Professional Documents
Culture Documents
Module 12.4
Ravi Sandhu
© Ravi Sandhu
World-Leading Research with Real-World Impact!
1
Two Special Case of ZN *
© Ravi Sandhu
World-Leading Research with Real-World Impact!
2
RSA Key Generation
same as Algorithm 9.47
slide 12, module 9.3
Computing d from e, N
is one strategy for A
There may be others
© Ravi Sandhu
World-Leading Research with Real-World Impact!
4
Plain (Naïve) RSA
Public Key Encryption
© Ravi Sandhu
World-Leading Research with Real-World Impact!
5
Plain (Naïve) RSA
Public Key Encryption
© Ravi Sandhu
World-Leading Research with Real-World Impact!
6
Attacks on Plain (Naïve) RSA
Public Key Encryption
© Ravi Sandhu
World-Leading Research with Real-World Impact!
7
Attacks on Plain (Naïve) RSA
Public Key Encryption
© Ravi Sandhu
World-Leading Research with Real-World Impact!
8
Optimal Asymmetric
Encryption Padding
number of bits
shown in blue l+k k
l+k k
l + 2k < ∥N∥
G, H : hash functions
2 round Feistel network
(slide 14, module 7.2)
k l+k
k l+k
© Ravi Sandhu
World-Leading Research with Real-World Impact!
9
RSA-OAEP Encryption
© Ravi Sandhu
World-Leading Research with Real-World Impact!
10
RSA-OAEP Encryption
© Ravi Sandhu
World-Leading Research with Real-World Impact!
11
RSA-OAEP Encryption
© Ravi Sandhu
World-Leading Research with Real-World Impact!
12
RSA-OAEP Encryption
If attacker has a
decryption oracle that
distinguishes these 2
cases
then attacker can
recover m in ≈ ∥N∥
queries
© Ravi Sandhu
World-Leading Research with Real-World Impact!
13