SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Cryptography -
Asymmetric
Encryption
5 minutes series
Abdul Manaf Vellakodath
Security Architect
Asymmetric Encryption - Overview
● There are many different Asymmetric
implementations around. Some of them
are:
○ Diffie-Hellman (Key Exchange)
○ RSA
○ Elliptic Curve
● RSA is the most popular commercially
used Asymmetric Algorithm from three
cryptographers:
○ Rivest
○ Shamir
● Diffie Hellman is a Key Exchange
mechanism
● RSA is also called Public Key encryption
due to its nature of keys
Encryption and Decryption using Asymmetric
Algorithm
Asymmetric
Key
Encryption
Algorithm
Plain
Text!
s8sdfdvsja9
qj7*jsdsf$ks
df.8sd*asfyl
dywkkeykk
Ciphertext
Decryption
Algorithm
Plain
Text!
Asymmetric
Key
< One key to encrypt and the other Key to
Decrypt>
RSA - Basic Premises
● The data encrypted with a Private Key can
only be decrypted with its corresponding
Public Key.
● The data encrypted with a Public Key can
only be decrypted with its corresponding
Private Key.
● The Sender has a Key called Private Key.
This key is secret. It is never transferred
out of his computer. Note: If someone
finds this key, he could impersonate the
sender.
● Everyone else, who wants to
communicate with the Sender is given a
key called the Public Key. Note: This key
is generated as part of the earlier Private
Key generation process.
● The Private and Public Keys comes in a
pair when we talk about RSA Public Key
encryption.
RSA Public Key Encryption - Features
● Integrity
○ Say:
■ M is the Message
■ MDh1 is the Message Digest (hash)
■ MDe is the encrypted (with the
Sender’s Private Key) form of MD
○ Send M and MDe to the Receiver.
○ Receiver will:
■ Decrypts the MDe to find the MDh1.
■ Generate MDh2 again from M.
● Confidentiality: Use the Public Key to
encrypt the message and send it to the
user. Receiver uses his Private Key
(secret) to decrypt the information, thus
passing information secretly, achieving
confidentiality.
● Non-repudiation: IF the Sender uses his
Private Key to encrypt a message, anyone
who has the respective Public Key could
decrypt his message. Since the Sender is
the only one possessing the Private Key,
only the Sender could have sent the
message. This is called non-repudiation.
RSA Encryption Algorithm
● Let us say:
○ Message = 65 (we want to encrypt this)
○ Public Key (n = 3233, e = 17)
○ Private Key (d = 2753)
● Encryption function:
i.e.
● Decryption function:
i.e.
Note: The encryption using the Private Key s
reversible using the Public Key. The reverse is
● Refer the following link to understand
how the RSA Keys are generated:
http://www.slideshare.net/AbdulManafV
ellakodat/cryptography-simplified-key-
generation-asymmetric-keys

Weitere ähnliche Inhalte

Was ist angesagt?

Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
Amit Debnath
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
Digital signature
Digital signatureDigital signature
Digital signature
Sadhana28
 

Was ist angesagt? (20)

Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Ch9
Ch9Ch9
Ch9
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography and RSA algorithm
Cryptography and RSA algorithmCryptography and RSA algorithm
Cryptography and RSA algorithm
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
introduction to cryptography
introduction to cryptographyintroduction to cryptography
introduction to cryptography
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms Overview(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms Overview
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
Digital signature
Digital signatureDigital signature
Digital signature
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
rsa-1
rsa-1rsa-1
rsa-1
 

Andere mochten auch

Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Java Symmetric
Java SymmetricJava Symmetric
Java Symmetric
phanleson
 
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standard
tarekiceiuk
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
Mecheko Sha
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 
Reading_Lesson 7 Explicit and Implicit Claims in a Text
Reading_Lesson 7 Explicit and Implicit Claims in a TextReading_Lesson 7 Explicit and Implicit Claims in a Text
Reading_Lesson 7 Explicit and Implicit Claims in a Text
Tine Lachica
 

Andere mochten auch (16)

Cryptography - Simplified - Symmetric Encryption
Cryptography - Simplified - Symmetric EncryptionCryptography - Simplified - Symmetric Encryption
Cryptography - Simplified - Symmetric Encryption
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Java Symmetric
Java SymmetricJava Symmetric
Java Symmetric
 
Blowfish Cryptosystem
Blowfish Cryptosystem Blowfish Cryptosystem
Blowfish Cryptosystem
 
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standard
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Reading_Lesson 7 Explicit and Implicit Claims in a Text
Reading_Lesson 7 Explicit and Implicit Claims in a TextReading_Lesson 7 Explicit and Implicit Claims in a Text
Reading_Lesson 7 Explicit and Implicit Claims in a Text
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
DES
DESDES
DES
 
Cryptography
CryptographyCryptography
Cryptography
 
PPT - Powerful Presentation Techniques
PPT - Powerful Presentation TechniquesPPT - Powerful Presentation Techniques
PPT - Powerful Presentation Techniques
 

Ähnlich wie Cryptography - Simplified - Asymmetric Encryption

Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
 

Ähnlich wie Cryptography - Simplified - Asymmetric Encryption (20)

Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
 
Pooguzhali
PooguzhaliPooguzhali
Pooguzhali
 
RSA
RSARSA
RSA
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
 
CNS.ppt
CNS.pptCNS.ppt
CNS.ppt
 
Intro to Cryptography
Intro to CryptographyIntro to Cryptography
Intro to Cryptography
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Rsa
RsaRsa
Rsa
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
Cryptography 101
Cryptography 101Cryptography 101
Cryptography 101
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
PresentationonCRYPTOGRAPHY.pptx
PresentationonCRYPTOGRAPHY.pptxPresentationonCRYPTOGRAPHY.pptx
PresentationonCRYPTOGRAPHY.pptx
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
 
Rsa
RsaRsa
Rsa
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Cryptography - Simplified - Asymmetric Encryption

  • 1. Cryptography - Asymmetric Encryption 5 minutes series Abdul Manaf Vellakodath Security Architect
  • 2. Asymmetric Encryption - Overview ● There are many different Asymmetric implementations around. Some of them are: ○ Diffie-Hellman (Key Exchange) ○ RSA ○ Elliptic Curve ● RSA is the most popular commercially used Asymmetric Algorithm from three cryptographers: ○ Rivest ○ Shamir ● Diffie Hellman is a Key Exchange mechanism ● RSA is also called Public Key encryption due to its nature of keys
  • 3. Encryption and Decryption using Asymmetric Algorithm Asymmetric Key Encryption Algorithm Plain Text! s8sdfdvsja9 qj7*jsdsf$ks df.8sd*asfyl dywkkeykk Ciphertext Decryption Algorithm Plain Text! Asymmetric Key < One key to encrypt and the other Key to Decrypt>
  • 4. RSA - Basic Premises ● The data encrypted with a Private Key can only be decrypted with its corresponding Public Key. ● The data encrypted with a Public Key can only be decrypted with its corresponding Private Key. ● The Sender has a Key called Private Key. This key is secret. It is never transferred out of his computer. Note: If someone finds this key, he could impersonate the sender. ● Everyone else, who wants to communicate with the Sender is given a key called the Public Key. Note: This key is generated as part of the earlier Private Key generation process. ● The Private and Public Keys comes in a pair when we talk about RSA Public Key encryption.
  • 5. RSA Public Key Encryption - Features ● Integrity ○ Say: ■ M is the Message ■ MDh1 is the Message Digest (hash) ■ MDe is the encrypted (with the Sender’s Private Key) form of MD ○ Send M and MDe to the Receiver. ○ Receiver will: ■ Decrypts the MDe to find the MDh1. ■ Generate MDh2 again from M. ● Confidentiality: Use the Public Key to encrypt the message and send it to the user. Receiver uses his Private Key (secret) to decrypt the information, thus passing information secretly, achieving confidentiality. ● Non-repudiation: IF the Sender uses his Private Key to encrypt a message, anyone who has the respective Public Key could decrypt his message. Since the Sender is the only one possessing the Private Key, only the Sender could have sent the message. This is called non-repudiation.
  • 6. RSA Encryption Algorithm ● Let us say: ○ Message = 65 (we want to encrypt this) ○ Public Key (n = 3233, e = 17) ○ Private Key (d = 2753) ● Encryption function: i.e. ● Decryption function: i.e. Note: The encryption using the Private Key s reversible using the Public Key. The reverse is ● Refer the following link to understand how the RSA Keys are generated: http://www.slideshare.net/AbdulManafV ellakodat/cryptography-simplified-key- generation-asymmetric-keys