You are on page 1of 7

1.

Public Key Encryption (A Simple Case)

1. 2.

Uses two mathematically related digital keys


Public key (widely distributed) Private key (kept secret by owner)

Both keys used to encrypt and decrypt message


Once key used to encrypt message, same key cannot be used to decrypt message Sender uses recipients public key to encrypt message; recipient uses his/her private key to decrypt it
Slide 5-1

Copyright 2010 Pearson Education, Inc.

Public Key CryptographyA Simple Case

Figure 5.8, Page 290


Copyright 2010 Pearson Education, Inc. Slide 5-2

Asymmetric/Public key Encryption


In public key encryption mathematically algorithms produce the keys through one way function. In one way function an input cant be derived from output. Example: it is easy to make scrambled eggs, but impossible to retrieve whole eggs from the scrambled eggs. Keys used in Asymmetric key encryption are 128 bit, 256bit, 512bit. Algorithm used in Asymmetric key encryption are RSA(Ron Rives, Adi Shamir and Len Adleman ) etc.

Copyright 2010 Pearson Education, Inc.

The RSA Algorithm Key Generation (Just Concept)

1.

2.
3. 4. 5. 6.

7.

Select p,q p and q both prime Calculate n = p x q Calculate (n) ( p 1)(q 1) Select integer e gcd((n), e) 1; 1 e (n) 1 Calculate d d e mod (n) Public Key KU = {e,n} Private key KR = {d,n}

Copyright 2010 Pearson Education, Inc.

The RSA Algorithm Encryption/Decryption Just Concept

Plaintext: Ciphertext:

M<n C = Me (mod n) C M = Cd (mod n)

Ciphertext: Plaintext:

Copyright 2010 Pearson Education, Inc.

Example of RSA Algorithm (Just Concept)

Copyright 2010 Pearson Education, Inc.

Problem: public key encryption (a simple case)


In public key encryption some elements of security are missing. Although we can be quite sure the message was not understood or read by a third party (Message Confidentiality) But No guarantee the sender really is the sender (no authentication of message) This mean the sender could deny ever sending the message (repudiation) And there is no assurance the message was not altered some how in transit. Example: message change to Buy Cisco@Rs.25 from sell Cisco @Rs.25. This suggests a potential lack of integrity in the system.

Copyright 2010 Pearson Education, Inc.

You might also like