Security: Cryptography CS/SS G513 S.K. Sahay

Network Security: Cryptography CS/SS G513 S.K. Sahay Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information

More information

Solutions to Problem Set 1

Solutions to Problem Set 1 YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose

More information