Professional Documents
Culture Documents
FALLSEM2023-24 ECE4013 TH VL2023240102926 2023-10-06 Reference-Material-I
FALLSEM2023-24 ECE4013 TH VL2023240102926 2023-10-06 Reference-Material-I
Cryptography
10.1
Objectives
To distinguish between two cryptosystems:
symmetric-key and asymmetric-key
To discuss the RSA cryptosystem
10.2
10-1 INTRODUCTION
10.3
10-1 INTRODUCTION
Note
Symmetric-key cryptography is based on sharing secrecy;
asymmetric-key cryptography is based on personal secrecy.
10.4
10.1.1 Keys
10.5
10.1.2 General Idea
10.6
10.1.2 Continued
Plaintext/Ciphertext
Unlike in symmetric-key cryptography, plaintext and
ciphertext are treated as integers in asymmetric-key
cryptography.
Encryption/Decryption
C = f (Kpublic , P) P = g(Kprivate , C)
10.7
10.1.3 Need for Both
10.8
10-2 RSA CRYPTOSYSTEM
10.9
RSA Algorithm
Invented in 1978 by Ron Rivest, Adi
Shamir and Leonard Adleman
Published as R L Rivest, A Shamir, L Adleman,
"On Digital Signatures and Public Key
Cryptosystems", Communications of the ACM,
vol 21 no 2, pp120-126, Feb 1978
10
RSA Public Key Crypto System
Key generation:
1. Select 2 large prime numbers of about the
same size, p and q
Typically each p, q has between 512 and 2048 bits
2. Compute n = pq, and (n) = (q-1)(p-1)
3. Select e, 1<e< (n), s.t. gcd(e, (n)) = 1
Typically e=3 or e=65537
4. Compute d, 1< d< (n) s.t. ed 1 mod (n)
Knowing (n), d easy to compute.
Public key: (e, n)
Private key: d
11
10.2.1 Introduction
10.12
10.2.2 Procedure
10.13