Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information



Similar documents
The Mathematics of the RSA Public-Key Cryptosystem

Overview of Public-Key Cryptography

Public Key Cryptography and RSA. Review: Number Theory Basics

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

CRYPTOGRAPHY IN NETWORK SECURITY

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

A SOFTWARE COMPARISON OF RSA AND ECC

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

7! Cryptographic Techniques! A Brief Introduction

An Introduction to the RSA Encryption Method

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CSCE 465 Computer & Network Security

RSA Attacks. By Abdulaziz Alrasheed and Fatima

ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING

Notes on Network Security Prof. Hemant K. Soni

Software Tool for Implementing RSA Algorithm

Computer Security: Principles and Practice

Elements of Applied Cryptography Public key encryption

Java Coding Ground With Security Editor

Maths delivers! A guide for teachers Years 11 and 12. RSA Encryption

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

The application of prime numbers to RSA encryption

CIS 5371 Cryptography. 8. Encryption --

How To Know If A Message Is From A Person Or A Machine

The science of encryption: prime numbers and mod n arithmetic

Public Key Cryptography: RSA and Lots of Number Theory

Shor s algorithm and secret sharing

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Public Key (asymmetric) Cryptography

Advanced Cryptography

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Speeding Up RSA Encryption Using GPU Parallelization

Cryptography and Network Security

Lukasz Pater CMMS Administrator and Developer

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Elliptic Curve Cryptography

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Applied Cryptography Public Key Algorithms

Primality Testing and Factorization Methods

RSA Encryption. Tom Davis October 10, 2003

Cryptography and Network Security Chapter 10

Cryptography and Network Security Chapter 9

Public Key Cryptography Overview

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography

Factoring integers, Producing primes and the RSA cryptosystem Harish-Chandra Research Institute

Lecture 13: Factoring Integers

How To Factoring

Symmetric Key cryptosystem

Number Theory and Cryptography using PARI/GP

Cryptography: Authentication, Blind Signatures, and Digital Cash

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

CS 758: Cryptography / Network Security

Public-key cryptography RSA

FPGA and ASIC Implementation of Rho and P-1 Methods of Factoring. Master s Thesis Presentation Ramakrishna Bachimanchi Director: Dr.

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

How To Use Amazon Cloud 2 On Linux And Windows 2 On A Pc Or Mac Or Ipad (For Pc) On A Microsoft Mac Or Macbook Or Ipa (For Mac) On An Ubuntu Or Ipro (For Windows

Cryptography and Network Security

Basic Algorithms In Computer Algebra

Table of Contents. Bibliografische Informationen digitalisiert durch

A Factoring and Discrete Logarithm based Cryptosystem

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

Network Security. Omer Rana

RSA Question 2. Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true?

Number Theory and the RSA Public Key Cryptosystem

RSA Keys with Common Factors

An Introduction to Cryptography as Applied to the Smart Grid

FPGA Implementation of RSA Encryption Engine with Flexible Key Size

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction


LUC: A New Public Key System

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

CSE Final Project: crypchat Encrypted Chat Program Christopher Durr, Matthew Mooney, Paul Zakas

Factoring integers and Producing primes

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Introduction to Cryptography CS 355

An Introduction to RSA Public-Key Cryptography

Wireless Local Area. Network Security

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

SECURITY IN NETWORKS

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, Notes on Algebra

Timing Attacks on software implementation of RSA

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY

Public Key Cryptography of Digital Signatures

Module: Applied Cryptography. Professor Patrick McDaniel Fall CSE543 - Introduction to Computer and Network Security

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Security in Computer Networks

EXAM questions for the course TTM Information Security June Part 1

Transcription:

The : Keeping Eve The Eavesdropper Away From Your Credit Card Information Department of Mathematics North Dakota State University 16 September 2010 Science Cafe

Introduction Disclaimer: is not an internet security expert. is an algebra expert. Ideas: 1. Some aspects of internet security are based on algebra: prime numbers, factorization, modular arithmetic 2. Security depends on the following fact: some mathematical operations are easy to do and hard to undo.

Security? The Internet: Transmit a message m from computer A to computer B. A: Alice B: Bob m: message represented as an integer (whole number) m 0 The Problem: How to keep Eve the eavesdropper from knowing m?

RSA What is it? An algorithm for public-key cryptography Ron Rivest, Adi Shamir, and Leonard Adleman (1978) Principle of RSA: Certain mathematical operations are computationally easy to do and computationally difficult to undo. Example: Multiplication is computationally easy. Factorization is computationally difficult. This is the first essential fact that makes RSA secure.

Modular Arithmetic Clock arithmetic Question: If it is 7:00 now, what time will it be in 9 hours? Answer: 4:00 Solution: 7 + 9 = 16 Now subtract multiples of 12 to get back to clock numbers. 16 = 16 12 = 4 Modular arithmetic: Let n be an integer (whole number) n 2 Z n = {0, 1,..., n 1} Addition and multiplication are defined modulo n : Add and multiply as usual, then subtract multiples of n to find an answer between 0 and n 1.

Modular Arithmetic (cont.) Example: Compute the powers of 4 in Z 10 = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}: The point: 4 1 = 4 4 3 = 4 4 2 = 4 6 = 24 = 4 4 2 = 16 = 6 4 4 = 4 4 = 16 = 6 etc. Computing powers in Z n is computationally easy. Computing roots is computationally difficult: Given m e in Z n, it is difficult to figure out what m is. This is the second essential fact that makes RSA secure.

RSA: The Algebra Theorem: Choose two distinct prime numbers p and q. Set n = pq and φ = (p 1)(q 1). Find a prime number e < φ that is not a factor of φ. Find an integer d < φ such that de = 1 in Z φ. Then for all m in Z n, we have m = m ed = (m e ) d in Z n. Example: p = 5 and q = 7. Then n = 5 7 = 35 and φ = 4 6 = 24. e = 5 is a prime number less than 24 that is not a factor of 24. d = 5 is a positive integer such that ed = 1 in Z 24. With m = 2 we have m e = 2 5 = 32 and (computing in Z 35 ): (m e ) d = 32 5 = 33, 554, 432 = 958, 698 35 + 2 = 2 = m.

RSA: Using The Theorem To Encrypt And Decrypt Alice wishes to transmit a message m securely to Bob. Bob chooses n, e, and d as in the theorem. e: the encrypting key d: the decrypting key Bob makes the numbers n and e public. Hence, public key. Bob keeps d secret. Encryption: Alice computes c = m e in Z n and sends c to Bob. c: the coded message Decryption: Bob recovers m from c by computing in Z n : c d = (m e ) d = m These steps are computationally easy

RSA: What Makes It Secure? Eve has the codeword c = m e ; she wants m. Without knowing d, it is computationally difficult to find m. To find d, Eve needs to know φ, so she needs to factor n. The factorization problem is computationally difficult. In practice, p and q are 1024-bit or 2048-bit. 1024-bit: p, q 2 1024 10 308 and n 10 616. 2048-bit: p, q 2 2048 10 616 and n 10 1232. There are about 10 80 atoms in the known universe. Est. time to factor 1024-bit integer using 8.4 million PC s: 2 yrs. Record: 768-bit integer factored summer 2005 to Jan. 2010. 1,675 years of operation on a 2.2 GHz Opteron processor

Conclusion 1. Some aspects of internet security are based on algebra: prime numbers, factorization, modular arithmetic 2. The security of RSA depends on the fact that certain mathematical operations are computationally easy to do and computationally difficult to undo. multiplication is easy, factorization is hard exponentiation is easy, taking roots in Z n is hard