UNIT 3 Vol1.0
UNIT 3 Vol1.0
• Key Pair: Consists of a public key for encryption and a private key for decryption
• Widespread Use: Essential for secure internet transactions, email encryption, and
digital signatures
Key Pair Generation
• Unique Pairs: Generated using complex mathematical algorithms
• Security and Size: Larger key sizes offer higher security levels
Encryption and Decryption
• Encrypt with Public Key: Ensures that only the intended recipient can
decrypt
• Decrypt with Private Key: The corresponding private key decrypts the
message
• Confidentiality: No one except the holder of the private key can read the
message
• Process Efficiency: Though computationally intensive, modern algorithms
optimize these processes
• Secure Channels: Enables the creation of secure channels over public
networks
Digital Signatures
• Signing with Private Key: The sender signs the message/document,
verifying authenticity
• Verification with Public Key: Anyone can verify the signature with the
sender’s public key
• Integrity: Ensures the message has not been altered
• Non-repudiation: The sender cannot deny the authenticity of the signed
message
• Legal and Financial Documents: Widely used for contracts, transactions,
and document verification
Key Management
• Public Key Accessibility: Should be easily accessible to anyone who might need it
• Private Key Security: Requires strong security measures, often involving hardware tokens
or encrypted storage
• Revocation and Expiry: Mechanisms must be in place to revoke or expire keys if
compromised or no longer used
• Key Recovery: In some systems, key recovery mechanisms are necessary to access data if
a private key is lost
• Policy and Regulation: Compliance with standards and regulations ensures
trustworthiness of the public key infrastructure
[2]RSA Algorithm
Introduction to RSA Algorithm
• Title: RSA Encryption Algorithm
• Developed By: Ron Rivest, Adi Shamir, Leonard Adleman, 1977
• Purpose: Secure data transmission through public-key cryptography
• Achievements: Widely adopted, Turing Award 2002
• Key Principle: Based on the mathematical difficulty of factoring large
primes
How RSA Works - Overview
• Two Key Pairs: Public key (e,n) and Private key (d,n)
• Key Generation: Use of large, random prime numbers p and q
• Modulus n: Calculated as n=p×q
• Public Exponent e: Small prime, coprime to
e= (p−1)×(q−1)
• Private Exponent d: Modular inverse of e modulo (p−1)×(q−1)
p = cd mod n
Step 4: A plaintext message m is encrypted using public key <e, n>. To find ciphertext from the plain text following formula is used to get ciphertext C.
To find ciphertext from the plain text following formula is used to get ciphertext C.
C = me mod n
C = 97 mod 77
C = 37
Step 5: The private key is <d, n>. To determine the private key, we use the following formula d such that:
De mod {(p - 1) x (q - 1)} = 1
7d mod 60 = 1, which gives d = 43
The private key is <d, n> = (43, 77)
Step 6: A ciphertext message c is decrypted using private key <d, n>. To calculate plain text m from the ciphertext c following formula is used to get plain text m.
m = cd mod n
m = 3743 mod 77
m=9
In this example, Plain text = 9 and the ciphertext = 37
Advantages and Challenges
• Strong Security: Based on the challenge of prime factorization