Professional Documents
Culture Documents
KEY CRYPTOGRAPHY”
Submitted by:-
Kratagya Chandra
0609013036
IT-1/3rd year
Contents
n Introduction
n Public-Key Cryptosystem
n RSA Cryptosystem
n Implementation
n Proof
n RSA Encryption in Practice
n Conclusion
2
Introduction
n Cryptography is the art or science of
mathematical techniques related to such
aspects of data security as
n confidentiality, or keeping secret the content
of information from unauthorized parties;
n data integrity, or detecting the unauthorized
alteration of data;
n authentication, or identifying either entities or
data origins;
n non-repudiation, or preventing an entity from
denying previous commitments or actions.
3
Introduction
n Cryptanalysis is the study of mathematical
methods which are used in attempting to
defeat cryptographic techniques.
n Cryptology means the study of cryptography
and cryptanalysis.
4
Terminology
5
Terminology
n Encryption:
Encryption Encoding the contents of
the message in such a way that hides
its contents from outsiders;
n Decryption:
Decryption The process of retrieving
the plaintext from the ciphertext;
n Encryption and decryption usually
make use of a key,
key and the coding
method is such that decryption can be
performed only by knowing the
proper key.
6
Cryptographic Algorithms
7
Symmetric Algorithms
n Same key for encryption and decryption
OR
n the decryption key is easily derived from the
encryption key
9
Asymmetric Algorithms
n Different keys for encryption and
decryption
n a public-key,
public-key which may be known by anybody,
and can be used to encrypt messages, and
verify signatures
n a private-key,
private-key known only to the recipient,
used to decrypt messages, and sign (create)
signatures
10
Why a pair of keys?
11
Why a pair of keys?
n A message sent from the owner
encrypted with the private key can be
decrypted by everyone with the
public key, but only the owner could
have sent it
13
How it works??
n Suppose Alice wants to send a
message to Bob.
n Alice encrypts the message with
Bob’s public key Pb and sends out.
n (only) Bob can decrypt the message
using his private key Sb. Nobody
else can.
14
Asymmetric Algorithms
15
Properties of Public Key
Cryptosystem
n D(E(M)) = M
16
More Properties of Public
Key Cryptosystem
n E(D(M)) = M - needed for signatures
17
Message Blocking
18
Examples of Asymmetric
Alg.
n RSA
n ElGamal
19
History of Public-Key
Cryptosystem
n 1970 – The public-key cryptography was
proposed by James Ellis, “The possibility of
non-secret encryption”. This paper was not
published
n 1973 – Clifford Cocks’ paper “a note on
non- secret encryption”, same as RSA
n 1976 – The idea of Public Key
Cryptography was put by Diffie and
Hellman
n 1977 – Rivest, Shamir and Adleman
invented RSA Cryptosystem
20
Number Theory
n Number theory is a division of
mathematics that studies the
properties of integers and all numbers
in general.
22
RSA Cryptosystem
Tansel Zenginler 23
Implementation of RSA
24
Implementation of RSA
n Encryption : Use public key
n Decryption : Use private key
n Signing : Use private key
n Verifying : Use public key
25
Key Generation
26
Key Generation
27
Proof of RSA
n If x Zn* , then
n
n
28
RSA Example
n Select two primes: p = 7, q = 17
n Calculate n = pq = 7 x 17 = 119
n Calculate
n
n
n
n
n
29
Conclusion
n The RSA algorithm is part of many
official standards worldwide.
30