Cryptography and Network Security Chapter 9 doc

27 404 0
Cryptography and Network SecurityChapter 9 doc

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Cryptography and Cryptography and Network Security Network Security Chapter 9 Chapter 9 Fourth Edition Fourth Edition by William Stallings by William Stallings Lecture slides by Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Chapter 9 – Public Key Public Key Cryptography and RSA Cryptography and RSA Every Egyptian received two names, Every Egyptian received two names, which were known respectively as the which were known respectively as the true name and the good name, or the true name and the good name, or the great name and the little name; and great name and the little name; and while the good or little name was made while the good or little name was made public, the true or great name appears public, the true or great name appears to have been carefully concealed. to have been carefully concealed.   The Golden Bough, The Golden Bough,     Private-Key Cryptography Private-Key Cryptography                                      Public-Key Cryptography Public-Key Cryptography  ! ! "### "###    $ $ %  %                         Why Public-Key Why Public-Key Cryptography? Cryptography?  $& $&  key distribution key distribution – how to have secure – how to have secure communications in general without having to trust a communications in general without having to trust a KDC with your key KDC with your key  digital signatures digital signatures – how to verify a message comes – how to verify a message comes intact from the claimed sender intact from the claimed sender  '!()  '!()  *+, /0 *+, /0  known earlier in classified community known earlier in classified community Public-Key Cryptography Public-Key Cryptography  1$1 1$1     $ $   & &  a a public-key public-key , which may be known by anybody, and , which may be known by anybody, and can be used to can be used to encrypt messages encrypt messages , and , and verify verify signatures signatures  a a private-key private-key , known only to the recipient, used to , known only to the recipient, used to decrypt messages decrypt messages , and , and sign sign (create) (create) signatures signatures         those who encrypt messages or verify signatures those who encrypt messages or verify signatures cannot cannot decrypt messages or create signatures decrypt messages or create signatures Public-Key Cryptography Public-Key Cryptography Public-Key Characteristics Public-Key Characteristics  213$ 213$ $& $&  it is computationally infeasible to find decryption key it is computationally infeasible to find decryption key knowing only algorithm & encryption key knowing only algorithm & encryption key  it is computationally easy to en/decrypt messages it is computationally easy to en/decrypt messages when the relevant (en/decrypt) key is known when the relevant (en/decrypt) key is known  either of the two related keys can be used for either of the two related keys can be used for encryption, with the other used for decryption (for encryption, with the other used for decryption (for some algorithms) some algorithms) Public-Key Cryptosystems Public-Key Cryptosystems Public-Key Applications Public-Key Applications  "& "&  encryption/decryption encryption/decryption (provide secrecy) (provide secrecy)  digital signatures digital signatures (provide authentication) (provide authentication)  key exchange key exchange (of session keys) (of session keys)    ! ! [...]... constraints Timing Attacks   developed by Paul Kocher in mid- 199 0’s exploit timing variations in operations      eg multiplying by small vs large number or IF's varying which instructions executed infer operand size based on time taken RSA exploits time taken in exponentiation countermeasures    use constant exponentiation time add random delays blind values used in calculations Chosen Ciphertext... knows values of p & q can use this technique RSA Key Generation    users of RSA must:  determine two primes at random - p, q  select either e or d and compute the other primes p,q must not be easily derived from modulus n=p.q  means must be sufficiently large  typically guess and use probabilistic test exponents e, d are inverses, so use Inverse algorithm to compute the other RSA Security ... hence compute ø(n) and then d determine ø(n) directly and compute d find d directly currently believe all equivalent to factoring  have seen slow improvements over the years • as of May-05 best is 200 decimal digits (663) bit with LS  biggest improvement comes from improved algorithm • cf QS to GHFS to LS  currently assume 1024-2048 bit RSA is secure • ensure p, q of similar size and matching other... Setup    each user generates a public/private key pair by: selecting two large primes at random - p, q computing their system modulus n=p.q   note ø(n)=(p-1)(q-1) selecting at random the encryption key e • where 1 . Cryptography and Cryptography and Network Security Network Security Chapter 9 Chapter 9 Fourth Edition Fourth Edition by. Brown Lecture slides by Lawrie Brown Chapter 9 – Chapter 9 – Public Key Public Key Cryptography and RSA Cryptography and RSA Every Egyptian received two names,

Ngày đăng: 06/03/2014, 16:20

Từ khóa liên quan

Mục lục

  • Cryptography and Network Security Chapter 9

  • Chapter 9 – Public Key Cryptography and RSA

  • Private-Key Cryptography

  • Public-Key Cryptography

  • Why Public-Key Cryptography?

  • Slide 6

  • Slide 7

  • Public-Key Characteristics

  • Public-Key Cryptosystems

  • Public-Key Applications

  • Security of Public Key Schemes

  • RSA

  • RSA Key Setup

  • RSA Use

  • Why RSA Works

  • RSA Example - Key Setup

  • RSA Example - En/Decryption

  • Exponentiation

  • Slide 19

  • Efficient Encryption

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan