Professional Documents
Culture Documents
Cryptography
Informal definition
can be evaluated in
polynomial time
Principles of asymmetric cryptography
Two popular one-way functions used in PKE
Integer factorization problems
Given two large prime numbers, it easy to compute the product but very difficult to factorize
the given product
discrete logarithm product
Practical aspects of public key cryptography
Security mechanisms – main functions of PK cryptography
Key establishment
used to establish secret keys over an insecure channel
Nonrepudiation
providing nonrepudiation and message integrity
Identification
can identify entities using challenge-and-response protocols together
with digital signatures
Encryption
Practical aspects of public key cryptography
Public key algorithms have a major drawback
they are computationally intensive i.e. extremely slow
many symmetric algorithms exists that are 100x to 1000x faster than PK algorithms
PK algorithms are rarely used for actual encryption of data
In practice , hybrid systems are used
Use PK to exchange keys and provide other security mechanisms
Use symmetric algorithms for actual encryption
One last problem
How to prove authenticity of public keys
Using Public Key Encryption for Key Exchange
Important public key algorithms
only 3 major families of PK algorithms that are of practical relevance
Integer factorization schemes
e.g. RSA
Discrete Logarithm Schemes
based on discrete logarithm problem in finite fields
e.g. Diffie-Hellman Key Exchange, El gamal, Digital Signature Algorithms (DSA)
Elliptic Curve (EC) Schemes
a generalization of discrete log algorithm
e.g. Elliptic Curve Diffie-Hellman (ECDH) and ECDSA
NEXT
Number theory fundamentals
Euclidean Greatest Common Divisor Algorithm
Euler’s Phi Function
Fermat’s Little theorem