Documente Academic
Documente Profesional
Documente Cultură
3rd Class
22 4 2018
1
Public Key Model
2
Public Key Encryption
3
Public Key Signature
4
Public-Key Cryptanalysis
Brute-force attack (Try all possible keys)
Derive private key from public key
– Try to find the relationship between the public key
and the private key and compute the private key
from the public one.
Probable-message attack
– The public key is known.
– Encrypt all possible messages
– Try to find a match between the ciphertext and one
of the encrypted messages.
– Example: Prof. sends encrypted of letter grades to his
students based on their public key.
5
RSA (Rivest, Shamir, Adleman)
See: R. Rivest, A. Shamir, and L. Adleman, "A
Method for Obtaining Digital Signatures and
Public-Key Cryptosystems", CACM 21, pp.
120--126, Feb. 1978
The first public key encryption and signature system
Supports both public key encryption and digital
signature.
• Theoretical basis:
Factorization of large numbers is hard.
Variable key length (usually 1024 bits).
Variable plaintext block size.
Plaintext must be “smaller” than the key.
Ciphertext block size is the same length as the
key. 6
The RSA Algorithm
To generate a key pair:
– Pick large primes p and q (do not
disclose them)
– Let n = p*q
– For the public key, choose e that is
relatively prime to ø(n)=(p-1)(q-1).
public key = <e,n>
– For private key, find (d ) that is the
multiplicative inverse of e mod ø(n), i.e.,
e*d
7
Using RSA