UNIT - 3
UNIT - 3
Public key cryptography, also known as asymmetric cryptography, is a cryptographic system that
uses pairs of keys: a public key, which can be freely distributed, and a private key, which is kept
secret. Public key cryptography enables secure communication and digital signatures without
the need for a shared secret key between the communicating parties. One of the most widely
used public key cryptographic algorithms is RSA (Rivest-Shamir-Adleman).
1. Key Generation:
• RSA involves generating a pair of cryptographic keys: a public key and a private
key.
• The keys are generated using mathematical algorithms that involve selecting
large prime numbers and performing various mathematical operations.
2. Public Key:
• The public key is used for encryption and verification. It can be freely distributed
to anyone who wishes to communicate securely with the owner of the key.
• The public key consists of two components: the modulus (N) and the public
exponent (e). The modulus is the product of two large prime numbers, and the
public exponent is typically a small prime number, such as 65537 (2^16 + 1).
3. Private Key:
• The private key is kept secret and is used for decryption and signing. Only the
owner of the private key should have access to it.
• The private key consists of two components: the modulus (N) and the private
exponent (d). The private exponent is calculated using modular arithmetic and is
related to the public exponent and other parameters.
4. Encryption:
5. Decryption:
• To decrypt a ciphertext encrypted with RSA, the ciphertext is raised to the power
of the private exponent modulo the modulus.
• The result of this operation is the original plaintext message.
6. Digital Signatures:
• RSA can also be used for digital signatures, where the private key is used to sign
a message, and the public key is used to verify the signature.
• To sign a message, the message is hashed, and then the hash value is encrypted
with the private key. The resulting ciphertext is the digital signature.
• To verify the signature, the recipient decrypts the signature using the public key,
hashes the original message, and compares the resulting hash value with the
decrypted signature.
RSA Algorithm, Key Management and other Public Key Cryptosystems Key Management
The RSA algorithm, a cornerstone of public-key cryptography, relies on the use of asymmetric
key pairs: a public key and a private key. Here's an overview of RSA, key management, and other
public-key cryptosystems' key management:
1. RSA Algorithm:
• Encryption:
• The sender encrypts the plaintext message M using the recipient's public
key (N, e) to obtain the ciphertext C = M^e mod N.
• Decryption:
• The recipient decrypts the ciphertext C using their private key (N, d) to
obtain the original plaintext message M = C^d mod N.
2. Key Management:
• Key Generation:
• Key Distribution:
• Key Storage:
• Key Revocation:
• If a private key is compromised or lost, it should be revoked and replaced
with a new key pair.
• Key revocation mechanisms, such as certificate revocation lists (CRLs) or
online certificate status protocol (OCSP), can be used to inform users
about revoked keys.
In summary, key management is a critical aspect of public key cryptography, ensuring the secure
generation, distribution, storage, and revocation of cryptographic keys to maintain the
confidentiality, integrity, and authenticity of digital communications and transactions
The Diffie-Hellman key exchange (DH) and elliptic curve arithmetic are two important concepts in
modern cryptography, particularly in the field of public-key cryptography.
In summary, Diffie-Hellman key exchange and elliptic curve arithmetic are two important concepts in
modern cryptography, providing secure key exchange and efficient public-key encryption and digital
signatures, respectively. They are widely used in various cryptographic protocols and systems to ensure
the confidentiality, integrity, and authenticity of digital communications
Elliptic Curve Cryptography (ECC) is a type of public-key cryptography that relies on the
algebraic structure of elliptic curves over finite fields to provide security for various
cryptographic applications, including encryption, digital signatures, and key exchange protocols.
ECC offers several advantages over other public-key cryptosystems, such as RSA, including
smaller key sizes, faster computation, and strong security guarantees.
Here are the key components and principles of elliptic curve cryptography:
1. Elliptic Curves:
• Points on an elliptic curve are pairs of coordinates (,)(x,y) that satisfy the curve
equation.
• The set of points on an elliptic curve, including a special point at infinity, forms an
abelian group under the group operation defined on the curve.
3. Scalar Multiplication:
4. Key Generation:
• In ECC, public and private keys are generated as pairs of points on the elliptic
curve.
• The private key is a randomly chosen integer d (typically within a certain range),
and the corresponding public key is the result of multiplying a fixed base point
on the curve by d.
6. Security:
• The security of ECC is based on the difficulty of the elliptic curve discrete
logarithm problem, which involves finding k given kP for a randomly chosen
point P and integer k.
• ECC offers strong security with much smaller key sizes compared to other public-
key cryptosystems, making it particularly suitable for constrained environments
such as mobile devices and embedded systems.
Elliptic curve cryptography has become increasingly popular in recent years due to its efficiency
and strong security properties. It is widely used in various cryptographic protocols and
applications, including SSL/TLS for secure communication over the Internet, digital signatures
for authentication and integrity verification, and secure key exchange for establishing secure
channels between parties.
1. Pseudorandomness:
2. Seed:
3. Deterministic Algorithm:
• Pseudorandom number generators have a finite period, after which the sequence
of numbers repeats.
• The length of the period depends on the size of the internal state of the PRNG
and the quality of the underlying algorithm.
6. Entropy Sources: