Cryptography and Network Security

Size: px
Start display at page:

Download "Cryptography and Network Security"

Transcription

1 Cryptography and Network Security Spring Lecture 7: Public-key cryptography and RSA Ion Petre Department of IT, Åbo Akademi University 1

2 Some unanswered questions on symmetric cryptosystems Key management: changing the secret key or establishing one is nontrivial Change the keys two users share (should be done reasonably often) Establish a secret key with somebody you do not know and cannot meet in person: (e.g., visiting secure websites such as e-shops) This could be done via a trusted Key Distribution Center (details in a future lecture) Can (or should) we really trust the KDC? What good would it do after all to develop impenetrable cryptosystems, if their users were forced to share their keys with a KDC that could be compromised by either burglary or subpoena? Diffie, 1988 Digital signatures 2

3 A breakthrough idea Rather than having a secret key that the two users must share, each users has two keys One key is secret and he is the only one who knows it The other key is public and anyone who wishes to send him a message uses that key to encrypt the message Diffie and Hellman first (publicly) introduced the idea in 1976 this was radically different than all previous efforts NSA claims to have known it since mid-1960s! Communications-Electronic Security Group (the British counterpart of NSA) documented the idea in a classified report in

4 A word of warning Public-key cryptography complements rather than replaces symmetric cryptography There is nothing in principle to make public-key crypto more secure than symmetric crypto Public-key crypto does not make symmetric crypto obsolete: it has its advantages but also its (major) drawbacks such as speed Due to its low speed, it is mostly confined to key management and digital signatures 4

5 The idea of public-key cryptography The concept was proposed in 1976 by Diffie and Hellman although no practical way to design such a system was suggested Each user has two keys: one encryption key that he makes public and one decryption key that he keeps secret Clearly, it should be computationally infeasible to determine the decryption key given only the encryption key and the cryptographic algorithm Some algorithms (such as RSA) satisfy also the following useful characteristic: Either one of the two keys can be used for encryption the other one should then be used to decrypt the message First we will investigate the concept with no reference yet to practical design of a public-key system 5

6 Essential steps in public-key encryption Each user generates a pair of keys to be used for encryption and decryption Each user places one of the two keys in a public register and the other key is kept private If B wants to send a confidential message to A, B encrypts the message using A s public key When A receives the message, she decrypts it using her private key Nobody else can decrypt the message because that can only be done using A s private key Deducing a private key should be infeasible If a user wishes to change his keys generate another pair of keys and publish the public one: no interaction with other users is needed 6

7 Bob sends an encrypted message to Alice 7

8 Some notation The public key of user A will be denoted KU A The private key of user A will be denoted KR A Encryption method will be a function E Decryption method will be a function D If B wishes to send a plain message X to A, then he sends the cryptotext Y=E(KU A,X) The intended receiver A will decrypt the message: D(KR A,Y)=X 8

9 A first attack on the public-key scheme authenticity Immediate attack on this scheme: An attacker may impersonate user B: he sends a message E(KU A,X) and claims in the message to be B A has no guarantee this is so This was guaranteed in classical cryptosystems simply through knowing the key (only A and B are supposed to know the symmetric key) The authenticity of user B can be established as follows: B will encrypt the message using his private key: Y=E(KR B,X) This shows the authenticity of the sender because (supposedly) he is the only one who knows the private key The entire encrypted message serves as a digital signature Note: this may not be the best possible solution: ideally, digital signatures should be rather small so that one can preserve many of them over a long period of time Better schemes will be presented a couple of lectures on 9

10 A scheme to authenticate the sender of the message 10

11 Encryption and authenticity Still a drawback: the scheme on the previous slide authenticate but does not ensure security: anybody can decrypt the message using B s public key One can provide both authentication and confidentiality using the public-key scheme twice: B encrypts X with his private key: Y=E(KR B,X) B encrypts Y with A s public key: Z=E(KU A,Y) A will decrypt Z (and she is the only one capable of doing it): Y=D(KR A,Z) A can now get the plaintext and ensure that it comes from B (he is the only one who knows his private key): decrypt Y using B s public key: X=E(KU B,Y) 11

12 Secrecy and authentication using public-key schemes 12

13 Applications for public-key cryptosystems 1. Encryption/decryption: sender encrypts the message with the receiver s public key 2. Digital signature: sender signs the message (or a representative part of the message) using his private key 3. Key exchange: two sides cooperate to exchange a secret key for later use in a secret-key cryptosystem 13

14 Requirements for public-key cryptosystems Generating a key pair (public key, private key) is computationally easy Encrypting a message using a known key (his own private or somebody else s public) is computationally easy Decrypting a message using a known key (his own private or somebody else s public) is computationally easy Knowing the public key, it is computationally infeasible for an opponent to deduce the private key Knowing the public key and a ciphertext, it is computationally infeasible for an opponent to deduce the private key Useful extra feature: encryption and decryption can be applied in any order: E( KU A, D(KR A,X) ) =D(KR A, E( KU A, X) ) 14

15 Designing a public-key cryptosystem Computationally easy usually means polynomial-time algorithm Computationally infeasible more difficult to define Usually means super-polynomial-time algorithms, e.g., exponential-time algorithms Classical complexity analysis (worst-case complexity or average-case complexity) are worthless in cryptography one should make sure a problem is difficult for virtually all inputs and not just in the worse or in the average case Public-key cryptosystems usually rely on difficult math functions rather than S-P networks as classical cryptosystems One-way function: easy to calculate in one direction, infeasible to calculate in the other direction (i.e., the inverse is infeasible to compute) Trap-door function: difficult function that becomes easy if some extra information is known Aim: find a trap-door one-way function for encryption decryption will be the inverse 15

16 RSA One of the first proposals on implementing the concept of public-key cryptography was that of Rivest, Shamir, Adleman 1977: RSA The RSA scheme is a block cipher in which the plaintext and the ciphertext are integers between 0 and n-1 for some fixed n Typical size for n is 1024 bits (or 309 decimal digits) To be secure with today s technology size should between 1024 and 2048 bits Idea of RSA: it is a difficult math problem to factorize (large) integers Choose p and q odd primes, n=pq Choose integers d,e such that M ed =M mod n, for all M<n Plaintext: block of k bits, where 2 k <n 2 k+1 can be considered a number M with M<n Encryption: C=M e mod n Decryption: C d mod n = M de mod n = M Public key: KU={e,n} Private key: KR={d,n} Questions: How do we find d,e? How do we find large primes? Answer: Number Theory! 16

17 Motto for our introduction to Number Theory The Devil said to Daniel Webster: "Set me a task I can't carry out, and I'll give you anything in the world you ask for." Daniel Webster: "Fair enough. Prove that for n greater than 2, the equation a n + b n = c n has no non-trivial solution in the integers." They agreed on a three-day period for the labour, and the Devil disappeared. At the end of three days, the Devil presented himself, haggard, jumpy, biting his lip. Daniel Webster said to him, "Well, how did you do at my task? Did you prove the theorem?' "Eh? No... no, I haven't proved it." "Then I can have whatever I ask for? Money? The Presidency?' "What? Oh, that of course. But listen! If we could just prove the following two lemmas " The Mathematical Magpie, Clifton Fadiman 17

18 Notions of number theory Fermat s little theorem: if p is prime and a is positive integer not divisible by p, then a p-1 1 mod p Corollary: For any positive integer a and prime p, a p a mod p Comments: Example: This is a first step in our quest to find M ed =M mod n not quite enough though Fermat s little theorem provides a necessary condition for an integer p to be prime the condition is not sufficient We will turn this theorem into a (probabilistic) test for primality p=5, a=3, 3 5 =243=3 mod 5 p=5, a=10, 10 5 =100000=10 mod 5 = 0 mod 5 Fermat s theorem, as useful as it will turn out to be, it does not provide us with integers d,e we are looking for Euler s theorem (a refinement of Fermat s) does 18

19 Euler s totient function Euler s function associates to any positive integer n a number φ(n): the number of positive integers smaller than n and relatively prime to n Example: φ(37)=36 φ(p)=p-1, for any prime p φ(35)=24: {1,2,3,4,6,8,9,11,12,13,16,17,18,19,22,23,24,26,27,29,31,32,33,34} Easy to see that for any two distinct primes p,q, φ(pq)=(p-1)(q-1) All numbers smaller than pq are relatively primes with pq except for multiples of p (q-1 of them) and multiples of q (p-1 of them): pq-(q-1)-(p-1)=(p-1)(q-1) Euler s theorem: for any relatively prime integers a,n we have a φ(n) 1 mod n Corollary: For any integers a,n we have a φ(n)+1 a mod n Corollary: Let p,q be two odd primes and n=pq. Then: φ(n)=(p-1)(q-1) For any integer m with 0<m<n, m (p-1)(q-1)+1 m mod n For any integers k,m with 0<m<n, m k(p-1)(q-1)+1 m mod n 19

20 Back to RSA Euler s theorem provides us the numbers d,e such that M ed =M mod n We have to choose d,e such that ed=kφ(n)+1 for some k Equivalently, d e -1 mod φ(n) To calculate the modular inverse of an interger: the extended Euclid s algorithm! see Lecture 5 The RSA scheme Key generation Choose two odd primes p,q keep private. Compute n=pq make public Choose e, 1<e<φ(n) with gcd(φ(n),e)=1 make public Compute d e -1 mod φ(n) keep private Private key is {d,n} Public key is {e,n} Encryption Plaintext: block of k bits, where 2 k <n 2 k+1 can be considered a number M with M<n Ciphertext: C=M e mod n Decryption: Ciphertext: C Plaintext: C d mod n = M de mod n = M 20

21 Example Key generation Select primes p=17, q=11 Compute n=pq=187 Compute φ(n)=(p-1)(q-1)=160 Select e=7 Compute d: d=23 (use the extended Euclid s algorithm) KU={7,187} KR={23,187} Encrypt M=88: 88 7 mod mod 187 = [ (88 4 mod 187)(88 2 mod 187) (88 mod 187) ] = 11 Decrypt C=11: mod 187 M=11 23 mod 187= [ (11 16 mod 187)(11 4 mod 187) (11 2 mod 187)(11 mod 187)] 11 2 mod 187 = mod 187= mod 187= mod 187=55 2 mod 187= mod 187=33 2 mod 187=154 M=154 x 55 x 121 x 11 mod 187 = 88 RSA scheme Key generation Choose primes p,q Compute n=pq Choose e, 1<e<φ(n) with gcd(φ(n),e)=1 Compute d e -1 mod φ(n) Private key is {d,n} Public key is {e,n} Encryption C=M e mod n Decryption: C d mod n = M de mod n = M 21

22 Computational aspects RSA implementation Fast modular exponentiation Take each step in turn and discuss how can it be implemented efficiently For encryption and decryption we must be able to do quick modular exponentiations two ideas are useful: (ab mod n) = [(a mod n)(b mod n)] (mod n) To compute x 16 mod n we do not have to do 15 multiplication but only 4: compute x 2 mod n, x 4 mod n, x 8 mod n, x 16 mod n Apply this to compute quickly any exponent, not just powers of 2 RSA scheme Key generation Choose primes p,q Compute n=pq Choose e, 1<e<φ(n) with gcd(φ(n),e)=1 Compute d e -1 mod φ(n) Private key is {d,n} Public key is {e,n} Encryption C=M e mod n Decryption: C d mod n = M de mod n = M 22

23 Fast modular exponentiation Square-and-multiply algorithm Input: n,x,b (b is in base 2 (b k-1,,b 1,b 0 ), b 0 Output: x b mod n 1. z=1 2. for i=k-1 downto 0 3. z=z 2 mod n 4. if b i =1 then z=zx mod n Complexity O(r 3 ), where r=[log 2 n] Example: encrypt 9726 with KU={3533,11413}: mod =(1,1,0,1,1,1,0,0,1,1,0,1) Ciphertext: 5761 RSA scheme Key generation Choose primes p,q Compute n=pq Choose e, 1<e<φ(n) with gcd(φ(n),e)=1 Compute d e -1 mod φ(n) Private key is {d,n} Public key is {e,n} Encryption C=M e mod n Decryption: C d mod n = M de mod n = M i b i z x9726= = x9726= x9726= x9726=7783 i b i z = = x9726= x9726= = x9726=

24 Computational aspects RSA implementation Key generation The highlighted part in the algorithm is easy to implement Generate a series of random numbers and test each against φ(n) for relative primality Testing whether or not two integers are relatively prime and finding a modular inverse can be done with the extended Euclid s algorithm Very few tests are needed before a usable e is found: the probability that two random numbers are relatively prime is 0.6 RSA scheme Key generation Choose primes p,q Compute n=pq Choose e, 1<e<φ(n) with gcd(φ(n),e)=1 Compute d e -1 mod φ(n) Private key is {d,n} Public key is {e,n} Encryption C=M e mod n Decryption: C d mod n = M de mod n = M 24

25 Computational aspects RSA implementation Key generation No practical techniques to yield large prime numbers Procedure: generate random odd numbers and test whether that integer is prime Testing whether or not an integer n is a prime is a difficult problem ( primality is difficult ) There has been a long standing question in math whether or not primality can be tested in polynomial deterministic time Answer (2002): YES! Manindra Agrawal, Neeraj Kayal and Nitin Saxena, PRIMES is in P, Ann. of Math. (2), 160:2 (2004) Drawback: high complexity O(log 12 n f(log log n)), where f is a polynomial RSA scheme Key generation Choose primes p,q Compute n=pq Choose e, 1<e<φ(n) with gcd(φ(n),e)=1 Compute d e -1 mod φ(n) Private key is {d,n} Public key is {e,n} Encryption C=M e mod n Decryption: C d mod n = M de mod n = M 25

26 Miller-Rabin primality test Faster methods of testing primality exist they are all probabilistic Such an algorithm can give two answers to the question Is n prime? 1. No, it is not 2. n is probably prime The probability can be made arbitrarily large Other algorithms may give precise answer but with low probability they may take a long time to finish Most popular primality test: Miller- Rabin, based on Fermat s little theorem 26

27 Miller-Rabin primality test Fermat s little theorem: if p is prime and a is positive integer not divisible by p, then a p-1 1 mod p Idea of the Miller-Rabin test: We need to test if the odd integer n is prime: test the equality in Fermat s little theorem for n and a random a A speedup may be done so that we do not have to compute all powers of a details bellow n-1 is even, i.e., of the form n-1=2 k q, with k>0, q odd: k and q easy to find Choose an integer a such that 1<a<n-1 Compute modulo n the values a 2j q, 0 j q: a q, a 2q,, a 2k-1 q, a 2k q By Fermat s theorem, if n is prime, then the last value in the sequence is 1 the sequence may have some other 1s, consider the first 1 in the sequence Case 1: the first number in the sequence is 1 then all other powers are also 1 Case 2: some number a 2j q in the sequence is 1 in this case a 2j-1 q = n-1 mod n 0 = (a 2j q -1) mod n = (a 2j-1 q 1) (a 2j-1 q + 1) mod n, i.e., n divides (a 2j-1 q 1) or (a 2j-1 q + 1) Since we took the first 1 in the sequence, it follows that n divides (a 2j-1 q + 1): a 2j-1 q = n-1 mod n The test: if either the first element in the sequence is 1, or some other element is n-1, then n could be prime. Otherwise n is certainly not prime 27

28 Miller-Rabin primality test TEST(n) 1. n-1=2 k q: compute k and q 2. Select a random integer a, 1<a<n-1 3. If a q mod n=1 then return probably prime 4. For j=0 to k-1 do 5. If a 2j q mod n = n-1, then return probably prime 6. Return not a prime Question: for how many integers a does the test fail? Failure: n is not prime but the algorithm return probably prime Answer: for at most (n-1)/4 integers a with 1 a n-1 Thus, the probability of failure is at most ¼ Practical implementation: Repeatedly invoke TEST(n) using random choices for a If TEST(n) return at least once not a prime, then n is not a prime If t executions of TEST(n) return probably prime, then the probability that n is indeed a prime is larger than 1-4 -t t=10 gives probability larger than

29 Computational aspects RSA implementation Key generation To choose primes p,q we generate random numbers p,q on the desired scale of magnitude and test the primality with Miller-Rabin Question: How many trials should we expect to do before we find a prime? Distribution of primes Prime number theorem: for any integer x, the primes near x are spaced in average one every log(x) integers On average we have to test log(x) integers before we find a prime reject immediately even integers and integers ending in 5 Correct rate: we need to test in average 0.4 log(x) integers before we find a prime of the order of x Example: if we look for a prime on the order of magnitude we need to do in average 55 trials, order of magnitude : in average 284 trials RSA scheme Key generation Choose primes p,q Compute n=pq Choose e, 1<e<φ(n) with gcd(φ(n),e)=1 Compute d e -1 mod φ(n) Private key is {d,n} Public key is {e,n} Encryption C=M e mod n Decryption: C d mod n = M de mod n = M 29

30 Attacking RSA Brute force attacks: try all possible private keys As in the other cases defend using large keys: nowadays integers between 1024 and 2048 bits Mathematical attacks Factor n into its two primes p,q: this is a hard problem for large n Challenges by RSA Labs to factorize large integers Last solved challenge: 768 bits (2009) Determine φ(n) directly without first determining p,q: this math problem is equivalent to factoring Determine d directly, without first determining φ(n): this is believed to be at least as difficult as factoring Suggestions for design The larger the keys, the better but also the slower the algorithm Choosing p,q badly may weaken the algorithm p,q should differ in length by only a few bits: for a 1024-bit key, p,q should be on the order of magnitude to p-1 and q-1 should both contain a large prime factor gcd(p-1,q-1) should be small d should be larger than n 1/4 RSA scheme Key generation Choose primes p,q Compute n=pq Choose e with gcd(φ(n),e)=1 Compute d e -1 mod φ(n) Private key is {d,n} Public key is {e,n} Encryption C=M e mod n Decryption: C d mod n = M de mod n = M 30

31 Attacks on RSA Timing attacks: determine a private key by keeping track of how long a computer takes to decipher a message (ciphertext-only attack) this is essentially an attack on the fast exponentiation algorithm but can be adapted for any other algorithm Whenever a bit is 1 the algorithm has more computations to do and takes more time Countermeasures: Ensure that all exponentiations take the same time before returning a result: degrade performance of the algorithm Add some random delay: if there is not enough noise the attack succeeds Blinding: multiply the ciphertext by a random number before performing exponentiation in this way the attacker does not know the input to the exponentiation algorithm. (implemented in the commercial products from RSA Data Security Inc.) Decryption M=C d mod n is modified as follows: Generate a secret random number r between 0 and n-1 Compute C =C(r e ) mod n where e is the public exponent Compute M =(C d ) mod n with the ordinary exponentiation Compute M=M r -1 mod n Reported performance penalty: 2 to 10% Square-and-multiply algorithm Input: n,x,b (b is in base 2 (b k-1,,b 1,b 0 ) Output: x b mod n 1. z=1 2. for i=k-1 downto 0 3. z=z 2 mod n 4. if b i =1 then z=zx mod n 31

32 Pseudo-random number generators Essential in RSA (and elsewhere) to be able to generate pseudorandom numbers A sequence of numbers is random if they have uniform distribution and are independent (no value can be deduced from the others) We generally use algorithmic techniques to generate such numbers they will not be independent and thus not random The whole point is to make them look random, i.e., make them pass many test of randomness Three tests to be used in evaluating a pseudo-random number generator The function should be full-period generating function: generate all numbers in its range before repeating The generated sequence should appear random: pass many statistical tests The function should implement efficiently with 32-bit arithmetic 32

33 Pseudo-random number generators The most widely used technique is the linear congruential method (Lehmer 1951) X n+1 =(ax n +c) mod m One should be very careful in choosing constants a, c, m: a=c=1 is bad choice! Value of m should be as large as possible: usually close to 2 31, very often chosen to be the prime number ; in this case one can take c=0 There are very few good choices for a: for m= only a handful of choices are advisable very often used is a=7 5 =16807 X n+1 =16807 X n mod (2 31-1) Using this in cryptography needs extra care: If the attacker finds one single value, then he will be able to compute all subsequent values Idea: restart the sequence often, using the clock as seed (initial value) 33

34 Cryptographically generated pseudo-random numbers Idea: use cryptographic primitives to generate pseudo-random numbers One possibility: Use a counter and encrypt each value for the counter, e.g., with DES the cryptotext will be the key Stronger version: instead of a counter use a PRNG (pseudo-random number generator) Technique can be made stronger using a more sophisticated scheme and 3DES, see ANSI X9.17 PRNG 34

35 Another speed-up in RSA implementation Operations modulo big integers become more time-consuming as the integers grows bigger Efficient implementation: use Chinese Remainder Theorem (CRT) In its simplest formulation, CRT essentially says that if n=pq, then instead of addition/difference/multiplication modulo n one can perform the same modulo p and modulo q and then compute the result mod n Big advantage because the modules are much smaller 35

Cryptography and Network Security Chapter 9

Cryptography and Network Security Chapter 9 Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,

More information

Cryptography and Network Security Chapter 8

Cryptography and Network Security Chapter 8 Cryptography and Network Security Chapter 8 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 8 Introduction to Number Theory The Devil said to Daniel Webster:

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared

More information

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Modern/Public-key cryptography started in 1976 with the publication of the following paper. W. Diffie

More information

Public Key (asymmetric) Cryptography

Public Key (asymmetric) Cryptography Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: luca.veltri@unipr.it) Course of Network Security,

More information

Notes on Network Security Prof. Hemant K. Soni

Notes on Network Security Prof. Hemant K. Soni Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications

More information

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem

More information

Overview of Public-Key Cryptography

Overview of Public-Key Cryptography CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows

More information

Public Key Cryptography and RSA. Review: Number Theory Basics

Public Key Cryptography and RSA. Review: Number Theory Basics Public Key Cryptography and RSA Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Review: Number Theory Basics Definition An integer n > 1 is called a prime number if its positive divisors are 1 and

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

More information

Public Key Cryptography: RSA and Lots of Number Theory

Public Key Cryptography: RSA and Lots of Number Theory Public Key Cryptography: RSA and Lots of Number Theory Public vs. Private-Key Cryptography We have just discussed traditional symmetric cryptography: Uses a single key shared between sender and receiver

More information

Symmetric Key cryptosystem

Symmetric Key cryptosystem SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Elements of Applied Cryptography Public key encryption

Elements of Applied Cryptography Public key encryption Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let

More information

RSA Attacks. By Abdulaziz Alrasheed and Fatima

RSA Attacks. By Abdulaziz Alrasheed and Fatima RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret

More information

The science of encryption: prime numbers and mod n arithmetic

The science of encryption: prime numbers and mod n arithmetic The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process

More information

Primality - Factorization

Primality - Factorization Primality - Factorization Christophe Ritzenthaler November 9, 2009 1 Prime and factorization Definition 1.1. An integer p > 1 is called a prime number (nombre premier) if it has only 1 and p as divisors.

More information

How To Know If A Message Is From A Person Or A Machine

How To Know If A Message Is From A Person Or A Machine The RSA Algorithm Evgeny Milanov 3 June 2009 In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau

More information

Public Key Cryptography Overview

Public Key Cryptography Overview Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic

More information

Cryptography and Network Security Chapter 10

Cryptography and Network Security Chapter 10 Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central

More information

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond

More information

SECURITY IN NETWORKS

SECURITY IN NETWORKS SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,

More information

Software Tool for Implementing RSA Algorithm

Software Tool for Implementing RSA Algorithm Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key

More information

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction MATH 168: FINAL PROJECT Troels Eriksen 1 Introduction In the later years cryptosystems using elliptic curves have shown up and are claimed to be just as secure as a system like RSA with much smaller key

More information

7! Cryptographic Techniques! A Brief Introduction

7! Cryptographic Techniques! A Brief Introduction 7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures

More information

Lecture 6 - Cryptography

Lecture 6 - Cryptography Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about

More information

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike

More information

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms Principles of Public Key Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter : Security on Network and Transport

More information

The application of prime numbers to RSA encryption

The application of prime numbers to RSA encryption The application of prime numbers to RSA encryption Prime number definition: Let us begin with the definition of a prime number p The number p, which is a member of the set of natural numbers N, is considered

More information

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies 1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?

More information

CIS 5371 Cryptography. 8. Encryption --

CIS 5371 Cryptography. 8. Encryption -- CIS 5371 Cryptography p y 8. Encryption -- Asymmetric Techniques Textbook encryption algorithms In this chapter, security (confidentiality) is considered in the following sense: All-or-nothing secrecy.

More information

Network Security. HIT Shimrit Tzur-David

Network Security. HIT Shimrit Tzur-David Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

Advanced Cryptography

Advanced Cryptography Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.

More information

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

Discrete Mathematics, Chapter 4: Number Theory and Cryptography Discrete Mathematics, Chapter 4: Number Theory and Cryptography Richard Mayr University of Edinburgh, UK Richard Mayr (University of Edinburgh, UK) Discrete Mathematics. Chapter 4 1 / 35 Outline 1 Divisibility

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Applied Cryptography Public Key Algorithms

Applied Cryptography Public Key Algorithms Applied Cryptography Public Key Algorithms Sape J. Mullender Huygens Systems Research Laboratory Universiteit Twente Enschede 1 Public Key Cryptography Independently invented by Whitfield Diffie & Martin

More information

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:

More information

Lecture 3: One-Way Encryption, RSA Example

Lecture 3: One-Way Encryption, RSA Example ICS 180: Introduction to Cryptography April 13, 2004 Lecturer: Stanislaw Jarecki Lecture 3: One-Way Encryption, RSA Example 1 LECTURE SUMMARY We look at a different security property one might require

More information

Factoring integers, Producing primes and the RSA cryptosystem Harish-Chandra Research Institute

Factoring integers, Producing primes and the RSA cryptosystem Harish-Chandra Research Institute RSA cryptosystem HRI, Allahabad, February, 2005 0 Factoring integers, Producing primes and the RSA cryptosystem Harish-Chandra Research Institute Allahabad (UP), INDIA February, 2005 RSA cryptosystem HRI,

More information

Factoring & Primality

Factoring & Primality Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount

More information

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information The : Keeping Eve The Eavesdropper Away From Your Credit Card Information Department of Mathematics North Dakota State University 16 September 2010 Science Cafe Introduction Disclaimer: is not an internet

More information

Authentication, digital signatures, PRNG

Authentication, digital signatures, PRNG Multimedia Security Authentication, digital signatures, PRNG Mauro Barni University of Siena Beyond confidentiality Up to now, we have been concerned with protecting message content (i.e. confidentiality)

More information

CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

More information

CS549: Cryptography and Network Security

CS549: Cryptography and Network Security CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared

More information

Ch.9 Cryptography. The Graduate Center, CUNY.! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis

Ch.9 Cryptography. The Graduate Center, CUNY.! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis Ch.9 Cryptography The Graduate Center, CUNY! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis Why is Modern Cryptography part of a Complexity course? Short answer:! Because Modern Cryptography

More information

RSA and Primality Testing

RSA and Primality Testing and Primality Testing Joan Boyar, IMADA, University of Southern Denmark Studieretningsprojekter 2010 1 / 81 Correctness of cryptography cryptography Introduction to number theory Correctness of with 2

More information

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6. 1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks

More information

SFWR ENG 4C03 - Computer Networks & Computer Security

SFWR ENG 4C03 - Computer Networks & Computer Security KEY MANAGEMENT SFWR ENG 4C03 - Computer Networks & Computer Security Researcher: Jayesh Patel Student No. 9909040 Revised: April 4, 2005 Introduction Key management deals with the secure generation, distribution,

More information

Lecture 13 - Basic Number Theory.

Lecture 13 - Basic Number Theory. Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted

More information

Study of algorithms for factoring integers and computing discrete logarithms

Study of algorithms for factoring integers and computing discrete logarithms Study of algorithms for factoring integers and computing discrete logarithms First Indo-French Workshop on Cryptography and Related Topics (IFW 2007) June 11 13, 2007 Paris, France Dr. Abhijit Das Department

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Lecture 9: Application of Cryptography

Lecture 9: Application of Cryptography Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that

More information

Basic Algorithms In Computer Algebra

Basic Algorithms In Computer Algebra Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,

More information

Chapter. Number Theory and Cryptography. Contents

Chapter. Number Theory and Cryptography. Contents Chapter 10 Number Theory and Cryptography Contents 10.1 Fundamental Algorithms Involving Numbers..... 453 10.1.1 Some Facts from Elementary Number Theory.... 453 10.1.2 Euclid s GCD Algorithm................

More information

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631 Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 1: Introduction Ion Petre Department of IT, Åbo Akademi University January 10, 2012 1 Motto Unfortunately, the technical

More information

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher

More information

2 Primality and Compositeness Tests

2 Primality and Compositeness Tests Int. J. Contemp. Math. Sciences, Vol. 3, 2008, no. 33, 1635-1642 On Factoring R. A. Mollin Department of Mathematics and Statistics University of Calgary, Calgary, Alberta, Canada, T2N 1N4 http://www.math.ucalgary.ca/

More information

Cryptography: Authentication, Blind Signatures, and Digital Cash

Cryptography: Authentication, Blind Signatures, and Digital Cash Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

More information

Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography

Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt

More information

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,

More information

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering

More information

Public-key cryptography RSA

Public-key cryptography RSA Public-key cryptography RSA NGUYEN Tuong Lan LIU Yi Master Informatique University Lyon 1 Objective: Our goal in the study is to understand the algorithm RSA, some existence attacks and implement in Java.

More information

Primality Testing and Factorization Methods

Primality Testing and Factorization Methods Primality Testing and Factorization Methods Eli Howey May 27, 2014 Abstract Since the days of Euclid and Eratosthenes, mathematicians have taken a keen interest in finding the nontrivial factors of integers,

More information

A SOFTWARE COMPARISON OF RSA AND ECC

A SOFTWARE COMPARISON OF RSA AND ECC International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138

More information

Network Security Technology Network Management

Network Security Technology Network Management COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

More information

How To Solve The Prime Factorization Of N With A Polynomials

How To Solve The Prime Factorization Of N With A Polynomials THE MATHEMATICS OF PUBLIC KEY CRYPTOGRAPHY. IAN KIMING 1. Forbemærkning. Det kan forekomme idiotisk, at jeg som dansktalende og skrivende i et danskbaseret tidsskrift med en (formentlig) primært dansktalende

More information

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg Outline CSc 466/566 Computer Security 8 : Cryptography Digital Signatures Version: 2012/02/27 16:07:05 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian

More information

Determining the Optimal Combination of Trial Division and Fermat s Factorization Method

Determining the Optimal Combination of Trial Division and Fermat s Factorization Method Determining the Optimal Combination of Trial Division and Fermat s Factorization Method Joseph C. Woodson Home School P. O. Box 55005 Tulsa, OK 74155 Abstract The process of finding the prime factorization

More information

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a

More information

Chapter 7: Network security

Chapter 7: Network security Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport

More information

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

More information

SECURITY EVALUATION OF EMAIL ENCRYPTION USING RANDOM NOISE GENERATED BY LCG

SECURITY EVALUATION OF EMAIL ENCRYPTION USING RANDOM NOISE GENERATED BY LCG SECURITY EVALUATION OF EMAIL ENCRYPTION USING RANDOM NOISE GENERATED BY LCG Chung-Chih Li, Hema Sagar R. Kandati, Bo Sun Dept. of Computer Science, Lamar University, Beaumont, Texas, USA 409-880-8748,

More information

Lecture 13: Factoring Integers

Lecture 13: Factoring Integers CS 880: Quantum Information Processing 0/4/0 Lecture 3: Factoring Integers Instructor: Dieter van Melkebeek Scribe: Mark Wellons In this lecture, we review order finding and use this to develop a method

More information

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

Security in Distributed Systems. Network Security

Security in Distributed Systems. Network Security Security in Distributed Systems Introduction Cryptography Authentication Key exchange Computer Science Lecture 18, page 1 Network Security Intruder may eavesdrop remove, modify, and/or insert messages

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard

More information

Implementing Public-Key Cryptography in Haskell

Implementing Public-Key Cryptography in Haskell Implementing Public-Key Cryptography in Haskell ***** ****, **********, **********, *********, ****** 9, *******. *****@*******.***.*** November 12, 2001 Abstract In this paper we describe how the RSA

More information

Network Security: Cryptography CS/SS G513 S.K. Sahay

Network Security: Cryptography CS/SS G513 S.K. Sahay Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information

More information

Module: Applied Cryptography. Professor Patrick McDaniel Fall 2010. CSE543 - Introduction to Computer and Network Security

Module: Applied Cryptography. Professor Patrick McDaniel Fall 2010. CSE543 - Introduction to Computer and Network Security CSE543 - Introduction to Computer and Network Security Module: Applied Cryptography Professor Patrick McDaniel Fall 2010 Page 1 Key Distribution/Agreement Key Distribution is the process where we assign

More information

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Encryption/Decryption using Public Key Cryptography Network Security Chapter 2 Basics 2.2 Public Key Cryptography

More information

CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement

More information

Introduction. Digital Signature

Introduction. Digital Signature Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology

More information

LUC: A New Public Key System

LUC: A New Public Key System LUC: A New Public Key System Peter J. Smith a and Michael J. J. Lennon b a LUC Partners, Auckland UniServices Ltd, The University of Auckland, Private Bag 92019, Auckland, New Zealand. b Department of

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING

ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING Sonam Mahajan 1 and Maninder Singh 2 1 Department of Computer Science Engineering, Thapar University, Patiala, India 2 Department of Computer Science Engineering,

More information

RSA Cryptography Algorithm: An Impressive Tool in Decreasing Intrusion Detection System Vulnerabilities in Network Security

RSA Cryptography Algorithm: An Impressive Tool in Decreasing Intrusion Detection System Vulnerabilities in Network Security International Journal of Innovative Technology and Exploring Engineering (IJITEE) RSA Cryptography Algorithm: An Impressive Tool in Decreasing Intrusion Detection System Vulnerabilities in Network Security

More information

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination

More information

Computer and Network Security

Computer and Network Security MIT 6.857 Computer and Networ Security Class Notes 1 File: http://theory.lcs.mit.edu/ rivest/notes/notes.pdf Revision: December 2, 2002 Computer and Networ Security MIT 6.857 Class Notes by Ronald L. Rivest

More information