4 Hybrid Cryptographic Algorithm

Size: px
Start display at page:

Download "4 Hybrid Cryptographic Algorithm"

Transcription

1 This chapter describes the MD5 hashing mechanism for general m-commerce transactions and Hybrid algorithm that combines the AES and ECC operations for the security mechanism. Part of the work is presented and published in ([GJG2007], [GGJ2008], [JGG2007], [GJG2008]). The ideas about the Hybrid algorithm are the starting point for this thesis improvement. AES and ECC algorithms are discussed in chapter3. Current standards would have to continually extend their key lengths to ensure security, which increases processing time and could make it difficult to secure small devices. ECC can provide greater security when comparing with RSA algorithm. Further work could result in significant speedups for elliptic curve systems by reducing the key size. The HECC is the best alternate for ECC based on key size. HECC can be the cryptosystem of choice for future embedded security applications and real world applications.

2 4.1 MD5 HASHING MECHANISM FOR m-commerce TRANSACTIONS The increasing use of m-commerce applications have necessitated the need for maintaining integrity of transactions. To maintain integrity, J2EE (Java 2 Enterprise Edition) provides a class called Message Digest [MEDOOOO]. The Sun Java Wireless Toolkit which is based on J2ME's Connected Limited Device Configuration (CLDC) and Mobile Information Device Profile (MIDP), do not have a class that can maintain integrity of transactions. Such a class can be designed, developed and implemented in a J2ME environment. To describe the.jar files can be created from the Sun Java Wireless. HASHING and Message Digest A hash function takes a message of any length as input and produces a fixed length string as output, sometimes termed a message digest [IIM2005]. The characteristics of a good hash function are: Should avoid collisions. Should try to spread keys evenly in the array. Should be easy to compute. The two most-commonly used hash functions are MD5 and SHA-1 [FIP2002].

3 Design of MD5 class in mobiles The MD5Pack package is designed and implemented in the Sun Java Wireless Toolkit. This Package contains the core message digest class called MDScls class which implements the functionality of MD5 algorithm. The MD5cls constructor accepts a string of any length and converts it into fixed length 128 bit message digest. The main methods used in this class are: initiateq, updateq, finalq and ashex(). The message digest result is the string type which contains the hexa-decimal value. This MD5cls class object is created and accessed from the MD5Demo class which extends the MIDlet class. This MD5Demo class is used to design the interface on mobile and is used to pass the string to main message digest class [GGJ2008] [GJG2007]. The Message Digest class is developed and implemented using Sun Java Wireless Toolkit on Intel Pentium III Celeron 933 MHz speed with 256 MB RAM. The details of the Sun Java Wireless Toolkit can be had from [JSMOOOO]. 76

4 Initial Screen Sender Screen MD generated by the Receiver Screen sender MD re-generated by the receiver Integrity Check Passed Integrity Check Failed Figure 4.1. MD5 Algorithm in Mobiles

5 .jar file creation The Java Archive (JAR) file format enables one to bundle multiple files into a single archive file. Typically a JAR file contains various class files and auxiliary resources associated with the application. Sun Java Wireless Toolkit provides necessary menus (project-^ package -> create package) for creation of.jar file and this.jar file can be transferred and executed in any mobile that supports Java. This section presented a method for designing and implementing MD5 algorithm in mobiles. The MD5 algorithm has been tested in the Sun Java Wireless Toolkit. Integrity of data is of prime importance in wide ranges of m-commerce transaction applications [GGJ2008]. 4.2 Hybrid Cryptographic Algorithm for Robust Network Security The prime requirements for any e-commerce and m-commerce transactions are Privacy, Authentication, Integrity maintenance and Non- Repudiation. Cryptography [SCH1996] helps us in achieving these prime requirements. Today, various cryptographic algorithms have been developed. These are broadly classified as symmetric key (DES, TDES, Blowfish, CAST, IDEA, RC4, RC6, AES) and asymmetric key (RSA [RSA1978], ECC [CER1997], HECC [WOL2004]) algorithms. The reason for the ECC in this algorithm is that the National Institute of Standards

6 Technology (NIST) recommended that 160 bits of key size in ECC is sufficient instead of 1024 bits key size in RSA [RSA1978] to obtain the same level of security [DMP1998]. Hence, it presents a hybrid algorithm for enhanced network security. The algorithm combines the best features of both symmetric (AES) and asymmetric (ECC) [MEN 1994] encryption techniques. The data (plain text) that is to be transmitted is encrypted using the AES algorithm. Details on AES can be had from [DMP1998]. The AES key is encrypted using ECC [MOV 1997] [CER1997] [CGF2006]. The cipher text of the message and the cipher text of the AES key are then sent to the receiver [JGG2007], To ensure integrity of the transmitted data, the data is subjected to MD5 hash algorithm. The message digest obtained by this process is also encrypted using ECC technique. Thus the sender sends a) Cipher text of the message b) Cipher text of the AES key and c) Cipher text of the message digest. The receiver receives a) Cipher text of the message b) Cipher text of the AES key and c) Cipher text of the message digest

7 Figure 4.2: Sequence of Operations izsel...nssf.../ 80

8 The preliminary step is decrypting the Cipher text of the AES key to obtain the AES key. This is then used to decrypt the cipher text of the message to obtain the plain text. The plaintext is again subjected to MD5 hash algorithm. This process yields a message digest. The cipher text of the message digest is decrypted using ECC technique to obtain the message digest sent by the sender. This value is compared with the computed message digest. If both of them are equal, the message is accepted or else rejected. This hybrid algorithm is a combination of AES and ECC encryption techniques. This hybrid algorithm is tested with various sizes of data and the following results obtained. Runtime analysis of AES and MD5 Runtime Analysis of ECC Encryption (Time in MilliSec.) Decryption (Time in MilliSec.) Message Digest (MD5) Generated (Time in MilliSec.) Encryption Decryption File Size (in Kb) Fig. 4.3b) Runtime analysis ECC Fig. 4.3a) Runtime analysis of AES and MD5

9 Stallings [STA1999] states that the computational complexity for breaking the elliptic-curve cryptosystem for an elliptic curve key size of 150 bits is 3.8 x 1010 MIPS (Million Instructions Per Second). But, the key size of the hyper-elliptic curve cryptography is still more minimal when comparing the elliptic curve cryptography to provide the same level of security. And moreover, Roberto M.Avanzi [AVA2003] and Wollinger T [TJV2003] have stated that the performance of hyperelliptic curves over prime fields is satisfactory enough to be considered as a valid alternative to elliptic curves, especially when large point groups are desired, and the bit length of the characteristic is close to (but smaller than) a multiple of the machine word length. Details of the hyperelliptic curve cryptography can be had from [KOB1998] [MOV 1997] [FAG2007] [MEN 1994], The following are the steps in MD5: Input: b-bit message Step 1: Append padding bits: Padding is performed as follows: a single "1" bit is appended to the message, and then "0" bits are appended so that the length in bits of the padded message becomes congruent to 448, modulo 512. In all, at least one bit and atmost 512 bits are appended. Step 2: Append Length: A 64-bit representation of b (the length of the message before the padding bits were added) is appended to the result of the previous step. At this point, the resulting message has a length that is an exact multiple of 512-bits.

10 Step 3: Initialize the MD Buffer: Four word buffers to compute the Message Digest. Each one is a 32-bit register. Step 4: Process Message in 16-word block Step 5: Output: The message digest produced as output in each of the 4 MD Buffer. Begin with low order byte of the Buffer and end with the high order byte of the Buffer. Algorithm Steps in AES The algorithm consists of four stages that make up a round, which is iterated 10 times for a 128-bit length key, 12 times for a 192-bit length key and 14 times for a 256-bit length key [USD2001]. Stage 1: Sub Bytes transformation is a non-linear for each byte of the block. Stage 2: Shift Rows transformation cyclically shifts (permutes) the bytes within the block. Stage 3: Mix Columns transformation groups 4-bytes together forming 4-term polynomials and multiplies the polynomials with a fixed polynomial mod(x4+l). Stage 4: Add Round Key transformation adds the round key with the block of data.

11 Elliptic curves in Galois Field GF(P) Elliptic curves can be defined in a finite or Galois field GF(p) [HAS2004]. 2 ^ y mod p = x + ax + b mod p where p is a prime number. Steps in ECO over GF(P) The following are the steps in performing ECC. Step A: Determine the Base Point. Step B: Determine the public key and the private key for the sender and receiver. Step C : Perform Encryption Step D : Perform Decryption Step A : Steps in finding the Base Point Step 1: Take the Elliptic curve y2 mod p= x3 + ax +b mod p where p is a prime number. Step 2: For values from 0 to p-1, compute LHS and RHS Step 3: Locate points P where LHS = RHS Step 4: Count the number of points n\ The total number of points is always n + 1 (one point at infinity) Step 5: Find the prime factors of (n+1) and choose the largest among them. Step 6: Find the negative point for every point computed in step 3.

12 Step7: Now perform addition operation of the each of the points obtained in step 3. Addition refers to finding 2P, 3P, 4P, 5P... and tabulate them Step 8: Repeat step 7 until one gets the point at infinity. Step 9: Identify the largest prime factor from step 5. From the table created in step 7, locate for what points of P, the value is O (point at infinity) Step 10: From the list of points, one can choose any point which will be the base point. Step B : Steps in Key Generation Step 1: Sender and receiver agree on the elliptic curve E and the base point G with order n. The order of n must be large. Hence E, G and n are known to everyone. Step 2: Sender chooses a random number d8 which is 1 < d8 < n-1. He then computes d8 * G. For him, d8 is the private key and d8 * G is the public key. Step 3 : Receiver chooses a random number dr which is 1 < dr < n-1. He then computes dr*g. For him, dr is the private key and dr * G is the public key.

13 Step C: Steps in Encryption Step 1: Both sender and receiver agree on the elliptic curve E and the base point G with order n. Hence E,G and n are known to everyone. Step 2 : Sender then encodes the message M as a point. Step 3: Sender then generates a random number k. He then computes the value of kg (again a point). Step 4: Sender takes the public key (drg) of the receiver, multiples the same with k (result is a point), and adds that with M. The result is again a point. Sender sends { kg, M + kdrg } to the receiver Step D: Steps in Decryption Receiver gets { kg, M + kdrg } sent by sender Step 1: Extracts kg portion. Step 2 : Multiples the same with his private key dr> He obtains kgdr> Step 3: He then extracts M + kdfg portion. Subtracts the output of Step 2. i.e. M + kdfg - kgdr> which results in M, the plain text.

14 4.3 Elliptic and Hyper Elliptic Curve Cryptography over Finite Field F p It has recently been reported that elliptic and hyper-elliptic curve cryptography are the two public key cryptographic techniques used to implement the cryptosystems more efficiently and effectively. Many researches are being done to implement these in both hardware and software fields. This section describes the algorithms for private key, public key generation, encryption and decryption for both elliptic curve and hyper-elliptic curve cryptography. Also, the performance of both ECC and HECC are demonstrated. Finally, the comparative study between these two is analyzed [GJG2008]. Cryptography is the branch of cryptology dealing with the design of algorithms for encryption and decryption, intended to ensure the secrecy and/or authenticity of messages. This cryptography is classified into Symmetric and Asymmetric Cryptography based on the number of keys involved in it. The former is the one form of cryptosystem [ATL2006], where the encryption and decryption are performed using the same key which is otherwise called as secret key. The latter one is another form of cryptosystem, where the encryption and decryption are performed using two different keys in which one is referred to as the public key and the other is referred to as the private key.

15 Keys generation (Public Key /Private Key) in BCC: In order to generate keys, to find out one Base Point (G) from the group of Elliptic Curve Points. The Base Point can be generated as follows: [TH01998] Find out the large prime factor (k) for the total number of points (#N) in the elliptic curve group Ep(a4,a6). Compute kp where P is the elliptic curve point in group Ep(a4>a6l- If kp = o then one can consider that P as a Base Point (G) for the key generation process. Algorithm for Keys generation: Input: Public parameters (G, E, p) Output: Public key P and private key a A A 1. aa Cr N [choose a as random prime number in N] 2. Pa< [ajg [The form of PAis a Point in the group Ep(a4,a6) ] 3. Return P and a A A For the random prime number generation in step 1, one can apply the Robbin-Miller Primality Test [JIN2005] or AKS Primality Test algorithm.

16 Elliptic Curve Encryption/Decryption: The first task is to encode the plain text message m to be sent as a (x,y) point, It is the point that will be encrypted as a cipher text and subsequently decrypted. Simply encode the message as the x or y coordinate of a point, because not all such coordinates are in elliptic curve group E^(a4,a&). The Elgamal technique requires some global parameters. Base Point G and an Elliptic group E (a,a ) are the global p 4 6 parameters for the encryption. To encrypt the message, the technique works as follows: To encrypt and send a message to B, A performs the following steps. k G N (choose k as a random positive prime number) R. Q < [k]g P < [k]po (P is receiver s public key) k B B C < (Q, P + P } (C is the Cipher Text and sent as a Point) To decrypt message, the Elgamal Decryption technique works as follows: To decrypt the Cipher Text C, B extracts the first coordinate O m from the cipher text then multiply with its Private Key (a ) and subtract the result from the second coordinate. This can be written as follows, P +kpd -a (Q) = P + kp - a (kg) = P +kpn - k(a G) m B B m B B v ' m B ' B ' P +kp - kp = P m B B m 89

17 In order to perform the above process, the various operations like multiplication of points, addition of points, and negative of a point. A has message m asked the message is encrypted as by adding kp to m. Nobody but A knows the value of k, so even though P is a B B public key, nobody can remove the mask kp For an attacker to remove B. message, the attacker would have to compute k from the given group G and [k]g i.e. Q, which is assumed very hard. This section deals with the public key cryptosystem. There are many algorithms designed based on the public key cryptography. Some of them are RSA algorithm, Diffie-Hellman Key Exchange, Elliptic Curve Cryptography (ECC) and Hyper Elliptic Curve Cryptography (HECC). Many researches are still based on the ECC and HECC. This section mainly deals with the ECC and HECC. The comparison between ECC and HECC is difficult to achieve because of differential sizes, types of operations, and the non- deterministic nature of the HEC operations, in particular the computation of GCDs (Greatest Common Divisors). In addition, a lot of the published ECC [WAS2003] results contain many platform specific optimizations which varying greatly between different implementations. The most interesting results are: 90

18 (a) ECC and HECC are in the same performance range. (b) Under certain conditions hyper elliptic curves are faster than ECC at the same level of security. This result, however, implies the use of very specific curves for HECC. The new metric is validated by comparing our theoretical and practical results. ECC and HECC Applications The need for ECC and HECC are widespread in the applications like e-commerce, m-commerce and embedded systems where the security plays a vital role. The following are the reasons why ECC and HECC are required and why it can be the best alternative compared to RSA. Both ECC and HECC are based on Discrete Logarithm Problems (DLF) which is very hard to break. The length of the key size for performing the encryption and decryption is very minimal compared to any other public-key cryptographic techniques. The following table shows the recommended key size for the various cryptographic techniques which is suggested by the National Institute of Standards Technology (NIST) [NBD2000],

19 Symmetric Key Size (bits) Table4.1: NIST Recommended Key sizes RSA Key Size (bits) Elliptic Curve Key Size (bits) Hyper-elliptic Curve Key Size (genus=2) (bits) *** kick irk* kick This section discusses the fundamental concepts of Elliptic curve and hyper elliptic curve. The working principles of ECC and HECC and the performance of both the ECC and HECC are analyzed [LAN2002]. Performance analysis of ECC and HECC Performance of ECC and HECC is analyzed as an asymmetric key cryptography by designing a digital envelope which comprises AES as symmetric key cryptography along with ECC and/or HECC respectively. Table 4.2 provides details on the time taken (Milliseconds) for Encryption and Decryption of 128 bit AES key and MD5 message digest using ECC and HECC [SKS2000] [WPW2004].

20 Table 4.2: Encryption and Decryption of ECC and HECC 128 bit AES key MD5 Message digest of the Cipher text Encryption (Ecq [ms] Decryption (Ecq [ms] Encryption (HECC) [ms] Decryption (HECC) [ms] [ms] [ms] [ms] [ms] (ECC) (ECC) (HECC) (HECC) Encryption Decryption Encryption Decryption H 128 bit AES key H MD5 Message digest of the Cipher text Figure 4.4: Performance analysis of ECC and HECC

21 Comparison of RSA,ECC and HECC Many researches have been done using ECC and HECC. The working performances of these in the software and hardware area have been compared. This highlights the performance of HECC is better than the ECC and RSA based on following resources. Roberto M.Avanzi [AVA2003] has stated that the performance of hyper-elliptic curves over prime fields is satisfactory enough to be considered as a valid alternative to elliptic curves, especially when large point groups are desired, and the bit length of the characteristic is close to (but smaller than) a multiple of the machine word length. Wollinger T s [TJV2003] contribution clearly shows that HECC - as equal alternative to ECC - can be the cryptosystem of choice for future embedded security applications and real world applications. Table 4.3: Comparison of RSA, ECC and HECC HECC(g=2) ECC RSA HECC(g=2) ECC RSA Encryption Encryption Encryption Decryption Decryption Decryption 128-bit AES key MD5 of the Ciphertext

22 B d d E n c ry p tio n E n c ry p tio n D ecry p ti on D e c ry p tio n D e c ry p tio n i > U 1 O o O o o d o E n c ry p tio n to Ik ECC RSA HECC ECC RSA (g=2) 128-bit AES key l MD5 of the Ciphertext Figure 4.5: Comparison of RSA, ECC and HECC 95

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY PRAKASH C. GUPTA Former Head Department of Information Technology Maharashtra Institute of Technology Pune Delhi-110092 2015 CRYPTOGRAPHY

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA

More information

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest 1 2 3 This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest PKCS, Diffie- Hellman key exchange. This first published

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms

More information

Key Management and Distribution

Key Management and Distribution CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 10 Key Management; Other Public Key Cryptosystems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan

More information

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a

More information

Public Key Cryptography

Public Key Cryptography graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,

More information

Computer Security 3/23/18

Computer Security 3/23/18 s s encrypt a block of plaintext at a time and produce ciphertext Computer Security 08. Cryptography Part II Paul Krzyzanowski DES & AES are two popular block ciphers DES: 64 bit blocks AES: 128 bit blocks

More information

ECC Elliptic Curve Cryptography. Foundations of Cryptography - ECC pp. 1 / 31

ECC Elliptic Curve Cryptography. Foundations of Cryptography - ECC pp. 1 / 31 ECC Elliptic Curve Cryptography Foundations of Cryptography - ECC pp. 1 / 31 Elliptic Curve an elliptic curve E is a smooth, projective, algebraic curve defined by the following equation: y 2 3 2 a xy

More information

Cryptographic Systems

Cryptographic Systems CPSC 426/526 Cryptographic Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-10 In lec-10, we learned: - Consistency models - Two-phase commit - Consensus - Paxos Lecture Roadmap

More information

Public Key Algorithms

Public Key Algorithms Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

Cryptography and Network Security Chapter 10. Fourth Edition by William Stallings

Cryptography and Network Security Chapter 10. Fourth Edition by William Stallings Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Chapter 10 Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture out of the

More information

Public-key encipherment concept

Public-key encipherment concept Date: onday, October 21, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on Public Key Cryptography Public-key encipherment concept Each user in a secure communication

More information

Elliptic Curve Public Key Cryptography

Elliptic Curve Public Key Cryptography Why? Elliptic Curve Public Key Cryptography ECC offers greater security for a given key size. Why? Elliptic Curve Public Key Cryptography ECC offers greater security for a given key size. The smaller key

More information

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional

More information

Encryption Details COMP620

Encryption Details COMP620 Encryption Details COMP620 Encryption is a powerful defensive weapon for free people. It offers a technical guarantee of privacy, regardless of who is running the government It s hard to think of a more

More information

Cryptography MIS

Cryptography MIS Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

Security. Communication security. System Security

Security. Communication security. System Security Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 10 Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would

More information

CS669 Network Security

CS669 Network Security UNIT II PUBLIC KEY ENCRYPTION Uniqueness Number Theory concepts Primality Modular Arithmetic Fermet & Euler Theorem Euclid Algorithm RSA Elliptic Curve Cryptography Diffie Hellman Key Exchange Uniqueness

More information

Public Key Encryption. Modified by: Dr. Ramzi Saifan

Public Key Encryption. Modified by: Dr. Ramzi Saifan Public Key Encryption Modified by: Dr. Ramzi Saifan Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime numbers are central to number

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System) Department of Software The University of Babylon LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY (One-Way Functions and ElGamal System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

Lecture 6: Overview of Public-Key Cryptography and RSA

Lecture 6: Overview of Public-Key Cryptography and RSA 1 Lecture 6: Overview of Public-Key Cryptography and RSA Yuan Xue In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO.

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. vii TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATION iii xii xiv xvii 1 INTRODUCTION 1 1.1 GENERAL 1 1.2 TYPES OF WIRELESS COMMUNICATION

More information

Secret Key Cryptography

Secret Key Cryptography Secret Key Cryptography 1 Block Cipher Scheme Encrypt Plaintext block of length N Decrypt Secret key Cipher block of length N 2 Generic Block Encryption Convert a plaintext block into an encrypted block:

More information

Network Security. Chapter 4 Public Key Cryptography. Public Key Cryptography (4) Public Key Cryptography

Network Security. Chapter 4 Public Key Cryptography. Public Key Cryptography (4) Public Key Cryptography Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Encryption/Decryption using Public Key Cryptography Network Security Chapter 4 Public Key Cryptography However,

More information

CSE 127: Computer Security Cryptography. Kirill Levchenko

CSE 127: Computer Security Cryptography. Kirill Levchenko CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified

More information

Crypto Basics. Recent block cipher: AES Public Key Cryptography Public key exchange: Diffie-Hellmann Homework suggestion

Crypto Basics. Recent block cipher: AES Public Key Cryptography Public key exchange: Diffie-Hellmann Homework suggestion Crypto Basics Recent block cipher: AES Public Key Cryptography Public key exchange: Diffie-Hellmann Homework suggestion 1 What is a cryptosystem? K = {0,1} l P = {0,1} m C = {0,1} n, C C E: P K C D: C

More information

Ref:

Ref: Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:

More information

APNIC elearning: Cryptography Basics

APNIC elearning: Cryptography Basics APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security

More information

Number Theory and RSA Public-Key Encryption

Number Theory and RSA Public-Key Encryption Number Theory and RSA Public-Key Encryption Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu CIA Triad: Three Fundamental

More information

Symmetric Cryptography. CS4264 Fall 2016

Symmetric Cryptography. CS4264 Fall 2016 Symmetric Cryptography CS4264 Fall 2016 Correction: TA Office Hour Stefan Nagy (snagy2@vt.edu) Office hour: Thursday Friday 10-11 AM, 106 McBryde Hall 2 Slides credit to Abdou Illia RECAP AND HIGH-LEVEL

More information

ANALYSIS OF AES ENCRYPTION WITH ECC

ANALYSIS OF AES ENCRYPTION WITH ECC ANALYSIS OF AES ENCRYPTION WITH ECC Samiksha Sharma Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Vinay Chopra Department of Computer

More information

Tuesday, January 17, 17. Crypto - mini lecture 1

Tuesday, January 17, 17. Crypto - mini lecture 1 Crypto - mini lecture 1 Cryptography Symmetric key cryptography (secret key crypto): sender and receiver keys identical Asymmetric key cryptography (public key crypto): encryption key public, decryption

More information

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

Spring 2010: CS419 Computer Security

Spring 2010: CS419 Computer Security Spring 2010: CS419 Computer Security MAC, HMAC, Hash functions and DSA Vinod Ganapathy Lecture 6 Message Authentication message authentication is concerned with: protecting the integrity of a message validating

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4 EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review

More information

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography Understanding Cryptography by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 9 Elliptic Curve Cryptography ver. February 2nd, 2015 These slides were prepared by Tim Güneysu, Christof Paar

More information

Goals for Today. Substitution Permutation Ciphers. Substitution Permutation stages. Encryption Details 8/24/2010

Goals for Today. Substitution Permutation Ciphers. Substitution Permutation stages. Encryption Details 8/24/2010 Encryption Details COMP620 Goals for Today Understand how some of the most common encryption algorithms operate Learn about some new potential encryption systems Substitution Permutation Ciphers A Substitution

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

Symmetric, Asymmetric, and One Way Technologies

Symmetric, Asymmetric, and One Way Technologies Symmetric, Asymmetric, and One Way Technologies Crypto Basics Ed Crowley Fall 2010 1 Topics: Symmetric & Asymmetric Technologies Kerckhoff s Principle Symmetric Crypto Overview Key management problem Attributes

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Giuseppe F. Italiano Universita` di Roma Tor Vergata italiano@disp.uniroma2.it Motivation Until early 70s, cryptography was mostly owned by government and military Symmetric cryptography

More information

Cryptographic Hash Functions

Cryptographic Hash Functions Cryptographic Hash Functions Cryptographic Hash Functions A cryptographic hash function takes a message of arbitrary length and creates a message digest of fixed length. Iterated Hash Function A (compression)

More information

UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Introduction to Cryptography ECE 597XX/697XX

UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Introduction to Cryptography ECE 597XX/697XX UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 10 Digital Signatures Israel Koren ECE597/697 Koren Part.10.1 Content of this part

More information

Diffie-Hellman Protocol as a Symmetric Cryptosystem

Diffie-Hellman Protocol as a Symmetric Cryptosystem IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.7, July 2018 33 Diffie-Hellman Protocol as a Symmetric Cryptosystem Karel Burda, Brno University of Technology, Brno, Czech

More information

Delineation of Trivial PGP Security

Delineation of Trivial PGP Security IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 20, Issue 3, Ver. I (May. - June. 2018), PP 17-23 www.iosrjournals.org Delineation of Trivial PGP Security Mr.

More information

Network Security Essentials

Network Security Essentials Network Security Essentials Applications and Standards Third Edition William Stallings Chapter 2 Symmetric Encryption and Message Confidentiality Dr. BHARGAVI H. GOSWAMI Department of Computer Science

More information

Public Key Cryptography and RSA

Public Key Cryptography and RSA Public Key Cryptography and RSA Major topics Principles of public key cryptosystems The RSA algorithm The Security of RSA Motivations A public key system is asymmetric, there does not have to be an exchange

More information

Prime Field over Elliptic Curve Cryptography for Secured Message Transaction

Prime Field over Elliptic Curve Cryptography for Secured Message Transaction Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Proposal for Scrambled Method based on NTRU

Proposal for Scrambled Method based on NTRU Proposal for Scrambled Method based on NTRU Ahmed Tariq Sadiq Computer Science Department University of Technology Baghdad, Iraq Najlaa Mohammad Hussein Computer Science Department Baghdad University Baghdad,

More information

Security: Cryptography

Security: Cryptography Security: Cryptography Computer Science and Engineering College of Engineering The Ohio State University Lecture 38 Some High-Level Goals Confidentiality Non-authorized users have limited access Integrity

More information

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and

More information

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings Key Exchange References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings Outlines Primitives Root Discrete Logarithm Diffie-Hellman ElGamal Shamir s Three Pass

More information

borzoi Manual Dragongate Technologies Ltd.

borzoi Manual Dragongate Technologies Ltd. borzoi Manual Dragongate Technologies Ltd. September 21, 2003 Contents 1 Introduction 1 2 Preliminaries 2 2.1 Header Files............................ 2 2.2 Type Definitions......................... 2

More information

Key Exchange. Secure Software Systems

Key Exchange. Secure Software Systems 1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?

More information

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7 Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:

More information

RSA. Public Key CryptoSystem

RSA. Public Key CryptoSystem RSA Public Key CryptoSystem DIFFIE AND HELLMAN (76) NEW DIRECTIONS IN CRYPTOGRAPHY Split the Bob s secret key K to two parts: K E, to be used for encrypting messages to Bob. K D, to be used for decrypting

More information

Practical Aspects of Modern Cryptography

Practical Aspects of Modern Cryptography Practical Aspects of Modern Cryptography Lecture 3: Symmetric s and Hash Functions Josh Benaloh & Brian LaMacchia Meet Alice and Bob Alice Bob Message Modern Symmetric s Setup: Alice wants to send a private

More information

PUBLIC KEY CRYPTO. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA

PUBLIC KEY CRYPTO. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA PUBLIC KEY CRYPTO Anwitaman DATTA SCSE, NTU Singapore Acknowledgement: The following lecture slides are based on, and uses material from the text book Cryptography and Network Security (various eds) by

More information

Channel Coding and Cryptography Part II: Introduction to Cryptography

Channel Coding and Cryptography Part II: Introduction to Cryptography Channel Coding and Cryptography Part II: Introduction to Cryptography Prof. Dr.-Ing. habil. Andreas Ahrens Communications Signal Processing Group, University of Technology, Business and Design Email: andreas.ahrens@hs-wismar.de

More information

Chapter 3 Public Key Cryptography

Chapter 3 Public Key Cryptography Cryptography and Network Security Chapter 3 Public Key Cryptography Lectured by Nguyễn Đức Thái Outline Number theory overview Public key cryptography RSA algorithm 2 Prime Numbers A prime number is an

More information

Overview. Public Key Algorithms I

Overview. Public Key Algorithms I Public Key Algorithms I Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.lsu.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601-04/ Louisiana State

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 13 Digital Signatures To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage

More information

Applied Cryptography and Computer Security CSE 664 Spring 2018

Applied Cryptography and Computer Security CSE 664 Spring 2018 Applied Cryptography and Computer Security Lecture 13: Public-Key Cryptography and RSA Department of Computer Science and Engineering University at Buffalo 1 Public-Key Cryptography What we already know

More information

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.). Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 2 M.M:50 The question paper contains 40 multiple choice questions with four choices and students will have to pick the

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lectures 16, 17: Security of RSA El Gamal Cryptosystem Announcement Final exam will be on May 11, 2015 between 11:30am 2:00pm in FMH 319 http://www.njit.edu/registrar/exams/finalexams.php

More information

Abhijith Chandrashekar and Dushyant Maheshwary

Abhijith Chandrashekar and Dushyant Maheshwary By Abhijith Chandrashekar and Dushyant Maheshwary Introduction What are Elliptic Curves? Curve with standard form y 2 = x 3 + ax + b a, b ϵ R Characteristics of Elliptic Curve Forms an abelian group Symmetric

More information

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption Introduction to Cryptography and Security Mechanisms: Unit 5 Public-Key Encryption Learning Outcomes Explain the basic principles behind public-key cryptography Recognise the fundamental problems that

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 23 wenbing@ieee.org (Lecture notes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Introduction to

More information

Winter 2011 Josh Benaloh Brian LaMacchia

Winter 2011 Josh Benaloh Brian LaMacchia Winter 2011 Josh Benaloh Brian LaMacchia Symmetric Cryptography January 20, 2011 Practical Aspects of Modern Cryptography 2 Agenda Symmetric key ciphers Stream ciphers Block ciphers Cryptographic hash

More information

PROTECTING CONVERSATIONS

PROTECTING CONVERSATIONS PROTECTING CONVERSATIONS Basics of Encrypted Network Communications Naïve Conversations Captured messages could be read by anyone Cannot be sure who sent the message you are reading Basic Definitions Authentication

More information

Encryption I. An Introduction

Encryption I. An Introduction Encryption I An Introduction Reading List ADO and SQL Server Security A Simple Guide to Cryptography Protecting Private Data with the Cryptography Namespaces Using MD5 to Encrypt Passwords in a Database

More information

Chapter 9. Public Key Cryptography, RSA And Key Management

Chapter 9. Public Key Cryptography, RSA And Key Management Chapter 9 Public Key Cryptography, RSA And Key Management RSA by Rivest, Shamir & Adleman of MIT in 1977 The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on

More information

Introduction to Elliptic Curve Cryptography

Introduction to Elliptic Curve Cryptography A short and pleasant Introduction to Elliptic Curve Cryptography Written by Florian Rienhardt peanut.@.bitnuts.de Abstract This is a very basic and simplified introduction into elliptic curve cryptography.

More information

Technological foundation

Technological foundation Technological foundation Carte à puce et Java Card 2010-2011 Jean-Louis Lanet Jean-louis.lanet@unilim.fr Cryptology Authentication Secure upload Agenda Cryptology Cryptography / Cryptanalysis, Smart Cards

More information

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain Cryptography Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar Submitted by:- Hardeep Gaurav Jain Cryptography Cryptography, a word with Greek origins, means "secret writing." However, we use the term

More information

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages. Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets

More information

Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm

Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm Princess Arleen S Zamora Gaduate Programs, Technological Institute of the Philippines Quezon City 1901, Philippines

More information

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test ECE 646 Fall 2009 Final Exam December 15, 2009 Multiple-choice test 1. (1 pt) Parallel processing can be used to speed up the following cryptographic transformations (please note that multiple answers

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Misconceptions Concerning Public-Key Encryption Public-key encryption is more secure from

More information

ISSN: Page 320

ISSN: Page 320 A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar

More information

Analysis, demands, and properties of pseudorandom number generators

Analysis, demands, and properties of pseudorandom number generators Analysis, demands, and properties of pseudorandom number generators Jan Krhovják Department of Computer Systems and Communications Faculty of Informatics, Masaryk University Brno, Czech Republic Jan Krhovják

More information

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E

More information

The Application of Elliptic Curves Cryptography in Embedded Systems

The Application of Elliptic Curves Cryptography in Embedded Systems The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography

More information

1.264 Lecture 28. Cryptography: Asymmetric keys

1.264 Lecture 28. Cryptography: Asymmetric keys 1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver

More information

Elliptic Curve Cryptosystem

Elliptic Curve Cryptosystem UDC 681.8 Elliptic Curve Cryptosystem VNaoya Torii VKazuhiro Yokoyama (Manuscript received June 6, 2000) This paper describes elliptic curve cryptosystems (ECCs), which are expected to become the next-generation

More information

Parallelizing Cryptography. Gordon Werner Samantha Kenyon

Parallelizing Cryptography. Gordon Werner Samantha Kenyon Parallelizing Cryptography Gordon Werner Samantha Kenyon Outline Security requirements Cryptographic Primitives Block Cipher Parallelization of current Standards AES RSA Elliptic Curve Cryptographic Attacks

More information

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message

More information

Lecture 1 Applied Cryptography (Part 1)

Lecture 1 Applied Cryptography (Part 1) Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication

More information