Professional Documents
Culture Documents
MMP Assymmetirc Cryptography PowerPoint Slides
MMP Assymmetirc Cryptography PowerPoint Slides
Cryptography
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1
Chapter 10
Objectives
To distinguish between two cryptosystems:
symmetric-key and asymmetric-key
To introduce trapdoor one-way functions and their
use in asymmetric-key cryptosystems
To discuss the RSA cryptosystem
To discuss the Rabin cryptosystem
10.2
10-1 INTRODUCTION
Note
Symmetric-key cryptography is based on sharing secrecy;
asymmetric-key cryptography is based on personal secrecy.
10.4
10.1.1 Keys
10.5
10.1.2 General Idea
10.6
10.1.2 Continued
Plaintext/Ciphertext
Unlike in symmetric-key cryptography, plaintext and
ciphertext are treated as integers in asymmetric-key
cryptography.
Encryption/Decryption
C = f (Kpublic , P) P = g(Kprivate , C)
10.7
10.1.3 Need for Both
10.8
10.1.4 Trapdoor One-Way Function
Functions
10.9
10.1.4 Continued
One-Way Function (OWF)
1. f is easy to compute.
2. f −1 is difficult to compute.
10.10
10.1.4 Continued
Example 10. 1
When n is large, n = p × q is a one-way function. Given p and
q , it is always easy to calculate n ; given n, it is very difficult to
compute p and q. This is the factorization problem.
Example 10. 2
When n is large, the function y = xk mod n is a trapdoor one-
way function. Given x, k, and n, it is easy to calculate y. Given
y, k, and n, it is very difficult to calculate x. This is the discrete
logarithm problem. However, if we know the trapdoor, k′ such
that k × k ′ = 1 mod f(n), we can use x = yk′ mod n to find x.
10.11
10-2 RSA CRYPTOSYSTEM
10.13
10.2.2 Procedure
10.14
10.2.2 Continued
10.15
10.2.2 Continued
10.16
10.2.2 Continued
Encryption
10.17
10.2.2 Continued
Decryption
10.18
10.2.2 Continued
Proof of RSA
10.19
10.2.3 Some Trivial Examples
Example 10. 5
10.20
10.2.3 Some Trivial Examples
Example 10. 6
10.21
10.2.3 Some Trivial Examples
Example 10. 7
10.23
10.2.4 Attacks on RSA
10.24
10.2.6 OAEP
Figure 10.9 Optimal asymmetric encryption padding (OAEP)
10.25
10.2.6 Continued
Example 10. 8
10.26
10.2.6 Continued
Example 10. 8 Continued
10.27
10.2.6 Continued
Example 10. 8 Continued
10.28
10.2.6 Continued
Example 10. 8 Continued
10.29
10.2.6 Continued
Example 10. 8 Continued
10.30
10-3 RABIN CRYPTOSYSTEM
10.32
10.3.1 Procedure
Key Generation
10.33
10.3.1 Continued
Encryption
10.34
10.3.1 Continued
Decryption
Note
The Rabin cryptosystem is not deterministic:
Decryption creates four plaintexts.
10.35
10.3.1 Continued
Example 10. 9
10.36
10.3.1 Continued
Example 10. 9
10.37
15-3 SYMMETRIC-KEY AGREEMENT
15.38
15.3.1 Diffie-Hellman Key Agreement
15.39
15.3.1 Continued
Note
The symmetric (shared) key in the Diffie-Hellman
method is K = gxy mod p.
15.40
15.3.1 Continued
Example 15.1
Let us give a trivial example to make the procedure clear. Our
example uses small numbers, but note that in a real situation, the
numbers are very large. Assume that g = 7 and p = 23. The steps
are as follows:
1. Alice chooses x = 3 and calculates R1 = 73 mod 23 = 21.
2. Bob chooses y = 6 and calculates R2 = 76 mod 23 = 4.
3. Alice sends the number 21 to Bob.
4. Bob sends the number 4 to Alice.
5. Alice calculates the symmetric key K = 43 mod 23 = 18.
6. Bob calculates the symmetric key K = 216 mod 23 = 18.
7. The value of K is the same for both Alice and Bob;
gxy mod p = 718 mod 35 = 18.
15.41
15.3.1 Continued
Example 15.2
15.42
15.3.1 Continued
Example 15.2 Continued
15.43
15.3.1 Continued
15.44
15.3.1 Continued
Security of Diffie-Hellman
Man-in-the-Middle Attack
15.45
15.3.1 Continued
Figure 15.11 Man-in-the-middle attack
15.46
15.3.2 Station-to-Station Key Agreement
Figure 15.12 Station-to-station key agreement method
15.47