You are on page 1of 28
903 ‘a 60112005 Mooune 3 kK fusnic KEY) CRYPTOSYS TENS: [franoduetion. Jo Petbtie Key Cnuptosystems AL tat toa Sysdeno haue been based on elermuni | Jools of Su ea and permudasion and Can be ce eee He ce C Sy pednic,) Sxystenat. Alt clasie and moder blocte and Sdineam Ciphers ane of | his oar | fublic key Cyptosysteras aru assymedsc, thuoleing too Seperiate keys » th Condaash do Syrometrue ene hte [aro Uses only one keg Anyone Knovotng dhe public key Con encrypt russages Or Uenity Scqnalomes 5 but HCanned dricrupt massages err couake Scqnatunes, COunien triudive dhough this may Seero The use of dwo keys las profound Consequences tn the ansas of Confiderdiality » Key ditasibedion, and authende- Cadton - Prrlolic b Setremas One netthen Mase Nor less Secure than pou ate ba CSeceunisty depends On the bey Site fon bath), naxdo 2 wrplace prutrade Neary Sebuumes Cathay are Joo Stow 30 do so) athe DI compl dhun: Both also have key surg with “key duxavibedion. Buquiring dhe use OF Some Suidalole protocol are developed do adcrus doo key creas © key andnribusion ¢ Hows do hasie Secume Communications th general cwethout hauitng de dnust a tee War your Kesh WO Deqedad Scqnaterus How do verity & raed : Crom dhe claimed Senden: ecormes intact | Chanacdurishies + | Acrymesnie alganidlrns July 0 one key {on encrypator, ea ulated key for fees piion use fee 4 4 Chanacdonistie Janda dite Algasidhins hhaue dhe following tm sins earopeshtonal trfeasibole do deere van ern at given only kenousledge of adhe Crypio4.nap \gorusl | enenuphion Key: @| Tn addedion, Sore alganidhmns 5 Such as RSA» also eotrilett |Gllewirg, Characsenrisiee # Even dwo wutared keys can be ysedh tory ehenlipaien., — | with dhe ode wed “far eee | Toy. s=¢ Rob's pulee ah totes a is ONO a> t Pun | Ace's pubtcc ity PRal'| Alie’s partzate Keey ae po Tranteided PL 1 \ Xa | Cependenk | |: | | : * | | YWaE (PU, XD X=DCPRaY) ers © Erenupdion. catia a aes Agantshon ; Agana Plainderte ae Eqs RSA ‘ Ouetpext, . Bob. Pladndert Atice Public Key, en Pr CDs hee Lig } iS Sin th y x | Ay Pluintent 3 mngredienss | 3, Pubic and prviteate roe As Giphertens : 5 Decrujpiton, alganishm 5 Syrorednde U6 Public key Lawypdosy stems - [| Symmetout Modet L_Pabtie key Enaryption : Needed dto atone Need do Wank Le nistirs 5 i se : Te Sure algpeuithrn. wily | one algani OS used for fugpsion, ae Same Key SS Used — enemupdior and decn ption. mn eneaypiion and deenypsior. Wwidh a pain of Kegs) One torr eneayption and one Tor bit Kecnupscor | afte Sender ard ruceiuer | The Senden and seceiven meth CON > mush shane the algorithm! ead rave onsot dre matched : and dhe bey. | pain ot keys: Croat dine Sour } ene) s | i Needed for Seousrity | Neaoted. On Security : ; They key mess bbe Kept | One of athe. auso leeys must be Secsus. | Kept Secsud Ta musa be dgpossible nat | LU must be, troponible on atleast re | P | | lees tropnacdecad cho deciphen| inapracilical do decipher a wapek A message if no other | message if no other Intdrmation Imfonmascon & auailable | \s nuailable Knowledge of are algorcthr| Knowledge of aire algeaithre Hus Samples of ciphertext | plus one or the lays plat Musi be thsutttcient do Saroples of Cipherdexs must be Bedenrnine the Key. | doscetticienk do deterunine , | the othen Key. it allah a ecm Tate ey Caypdosy stems Public key Scrermnes tan bee usecl fan ether Secmecy Or cation, an bath. There ts sore Source A that | Secnsey keys, Senden ovons eee Bail text X Cain’ r eens in some rfinide alphabes- produces & massage tn ; of XK ane iti? sare bande ‘fon destination B- ee. : 2 a public U aenendes 0 raced pair OF keys 2 2 P Y TUG any | a paiwabe Keey PRp PRp is Knowre only do B- auailable and herctore a0te message XK and dhe ener phor fooms dhe Ciprendert Y= ECPUD, XD The intended oueetver, to possession of dhe matching portale tray ig able to inuesd dhe dvansformairon. X= PCP VY) ; | Ap aduensany obsentring Y and haueng access cto PUp tase hod hauing access IO” PRp an KX, must atdenspt do | rucouen Xand lon PRE Tis proudoles lortdensuatity | Gnaleo usd oupubblic Way enenypaior te prroecole | whereas PUp ts pubWcly ssible by A: With the key PUb as ope A | auadlrunrateattor ‘ Y=ECPRay X).3 X= DU pUa oY) | To prouidt bok authuntication tuncdion ancl | Contidertéatiay Wave a double tise of 2 ‘ | Scheme a } se Sg Pupie a] | ‘ Z= ECPUb) ECPRa, X))> X= Chua, OcPRL, 2) Tn this case, §: ing io ais » Seperate Kes pains ane Used Ton each PNA, CONS ANA Couales Of these punpores: The ree co Sounce A | Source & eh y zi t X | Eres PUA Satsang |frosssage, | Erumupiion| | Enenyphion |” [Decnuption| |Deenyation) x | . : : I = Ab any. peers esa Algorethiro brits Nagreben | Pur a | , oa Dest: Ceonceountenlute) 4 R Key patio, | eee || founce T ey Pa Key pation . Source | ( authunticatéon > | Appiicakions Le] 4 : : * Enenypaion [decryption 2 The Senden enenypde a message is with Bie rte Fi PRE PS 4 440 *) Deqidar Signature § The Serolen “seqns ” aAmesage wih y. Us prrivade key, etdren do ahe whole. message on Jo a Smatt block of dala dhat ts a funekor of The message, | tl Ke exchange = Two Scaes Coopenale AO exchange & — Geuenal duftrenk approaches Bore pousible » Session vc a Tnuoluing She parte ate Key (s) of One an both a Public Key ougyireruots This conopstationally easy fora party 8 to genenabes & pain Cpublic Key PUL prruate Key PRD : : s ce Sorden Ay knowing AA Be Mis conppudationally eas ‘tna a lass ng cohkic? totic dhe message 2 encnyy , ae ae Pipex cipher Seat C=, (rub () "BS computationaltty earyfor are vuceiver B #2 Gecmyph athe rd Cipherteat Using dhe pouate Kug Jo oucouen dhe ‘ aruginok message to= DCPREV C= DCPRE DE CPUb/N)) inteasible or an aduensany + knowing | Tats cormpedadionalty TT OPER ag Ore | dhe public key Pbl, do de. i OSANY, | Tats connpedationally Inrasible foran adsiersany, king, pulotic ginal Message CO ©} The aoe bays can be applied. in either anden (optional) MEDLPULEC PRPOIT = OL PR. E CPUs 19) ] Security ot Public Key Schorvus : Public Key schemes ane no mane onless Secure athan pouiuade Key cremts~ tn bath Cases che Size Of, de | Key dererunines She Secusit4 | © Like porate Key Schernes brute force toehauctive | Search, addack ¢ atuonys theancsically possible +} * But keys used art roo lange o> 542 bes) ie Seceanity wulies ona lange enough “Auernence ire disetettsy beduocen: £4 (tH [decrypt and hand Conyypr. anolysis paoblems >) : > | . ugh 20 be (mpnacdial to basals Je Reqyinss use of Very lange Numbeng : * Hence is Slow coropanede she) pritiate Key Schemes. * OL RSA Algorithme, ; “ . PRSAts dhe best Known and by Grits mont Week ene ce pabloe “nenupsion, Algaruithen : 4 “eat tees earl o> J) Oa Of TOXT CRon Rivesk) Adishamin ano Len. Adlernan) | ‘Tis based on Cxportnkidion. thy Attrute Gold ues Ci key PUy anda Cipherterd »C, bo Mecovenr the " & dndegens modulo a prime, Using (, thintearnd Wee keg : vite). ise ¢ a 3 lote) > fe Security & Ave do the Conte gee ol jot lange num 4 ing There are three Stages te BoA alganish re | ly, Kou, genenadion / Key sedup | Enemypsion 14, Deeney pion | 4 Key genenviton I Key setup: |p Seteck P, 4, Vohene PRA, are porirre numsbend andl PEO, Ui) Caleatate n= PX, GID Calecatode heng= CP-496q- 4D Cu) Setect Uoregan € 5 Such Amok gedlhtn?, )=17 16 e< Ged © (UW) Cteutate dy A =e 'Cmod Gen? Qt) Public Key PU=fern}, pricate key pr * La.nj ga Grsadest Cornmon Atuson | &=bmodr => amodn = b moan s | 4)Erenupaion va Or to in where Mis the plain deat j Gi) Ciphen Lead, C= NO mod 5 5, Decry pation. COTf Cis the Cepher ert WW) Plain dexd 119 = C% mod nr Eqs p= 47 els Reet = 181 Bt -Stos=Cin-igcaaetr= tem te = EP 1 gent +607 195 cd (AGO) 2D* = ged C160 39-8 e=3an e=7 | \‘ wok cal de g'mod 60nd eb mod 160 © ae 3a = 1 mod 160 [eters a= LOT Tease es Blin1)= 2tieott | ae as Pukece key Pur £2, 1813 pute teey PU LT 1813 & | pauieate key, PR={ 107 18Tt | Private Key » PR= LAS, 2 i | Bacauypaiors | Encinypators | to=ge | Nese | Ciphen bend + wo mod 187. Cipler derd.= rot mod 161 | = 88 mod 187 = 8B mod 187 | (88?mod tet )= 44 least mod 181 (88% mod 181 D | Poa (eg mod 1812) mod 429 {GsFmod 181988" mod1¢9)) mod 151) nw | Ce . (aa? mod 121) Cee mol Je) a Ic herd = | phen tex: ai free) moa 187] x11 x88] moa 18 | nb | =[12Ax TIX? Jmod 127 x | [4b med ter C4aF mod | DCAM mod 407 (ye 7 84448Q, MOA eT 14 mod 110448 moa tery | 6 oath | GaSmod (8 9 448mod 1) | (448 mod 21) (44 meatier) i ees | Gad mod (21) (44 Smo te) Nox cd mod. Caat wmod (8111448 med let =11°S mea 197 (44q* mod earn sso Se | mkt een tort 1879. Cu® mock lense! mLXSS x33 x33 mod 181 932 x 66x 44D rnod 187 = 12120245 moa 4¢ e “i 1 2 = & | 4 ‘a | Percfonno RSA agar ld Re39,%- 14, @=0 , to=86 Bye Sy e@=a, M=q eae Tee Ses [4 pai, Da tacatO fo=T QPIT 4-38 e=IL Mrk | Ansuserrs Ja)e=3) Yais, e= 1) M=S n= PRY = 3014) Gend= (3-19(4- 1) = actor = 80 tL en 139 = a0 ds 1 rned 20 a=3 > iia | Ta = 1 mod 20 © ss Public Key = 41.334 od 1st) | Rrrivade Kary = {3.334 A12T | Erenypaton. 8 CHP mod enn ~ 5" mod 38 [C5 * mod 33) ( mod 33)( 56 mod 989) mod 3% | =[ atxasxsdmodss=4 | me Dunypaions D= CX moa gtnd= 14% mod 52 | (44 rnod 93.) 44 mod 38) 14 mod 339) med 33 (44x14 244)mod 33> A744 mod 33 = 5 )P=5, qe, e=8, DOHA aes) 1. 5S beny= Atto) = 40 | 2 (3,585 e=3 ‘ Lie Keey 2 det mod £0 Ce os | 3 Pricrate Kay fats 584 a= 4S mod 40° | ZC atd= acavott aA=al ere. = A> mod55 = 14 | Erenuyeaton 2 C= 19 mod = A Mo = 14 Deenuypxion, $ T9= ct moan’= 144" mod 5& | . | Medes) (4 moss) | C casfmod 58 9¢ 14% mods )C1AE | (AA rod. 55 J 90d 66 | C tex Jexséxai x14 ) wed 8 oH AQ pa1,q+14) e211, to=8- N= Pxqe 1C31)= 11 enr= 6Cto) = 66 e- 41 | -! d= 41 mod 60 TIA = 1 mod 60° | A1ts29= £6 Ceod-+ phere | En PincsGs Oona ae ee 2 of modn = § med 11 [[C8E 0447) COT 0d 419 (8* mode 1) (@ Mod 1)] Moet Laxtg%18%x 8] mod 17 - 5] Decauypaton o Ms 54 53 sn id 4) Pett, 4-33, en 44) 5 = 15x13 = 143 in $= tox tae 1. = Lat e= 14 Z | © De ae eo ule] d= + mod 180° at Public Keay = { 14) 1434 Priv ate eq = {11,1434 | 44a = 1 mod 120 » | 4 Ga =AC 140041 a=44 Eneaypaion § C= to°medn = 1%lmed 143 (CTA mod $439C THmad 143961 2 mou 143 Tmod 1439) mod 143 Bade x 11s 4 AA x) modi acs. 106 | Deenypaion 2 t= C 4 mod n= 1064"mod 143 = |e)Pa1L 4-31, C= L M-& - | n= 1Txat = 587 beno= 16x30 = 480 at Public Key = LT sath nes mod 480° truseade Kir = 4,343, 5275 | dd = t mod 480 | wee) 10348) = 5(4d0) tt “ds 348 | Enenupiton $C = to% mod n= a mod 681 = | Decsuypséon 2 t= edmod n= a mod 627 BU REACabeSe sa ee an : bn Case of RSA alganithm , no devastating addacks have Yer discouersdr lout Levenal adiacks have beer Poudicted based op dhe weal plainer, weale panender Slecdion qn inappropriate inzplementatéor They anes Neng Wott brute torce Seah mathematcal atdacks | FTeseneaton | | chosen. Cipherdent | t t |_| ee i a | = ra | F pn, gran [ert es BSA 1 Nake aude tami mage“ eter ee | | ; 4, | Factorization, Aadack The Seeunisey of RSA Is leased on the idea that the modeitu js so lange Athat (2 vs trfeastble to “ctor. tA i a seas lable time Bob Selecds panda, and caleulele n= Px 4, | Atahough nspublic, Panda, ane Serut- TY Eve can | facdon Nand obdain f anda, , She tan euialuale eno = (P-49(q- 19. Fre then can Cateutate ol- & mod because ¢ & pucbtie- The private exponent A ig cle | dnapdoan hak Eve can use Jo Aectoryps AnH eneaupil eh * Then ant mah (aclorizakion at, ofdhem Can tack a atme Conpplentiiey . To be ceeunss RSA preserlly Acasines dha m sho! be mont than 300 Aetimal digits, Pere Ries qosvdhrns, bo ut nom} e lnhegen uodstin polyno" 3 mou e Ever dode on Sect fou Chose oie A pe Ra C= oo | coil | than | Sap Sep Sep mrss be aleash tong bids @ Evers using ne largest and “Gsdest Conpede | f i , hodaxy» far osuing an wieqer of this fs or an tnteas tbly beng period of dime This means RoA ee Seeunt as long as an etticient algordim has nod es found . |choser. ~ Ciphordeed Anlacle | aa A podenseak adiackk on RSA, (2's based on the mrletipucadve fproperty Of RSA Assume athat AUice cneates the Cipherterd C= Pimodn and Sends C Yo Bob Also assume dhal Bob [will decnypdh an anbilrany Ciphentext an Eve, ather dhan C and uses the following Sdeps JO ind P Siep 1.8 Exe Chooses a narvtorn tndegun X in Zn* | Shep a & Eve Cateertates, Y= Cx X*modn Sep 3 * Eue Sends Y do Bob Tar deenyprton ana ger aes US mod nr, Tris Sdep ts an (instance of & clnosere Cipher here aback - Siep 4% Eure can easily “find P because a Seen re = Ce Xormod D ~ moolim =(edy yet) mod n =(C4x XD moan: Ze (pe % moan) —P P= ZxX!' mad a Eue uses the extended Evelidean Alyan ith do tin: alee ot P- Foulatp cat ivee Inverse of X and evensealtey the Adaacks on Enanupsion Exporect i To vuduece pion. dinar woe7(l day go use a Small Sneneption excponank € The Commor valus > eae | Ghetecond primed Thane are Sorna posectéal attacks Jhat 4 enanall peered eM waddlcowh hon dhe System, piled fan dhak sxcommen derkio,, 5537 Cana prim Close to this 2 penne ype user ew et were! Valu) 1) CoygensisnToeanin Mier This reonero Wodes Shak tn a module-n polynomual one can use analgaridinr> of SAL go find the moat re one of the ook Ve “ex of deqaee & Connplentsey log is sratlen than Thus “theonern Can be appiied do dhe RSA Congpatos ys Wik ceHttpyepemodn: Tt e= 3 andconly suse dhinde of dhe bids to dhe pladaderd art Known, dhe algoralm Can ind all bike tpdhe plaindesct b) Broadlask Addack Thi aac can be launched tone entity Sends the Sarna message to & 4ROUP ot Aecipiends with wor ial Chenyphior eneponerdt Fase example Alice wanis do sends athe 5 amt message to dh ner recip ie Woh dhe Same public exponink e= Baten fe = 3 and the meduli Cy =P? modn, Cart modng Cas Po mod = ook Ag Applying Chinuse Aemairden theorems to ches dhour eayattons, Eve can tind an Cayak©Oon of Bue foam cl= p> i co mG A a sugulan anithmoste Cros tr model anhusicd Eve can tinsine ual of cle p'8 © Related Hoesage Addacte Ji voas discou ’ ened by Enanktin baietty Anscobed as Atice és mes rn be Ph and Pa and enorups s Nd ae Sa 1 with €=3 anol Send! ls Sten 4s Ci anaCa do Bob. If hy is utaled son te ty funcdior, then Eve recouen Ps and rae J a toean Compactor. tine in a Peasible d) Short Pad Adracl Ducouersd by Coppensmiil, Can be descovboed as Alice has ~ message fo do Send 20 Bob, She pods dhs message 4 vwidh 14) tnonyps wusulk 4004 ana Sends C1 to Bob Lue tolencephs 64 arck daops (A Bob trams Alice that: he has’ recedued athe massage y So Atice pads dhe mosag again wish vd, erery PAs Land Sends ti to Bob. Eve oso fndencepss dhe rmussage Fuen now has cs andla and Sha tenows Mrat Whey both ane Ciphertorr betong ing Jo Same platiokext Coppancinisio paoued ahar 4 andra ant shark Eve may be able do suo’. the oniginal massage M> Audacks on dhe Peemypsion Exporunk 4) Rewealeat Decnypsion Exponent Aatack Ws obuius Shad & Fue car ‘find dre decragplion expos a She can decnyph Ine Curpunk, Uren PLEA VYLSSAYS - If Eve Knows dhe uate of a, sre Can use % probabdiste algorishen to fa0tOr Nand Tind tre Uralur of Pand %. Consearrodly if Bob changes only dhe Conopnrorris eo m dee ACO, eacporernt bet Keeps Sane modulul yn, Eve um be able 20 Aecayps fidune masager bedauae She hat dhe ectovizatton of n- Tis means dot 1¢ Bob trnas oud hat decrephior exporsnd lt Coraprarniseds hen ees A Choege Hews uate “far P and, » Caleutade in ana toate i orally noo pouriade and public key. wy Me ndior. Foe onenk Adxac » oe ey using «Seal poucrate Key a, ante" ewe erase process faster Ar bin Wiener showvod hat 1 a < tian mspasial dupe »| paiace based ore Continuous Cractior » Carr jeopardize Cendanger /atreaters) dre Security of RSA» Fon thy do Wappen tmx be die Case shah 4, 4 p< 2q,- Te | dthese ILO Condtiéons eocisds Eve can factor 1 iw Poly nomial dime: | Node? In RSA pare vucommundodiore ts do have A>d= Ifn' Yo paruerd lows Anereypstor eeponrsd adsdac!\ 5, | Plateaus Asante: Platndert and Ciploeroa tn RSA» are Ane Peamecaicons of each ather bemuse Sheyare boregens in dhe Sarre Jodenuel Co ston-19 If Eve knows Somusining about du Plaident, those Chanacdenistics may alld Some atta cl by on Plaindexr i 10) Shank, Message Addock | , i \ aie based on he permutation sretationship betecon Planters and Ciphentexk Eve can ercnyps he. possible messages until athe . eee ot 4 meld As Came as tre vardom bids befart encryption Ls a, Pieeare NG a matrod called ia Ung. 6) Cycling, Axdack YPE op Tas based on dhe permutation. rulationship beseocen. rclize plaintext anc Ciphemord: The Continous encoypdion of thy | dhe Ctpherclers coil erremually vusult tn plaindent Ie 4 | Fue doemtd Continuously tneayprs dha Intencepsed Cipher rend Cy She will evenduatty ged the plaiirsencs | Howverrer, Ere dosen't Knows “hak dhe plaindesch Is. S0 She dossn'd Know Cohen do Stop She meds Jo JO tne | | 4s one Sop Custhen. When she gede Ihe CiphendLexk ¢ Again, sas deeseth Lnoey shes alias -plainser us oto She qoes back ome Stop to nad dhe platnstercs ‘ions | Tntencopral Ciphertexd ¢ L Ci= C modAn tat Ca = Cf mod fa lcs a ; PRE WE sige herr ee Coy sacl PEON Pe Ces ore There is no erttetend algorisdhen What can en ae fens large Comper of the ot the BAack, \n pol nodal ine» addack és equal 40 Consflerdty oC tadoning ™ 9 Unconcealed toesscige Astack Another attack based on the perm edadtion. bedeveen platotexd andi ciphenheneh, Ar eneencealees message |p a message dak enerypas Cael Ty has been. " » proven thal then are, Some mos Ag08 On plaoctects a . Tatars rene Asch 25 derseives ea On! ce : onind is selected Bee Gad. uch mone, Ir. : - Cootully, thre pumber of arse messages raglegible gulationship i rm can always check 0 cthe ¢ Tre onenysing prog ; ogni seen as the plainserct and gujoct the tt i i plaioderd beter Submisding athe cipherden. | Aidacles on the. odulus Factorizadion dsac also modulus atack: |) Common. Modulus aac |” an belaundud Ha Commenity user % Commer modules D> Far exanople people In a Communist, Migbk led a anusked dhind parce Soleck P and 4, Caleutade Nand tnd and Covate A PAU of Gxponeni Cee, did for each enitiey. Novo assume Alice neds do Serco massage to Bob. The Ciploerteocse to Bolo ce iG moan, Bob uses his private exponen» AL co | deuryph bis menage, P= cd mod. The problem ¢ that Bre con AO Accaupk themessage If she bo member of dhe Connmurikey rte Viskbeers eee a pain of eaporanss (ee and de) Using hen own exponents she Can launch g probabilicdte artack: footon Nand ‘find Bob’s Ap t aoe oe ote eoreek the Modul tus mu |. not be Shared. Each senate k en warty MEM to Gaiculate Adiack, on Inple ae 9 Tong Aataelece Jy Demonsdinated i adack Vosoon! 1 Mgordhen uses ; oe alle on dhe Codeqony of (| L Pat! Kocher. Ty © 4 Cpervext 04 OKA algonithrs Ine & dhe 2 S Cormespon cling wt? tha | go-find dhe value of bids inds ong by one Sayaning Consamas mart power chan (dencdion shad Use only Squaring. Ts same Kinol of Aechriques “eal + Prevent String prtacks can be used do thuverst pocwen aoa s il Gamma Creypaesysterns adhe porieeade exponend A tO; id uses bal 7 roulapiicadtor eC the losvuspondina ma inaaing ang, " ; a ate dredirre vuqyuired todo carr idemation, g& wid, eans tonsespondin: bet 4. Thes at 4 aaah Pi beth, et ots Eye There ert doo medheds Jo ahwant this olack e Add random delays Jo exponendials Jo make cach exponematation dake dhe Same amount of time e Rivesk pucommunded Buinding , The tdea ts clo multiply | dhe Ciploe rhe by a random humbean befane sdeanypsion | boPewser Asncl lan do timing asack: Kocher. Showed ghal «¢ Eve cap, pucisely muasunre the power Consumed alma ACO Es Shae can, (ouaneh. a power otack based on dhe principle tor Ht addock, «An tencdion inceotteh 9 matsp Weadlon anol Siroi Patmetatve Rook Tris an lndeger Such dak g > tery, bodeg err seladively Prime dor Is Congreruod do a power of g moan Te, fon eveny number ‘a? relareve prime to no dhene tran \ndeqan Z Such thas: ae 9” mod. pie than q Is called she primidttre soot of Retantve Pris $ 1) 8s 3 wee gd (Rrinniicve tootot 5) he a? mod 8 = 1 mod 5 = t Ret meas a els id eesstdsi. eee ot ao A= at mod S = &med 3 -* ie neh \ | Qs the primitive srook of 8. | Blgarnak’ Conypdaa nope TAS an assyrnedsie public Keeey ovypko Sy steno Bowed on discande Voganisoro ee aie mae es qr x very lange poume number Cid ts, a priisicere rood o€ a, This Corpo seysclorys twwoanks anv Hare step ¢ 4, Kee qenenakton & Eneny pion a Decry pdtion | & Key qepenadion oh A: | GD ScleedLa precake leas Aa Xa 2 a4 | UY Caleutate dthind part of the, public key Y, | . : yw tA “mod a, | cliid Pubie Key = fg, al ony Priate key = %, ee or | | aid caleutake Ke CY, moa q, | . ee eee | Platoderct to < 4, | Cin Seleck random bategen Ca! moda, N= Cae, %4 7! mod an Eqs Gz it hed, M=1, Kae 3, 0e4 tae A™ mod 4, =a mod t1 = 8 modlt = & Public Key Br Ope VAN =. fatdls An Say Paterate ey = 434 a Enenupsion. ak 6 Random indeqen Y= 4 Ke (Yay moa gq = 3* modll= (Cat rmodtt (mod UD? mod 1 = 4 C4= kX moda, = artmodtt © =o mod tl= 5 : CR = Neto mod ge 412 mod tt = as rmed le & Cipher deck = (5/64 | Decryption om | Planters , T= C2.( C1 tenays mod 4, | = 6(8°9) mod Ut | = o(BedD mod tL = 182 moa It = 1 28 Die: Wenany Key Exch e See Here Kay Eaernge er | The pespose of Shit algorithm & do enable awe eas | do Seeuneley eocchange a key ahak Can dher be Used for peers enenypaton OF USAGES | There ane devo gtobat UREA eon 9 OSE ire HL and an bodega of (premise sas Oboe, Cohe | These numbers are Verpeom ae aloe dinem, tobe wet | Using shis Sysleno- Hens cach ese coreates thein kay sno 0M i ne x | Key quaercsion. CAued | G Alice generates a nando number XA (private key) | GH Yq = XA mod 4, (Public Key > (iti This YA Is Sent to users B or Bob Key quoenation. (Bob) ti A suandom nundber , XB (Bob's pruiuacte Key > CD Yy = KB mnod 9, CWO This Ye iS Seat do user Alice Ones paion Us * is Seyramedouic ™ Now Calculates a Seenek | kK < 4 Key, put key Sele Kee thom thaia. pew xX K= C¥8) mod 9, Now B Ccaleutodes oO Socmet ke wn priweade keny anc publce Wher mona dine Ke Cyan"? modo, | 4¢ Ace and Bob Subsequentty, ‘i . jarie ahe San key as betrmre Ommunicare , Stroy esill K= (4% )™ mod a, es xe x Col mod an’) ee ay eye mod a, age x ~—| = A mod a, =e kA) LEP = nea, A es x 1 = Ce ™ mod a, 7% moa a, . | = €¥A0%? moda. = i £ | Se 4 |_| Kix used as session key ir prtirate ley enenypston Shure between Alice and Bob - gl 4 “> Je dhe attacker needs Xa or Xp dhey musk sotire diserede 'ogorishre Fa Q-= 383 5. XA a1, Xp= 233 ,X= 3 4 Ups &™* moda, = 3" mod 368) = 40 Ye = 3% & *® modg, = 3 mod 353 84d Ci Ke Ye™ moaq, = 248 mod 865= 16 S mod 363 = 160 wey k= YA™? moda, = 40° “Ke| Man fp the middle addacke A Cornmen. ype of Secu addack do cows on the Convrunricattor USES The aadack Jakes place In beter Movoing the users adiacken JO tater do Fe thar alloowrs adlackens beteveen too een. eve Users 5 nuersation without permission eae Aue % Bob ane hauing ConuersaktOry > Paral, do eauescaop on the Convrensection bey of usens, hence tho Name man by | also Pum Pass could dell Alice aad he ahead she wwas Ale: Thet would lead Alice 40 | Speing do Bob, while actually suveating hen poarch of ah, | conversation 2© Darth: Darth Coutd shin gather | inteemation Grom dus, alien the Mesponse ard Pry dhe Message along to Bob Cwho ahinks he’s dalkirg so Aiee’) As a vuscilt Darth ts able do hijack thew Coneiensatton, Man ib dhe middle occ in Dette Hellman key exchir| cakes place auruing txchange of public keys, iad mais e | attacker “eapduane ah both keys ark reco Yaltzes of | Kays are Share usidh let dine users | Scilbsequent encmuptecl messages aore mead and modi jby addacker. Ther send do dhe suspective User. Using 2 was Bob and dell Bob beotieve shyt | addack, arlocken Puna and moolitey mosage ant ged he benefits. of User Communication | Seleck Xpr and Xpa. Seeret to conuersaction we? | | Ypr = oeXr, =~ i ee Dont | Nice Kauce = CYA ?* med 4, “pa = aX medg = Seared Key 40 Conversation esr ld A Keb = yp) XPt Yoa “A Ae YEP med Yo | \ ¥ / YA Ye ‘ MM | (i) f Selous! a0 ‘ a. YA = of XA ‘cleek Xp x med An YB = 08 mod qn ass. We Cannok easily detect man - tr She attack, So Wwe at prcverst man in dhe middle allack, betane Commune oo a | se Elipdie Curve Creptogmaphy (Ecc) TAL A: majar (ssoe With dhe Use of wrirrade Ke, Jahe Sme of murobens eused and hence keys betng sdarud - Hence We use Ecc, th other ¢, agal Security TOKA &Mall Key site ,aeruby Peducing proces ing Quenbead Eltgpace Cosme ts defined by an |stand y fan Corpse qoraphy the, en Jane susdoucded “sy élements in 4 yplography x | CAYAKON tn R pa Uasiable arables and toeYicieris assOcialierely » commutadicr’iy , kaiclence oF (density ant jINleASe srtomend Properties > | Constden adhe Cubce etlepace Cane of thy fos SF = x4 art b Me Tt thae polos On arr ellipdtte cuunvee Iie ona saraight Une Thurnsam és Zeno: . a Renplognaphy ue use Ecc, 45 Fy (abd tohene a, 15 % Prime number + Fltipare Curve Diefle Hellman eoechang ¢ ee p Kau coche: | Global Putte element Seleck an tinleger 4.) which ty ether a prime numben, onan daeqen of the Gam a Scleed a Conve Ealasbd and G a point on che tury G= (tr 4d User A Key. geoeraston: ean, wg a GY Select ode Key Na whear na

You might also like