You are on page 1of 21

 BANKING

 SHOPPING

 FILING TAX RETURNS

 MILIATARY

 N/W SECURITY IS LOOMING ON THE HORIZON


AS A POTENTIALLY MASSIVE PROBLEM

CIET
 SECRECY

 AUTHENTICATION

 NONREPUDIATION

 INTEGRITY CONTROL

CIET
 Encryption: only the authorized party can
understand the encrypted message.

 Data authentication: Ascertain that information


exchanged is indeed the one from the sender.

 Signature: allow people to verify the authenticity


of the message or authenticate the peer user.

CIET
4
Cryptography
 Cryptography
 symmetric-key cryptography
 public-key cryptography
 Used for
 authentication,
 integrity protection,
 encryption,
 key management

CIET
5
C-ciphertext p-plaintext E-encrptionkey D=decryptionkey

C=E[P]
P=D[C]
MEDHA-2K7 GIET
plaintext cipher text plaintext

Encryption key Decryption key

 Here both encryption key and decryption key are same .


CIET
DIFFERENT PUBLIC KEY AND PRIVATE KEY.

CIET
plaintext cipher text plaintext

A’S Public key A’S Private key

plaintext cipher text plaintext

B’S Public key CIET


B’S Private key
RSA

 knapsack.

 Diffie and Hellman key exchange .

 Elliptic curve crptography .

(and many more……)


CIET
Summary of RSA
•n = pq where p and q are distinct primes.
•phi, φ (n)
= (p-1)(q-1) .
•e < n such that gcd(e, phi)=1 .
•d = e^-1 mod phi.
•c = m^e mod n, 1<m<n.
•m = c^d mod n.
CIET
plaintext : M<n

Ciphertext : C=M^e(mod n)

plaintext : C

Ciphertext : M=C^d(mod n)

CIET
 Sender A does the following:

 Creates a message digest of the information to be


sent.

 Represents this digest as an integer ‘m’ between 0 and


n-1.

 Uses her private key(n,d) to compute the


signatures=m^d mod n.

 Sends this signature s to the recipient B.

CIET
Recipient B does the following:

 Uses sender A’s public key(n,e) to compute integer


v=s^e mod n.

 Extracts the message digest from this integer.

 Independently computes the message digest of info


yhat has been signed.

 If both message digests are identical,the signature is


valid
CIET
CIET
Need for further development of cryptography.

CIET
Menezes, Alfred; van Oorschot, Paul C.; and Vanstone, Scott A. Handbook
of Applied Cryptography. CRC Press, October 1996. ISBN 0-8493-8523-7
R. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures
and Public-Key Cryptosystems. Communications of the ACM, Vol. 21 (2),
pp.120–126. 1978. Previously released as an MIT "Technical Memo" in April
1977. Initial publication of the RSA scheme.
Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein.
Introduction to Algorithms, Second Edition. MIT Press and McGraw-Hill, 2001.
ISBN 0-262-03293-7. Section 31.7: The RSA public-key cryptosystem, pp.881–
www.abcseo.com
www.google.com

CIET
CIET
CIET
CIET

You might also like