Professional Documents
Culture Documents
Patil
1
Symmetric and asymmetric-key cryptography will
exist in parallel and continue to serve the
community. We actually believe that they are
complements of each other; the advantages of one
can compensate for the disadvantages of the other.
10.
3
General idea of asymmetric-key cryptosystem
10.
4
Plaintext/Ciphertext
Unlike in symmetric-key cryptography, plaintext
and ciphertext are treated as integers in
asymmetric-key cryptography.
Encryption/Decryption
C = f (Kpublic , P) P = g(Kprivate , C)
10.
5
The most common public-key algorithm is the
RSA cryptosystem, named for its inventors
(Rivest, Shamir, and Adleman).
07/20/10
10.7
Encryption, decryption, and key generation in RSA
Multiplicative Group
10.10
Decryption
10.11
Example
10.12
Example
10.13
Example
07/20/10
Example
• Alice (5,119)
Bob(17,3233)
07/20/10
May 2012
• Using RSA Algorithm ,encrypt the following
• 1. p=3 ,q=11,e=7 ,M=12
• 2. p=7 ,q=11,e=17,M=25
07/20/10
Dec 2010
• In RSA system the public key of a given user is e=7
and n=187
07/20/10
Example
07/20/10
Example
• A uses RSA algorithm and declares his public key
(e,n) as (13,77).B decrypts message m with A’s
public key and sends it to A. the cipher text
received by A is 26 .show how A can decrypt it to
get the original plaintext. What is A’s private key
and original message .can we have different
values for A’s private key.
07/20/10
Knapsack Cryptosystem
Definition
a = [a1, a2, …, ak ] and x = [x1, x2, …, xk].
Superincreasing Tuple
ai ≥ a1 + a2 + … + ai−1
10.20
10.21
Example
Assume that a = [17, 25, 46, 94, 201,400] and s = 272 are
given. Table 10.1 shows how the tuple x is found using
inv_knapsackSum routine in Algorithm 10.1. In this case x = [0,
1, 1, 0, 1, 0], which means that 25, 46, and 201 are in the
knapsack.
10.22
Secret Communication with Knapsacks.
10.23
Example
• b = [7,11,19,39,79,157,313]
• n = 900
• r = 37
• Permutation table= [4,2,5,3,1,7,6]
• Encrypt the message “g” (ASCII value 103)
• Find Ciphertext
• Decrypt the ciphertext to get plaintext back
10.24
Example
• b = (2,3,7,14,30,57,120,251)
• n = 491
• r = 41
• Permutation table= [4,2,5,3,1,7,6,8]
• Encrypt the message 10010110
• Find Ciphertext
• Decrypt the ciphertext to get plaintext back
10.25
07/20/10