SlideShare ist ein Scribd-Unternehmen logo
1 von 20
PUBLIC KEY
CRYPTOGRAPHY
Prime - totient - coprime –
relative prime - RSA
prasaugus
Friday, 28
March 2014
1
Prime numbers
Divisible by 1 and itself
Friday, 28 March 20142
 Any number
other than prime
are broken to
prime.
 A group of
smaller prime
number
 Factorization
involves set of
prime numbers
to bring back the
number
 Prime factors are
unique
Prime Number
What is it made of ?
Factorization
Friday, 28 March 20143
Discrete Logarithm Problem
 46 mod 12 Ξ 10
 3n mod 17 Ξ Equally
likely
with in 17
 Modulus of any
given number with
any exponent is
equally likely
Friday, 28 March 20144
Friday, 28 March 20145
 32 mod 17 Ξ 9
 33 mod 17 Ξ 10
 34 mod 17 Ξ 13
 35 mod 17 Ξ 5
 36 mod 17 Ξ 15
 37 mod 17 Ξ 11
 38 mod 17 Ξ 16
 39 mod 17 Ξ 14
 310 mod 17 Ξ 8
 311 mod 17 Ξ 7
Equally likely……!
Discrete
Logarithm
problem
(one way
function)
Is to find the exponent given
the resultant value
Eg : given 7 to find the
exponent of 3
You may find it easy with
smaller prime numbers….
It would take years to find if the
prime number was 100 digits
long…..
Strength of this one way
function is the time needed to
compute
Friday, 28 March 20146
Sender
Intruder/eavesdropper
Receiver
Public distribution of generator ‘g’ and prime number ‘p’
gn mod p Ξ c
315 mod 17 Ξ 6 313 mod 17 Ξ 12
3, 17
3, 17
3,17
g = 3
p = 17
Spr= 15
Rpu= 12
Rpr= 13
Spu= 6
Sender selects his private ‘n’ to generate his public key and
distributes it to all
Receiver keeps sender’s public key and selects his private
key ‘n’ and sends back his public key to all
THE CRUX NOW!!Sender = Rpu
Spr mod 17 = Actual Secret Key 10
Receiver = Spu
Rpr mod 17 = Actual Secret Key 10
Friday, 28 March 20147
The Story behind the logic
1215 mod 17 Ξ 10
12 Ξ 313 mod 17
313^15 mod 17 Ξ 10
Spr= 15
Rpu= 12
Rpr= 13
Spu= 6
Sender Receiver
613 mod 17 Ξ 10
6 Ξ 315 mod 17
315^13 mod 17 Ξ 10
Without any of the private keys, intruder or eavesdropper
cannot access the secret key.
It requires huge computation power to find it
 Thanks to Diffie –
Hellman
 Who devised the
algorithm to
share keys in
public
Public Key
Cryptography
Thus the sharing of the keys
between any unknown person
is made
Friday, 28 March 20148
 Complexities
 What if there are
multiple
receivers
 Key
management
problem
 Computation
overhead
Friday, 28 March 20149
 Ronald Rivest
 Adi Shamir
 Leonard
Adleman
You know us all by name
Friday, 28 March 201410
Sender Receiver
Intruder
R wants to send ‘89’
p1 = 53
p2 = 59
n = 53 * 59
n = 3127
(n) = 3016 by totient
e = 3
d = 2011
Exponent e
- Odd
- Not a factor of (n)
Calculated by modular
Inverse using Euclidean
Algorithm
d = (k * (n) + 1)/e
Hide eth
except
n = 3127
e = 3
n = 3127
e = 3
n = 3127
e = 3
n = 3127
e = 3
c = 1394
1394d Ξ 89 mod 3127
Message = 89
893 mod 3127 Ξ 1394
Crypt c = 1394
c = 1394
Friday, 28 March 201411
 In 1970 James
Alice, a British
Engineer, devise
d a plan.
 ‘A’ Sends an
open lock to
all, let those who
wish to send
message may
lock it and send
back.
 ‘A’ opens all
locks with his one
and only key
RSA
Foundation of RSA
To resolve computational
complexityy
Key Management
Friday, 28 March 201412
 Multiplication is
easy to perform
 (computer takes
less than
seconds to do it)
 Instead finding
factors of given
numbers is hard.
 (for larger
numbers days
and years)
factorizor
RSA
Foundation of RSA
To resolve computational
complexityy
Key Management
Friday, 28 March 201413
  PHI function is
to measure the
breakability of
the number;
 Where it is less
than ‘n’ and not
a factor of ‘n’
 (Prime) = P-1
 (7) =6
RSA
Foundation of RSA
To resolve computational
complexityy
Key Management
Totient of a number
 When n is a product of two primes, in
arithmetic operations modulo n, the
exponents behave modulo the totient
φ(n) of n
 15 = 3 x 5
 φ(15) = 8
 Relation
(43)5 mod 15 Ξ 4(3x5)mod 8 mod 15 Ξ 47 mod 15
Friday, 28 March 201414
Connection bw PHI φ function
and Modular exponentiation
 Connection
mφ(n) Ξ 1 mod n
let us assume any two numbers such that
they do not share any common factors
m = 5 and n = 8
5φ(8) Ξ 1 mod 8
Friday, 28 March 201415
Connection bw PHI φ function
and Modular exponentiation
 Breakthrough
a. 1k = 1
b. m* 1k = m
based on the above propositions
mφ(n) Ξ 1 mod n can be written as
mk*φ(n) Ξ 1 mod n using (a)
m*mk*φ(n) Ξ m mod n using (b)
Finally we get
mk*φ(n)+1 Ξ m mod n
Friday, 28 March 201416
Friday, 28 March 201417
Sender Receiver
Intruder
R wants to send ‘89’
p1 = 53
p2 = 59
n = 53 * 59
n = 3127
(n) = 3016 by totient
e = 3
d = 2011
Exponent e
- Odd
- Not a factor of (n)
Calculated by modular
Inverse using Euclidean
Algorithm
d = (k * (n) + 1)/e
Hide eth
except
n = 3127
e = 3
n = 3127
e = 3
n = 3127
e = 3
n = 3127
e = 3
c = 1394
1394d Ξ 89 mod 3127
Message = 89
893 mod 3127 Ξ 1394
Crypt c = 1394
c = 1394
QUERIES ?
Just a sec …
Khan Videos on Cryptography
https://engineering.purdue.ed
u/kak/compsec/NewLectures/
Lecture12.pdf
Friday, 28 March 201418
Friday, 28 March 201419
 Confidential
communication
 An individual
can use (e,n)
and (d, n) as
public and
private keys
respectively.
 If the message is
long, it could be
used as block
cipher to reduce
the size
Usage of RSA
Choice of values, keys, primes
THANKS
EVERYONE
prassanna john paul
prasaugus@gmail.com
Friday, 28
March 2014
20

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Network security cs5
Network security cs5Network security cs5
Network security cs5
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
Signal Processing Assignment Help
Signal Processing Assignment HelpSignal Processing Assignment Help
Signal Processing Assignment Help
 
Dijkstra's algorithm
Dijkstra's algorithmDijkstra's algorithm
Dijkstra's algorithm
 
Dijkstra’s algorithm
Dijkstra’s algorithmDijkstra’s algorithm
Dijkstra’s algorithm
 
Control System Homework Help
Control System Homework HelpControl System Homework Help
Control System Homework Help
 
Daa unit 6_efficiency of algorithms
Daa unit 6_efficiency of algorithmsDaa unit 6_efficiency of algorithms
Daa unit 6_efficiency of algorithms
 
Randomized algorithms ver 1.0
Randomized algorithms ver 1.0Randomized algorithms ver 1.0
Randomized algorithms ver 1.0
 
Signal Processing Assignment Help
Signal Processing Assignment HelpSignal Processing Assignment Help
Signal Processing Assignment Help
 
Solution 3.
Solution 3.Solution 3.
Solution 3.
 
Algorithm Homework Help
Algorithm Homework HelpAlgorithm Homework Help
Algorithm Homework Help
 
Quiz 1 solution
Quiz 1 solutionQuiz 1 solution
Quiz 1 solution
 
Assignment 2 daa
Assignment 2 daaAssignment 2 daa
Assignment 2 daa
 
Machnical Engineering Assignment Help
Machnical Engineering Assignment HelpMachnical Engineering Assignment Help
Machnical Engineering Assignment Help
 
5.1 greedy 03
5.1 greedy 035.1 greedy 03
5.1 greedy 03
 
Answers withexplanations
Answers withexplanationsAnswers withexplanations
Answers withexplanations
 
Ee693 sept2014midsem
Ee693 sept2014midsemEe693 sept2014midsem
Ee693 sept2014midsem
 
Electrical Engineering Assignment Help
Electrical Engineering Assignment HelpElectrical Engineering Assignment Help
Electrical Engineering Assignment Help
 
Deep Recurrent Neural Networks with Layer-wise Multi-head Attentions for Punc...
Deep Recurrent Neural Networks with Layer-wise Multi-head Attentions for Punc...Deep Recurrent Neural Networks with Layer-wise Multi-head Attentions for Punc...
Deep Recurrent Neural Networks with Layer-wise Multi-head Attentions for Punc...
 
(floyd's algm)
(floyd's algm)(floyd's algm)
(floyd's algm)
 

Andere mochten auch

Mobile Cloud Computing
Mobile Cloud Computing Mobile Cloud Computing
Mobile Cloud Computing Varun Vijay
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography rinnocente
 
IDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyIDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyShivashish Kumar
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptographyishmecse13
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyIsrael Herraiz
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSAAmit Debnath
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareProf. Swapnil V. Kaware
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud ComputingMobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud ComputingVineet Garg
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE Qualcomm
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101Joshua Thijssen
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptographyanusachu .
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3koolkampus
 

Andere mochten auch (20)

Mobile Cloud Computing
Mobile Cloud Computing Mobile Cloud Computing
Mobile Cloud Computing
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
IDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptographyIDRBT Project: Application Development in Java for public key cryptography
IDRBT Project: Application Development in Java for public key cryptography
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Ch09
Ch09Ch09
Ch09
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud ComputingMobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
Paper battery
Paper batteryPaper battery
Paper battery
 

Ähnlich wie PUBLIC KEY CRYPTOGRAPHY AND RSA EXPLAINED

On the Secrecy of RSA Private Keys
On the Secrecy of RSA Private KeysOn the Secrecy of RSA Private Keys
On the Secrecy of RSA Private KeysDharmalingam Ganesan
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA EncryptionNathan F. Dunn
 
11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdfVipinNegi38
 
Cyber Security Part-3.pptx
Cyber Security Part-3.pptxCyber Security Part-3.pptx
Cyber Security Part-3.pptxRavikumarVadana
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)ArthyR3
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA EncryptionNathan F. Dunn
 
Dependency Analysis of RSA Private Variables
Dependency Analysis of RSA Private VariablesDependency Analysis of RSA Private Variables
Dependency Analysis of RSA Private VariablesDharmalingam Ganesan
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3Coleman Gorham
 
Analysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent dAnalysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent dDharmalingam Ganesan
 
01 - DAA - PPT.pptx
01 - DAA - PPT.pptx01 - DAA - PPT.pptx
01 - DAA - PPT.pptxKokilaK25
 

Ähnlich wie PUBLIC KEY CRYPTOGRAPHY AND RSA EXPLAINED (20)

On the Secrecy of RSA Private Keys
On the Secrecy of RSA Private KeysOn the Secrecy of RSA Private Keys
On the Secrecy of RSA Private Keys
 
Factorization Hack of RSA Secret Numbers
Factorization Hack of RSA Secret NumbersFactorization Hack of RSA Secret Numbers
Factorization Hack of RSA Secret Numbers
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
 
11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf
 
Cyber Security Part-3.pptx
Cyber Security Part-3.pptxCyber Security Part-3.pptx
Cyber Security Part-3.pptx
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Rsa documentation
Rsa documentationRsa documentation
Rsa documentation
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
 
Dependency Analysis of RSA Private Variables
Dependency Analysis of RSA Private VariablesDependency Analysis of RSA Private Variables
Dependency Analysis of RSA Private Variables
 
Rsa
RsaRsa
Rsa
 
Rsa
RsaRsa
Rsa
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
The rsa algorithm JooSeok Song
The rsa algorithm JooSeok SongThe rsa algorithm JooSeok Song
The rsa algorithm JooSeok Song
 
RSA without Padding
RSA without PaddingRSA without Padding
RSA without Padding
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3
 
Analysis of Shared RSA Modulus
Analysis of Shared RSA ModulusAnalysis of Shared RSA Modulus
Analysis of Shared RSA Modulus
 
Analysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent dAnalysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent d
 
PKC&RSA
PKC&RSAPKC&RSA
PKC&RSA
 
01 - DAA - PPT.pptx
01 - DAA - PPT.pptx01 - DAA - PPT.pptx
01 - DAA - PPT.pptx
 

Kürzlich hochgeladen

Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Kürzlich hochgeladen (20)

Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

PUBLIC KEY CRYPTOGRAPHY AND RSA EXPLAINED

  • 1. PUBLIC KEY CRYPTOGRAPHY Prime - totient - coprime – relative prime - RSA prasaugus Friday, 28 March 2014 1
  • 2. Prime numbers Divisible by 1 and itself Friday, 28 March 20142
  • 3.  Any number other than prime are broken to prime.  A group of smaller prime number  Factorization involves set of prime numbers to bring back the number  Prime factors are unique Prime Number What is it made of ? Factorization Friday, 28 March 20143
  • 4. Discrete Logarithm Problem  46 mod 12 Ξ 10  3n mod 17 Ξ Equally likely with in 17  Modulus of any given number with any exponent is equally likely Friday, 28 March 20144
  • 5. Friday, 28 March 20145  32 mod 17 Ξ 9  33 mod 17 Ξ 10  34 mod 17 Ξ 13  35 mod 17 Ξ 5  36 mod 17 Ξ 15  37 mod 17 Ξ 11  38 mod 17 Ξ 16  39 mod 17 Ξ 14  310 mod 17 Ξ 8  311 mod 17 Ξ 7 Equally likely……! Discrete Logarithm problem (one way function) Is to find the exponent given the resultant value Eg : given 7 to find the exponent of 3 You may find it easy with smaller prime numbers…. It would take years to find if the prime number was 100 digits long….. Strength of this one way function is the time needed to compute
  • 6. Friday, 28 March 20146 Sender Intruder/eavesdropper Receiver Public distribution of generator ‘g’ and prime number ‘p’ gn mod p Ξ c 315 mod 17 Ξ 6 313 mod 17 Ξ 12 3, 17 3, 17 3,17 g = 3 p = 17 Spr= 15 Rpu= 12 Rpr= 13 Spu= 6 Sender selects his private ‘n’ to generate his public key and distributes it to all Receiver keeps sender’s public key and selects his private key ‘n’ and sends back his public key to all THE CRUX NOW!!Sender = Rpu Spr mod 17 = Actual Secret Key 10 Receiver = Spu Rpr mod 17 = Actual Secret Key 10
  • 7. Friday, 28 March 20147 The Story behind the logic 1215 mod 17 Ξ 10 12 Ξ 313 mod 17 313^15 mod 17 Ξ 10 Spr= 15 Rpu= 12 Rpr= 13 Spu= 6 Sender Receiver 613 mod 17 Ξ 10 6 Ξ 315 mod 17 315^13 mod 17 Ξ 10 Without any of the private keys, intruder or eavesdropper cannot access the secret key. It requires huge computation power to find it
  • 8.  Thanks to Diffie – Hellman  Who devised the algorithm to share keys in public Public Key Cryptography Thus the sharing of the keys between any unknown person is made Friday, 28 March 20148  Complexities  What if there are multiple receivers  Key management problem  Computation overhead
  • 9. Friday, 28 March 20149  Ronald Rivest  Adi Shamir  Leonard Adleman You know us all by name
  • 10. Friday, 28 March 201410 Sender Receiver Intruder R wants to send ‘89’ p1 = 53 p2 = 59 n = 53 * 59 n = 3127 (n) = 3016 by totient e = 3 d = 2011 Exponent e - Odd - Not a factor of (n) Calculated by modular Inverse using Euclidean Algorithm d = (k * (n) + 1)/e Hide eth except n = 3127 e = 3 n = 3127 e = 3 n = 3127 e = 3 n = 3127 e = 3 c = 1394 1394d Ξ 89 mod 3127 Message = 89 893 mod 3127 Ξ 1394 Crypt c = 1394 c = 1394
  • 11. Friday, 28 March 201411  In 1970 James Alice, a British Engineer, devise d a plan.  ‘A’ Sends an open lock to all, let those who wish to send message may lock it and send back.  ‘A’ opens all locks with his one and only key RSA Foundation of RSA To resolve computational complexityy Key Management
  • 12. Friday, 28 March 201412  Multiplication is easy to perform  (computer takes less than seconds to do it)  Instead finding factors of given numbers is hard.  (for larger numbers days and years) factorizor RSA Foundation of RSA To resolve computational complexityy Key Management
  • 13. Friday, 28 March 201413   PHI function is to measure the breakability of the number;  Where it is less than ‘n’ and not a factor of ‘n’  (Prime) = P-1  (7) =6 RSA Foundation of RSA To resolve computational complexityy Key Management
  • 14. Totient of a number  When n is a product of two primes, in arithmetic operations modulo n, the exponents behave modulo the totient φ(n) of n  15 = 3 x 5  φ(15) = 8  Relation (43)5 mod 15 Ξ 4(3x5)mod 8 mod 15 Ξ 47 mod 15 Friday, 28 March 201414
  • 15. Connection bw PHI φ function and Modular exponentiation  Connection mφ(n) Ξ 1 mod n let us assume any two numbers such that they do not share any common factors m = 5 and n = 8 5φ(8) Ξ 1 mod 8 Friday, 28 March 201415
  • 16. Connection bw PHI φ function and Modular exponentiation  Breakthrough a. 1k = 1 b. m* 1k = m based on the above propositions mφ(n) Ξ 1 mod n can be written as mk*φ(n) Ξ 1 mod n using (a) m*mk*φ(n) Ξ m mod n using (b) Finally we get mk*φ(n)+1 Ξ m mod n Friday, 28 March 201416
  • 17. Friday, 28 March 201417 Sender Receiver Intruder R wants to send ‘89’ p1 = 53 p2 = 59 n = 53 * 59 n = 3127 (n) = 3016 by totient e = 3 d = 2011 Exponent e - Odd - Not a factor of (n) Calculated by modular Inverse using Euclidean Algorithm d = (k * (n) + 1)/e Hide eth except n = 3127 e = 3 n = 3127 e = 3 n = 3127 e = 3 n = 3127 e = 3 c = 1394 1394d Ξ 89 mod 3127 Message = 89 893 mod 3127 Ξ 1394 Crypt c = 1394 c = 1394
  • 18. QUERIES ? Just a sec … Khan Videos on Cryptography https://engineering.purdue.ed u/kak/compsec/NewLectures/ Lecture12.pdf Friday, 28 March 201418
  • 19. Friday, 28 March 201419  Confidential communication  An individual can use (e,n) and (d, n) as public and private keys respectively.  If the message is long, it could be used as block cipher to reduce the size Usage of RSA Choice of values, keys, primes