12 views

Uploaded by samaher hussein

Dr. Samaher Hussein Ali

save

- IRJET-A Noval Approach Key Aggregate Cryptosystem for Resizable Data Sharing in Cloud Storage
- Security
- projectsideas-130815143424-phpapp02
- Dual Polarization of Antenna for Wireless Applications
- Chapter 4 Data Security (Dr.Atef)
- IJEST10-02-07-24
- Cryptography Tutorial
- The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations
- Network Security-For Senthil Ganapathy
- Public Key Infrastructure
- Px c 3881560
- ICT Development
- ICT Development_
- Cryptography Tutorial
- 78 Crypto
- Transmitting Bulk Amount of Data in the Form of Qr Code With Cbfsc and Chunki
- Information Security
- A Mechanism Using the Electronic Signature to Verify the Power of Attorney and the Requested Activity
- ibe
- LARGE UNIVERSE CP-ABE WITH WHITEBOX TRACEABILITY
- NET Security
- Cryptography
- Authentication and Kerberos
- Group 9 - Digital Signatures Presentation
- Proof Verification and Attribute Based Re-Encryption of Shared Data over Public Cloud
- Steganography: Data hiding using LSB algorithm
- 5 Attribute-Based Data Access Policy & Key Escrowing Problem_ A Review Paper.pdf
- Fast Transmission to Remote Cooperative Groups Abstract
- Digital Signature Foruzan
- 06654173_002
- Lecture 4
- Lecture 8
- Lecture 7
- Lecture 3
- Lecture 2
- Lecture 6
- Lecture 11
- Lecture 6
- Lecture 10
- Lecture 5
- Lecture 14
- Lecture 1
- Lecture 13
- Lecture 5
- Lecture 4
- Lecture 8
- Lecture 7
- Lecture 6
- Lecture 2
- Lecture 11
- Lecture 3
- Quantum Cryptography
- Lecture 10
- Lecture 14
- Lecture 13
- Lecture 9
- Lecture 1
- Lecture 5
- Lecture 4
- 2013 WBUT
- Criptologia
- Cole E., Krutz R. - Hiding in Plain Sight. Steganography and the Art of Covert Communication(2003)(335)
- White Paper: Cincom VisualWorks Security Library
- Final Draft 1.doc
- KeysToTheKingdomV1
- pa3 andrew emrazian
- 02 Cryptography
- Demystifying IPSec VPNs
- CrypToolPresentation-es
- Cifrado Ideas Básicas.ppt
- Rsa Rivestshamiradleman 150531152524 Lva1 App6891
- Criptografia Peru
- Steganography
- Discrete_Maths_2002_Lecture_37_3_slides_pp
- 06-chiffsym2
- Mitm Bluetooth Attack
- AES Key Expansition
- crypt_doc
- Classification of Cipher Using Machine Learning Techniques
- 2006Open Wireless
- Informe Criptografia Redes
- Lecture2_Encryption_Techniques_2011_spr.pdf
- N LISTA SECRETA DE LOS AGENTES DEL SPECIAL OPERATIONS (SOE)
- CryptoNotes
- Security During Transmission of Data Using Web Steganography
- Encriptación
- Symmetric Encryption and XML Encryption Patterns
- Cryptography and Network Security
- m2_tgm_modelo de Autoridad de Certificación Pki

You are on page 1of 11

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY (One-Way Functions and ElGamal System)

By Dr. Samaher Hussein Ali

College of Information Technology, University of Babylon, Iraq Samaher_hussein@yahoo.com

6 November 2012

A one-way function is a function that is easy to compute and difficult to reverse Examples of OWF that well use in this lecture to explain public-key systems: Multiplication of two primes Modular exponentiation Multiplication of two prime numbers is believed to be a one-way function. We say believed because nobody has been able to prove that it is hard to factorise. Given two primes numbers p and q Its easy to find n=p.q However, starting from n, its difficult to find p and q Is it prime factorization?

6 November 2012

Notes of Lecture 9

The process of exponentiation just means raising numbers to a power. Raising a to the power b, normally denoted ab just means multiplying a by itself b times. In other words: ab = a x a x a x x a Modular exponentiation means computing ab modulo some other number n. We tend to write this as ab mod n. Modular exponentiation is easy.

6 November 2012

Notes of Lecture 9

El-Gamal

ElGamal is another public-key encryption We will also take a look at the ElGamal public key cipher system for a number of reasons: To show that RSA is not the only public key system To exhibit a public key system based on a different one way function ElGamal is the basis for several well-known cryptosystems

6 November 2012

Notes of Lecture 9

El-Gamal

ElGamal is another public-key encryption We will also take a look at the ElGamal public key cipher system for a number of reasons: To show that RSA is not the only public key system To exhibit a public key system based on a different one way function ElGamal is the basis for several well-known cryptosystems

6 November 2012

Notes of Lecture 9

El-Gamal algorithm (key generation) Key generation for ElGamal public-key encryption Each entity A creates a public key and a corresponding private keys Generate a large prime number p (1024 bits) Generate a generator g of the multiplicative group Zp* of the integers modulo p Select a random integer x, 1 x p-2 Compute y = gx mod p As public key is (p, g, y) To be published As private key is x To be kept secret by A

6 November 2012

Notes of Lecture 9

El-Gamal algorithm (key generation) Example Step 1: Let p = 2357 Step 2: Select a generator g = 2 of Z2357* Step 3: Choose a private key x = 1751 Step 4: Compute y = 21751 (mod 2357) = 1185 Public key is (2357,2,1185) Private key is 1751

6 November 2012

Notes of Lecture 9

Summary: Samaher encrypts a message m for Eman, which eman decrypts Encryption: samaher should de the following Obtain Emans authentic public key (p, g, y). Represent the message as an integer in the interval [0,p-1] Select an integer k, 1 k p-2 Compute w=g k mod p and v=m Decryption A uses the private key x to compute z= A computes M= z.v mod p

.(y) k mod p

w p -1-x mod p

6 November 2012

Notes of Lecture 9

ElGamal algorithm (Encryption/decryption) Encryption To encrypt m = 2035 using Public key (2357,2,1185) Generate a random number k = 1520 Compute w = 21520 mod 2357 = 1430 v = 2035 x 11851520 mod 2357 =697 Cipher Text: c = (1430 , 697) Decryption z= w p-1-x mod p = 1430605 mod 2357 =872 872x697 mod 2357 = 2035

6 November 2012

Notes of Lecture 9

ElGamal Properties There is a message expansion by a factor of 2 i.e., the cipher text is twice as long as the corresponding plaintext Requires a random number generator (k) Relies on discrete algorithm problem, i.e., having y= gx mod p its hard to find x (the private key) ElGamal encryption is randomized (coming from the random number k), RSA encryption is deterministic. ElGamal is the basis of many other algorithms (e.g., DSA)

6 November 2012

Notes of Lecture 9

Summary

RSA is a public key encryption algorithm whose security is believed to be based on the problem of factoring large numbers ElGamal is a public key encryption algorithm whose security is believed to be based on the discrete logarithm problem RSA is generally favoured over ElGamal for practical rather than security reasons RSA and ElGamal are less efficient and fast to operate than most symmetric encryption algorithms because they involve modular exponentiation

6 November 2012

Notes of Lecture 9

- IRJET-A Noval Approach Key Aggregate Cryptosystem for Resizable Data Sharing in Cloud StorageUploaded byIRJET Journal
- SecurityUploaded byShruti Gupta
- projectsideas-130815143424-phpapp02Uploaded bySadiaAli
- Dual Polarization of Antenna for Wireless ApplicationsUploaded byEditor IJRITCC
- Chapter 4 Data Security (Dr.Atef)Uploaded byJonathanHindi
- IJEST10-02-07-24Uploaded byMano Billi
- Cryptography TutorialUploaded bySaiTeja
- The Key Exchange Cryptosystem Used With Higher Order Diophantine EquationsUploaded byAIRCC - IJNSA
- Network Security-For Senthil GanapathyUploaded bySenthil Kanapathy
- Public Key InfrastructureUploaded bysathya_perumal
- Px c 3881560Uploaded byram1312
- ICT DevelopmentUploaded byshivpreetsandhu
- ICT Development_Uploaded byshivpreetsandhu
- Cryptography TutorialUploaded bybob
- 78 CryptoUploaded byJulio Cesar Alcantara Delgado
- Transmitting Bulk Amount of Data in the Form of Qr Code With Cbfsc and ChunkiUploaded byIAEME Publication
- Information SecurityUploaded byTapan Jain
- A Mechanism Using the Electronic Signature to Verify the Power of Attorney and the Requested ActivityUploaded byEditor IJRITCC
- ibeUploaded byGaurav Srivastav
- LARGE UNIVERSE CP-ABE WITH WHITEBOX TRACEABILITYUploaded byJames Moreno
- NET SecurityUploaded byarunascarlet
- CryptographyUploaded bySaidaiah Bathineni
- Authentication and KerberosUploaded byTushar Saxena
- Group 9 - Digital Signatures PresentationUploaded byShubhamSidana
- Proof Verification and Attribute Based Re-Encryption of Shared Data over Public CloudUploaded byEditor IJRITCC
- Steganography: Data hiding using LSB algorithmUploaded byNani Koduri
- 5 Attribute-Based Data Access Policy & Key Escrowing Problem_ A Review Paper.pdfUploaded byIJAERS JOURNAL
- Fast Transmission to Remote Cooperative Groups AbstractUploaded byKannan Deenadayalan
- Digital Signature ForuzanUploaded bySagar Lodhiya
- 06654173_002Uploaded bynaveenr3

- Lecture 4Uploaded bysamaher hussein
- Lecture 8Uploaded bysamaher hussein
- Lecture 7Uploaded bysamaher hussein
- Lecture 3Uploaded bysamaher hussein
- Lecture 2Uploaded bysamaher hussein
- Lecture 6Uploaded bysamaher hussein
- Lecture 11Uploaded bysamaher hussein
- Lecture 6Uploaded bysamaher hussein
- Lecture 10Uploaded bysamaher hussein
- Lecture 5Uploaded bysamaher hussein
- Lecture 14Uploaded bysamaher hussein
- Lecture 1Uploaded bysamaher hussein
- Lecture 13Uploaded bysamaher hussein
- Lecture 5Uploaded bysamaher hussein
- Lecture 4Uploaded bysamaher hussein
- Lecture 8Uploaded bysamaher hussein
- Lecture 7Uploaded bysamaher hussein
- Lecture 6Uploaded bysamaher hussein
- Lecture 2Uploaded bysamaher hussein
- Lecture 11Uploaded bysamaher hussein
- Lecture 3Uploaded bysamaher hussein
- Quantum CryptographyUploaded bysamaher hussein
- Lecture 10Uploaded bysamaher hussein
- Lecture 14Uploaded bysamaher hussein
- Lecture 13Uploaded bysamaher hussein
- Lecture 9Uploaded bysamaher hussein
- Lecture 1Uploaded bysamaher hussein
- Lecture 5Uploaded bysamaher hussein
- Lecture 4Uploaded bysamaher hussein

- 2013 WBUTUploaded byMainak Sen
- CriptologiaUploaded byhugo
- Cole E., Krutz R. - Hiding in Plain Sight. Steganography and the Art of Covert Communication(2003)(335)Uploaded byjaypatel40
- White Paper: Cincom VisualWorks Security LibraryUploaded byCincom Smalltalk
- Final Draft 1.docUploaded byTed Watkins
- KeysToTheKingdomV1Uploaded byAlexander Kyte
- pa3 andrew emrazianUploaded byapi-240736473
- 02 CryptographyUploaded byKasun Eranga
- Demystifying IPSec VPNsUploaded byEric Nana
- CrypToolPresentation-esUploaded bySergio Sisterna
- Cifrado Ideas Básicas.pptUploaded byGanimedes
- Rsa Rivestshamiradleman 150531152524 Lva1 App6891Uploaded byimbo9
- Criptografia PeruUploaded byPERUHACKING
- SteganographyUploaded byOmeGa Doublex
- Discrete_Maths_2002_Lecture_37_3_slides_ppUploaded byapi-26021617
- 06-chiffsym2Uploaded byami2008
- Mitm Bluetooth AttackUploaded byjasonddennis
- AES Key ExpansitionUploaded bysureshkumarmtech
- crypt_docUploaded bySharnu Nagarahalli
- Classification of Cipher Using Machine Learning TechniquesUploaded byompjha1991
- 2006Open WirelessUploaded byelite
- Informe Criptografia RedesUploaded bykrlos17
- Lecture2_Encryption_Techniques_2011_spr.pdfUploaded byhttp://utsit.blogspot.com.au/
- N LISTA SECRETA DE LOS AGENTES DEL SPECIAL OPERATIONS (SOE)Uploaded byGatopardo
- CryptoNotesUploaded byLatha Murugappan
- Security During Transmission of Data Using Web SteganographyUploaded byNikola Dimitrijević
- EncriptaciónUploaded byhugher
- Symmetric Encryption and XML Encryption PatternsUploaded byMalik Aqib
- Cryptography and Network SecurityUploaded byJoby Paul
- m2_tgm_modelo de Autoridad de Certificación PkiUploaded byJesus Colmenares