0% found this document useful (0 votes)
21 views

Symmetric Cryptography

- Symmetric cryptography uses the same key for encryption and decryption, with the sender encrypting with the key and algorithm and receiver decrypting with the same key and corresponding algorithm. - With public key cryptography, there are two keys - a public key used for encryption and a private key for decryption. The private key is kept by the receiver while the public key is available to all. - The RSA algorithm works by selecting two prime numbers to compute a modulus for encryption, with a private key also computed that allows decryption using mathematical properties, and while fast for encryption, factoring the modulus for decryption without the private key is mathematically difficult.

Uploaded by

vansha_mehra1990
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Symmetric Cryptography

- Symmetric cryptography uses the same key for encryption and decryption, with the sender encrypting with the key and algorithm and receiver decrypting with the same key and corresponding algorithm. - With public key cryptography, there are two keys - a public key used for encryption and a private key for decryption. The private key is kept by the receiver while the public key is available to all. - The RSA algorithm works by selecting two prime numbers to compute a modulus for encryption, with a private key also computed that allows decryption using mathematical properties, and while fast for encryption, factoring the modulus for decryption without the private key is mathematically difficult.

Uploaded by

vansha_mehra1990
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 10

Same key used by both parties Sender uses key and encryption algorithm for encrypting the data

a Receiver uses same key and corresponding decryption algorithm for decrypting the data

Symmetric Cryptography/ Private Key /Secret Key Encryption

Secret Key

Public key Encryption


There are two keys public key and private key Private key is kept by receiver Public key is announced to the public Sender uses public key to encrypt the message Receiver uses private key to decrypt the message

Public Key

Use a random process to select two large prime numbers P and Q. Compute the product M = P*Q. This number is called the modulus, and is made publicly available.
RSA currently recommends a modulus thats at least 768 bits long.

The RSA Encryption Algorithm

Also compute the Euler totient T = (P-1)*(Q-1). Keep this number (as well as P and Q)

RSA (continued)
Randomly choose a public key E that has no factors in common with T = (P-1)*(Q-1). Compute a private key D so that E*D leaves a remainder of 1 when divided by T.
We say E*D is congruent to 1 modulo T

Note that D is easy to compute only if one knows the value of T.

RSA (continued)
If N is any number that is not divisible by M, then dividing NE*D by M and taking the remainder yields the original value N.
This is a relatively deep mathematical theorem, which we can write as NE*D mod M = N.)

If N is a numeric encoding of a block of plaintext, the cyphertext is C = NE mod M. Then CD mod M = (NE)D mod M

Why RSA Works


Multiplying P by Q is easy: the number of operations depends on the number of bits (number of digits) in P and Q. For example, multiplying two 384bit numbers takes approximately 3842 = 147,456 bit operations

Why RSA Works (2)


If one knows only M, finding P and Q is hard: in essence, the number of operations depends on the value of M.
The simplest method for factoring a 768-bit number takes about 2384 3.94 !10115 trial divisions. A more sophisticated methods takes about 285 3.87 ! 1025 trial divisions. A still more sophisticated method takes about 241 219,000,000,000

Why RSA Works (3)


No-one has found an really quick algorithm for factoring a large number M. No-one has proven that such a quick algorithm doesnt exist (or even that one is unlikely to exist). Peter Shor has devised a very fast factoring algorithm for a quantum computer, if anyone manages to build one.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy