Professional Documents
Culture Documents
Others
1/29
CSS322
Contents
Others
2/29
CSS322
RSA
Diffie-Hellman
Others
I
I
3/29
CSS322
RSA
Diffie-Hellman
Others
4/29
CSS322
RSA
Diffie-Hellman
Others
Public Key
I
Private Key
5/29
CSS322
6/29
CSS322
7/29
CSS322
Credit: Table 9.2 in Stallings, Cryptography and Network Security, 5th Ed., Pearson 2011
8/29
CSS322
RSA
Diffie-Hellman
Principles
Others
Credit: Table 9.3 in Stallings, Cryptography and Network Security, 5th Ed., Pearson 2011
9/29
CSS322
10/29
CSS322
RSA
Diffie-Hellman
Others
Y = fk (X )
easy, if k and Y are known
1
X = fk (Y ) easy, if k and Y are known
X = fk1 (Y ) infeasible, if Y is known but k is not
I
11/29
CSS322
Public-Key Cryptanalysis
Diffie-Hellman
Others
Probable-Message Attack
12/29
CSS322
Contents
Others
13/29
CSS322
RSA
RSA
Diffie-Hellman
Principles
Others
14/29
CSS322
Key Generation
Diffie-Hellman
Others
Encryption
Encryption of plaintext M, where M < n:
C = M e mod n
Decryption
Decryption of ciphertext C :
M = C d mod n
15/29
CSS322
16/29
(mod (n))
CSS322
Public Key Crypto
Principles
RSA
Diffie-Hellman
Others
17/29
CSS322
Encryption:
C = M e mod n
RSA
Diffie-Hellman
Decryption:
M = C d mod n
Others
18/29
Public exponent, e
Private exponent, d
Exponent1, dp = d (mod p 1)
Exponent2, dq = d (mod q 1)
CSS322
I
Principles
RSA
Diffie-Hellman
Others
Choosing e
I
Choosing d
I
I
Choosing p and q
I
I
19/29
CSS322
Security of RSA
RSA
Diffie-Hellman
Others
20/29
CSS322
Progress in Factorisation
I
I
RSA
Diffie-Hellman
Others
I
I
I
21/29
CSS322
Contents
Others
22/29
CSS322
RSA
Diffie-Hellman
Others
23/29
CSS322
24/29
Credit: Figure 10.1 in Stallings, Cryptography and Network Security, 5th Ed., Pearson 2011
CSS322
Credit: Figure 10.2.2 in Stallings, Cryptography and Network Security, 5th Ed., Pearson 2011
25/29
CSS322
Public Key Crypto
Principles
RSA
Diffie-Hellman
Others
26/29
CSS322
27/29
CSS322
Contents
Others
28/29
CSS322
ElGamal Crypto-system
RSA
Diffie-Hellman
Others
29/29