RSA-W7(rsa) d1-d2

Fahad Layth
Fahad LaythMaster Student and Researcher um Universiti Putra Malaysia
Information Security I
By
Fahad Layth Malallah
Reference Books:
1. Introduction to Computer Security, by Matt Bishop.
2. Security in Computing, 4th Edition, by Charls P. Pfleeger.
3. Principle of Computer Security. 2nd edition, by Arthur.
4th grade, Computer Science
Cihan University
First Semester, 2014-2015.
Lecture-W7-D1-D2.
1
4-Cryptography
A- Definitions.
B-Encryption and Decryption Definition(Symmetric & Asymmetric).
C-Classical Cryptosystems.
1- Transposition Ciphers (Permutation):
- Shuffling Scheme.
2- Substitution Ciphers :
- Caesar’s Cipher.
-Vigenère Cipher.
-One-Time Pad.
D-Symmetric Cryptography :
-Data Encryption Standard (DES) Algorithm.
E- Asymmetric Cryptography (Public-Key Systems):
1-Basic on modular arithmetic, Number Theory.
2-Modular arithmetic inverse computation.
3- Al-Gamal Algorithm (ciphering & de-ciphering).
4-RSA Algorithm (ciphering & de-ciphering).
Summary- Exercises.
2
-Aim of this lecture:
Students will be familiar and able to secure information by using:
E- Asymmetric Cryptography (Public-Key Systems):
1-Basic on modular arithmetic, Number Theory.
2-Modular arithmetic inverse computation.
3- Al-Gamal Algorithm (ciphering & de-ciphering).
4-RSA Algorithm (ciphering & de-ciphering).
3
4- RSA Algorithm (ciphering & de-ciphering).
• Three scientist have invented a security algorithm named it by
first character of their names:
• Adleman the mathematician.
• Rivest and Shamir the computer scientists.
– Alice must create a Public Key, which she can publish so that Bob (and
everyone else) can use it to encrypt messages to her. Because the
public key is a one way function, it must be virtually impossible for
anybody to reverse it and decrypt Alice’s message.
– However, Alice needs to decrypt the messages being sent to her. She
must therefore have a Private Key, which allows her to reverse the
effect of the Public Key.
– There is a mathematical relation between the Public Key and Private
Key, but if the Public Key is known the ability to find the Private Key is
zero, even if the mathematical relation is known!!!
4
Hard Mathematical Problem
• The concept HMP is best understood as a
mathematical problem which is computationally
infeasible to solve.
• The HMP is proven mathematically.
• Among the concepts that are HMP that we have
seen are:
– DLP (Discrete Logarithm Problem).
– Integer Factorization.
MCS 1413 - CRYPTOGRAPHY 5
RSA Algorithm:
6
Ali:
1-Alie encrypts M by
using public keys (e, n)as:
Bob:
1- chooses secret primes p and q and
computes n=pq .
2- chooses an exponent e as:
gcd( e, [p-1 ]. [q-1])= 1
3- then, computes d as :
de= 1 mod (p-1)(q-1)
4- Bob makes (p,q,d) public and keeps
(e,n) secret keys, then send only the
public to Ali….
5-Bob decrypts by computing .
Procedures is : Ali want to send a Secret message M to Bob. So , Ali
will encrypt a M and Bob will decrypt the message. Bob should
create a private key to decryption.
.
RSA numerical Example 1:
Part A wants to send a message M to Part B. encrypt the message
m=10 and decrypt the cipher c by using asymmetric cryptosystem
RSA. Let p = 7 and q = 13 be the two primes.
Solution:
1- Part B must select n= pq. and e where: gcd(e, [p-1][q-1])
n = pq = 91 and (p − 1)(q − 1) = 72.
To find e : gcd(e,72)=1 :
Choose e. Let’s look among the primes.
• Try e = 2. gcd(2, 72) = 2 (does not work)
• Try e = 3. gcd(3, 72) = 3 (does not work)
• Try e = 5. gcd(5, 72) = 1 (it works)
We choose e = 5. (e,n) is the public key
2- Part B also must find d (private key) next slides… 7
RSA numerical Example 1: Continue…
2- Part B also must find d (private key) by :
d.e = 1 mod (p-1) (q-1)  d.e=1 mod (7-1) (13-1)
d. 5 = 1 mod (6 ) (12)  d.5 = 1 mod 72
Now, we find multiplication inverse for 5 mod 72.
inverse equation: 1= ax + by a=5, b=72  1= 5x + 72 y.
1= (5*29) + (-2 * 72) correct.
Inverse(5)= 29.
29 = 1 mod 72
d=29.
Private key is 29. this should be kept with Part B for decryption. 8
RSA numerical Example 1: Continue…
3- Now, Part B sends the public key (e,n) and keeps the private key
(p,q,d).
4- Now, Part A encrypt the message m=10 as:
9
82
91mod10
mod
5



C
C
nMC e
5- Now , Part B will decrypt the C by using the private key 29
10
91mod82
mod
29



m
m
nCm d
-Summary
-Encryption and Decryption of Asymmetric cryptography of RSA
have been illustrated with an example.
10
-Exercises:
1-On which hard mathematical problem does RSA base its security?
2- Explain the ciphering and deciphering operations of RSA.
3-Compare between Al-Gamal and RSA .
4- In RSA, the cipher-text C = 9. The public key is given by n = 143 and
e = 23. In the following, we will try to crack the system and to
determine the original message M.
(i) What parameters comprises the public key and what parameters
the private key?.
(ii) What steps are necessary to determine the private key from the
public key?.
(iii) Determine the private key for the given system.
(iv) What is the original message M?.
5- Given p = 19, q = 29, N = pq and e = 17, compute the private key d
corresponding to the RSA system.
11
-Exercises:
6- Local Area Network uses a public key infrastructure based on RSA
with public key n =pq=55 and e=7.
(i) Find the private key d. For RSA we have de= 1 mod (p-1)(q-1)
(ii) Find the corresponding message M for a cipher C = 3.
7- Consider a RSA public-key system where the public key consists of
n = pq = 143 and e = 71.
A: Find a number d such that ed = 1 modulo (p-1)(q -1).
B: Give the decryption function for RSA.
C: Decrypt the cipher C = 12.
8-Alice has published her RSA public keys as <N; e> = <91;5>, where
N is the known public number and e is her public key. Accordingly,
Bob sent her the cipher text 81. Find the corresponding message.
12
-Exercises:
1-On which hard mathematical problem does RSA base its security?
1-discrete Logarithm Problem.
2- Number factorization.
2- Explain the ciphering and deciphering operations of RSA.
It is available in the lecture documents (slide 6).
3-Compare between Al-Gamal and RSA .
13
RSA Al-Gamal
Depend on DLP, Number factorization Depend on DLP
Cipher text size is the same as the message
size
Cipher text size is the double of message
size
Public key (n,e), private key= p,q, d. public key g,p,A private key: a
4- In RSA, the cipher-text C = 9. The public key is given by n = 143 and
e = 23. In the following, we will try to crack the system and to
determine the original message M.
(i) What parameters comprises the public key and what parameters
the private key?.
(ii) What steps are necessary to determine the private key from the
public key?.
(iii) Determine the private key for the given system.
(iv) What is the original message M?.
Sol:
1-Public key : n=143, e= 23. private key is d. ( d.e= 1 mod (p-1)(q-1))
2- d.e= 1 mod (p-1) (q-1), how do we find p & q.
Divide n by sqrt(n). Sqrt(143)= 11.9
143/3
143/7
143/11= 13 ok. Now p=11, q= 13 14
Now p=11, q= 13
d.23 = 1 mod (11-1) (13-1)  23. d= 1 mod 120
Now compute the inverse as 1 =ax + by : a= 23, b= 120
X= 47, y= -9 , the inverse is 47, so d= 47.
3- Original message is M
http://www.cs.princeton.edu/~dsri/modular-inversion.html
5- Given p = 19, q = 29, N = pq and e = 17, compute the private key d
corresponding to the RSA system.
Sol:
d.e = 1 mod (p-1)( q-1)  d. 17= 1 mod (19-1) (29-1)
15
46
143mod9
mod
47



M
M
nCM d
http://www.cs.princeton.edu/~dsri/modular-inversion.html
5- Given p = 19, q = 29, N = pq and e = 17, compute the private key d
corresponding to the RSA system.
Sol:
d.e = 1 mod (p-1)( q-1)  d. 17= 1 mod (19-1) (29-1)
17. d = 1 mod 504
Now, compute the inverse of d as:
1 = ax + by : a= 17, b= 504.
1= 17 x + 504 y
Now, compute q from gcd (504,17), then compute x(s) and y(s).
Finally: x= 89, y= -3.
Accordingly, the inverse d = 89.
16
6- Local Area Network uses a public key infrastructure based on RSA
with public key n =pq=55 and e=7.
(i) Find the private key d. For RSA we have de= 1 mod (p-1)(q-1)
(ii) Find the corresponding message M for a cipher C = 3.
Sol:
1- d.e= 1 mod (p-1) (q-1)  we have to find p & q.
So p= 11, q=5.
-To compute d: d. 7 = 1 mod (11-1) (5-1)  7.d =1 mod 40
-to compute inverse : 1= ax + by as a = 7, b= 40
- Compute x & y , x=-17 ,y= 3 d= (-17*1 + 40) mod 40 d= 23 17
11555
3.18355
4.755



6- Local Area Network uses a public key infrastructure based on RSA
with public key n =pq=55 and e=7.
(i) Find the private key d. For RSA we have de= 1 mod (p-1)(q-1)
(ii) Find the corresponding message M for a cipher C = 3.
Sol:
-Compute x & y , x=-17 ,y= 3 d= (-17*1 + 40) mod 40 d= 23
2-
18
27
55mod3
mod
23



M
M
nCM d
7- Consider a RSA public-key system where the public key consists of
n = pq = 143 and e = 71.
A: Find a number d such that ed = 1 modulo (p-1)(q -1).
B: Give the decryption function for RSA.
C: Decrypt the cipher C = 12.
Sol:
A- n=143=pq=11.13  d ed=1 mod (p-1)(q-1)
71. d = 1 mod (11-1)(13-1).  71 d = 1 mod 120
to compute the inverse 1= ax + by: a=71, b=120
So, x= -49 , y= 29.
d= 1 * -49 mod 120  d=71.
B-
C-
19
nCM d
mod
73
143mod1271


M
M
8-Alice has published her RSA public keys as <N; e> = <91;5>, where
N is the known public number and e is her public key. Accordingly,
Bob sent her the cipher text 81. Find the corresponding message.
Sol:
In order to find the message , we have to firstly find the private key
which is d.
d.e =1 mod (p-1) (q-1)  now we have to find q & p from n where
n=pq.
91= 7 . 13= p.q.
d.5 = 1 mod (7-1) (13-1)  5.d = 1 mod 72  by finding the inverse
so: d=29.
Now, apply the decryption rule 
20
5
91mod81
mod
29



M
M
nCM d
1 von 20

Recomendados

RSA Algorithm von
RSA AlgorithmRSA Algorithm
RSA AlgorithmSrinadh Muvva
802 views14 Folien
RSA von
RSARSA
RSAbansidhar11
208 views21 Folien
Public Key Cryptography and RSA algorithm von
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
16.2K views27 Folien
Public Key Cryptography von
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
33.2K views188 Folien
RSA Algorithm von
RSA AlgorithmRSA Algorithm
RSA Algorithmchauhankapil
2K views8 Folien
RSA ALGORITHM von
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHMSathish Kumar
9.4K views19 Folien

Más contenido relacionado

Was ist angesagt?

The Diffie-Hellman Algorithm von
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmJay Nagar
3.9K views16 Folien
RSA ALGORITHM von
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHMShashank Shetty
51.1K views28 Folien
Public Key Cryptosystem von
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
16.5K views19 Folien
The rsa algorithm von
The rsa algorithmThe rsa algorithm
The rsa algorithmKomal Singh
12.3K views31 Folien
Transport Layer Security von
Transport Layer SecurityTransport Layer Security
Transport Layer SecurityHuda Seyam
336 views17 Folien
Homomorphic Encryption von
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionVictor Pereira
4.3K views20 Folien

Was ist angesagt?(20)

The Diffie-Hellman Algorithm von Jay Nagar
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
Jay Nagar3.9K views
Public Key Cryptosystem von Devakumar Kp
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp16.5K views
The rsa algorithm von Komal Singh
The rsa algorithmThe rsa algorithm
The rsa algorithm
Komal Singh12.3K views
Transport Layer Security von Huda Seyam
Transport Layer SecurityTransport Layer Security
Transport Layer Security
Huda Seyam336 views
Cryptanalysis Project Report von shahparin
Cryptanalysis Project ReportCryptanalysis Project Report
Cryptanalysis Project Report
shahparin4.1K views
Elgamal Digital Signature von Sou Jana
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital Signature
Sou Jana320 views
6. cryptography von 7wounders
6. cryptography6. cryptography
6. cryptography
7wounders5.6K views
Digital Signature Standard von Sou Jana
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
Sou Jana503 views
Diffiehellman von chenlahero
DiffiehellmanDiffiehellman
Diffiehellman
chenlahero18.7K views
Message authentication von CAS
Message authenticationMessage authentication
Message authentication
CAS26.3K views
Message Authentication Code & HMAC von Krishna Gehlot
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot16.4K views
12 symmetric key cryptography von drewz lin
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
drewz lin9.9K views

Similar a RSA-W7(rsa) d1-d2

Rsa diffi-network security-itt von
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-ittrameshvvv
624 views33 Folien
PKC&RSA von
PKC&RSAPKC&RSA
PKC&RSAAnver S R
34 views29 Folien
Unit 3 von
Unit 3Unit 3
Unit 3KRAMANJANEYULU1
1.2K views70 Folien
Information and network security 33 rsa algorithm von
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
96 views18 Folien
1508.07756v1 von
1508.07756v11508.07756v1
1508.07756v1Samir Crypticus
283 views14 Folien
Presentation about RSA von
Presentation about RSAPresentation about RSA
Presentation about RSASrilal Buddika
7.5K views43 Folien

Similar a RSA-W7(rsa) d1-d2(20)

Rsa diffi-network security-itt von rameshvvv
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
rameshvvv624 views
Information and network security 33 rsa algorithm von Vaibhav Khanna
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna96 views
CRYPTOGRAPHY (2).pdf von BhuvanaR13
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
BhuvanaR1332 views
Cupdf.com public key-cryptography-569692953829a von jsk1950
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
jsk195078 views
RSA & MD5 algorithm von Siva Rushi
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi12.6K views
A New Cryptosystem Based On Factoring And Discrete Logarithm Problems von Monica Waters
A New Cryptosystem Based On Factoring And Discrete Logarithm ProblemsA New Cryptosystem Based On Factoring And Discrete Logarithm Problems
A New Cryptosystem Based On Factoring And Discrete Logarithm Problems
Monica Waters4 views

Último

himalay baruah acid fast staining.pptx von
himalay baruah acid fast staining.pptxhimalay baruah acid fast staining.pptx
himalay baruah acid fast staining.pptxHimalayBaruah
5 views16 Folien
SANJAY HPLC.pptx von
SANJAY HPLC.pptxSANJAY HPLC.pptx
SANJAY HPLC.pptxsanjayudps2016
148 views38 Folien
Chromatography ppt.pptx von
Chromatography ppt.pptxChromatography ppt.pptx
Chromatography ppt.pptxvarshachandgudesvpm
16 views1 Folie
Conventional and non-conventional methods for improvement of cucurbits.pptx von
Conventional and non-conventional methods for improvement of cucurbits.pptxConventional and non-conventional methods for improvement of cucurbits.pptx
Conventional and non-conventional methods for improvement of cucurbits.pptxgandhi976
18 views35 Folien
"How can I develop my learning path in bioinformatics? von
"How can I develop my learning path in bioinformatics?"How can I develop my learning path in bioinformatics?
"How can I develop my learning path in bioinformatics?Bioinformy
21 views13 Folien
application of genetic engineering 2.pptx von
application of genetic engineering 2.pptxapplication of genetic engineering 2.pptx
application of genetic engineering 2.pptxSankSurezz
7 views12 Folien

Último(20)

himalay baruah acid fast staining.pptx von HimalayBaruah
himalay baruah acid fast staining.pptxhimalay baruah acid fast staining.pptx
himalay baruah acid fast staining.pptx
HimalayBaruah5 views
Conventional and non-conventional methods for improvement of cucurbits.pptx von gandhi976
Conventional and non-conventional methods for improvement of cucurbits.pptxConventional and non-conventional methods for improvement of cucurbits.pptx
Conventional and non-conventional methods for improvement of cucurbits.pptx
gandhi97618 views
"How can I develop my learning path in bioinformatics? von Bioinformy
"How can I develop my learning path in bioinformatics?"How can I develop my learning path in bioinformatics?
"How can I develop my learning path in bioinformatics?
Bioinformy21 views
application of genetic engineering 2.pptx von SankSurezz
application of genetic engineering 2.pptxapplication of genetic engineering 2.pptx
application of genetic engineering 2.pptx
SankSurezz7 views
How to be(come) a successful PhD student von Tom Mens
How to be(come) a successful PhD studentHow to be(come) a successful PhD student
How to be(come) a successful PhD student
Tom Mens460 views
Small ruminant keepers’ knowledge, attitudes and practices towards peste des ... von ILRI
Small ruminant keepers’ knowledge, attitudes and practices towards peste des ...Small ruminant keepers’ knowledge, attitudes and practices towards peste des ...
Small ruminant keepers’ knowledge, attitudes and practices towards peste des ...
ILRI5 views
별헤는 사람들 2023년 12월호 전명원 교수 자료 von sciencepeople
별헤는 사람들 2023년 12월호 전명원 교수 자료별헤는 사람들 2023년 12월호 전명원 교수 자료
별헤는 사람들 2023년 12월호 전명원 교수 자료
sciencepeople31 views
Experimental animal Guinea pigs.pptx von Mansee Arya
Experimental animal Guinea pigs.pptxExperimental animal Guinea pigs.pptx
Experimental animal Guinea pigs.pptx
Mansee Arya13 views
ENTOMOLOGY PPT ON BOMBYCIDAE AND SATURNIIDAE.pptx von MN
ENTOMOLOGY PPT ON BOMBYCIDAE AND SATURNIIDAE.pptxENTOMOLOGY PPT ON BOMBYCIDAE AND SATURNIIDAE.pptx
ENTOMOLOGY PPT ON BOMBYCIDAE AND SATURNIIDAE.pptx
MN6 views
A training, certification and marketing scheme for informal dairy vendors in ... von ILRI
A training, certification and marketing scheme for informal dairy vendors in ...A training, certification and marketing scheme for informal dairy vendors in ...
A training, certification and marketing scheme for informal dairy vendors in ...
ILRI11 views

RSA-W7(rsa) d1-d2

  • 1. Information Security I By Fahad Layth Malallah Reference Books: 1. Introduction to Computer Security, by Matt Bishop. 2. Security in Computing, 4th Edition, by Charls P. Pfleeger. 3. Principle of Computer Security. 2nd edition, by Arthur. 4th grade, Computer Science Cihan University First Semester, 2014-2015. Lecture-W7-D1-D2. 1
  • 2. 4-Cryptography A- Definitions. B-Encryption and Decryption Definition(Symmetric & Asymmetric). C-Classical Cryptosystems. 1- Transposition Ciphers (Permutation): - Shuffling Scheme. 2- Substitution Ciphers : - Caesar’s Cipher. -Vigenère Cipher. -One-Time Pad. D-Symmetric Cryptography : -Data Encryption Standard (DES) Algorithm. E- Asymmetric Cryptography (Public-Key Systems): 1-Basic on modular arithmetic, Number Theory. 2-Modular arithmetic inverse computation. 3- Al-Gamal Algorithm (ciphering & de-ciphering). 4-RSA Algorithm (ciphering & de-ciphering). Summary- Exercises. 2
  • 3. -Aim of this lecture: Students will be familiar and able to secure information by using: E- Asymmetric Cryptography (Public-Key Systems): 1-Basic on modular arithmetic, Number Theory. 2-Modular arithmetic inverse computation. 3- Al-Gamal Algorithm (ciphering & de-ciphering). 4-RSA Algorithm (ciphering & de-ciphering). 3
  • 4. 4- RSA Algorithm (ciphering & de-ciphering). • Three scientist have invented a security algorithm named it by first character of their names: • Adleman the mathematician. • Rivest and Shamir the computer scientists. – Alice must create a Public Key, which she can publish so that Bob (and everyone else) can use it to encrypt messages to her. Because the public key is a one way function, it must be virtually impossible for anybody to reverse it and decrypt Alice’s message. – However, Alice needs to decrypt the messages being sent to her. She must therefore have a Private Key, which allows her to reverse the effect of the Public Key. – There is a mathematical relation between the Public Key and Private Key, but if the Public Key is known the ability to find the Private Key is zero, even if the mathematical relation is known!!! 4
  • 5. Hard Mathematical Problem • The concept HMP is best understood as a mathematical problem which is computationally infeasible to solve. • The HMP is proven mathematically. • Among the concepts that are HMP that we have seen are: – DLP (Discrete Logarithm Problem). – Integer Factorization. MCS 1413 - CRYPTOGRAPHY 5
  • 6. RSA Algorithm: 6 Ali: 1-Alie encrypts M by using public keys (e, n)as: Bob: 1- chooses secret primes p and q and computes n=pq . 2- chooses an exponent e as: gcd( e, [p-1 ]. [q-1])= 1 3- then, computes d as : de= 1 mod (p-1)(q-1) 4- Bob makes (p,q,d) public and keeps (e,n) secret keys, then send only the public to Ali…. 5-Bob decrypts by computing . Procedures is : Ali want to send a Secret message M to Bob. So , Ali will encrypt a M and Bob will decrypt the message. Bob should create a private key to decryption. .
  • 7. RSA numerical Example 1: Part A wants to send a message M to Part B. encrypt the message m=10 and decrypt the cipher c by using asymmetric cryptosystem RSA. Let p = 7 and q = 13 be the two primes. Solution: 1- Part B must select n= pq. and e where: gcd(e, [p-1][q-1]) n = pq = 91 and (p − 1)(q − 1) = 72. To find e : gcd(e,72)=1 : Choose e. Let’s look among the primes. • Try e = 2. gcd(2, 72) = 2 (does not work) • Try e = 3. gcd(3, 72) = 3 (does not work) • Try e = 5. gcd(5, 72) = 1 (it works) We choose e = 5. (e,n) is the public key 2- Part B also must find d (private key) next slides… 7
  • 8. RSA numerical Example 1: Continue… 2- Part B also must find d (private key) by : d.e = 1 mod (p-1) (q-1)  d.e=1 mod (7-1) (13-1) d. 5 = 1 mod (6 ) (12)  d.5 = 1 mod 72 Now, we find multiplication inverse for 5 mod 72. inverse equation: 1= ax + by a=5, b=72  1= 5x + 72 y. 1= (5*29) + (-2 * 72) correct. Inverse(5)= 29. 29 = 1 mod 72 d=29. Private key is 29. this should be kept with Part B for decryption. 8
  • 9. RSA numerical Example 1: Continue… 3- Now, Part B sends the public key (e,n) and keeps the private key (p,q,d). 4- Now, Part A encrypt the message m=10 as: 9 82 91mod10 mod 5    C C nMC e 5- Now , Part B will decrypt the C by using the private key 29 10 91mod82 mod 29    m m nCm d
  • 10. -Summary -Encryption and Decryption of Asymmetric cryptography of RSA have been illustrated with an example. 10
  • 11. -Exercises: 1-On which hard mathematical problem does RSA base its security? 2- Explain the ciphering and deciphering operations of RSA. 3-Compare between Al-Gamal and RSA . 4- In RSA, the cipher-text C = 9. The public key is given by n = 143 and e = 23. In the following, we will try to crack the system and to determine the original message M. (i) What parameters comprises the public key and what parameters the private key?. (ii) What steps are necessary to determine the private key from the public key?. (iii) Determine the private key for the given system. (iv) What is the original message M?. 5- Given p = 19, q = 29, N = pq and e = 17, compute the private key d corresponding to the RSA system. 11
  • 12. -Exercises: 6- Local Area Network uses a public key infrastructure based on RSA with public key n =pq=55 and e=7. (i) Find the private key d. For RSA we have de= 1 mod (p-1)(q-1) (ii) Find the corresponding message M for a cipher C = 3. 7- Consider a RSA public-key system where the public key consists of n = pq = 143 and e = 71. A: Find a number d such that ed = 1 modulo (p-1)(q -1). B: Give the decryption function for RSA. C: Decrypt the cipher C = 12. 8-Alice has published her RSA public keys as <N; e> = <91;5>, where N is the known public number and e is her public key. Accordingly, Bob sent her the cipher text 81. Find the corresponding message. 12
  • 13. -Exercises: 1-On which hard mathematical problem does RSA base its security? 1-discrete Logarithm Problem. 2- Number factorization. 2- Explain the ciphering and deciphering operations of RSA. It is available in the lecture documents (slide 6). 3-Compare between Al-Gamal and RSA . 13 RSA Al-Gamal Depend on DLP, Number factorization Depend on DLP Cipher text size is the same as the message size Cipher text size is the double of message size Public key (n,e), private key= p,q, d. public key g,p,A private key: a
  • 14. 4- In RSA, the cipher-text C = 9. The public key is given by n = 143 and e = 23. In the following, we will try to crack the system and to determine the original message M. (i) What parameters comprises the public key and what parameters the private key?. (ii) What steps are necessary to determine the private key from the public key?. (iii) Determine the private key for the given system. (iv) What is the original message M?. Sol: 1-Public key : n=143, e= 23. private key is d. ( d.e= 1 mod (p-1)(q-1)) 2- d.e= 1 mod (p-1) (q-1), how do we find p & q. Divide n by sqrt(n). Sqrt(143)= 11.9 143/3 143/7 143/11= 13 ok. Now p=11, q= 13 14
  • 15. Now p=11, q= 13 d.23 = 1 mod (11-1) (13-1)  23. d= 1 mod 120 Now compute the inverse as 1 =ax + by : a= 23, b= 120 X= 47, y= -9 , the inverse is 47, so d= 47. 3- Original message is M http://www.cs.princeton.edu/~dsri/modular-inversion.html 5- Given p = 19, q = 29, N = pq and e = 17, compute the private key d corresponding to the RSA system. Sol: d.e = 1 mod (p-1)( q-1)  d. 17= 1 mod (19-1) (29-1) 15 46 143mod9 mod 47    M M nCM d
  • 16. http://www.cs.princeton.edu/~dsri/modular-inversion.html 5- Given p = 19, q = 29, N = pq and e = 17, compute the private key d corresponding to the RSA system. Sol: d.e = 1 mod (p-1)( q-1)  d. 17= 1 mod (19-1) (29-1) 17. d = 1 mod 504 Now, compute the inverse of d as: 1 = ax + by : a= 17, b= 504. 1= 17 x + 504 y Now, compute q from gcd (504,17), then compute x(s) and y(s). Finally: x= 89, y= -3. Accordingly, the inverse d = 89. 16
  • 17. 6- Local Area Network uses a public key infrastructure based on RSA with public key n =pq=55 and e=7. (i) Find the private key d. For RSA we have de= 1 mod (p-1)(q-1) (ii) Find the corresponding message M for a cipher C = 3. Sol: 1- d.e= 1 mod (p-1) (q-1)  we have to find p & q. So p= 11, q=5. -To compute d: d. 7 = 1 mod (11-1) (5-1)  7.d =1 mod 40 -to compute inverse : 1= ax + by as a = 7, b= 40 - Compute x & y , x=-17 ,y= 3 d= (-17*1 + 40) mod 40 d= 23 17 11555 3.18355 4.755   
  • 18. 6- Local Area Network uses a public key infrastructure based on RSA with public key n =pq=55 and e=7. (i) Find the private key d. For RSA we have de= 1 mod (p-1)(q-1) (ii) Find the corresponding message M for a cipher C = 3. Sol: -Compute x & y , x=-17 ,y= 3 d= (-17*1 + 40) mod 40 d= 23 2- 18 27 55mod3 mod 23    M M nCM d
  • 19. 7- Consider a RSA public-key system where the public key consists of n = pq = 143 and e = 71. A: Find a number d such that ed = 1 modulo (p-1)(q -1). B: Give the decryption function for RSA. C: Decrypt the cipher C = 12. Sol: A- n=143=pq=11.13  d ed=1 mod (p-1)(q-1) 71. d = 1 mod (11-1)(13-1).  71 d = 1 mod 120 to compute the inverse 1= ax + by: a=71, b=120 So, x= -49 , y= 29. d= 1 * -49 mod 120  d=71. B- C- 19 nCM d mod 73 143mod1271   M M
  • 20. 8-Alice has published her RSA public keys as <N; e> = <91;5>, where N is the known public number and e is her public key. Accordingly, Bob sent her the cipher text 81. Find the corresponding message. Sol: In order to find the message , we have to firstly find the private key which is d. d.e =1 mod (p-1) (q-1)  now we have to find q & p from n where n=pq. 91= 7 . 13= p.q. d.5 = 1 mod (7-1) (13-1)  5.d = 1 mod 72  by finding the inverse so: d=29. Now, apply the decryption rule  20 5 91mod81 mod 29    M M nCM d

Hinweis der Redaktion

  1. Model of security: policies of securities
  2. Model of security: policies of securities
  3. Factorization of big numbers Finding big prime numbers Multiplication of big prime numbers Exponentiation of big numbers Computing discrete logarithms.
  4. Factorization of big numbers Finding big prime numbers Multiplication of big prime numbers Exponentiation of big numbers Computing discrete logarithms.