Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm

Size: px
Start display at page:

Download "Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm"

Transcription

1 Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm Princess Arleen S Zamora Gaduate Programs, Technological Institute of the Philippines Quezon City 1901, Philippines pazamora@sscmnl.edu.ph Bobby D Gerardo Institute of Information and Communications Technology West Visayas State University Lapaz, Iloilo City, Philippines bgerardo@wvsu.edu.ph Bartolome T Tanguilig III Graduate Programs Technological Institute of the Philippines Quezon City 1901, Philippines bttanguilig_3@yahoo.com Abstract Cryptography is one way on how to protect data. In this paper, you will see how Diffie-Hellman and RSA Asymmetric Public Key Cryptology works. The output of harmonizing these two algorithms is the Enhanced Asymmetric Public Key Cryptology that will be applied to Document Management System (DMS). Testing of the proposed algorithm is done by simulating its process. Used heap memory, class count, and CPU usage were measured to test the proposed algorithm. Keywords- RSA; DH; RSADH; Cryptology I. INTRODUCTION As data continuous to grow, protection of information is becoming very significant. Every computer system in an organization has its levels of users, and each user has its password for security. Data security can be strengthened by the use of cryptology. The researcher chooses to propose an enhancement in public key cryptology by harmonizing Diffie Hellman(DH) and Rivest, Shamir, Adleman (RSA) algorithm. The proposed algorithm will enhance security in the key exchange process of RSA and add encryption and decryption on the part of DH. The following objectives are expected to be achieved in this paper [1] to harmonize Diffie-Hellman algorithm and RSA security in key exchange process [2] to evaluate the RSADH method by demonstrating the key exchange, encryption and decryption of messages from the given processes; [3] test the performance of the proposed algorithm using used heap memory, class count, and CPU usage. II. REVIEW OF RELATED LITERATURE This section intends to review literature and studies related to Diffie-hellman and RSA cipher, synthesize, and use what applies to the topic. In 1976, Diffie and Hellman [1] proposed a scheme using exponentiation modulo q (a prime) as a public key exchange algorithm. According to their paper; New directions in cryptology, that the best known cryptographic problem is that of privacy: preventing the unauthorized extraction of information from communications over an insecure channel order to use cryptography to ensure privacy and the second problem is authentication: amenable to cryptographic solution which stands in the way of replacing contemporary business communications by teleprocessing system [1] Message authenticity is guaranteed by adding a secret key but also by attaching the date and time to each message and encrypting the entire sequence. Authentication is the heart of any system involving contracts and billing [1]. One-way authentication provides protection against third party attacks. DMS is a multiuser login account. Same as true with the given example by DH, the admin of the DMS needs to set-up his account and chooses his password. Every time the user needs to log in, it asks for a username and a secret password. The problem comes in if the system operators have legitimate reasons to access the password directory. That is the reason DH develops a new login procedure capable of judging the authenticity of the password. Steps are as follows [1]: 1) When the user first enters his password PW, the computer automatically and transparently saves f (PW) and stores this not as PW in the password directory. 2) For each login, the computer calculates f (X), where X is the proffered password, and compares f (X), where X is the proffered password and compares f (X) with the stored value f (PW). 3) If and only if they are equal, the user is accepted as being authentic. The above-mentioned steps are also true with public key cryptology. 1) When the user A sends message M to user B, he first deciphers it in his secret deciphering key and sends D A (M). 2) When user B receives the message, he can read and to make sure of its authenticity, he enciphers it using A s public enciphering key E A. 3) User B also saves D A (M) as a proof of the message that comes from A. 1

2 Preeti and Sharma proposed an improvement of Diffie- Hellman Algorithm. The enhancement was implemented in JAVA. Steps of the proposed algorithm [2] are as follows: 1) The user selects prime no. a (create two separate instances of Diffie-hellman object one for the sender and one for the receiver). 2) Sender enters a prime number. 3) Receiver also enters a prime number. 4) The sender sends p and g (safe prime number) to the receiver. 5) Then the receiver will check if p is safe or not. 6) Creates 256-bit key at sender at sender and receiver side finding the k function. 7) Performs encryption using a key at sender side or decryption at the receiver side. 8) Writes the generated key into a file for analysis purpose. The proposed differs from the DH algorithm on step number 6. Preeti and Sharma tested the two algorithms in terms of entropy, floating frequency, auto-correlation, n-gram, and periodicity. Hirose and Yoshida [3] proposed a two-party authenticated Diffie-hellman key agreement that provides forward secrecy. Interference and un-known key share are the two active attacks solved using KAP (key agreement protocol). Also, the same with other security algorithm, there is also limitations and disadvantages. One of its disadvantages is that each user needs to generate two random numbers from Zq in one execution. It also requires the user s slightly more modular exponentials than other protocol. The algorithm used by Hirose and Yoshida were analyzed and was used as a basis for the researcher to enhance the algorithm. Abdalla et al. [4] called their encryption scheme based on DH problem DHAES. It has a basic property to secure encryption (plain text attacks) and a solution for privacy under adaptive and non-adaptive ciphertext attacks. TABLE I. TABLE I. VISHAL GARG AND YISHU [6] PROPOSED ALGORITHM Sender Side 1) X a< q (user can select any random number less than q) 2) Y a = a xa mod q (Y a is a public key of sender) 3) K = Y b xa mod q (where Y b is a public key of receiver and K is a private key) 4) pow = 2 k 5) pow = pow + q Encrypt every letter of plain text using pow Receiver Side 1) X b< q (user can select any random number less than q) 2) Y b=a xb mod q (Y b is public key of receiver) 3) K = Y xb a mod q (where Y a is a public key of sender and K is a private key) 4) pow = 2 k 5) pow = pow + q Decrypt every letter of cipher text using pow Vishal Garg and Yishu [6] improve DH algorithm for network security enhancement by including pow = 2 k as step 4 (sender side) and use step 4 pow = 2 k and step 5 pow=pow = q on the receiver side. The proposed and classical DH use various parameters such as entropy, autocorrelation, etc. The reason why Rivest, Shamir, and Adleman [7] developed the method for obtaining a digital signature and public key cryptosystem is because they got motivated by the concept of Diffie-Hellman. Notably, the encryption does not increase the size of the message. Both sent messages and the ciphertext are integers ranging from 0 n-1. The author s encryption and decryption methods are: [7] 1) To encrypt the message M, use a public encryption key (e,n). a) First represent the message as an integer between 0 and n-1. (Here you break a long message into series of blocks and represent each as an integer.) Note that the purpose here is to get into the numeric form necessary for encryption. b) For the encryption part, encrypt the message by raising it to the e th power modulo n c-> ciphertext ; C E(M) M e (mod n), for message M 2) To decrypt the ciphertext, raise to another power d, then again modulo n D(C) C d (mod n), for ciphertext C. Below is the process of choosing the encryption and decryption method [6]: a) First compute n as the product of 2 large random prime p and q. Make n as public, but the factors p and q will be effectively hidden from everyone else due to difficulty factoring n. n=p*q. b) Pick the integer d to be a large and random integer and relatively prime to (p-1) (q-1) and check if it satisfies the greatest common divisor equals to 1, gcd (d, (p-1) *(q*1)) =1. c) Compute for e from p, q, and d to be multiplicative inverse of d, modulo(p-1) *(q-1), e*d 1 (mod (p 1) * (q 1)). Pointcheval-* [10] mentioned in his paper that to prove the security of the cryptographic protocol, we must first be precise on what protocol to achieve, under what kind of attack. What motivated him to do the study is in the complexity theory sense that if one can break the cryptographic protocol, one can also efficiently solve the underlying problems. The method he called reductionist security proof is the focus of his study. On his research, he gave an example on how to factor integer using RSA and discrete logarithm using Diffie-Hellman problems. From the journal entitled Comparative Study of Asymmetric Key Cryptographic Algorithms [11] the authors 2

3 claimed that Integer Factorization schemes are based on the fact that it is difficult to factor large integers. And this is one of the processes of RSA. This journal also presented Diffie- Hellman key exchange algorithm and RSA key generation and encryption and decryption. The authors review the five commonly used asymmetric key cryptology algorithms: RSA, Diffie-Hellman, ElGamal, DSA, and ECC. They concluded that RSA needs to grow to 2048 bits. They also mentioned that most practical protocols are hybrid protocols which incorporate both symmetric and public key algorithms. In 2014, Kuppuswammy and Al-Khalidi [12] proposed a hybrid encryption system using a new public key algorithm and private key algorithm. They addressed the concerns of user s privacy, authentication, and accuracy. The integration security is from the four different sources like user, application security, resources and hardware. The hybrid encryption system is a combination of RSA and AES and is an efficient technique to ensure the security of the data being transmitted. Over different text sizes, 128 bits, 256 bits, 512 bits, 1024 and 2048, Meelu and Meelu [13] tried RSA encryption and decryption process. They also mentioned that the code can be used to encrypt a word file, picture file, binary file, and text file. III. THE PROPOSED KEY EXCHANGE Enhancement is done by harmonizing Diffie-Hellman algorithm and RSA security in the key exchange process. The keys agreed upon will be used to unlock the encrypted message and the key generated will be used for encrypting and decrypting the message of a file. In this research paper, the author will use the Diffie-Hellman algorithm to encrypt and decrypt password for a certain file. If somebody tries to hack the file, even if he opens the file, he still needs to decrypt the message. Only the sender and the recipient knows the generated key. The process may take long, but the security of the file /message will be strengthened. A. Diffie-Hellman Key Exchange Algorithm[5] 1) User i chooses a random integer X i and the user j a random integer X j. Then the user i picks a random number X i from the integer set {1, 2,..., q 1}. The user i keeps X i secret, but sends Y i α Xi (mod q), (1) to the user j. Similarly, the user j chooses a random integer X j and sends Y j α Xj (mod q), (2) to the user i. 2) Both users i and j can now compute: K ij α XiXj (mod q), (3) (4) and use K ij as their common key. 3) The user i computes K ij by raising Y j to the power X i : K ij Y j Xi (mod q) (α Xj ) Xi (mod q) α XjXi α XiXj (mod q) and the user j computes K ij in a similar fashion: K ij Y i Xj (mod q), (α Xi ) Xj α XiXj (mod q). B. RSA Key Exchange Algorithm, Encryption and Decryption Algorithm RSA cryptosystems security depends on the problem of factoring large numbers. It was named after its inventor Rivest, Schamir, and Adleman (1977). The steps [7] are as follows: 1) Choose two very large prime p and q. 2) Compute for the value of n: n= pq. (1) 3) Then choose an encryption key e such that e and Φ (n) are coprime. Using Euler s totient function gcd (e, Φ(n)) =1, such that: Φ(n) = (p-1) (q-1). (2) 4) Using the Euclidean algorithm, the private key d for decryption using this formula: d = e -1 (mod Φ (n)) or ed 1 (mod Φ(n)). (3) 5) To encrypt the message m, ciphertext c corresponds to the block in the given formula below: c m e (mod n). (4) The decryption key d and the modulo n are also prime numbers and a private key while e and n are called public keys. 6) To decrypt a ciphertext: m c d (mod n). (5) It also proves that c d m ed m (mod n) because ed 1 (mod Φ (n)). C. The Enhanced Algorithm Based on the gathered research, the problem mentioned with RSA is the speed, because the security of RSA relies on factoring two (2) very large numbers. DH security is based on exponential key exchange. To solve the problem, the author will combine DH [5] and RSA [7]. Since there are two cryptographic algorithms to use, we can now have a small 3

4 prime number to make the processing faster and at the same time to tighten the security of the file/message, the agreed upon prime number will be used to encrypt and decrypt the message. The author will call this enhancement, RSADH. The process of key exchange will be as follows: 1) User i and user j choose a random integer number the two prime numbers p and q. 2) User i and user j choose their respective secret number I and J but send: User i x = q I mod p and sends to user j, (1) User j x = q J mod p and sends to user i. (2) 3) Compute for the Session Key User j k = i x ^J mod p (3) User i k =j x ^ I mod p (4) 4) The file maybe unlocked but the message is still unreadable. To encrypt the message User i and User j use p and q and get for the n and Φ. n=pq, (5) Φ = (p-1) (q-1). (6) a. Specify alphabet to the characters 5) User i and j choose an encryption key e, and the decryption d using the extended Euler Greatest Common Divisor Algorithm e * d mod Φ = 1. 6) Message is encrypted by raising it to the power e and dividing it by n. Encryption is per letter. Use the formula: IV. SIMULATION AND TESTING RESULTS The simulation of the process is done with the use of Cryptool. Algorithm was coded using Java and run the analysis using JVM monitor. TABLE II. TABLE II. KEY EXCHANGE PROCESS, ENCRYPTION, AND DECRYPTION PROCESS OF DIFFIE-HELLMAN, RSA, AND PROPOSED ALGORITHM APKC Process DH RSA Proposed Algorithm (RSADH) User i User j User i Secret User j Secret Shared Key A Shared Key B Session Key n Φ e d Plaintext coded in numbers of base Encryption to Cipher text Ciphertext coded in numbers of base The proposed algorithm used heap memory during runtime approximately increases every one minute. c 1 = m e 1(mod n) (7) 7) The ciphertext is decrypted by raising it to the power d and dividing it by n. Decryption is per letter. Use the formula: m 1 = c d 1(mod n). (8) Translate the deciphered integers into a specific alphabet. Figure 1. Figure 1. Used Heap Memory of the Proposed Algorithm The figure below shows the class being loaded during runtime of the proposed system increases as the program is calling it. 4

5 V. CONCLUSION This paper shows that Diffie-Hellman and RSA Security can be combined to make a more secured algorithm. By having two prime input for p and q, and use this input to get the e and d to strengthen the security of the file. The proposed algorithm adds security in a key exchange process of RSA using some steps of Diffie-Hellman. If ever the file will be unlocked, the message cannot be read because it is encrypted. The proposed algorithm will be used in securing file for document management system. Figure 2. Loaded Class Count of the Proposed Algorithm Figure 3 shows that the CPU usage of the proposed system in less than 95 ms is less than five percent (5%). Testing was done using Intel Core i7 (16 GB RAM). Figure 3. CPU Usage of the Proposed Algorithm REFERENCES [1] W. Diffie and M. Hellman, New Directions in Cryptography, IEEE Trans. Inform Theory, [2] Preeti and B. Sharma, Enhancement in Security by improving Diffie- Hellman Algorithm, International Journal for Advance Research in Engineering and Technology, Vol 2, Issue VI, [3] S. Hirose and S. Yoshida, An authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks, Springer, Volume 1431, 1998, 2006, pp [4] Abdalla, Bellare, Rogaway, DHAES: An Encryption Scheme based on the Diffie-Hellman Problem, IEEE, [5] M.Y. Lee, Internet Security: Cryptographic Principles and Protocols, John Wiley and Sons, Ltd, 2003, p [6] V. Garg and Rishu, Improved Diffie-Hellman Algorithm for Network Security Enhancement, International J. Computer Technology and Applications, Vol 3 (4) I327-I3 [7] R.L Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, [8] M. Ginsburg, Intranet Document Management Systems as Knowledge Ecologies, Proceedings of the 33rd Hawaii International Conference on System Sciences, IEEE, [9] M.Y. Lee, Internet Security: Cryptographic Principles and Protocols, John Wiley and Sons, Ltd, 2003, p [10] D. Pointcheval, Asymmetric Cryptology and Practical Security, Journal of Telecommunications and Information Technology. Vol 4, 2002, Page [11] Arya, Aswal, and Kumar, International Journal of Computer Science and Communication Networks. Vol 5 Page [12] P. Kuppuswammy and S. Al-Khalidi, Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm, MIS Review Vol 19 No2, 2014, Pages [13] P. Meelu and R. Meelu, Implementation of Public Key Cryptographic System: RSA, International Journal of Information Technology and Knowledge Management, July- December 2012, Vol 5. No.2, Pages

Public Key Algorithms

Public Key Algorithms Public Key Algorithms CS 472 Spring 13 Lecture 6 Mohammad Almalag 2/19/2013 Public Key Algorithms - Introduction Public key algorithms are a motley crew, how? All hash algorithms do the same thing: Take

More information

Public Key Algorithms

Public Key Algorithms Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular

More information

Public-key encipherment concept

Public-key encipherment concept Date: onday, October 21, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on Public Key Cryptography Public-key encipherment concept Each user in a secure communication

More information

Chapter 9. Public Key Cryptography, RSA And Key Management

Chapter 9. Public Key Cryptography, RSA And Key Management Chapter 9 Public Key Cryptography, RSA And Key Management RSA by Rivest, Shamir & Adleman of MIT in 1977 The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on

More information

Overview. Public Key Algorithms I

Overview. Public Key Algorithms I Public Key Algorithms I Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.lsu.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601-04/ Louisiana State

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA

More information

Public Key Cryptography

Public Key Cryptography graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,

More information

ASYMMETRIC CRYPTOGRAPHY

ASYMMETRIC CRYPTOGRAPHY ASYMMETRIC CRYPTOGRAPHY CONTENT: 1. Number Theory 2. One Way Function 3. Hash Function 4. Digital Signature 5. RSA (Rivest-Shamir Adleman) References: 1. Applied Cryptography, Bruce Schneier 2. Cryptography

More information

Topics. Number Theory Review. Public Key Cryptography

Topics. Number Theory Review. Public Key Cryptography Public Key Cryptography Topics 1. Number Theory Review 2. Public Key Cryptography 3. One-Way Trapdoor Functions 4. Diffie-Helman Key Exchange 5. RSA Cipher 6. Modern Steganography Number Theory Review

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 2.5 Public Key Algorithms CSC 474/574 Dr. Peng Ning 1 Public Key Algorithms Public key algorithms covered in this class RSA: encryption and digital signature

More information

Lecture 6: Overview of Public-Key Cryptography and RSA

Lecture 6: Overview of Public-Key Cryptography and RSA 1 Lecture 6: Overview of Public-Key Cryptography and RSA Yuan Xue In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first

More information

Public Key Algorithms

Public Key Algorithms CSE597B: Special Topics in Network and Systems Security Public Key Cryptography Instructor: Sencun Zhu The Pennsylvania State University Public Key Algorithms Public key algorithms RSA: encryption and

More information

Network Security. Chapter 4 Public Key Cryptography. Public Key Cryptography (4) Public Key Cryptography

Network Security. Chapter 4 Public Key Cryptography. Public Key Cryptography (4) Public Key Cryptography Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Encryption/Decryption using Public Key Cryptography Network Security Chapter 4 Public Key Cryptography However,

More information

Chapter 3 Public Key Cryptography

Chapter 3 Public Key Cryptography Cryptography and Network Security Chapter 3 Public Key Cryptography Lectured by Nguyễn Đức Thái Outline Number theory overview Public key cryptography RSA algorithm 2 Prime Numbers A prime number is an

More information

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System) Department of Software The University of Babylon LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY (One-Way Functions and ElGamal System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Public Key Cryptography and RSA

Public Key Cryptography and RSA Public Key Cryptography and RSA Major topics Principles of public key cryptosystems The RSA algorithm The Security of RSA Motivations A public key system is asymmetric, there does not have to be an exchange

More information

ISA 662 Internet Security Protocols. Outline. Prime Numbers (I) Beauty of Mathematics. Division (II) Division (I)

ISA 662 Internet Security Protocols. Outline. Prime Numbers (I) Beauty of Mathematics. Division (II) Division (I) Outline ISA 662 Internet Security Protocols Some Math Essentials & History Asymmetric signatures and key exchange Asymmetric encryption Symmetric MACs Lecture 2 ISA 662 1 2 Beauty of Mathematics Demonstration

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Misconceptions Concerning Public-Key Encryption Public-key encryption is more secure from

More information

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages. Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets

More information

Lecture 2 Applied Cryptography (Part 2)

Lecture 2 Applied Cryptography (Part 2) Lecture 2 Applied Cryptography (Part 2) Patrick P. C. Lee Tsinghua Summer Course 2010 2-1 Roadmap Number theory Public key cryptography RSA Diffie-Hellman DSA Certificates Tsinghua Summer Course 2010 2-2

More information

Key Exchange. Secure Software Systems

Key Exchange. Secure Software Systems 1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 6 Introduction to Public-Key Cryptography ver. November 18, 2010 These

More information

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography Outline 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

Applied Cryptography and Computer Security CSE 664 Spring 2018

Applied Cryptography and Computer Security CSE 664 Spring 2018 Applied Cryptography and Computer Security Lecture 13: Public-Key Cryptography and RSA Department of Computer Science and Engineering University at Buffalo 1 Public-Key Cryptography What we already know

More information

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography 1. Introduction 2. RSA Outline 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

CS669 Network Security

CS669 Network Security UNIT II PUBLIC KEY ENCRYPTION Uniqueness Number Theory concepts Primality Modular Arithmetic Fermet & Euler Theorem Euclid Algorithm RSA Elliptic Curve Cryptography Diffie Hellman Key Exchange Uniqueness

More information

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d) Outline AIT 682: Network and Systems Security 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard Topic 5.2 Public Key Cryptography Instructor: Dr. Kun Sun 2 Public Key

More information

Chapter 9 Public Key Cryptography. WANG YANG

Chapter 9 Public Key Cryptography. WANG YANG Chapter 9 Public Key Cryptography WANG YANG wyang@njnet.edu.cn Content Introduction RSA Diffie-Hellman Key Exchange Introduction Public Key Cryptography plaintext encryption ciphertext decryption plaintext

More information

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings Key Exchange References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings Outlines Primitives Root Discrete Logarithm Diffie-Hellman ElGamal Shamir s Three Pass

More information

Channel Coding and Cryptography Part II: Introduction to Cryptography

Channel Coding and Cryptography Part II: Introduction to Cryptography Channel Coding and Cryptography Part II: Introduction to Cryptography Prof. Dr.-Ing. habil. Andreas Ahrens Communications Signal Processing Group, University of Technology, Business and Design Email: andreas.ahrens@hs-wismar.de

More information

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7 Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:

More information

Public Key Cryptography and the RSA Cryptosystem

Public Key Cryptography and the RSA Cryptosystem Public Key Cryptography and the RSA Cryptosystem Two people, say Alice and Bob, would like to exchange secret messages; however, Eve is eavesdropping: One technique would be to use an encryption technique

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 2 Basics 2.2 Public Key Cryptography Encryption/Decryption using Public Key Cryptography

More information

RSA (material drawn from Avi Kak Lecture 12, Lecture Notes on "Computer and Network Security" Used in asymmetric crypto.

RSA (material drawn from Avi Kak Lecture 12, Lecture Notes on Computer and Network Security Used in asymmetric crypto. RSA (material drawn from Avi Kak (kak@purdue.edu) Lecture 12, Lecture Notes on "Computer and Network Security" Used in asymmetric crypto. protocols The RSA algorithm is based on the following property

More information

Hybrid Public Key Cryptosystem Combining RSA & DES Algorithms

Hybrid Public Key Cryptosystem Combining RSA & DES Algorithms Hybrid Public Key Cryptosystem Combining RSA & DES Algorithms Saba Khanum Department of Information Technology Maharaja Surajmal Institute of Technology, Janakpuri, New Delhi, India Bharti Sharma Department

More information

RSA. Public Key CryptoSystem

RSA. Public Key CryptoSystem RSA Public Key CryptoSystem DIFFIE AND HELLMAN (76) NEW DIRECTIONS IN CRYPTOGRAPHY Split the Bob s secret key K to two parts: K E, to be used for encrypting messages to Bob. K D, to be used for decrypting

More information

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building Cryptographic Techniques Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building Outline Data security Cryptography basics Cryptographic systems DES RSA C. H. HUANG IN CML 2 Cryptography

More information

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography

More information

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a

More information

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Introduction to Cryptography and Security Mechanisms. Abdul Hameed Introduction to Cryptography and Security Mechanisms Abdul Hameed http://informationtechnology.pk Before we start 3 Quiz 1 From a security perspective, rather than an efficiency perspective, which of the

More information

*E. Madhusudhana Reddy & M.Padmavathamma Department of Computer Science, S.V.University, Tirupati

*E. Madhusudhana Reddy & M.Padmavathamma Department of Computer Science, S.V.University, Tirupati I.J.E.M.S., VOL. 1(1): 12-17 ISSN 2229-6X THRESHOLD MJ2 CRYPTOSYSTEM WITH ONE PUBLIC KEY AND ONE PRIVATE KEY *E. Madhusudhana Reddy & M.Padmavathamma Department of Computer Science, S.V.University, Tirupati

More information

Introduction to Cryptography Lecture 7

Introduction to Cryptography Lecture 7 Introduction to Cryptography Lecture 7 El Gamal Encryption RSA Encryption Benny Pinkas page 1 1 Public key encryption Alice publishes a public key PK Alice. Alice has a secret key SK Alice. Anyone knowing

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD ERIK JONSSON SCHOOL OF ENGINEERING & COMPUTER SCIENCE Cyber Security Research and Education Institute CS 6324: Information Security Dr. Junia Valente Department of Computer Science The University of Texas

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

Public Key Encryption. Modified by: Dr. Ramzi Saifan

Public Key Encryption. Modified by: Dr. Ramzi Saifan Public Key Encryption Modified by: Dr. Ramzi Saifan Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime numbers are central to number

More information

Introduction to Cryptography Lecture 7

Introduction to Cryptography Lecture 7 Introduction to Cryptography Lecture 7 Public-Key Encryption: El-Gamal, RSA Benny Pinkas page 1 1 Public key encryption Alice publishes a public key PK Alice. Alice has a secret key SK Alice. Anyone knowing

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

Hardware Design and Software Simulation for Four Classical Cryptosystems

Hardware Design and Software Simulation for Four Classical Cryptosystems Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 21 (2013 ) 500 505 The 4 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)

More information

CS Network Security. Nasir Memon Polytechnic University Module 7 Public Key Cryptography. RSA.

CS Network Security. Nasir Memon Polytechnic University Module 7 Public Key Cryptography. RSA. CS 393 - Network Security Nasir Memon Polytechnic University Module 7 Public Key Cryptography. RSA. Course Logistics Homework 2 revised. Due next Tuesday midnight. 2/26,28/02 Module 7 - Pubic Key Crypto

More information

A nice outline of the RSA algorithm and implementation can be found at:

A nice outline of the RSA algorithm and implementation can be found at: Cryptography Lab: RSA Encryption and Decryption Lab Objectives: After this lab, the students should be able to Explain the simple concepts of encryption and decryption to protect information in transmission.

More information

Computer Security 3/23/18

Computer Security 3/23/18 s s encrypt a block of plaintext at a time and produce ciphertext Computer Security 08. Cryptography Part II Paul Krzyzanowski DES & AES are two popular block ciphers DES: 64 bit blocks AES: 128 bit blocks

More information

Encryption Details COMP620

Encryption Details COMP620 Encryption Details COMP620 Encryption is a powerful defensive weapon for free people. It offers a technical guarantee of privacy, regardless of who is running the government It s hard to think of a more

More information

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography 15-251 Great Theoretical Ideas in Computer Science Lecture 27: Cryptography What is cryptography about? Adversary Eavesdropper I will cut his throat I will cut his throat What is cryptography about? loru23n8uladjkfb!#@

More information

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E

More information

Number Theory and RSA Public-Key Encryption

Number Theory and RSA Public-Key Encryption Number Theory and RSA Public-Key Encryption Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu CIA Triad: Three Fundamental

More information

Lecture 6 - Cryptography

Lecture 6 - Cryptography Lecture 6 - Cryptography CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12 Question Setup: Assume you and I donʼt know anything about

More information

Introduction to cryptography

Introduction to cryptography Chapter 1 Introduction to cryptography 1.1 From caesar cipher to public key cryptography Cryptography: is the practical means for protecting information transmitted through public communications networks,

More information

Key Management and Distribution

Key Management and Distribution CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 10 Key Management; Other Public Key Cryptosystems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan

More information

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption Introduction to Cryptography and Security Mechanisms: Unit 5 Public-Key Encryption Learning Outcomes Explain the basic principles behind public-key cryptography Recognise the fundamental problems that

More information

An overview and Cryptographic Challenges of RSA Bhawana

An overview and Cryptographic Challenges of RSA Bhawana An overview and Cryptographic Challenges of RSA Bhawana Department of CSE, Shanti Devi Institute of Technology & Management, Israna, Haryana India ABSTRACT: With the introduction of the computer, the need

More information

Admin ENCRYPTION. Admin. Encryption 10/29/15. Assignment 6. 4 more assignments: Midterm next Thursday. What is it and why do we need it?

Admin ENCRYPTION. Admin. Encryption 10/29/15. Assignment 6. 4 more assignments: Midterm next Thursday. What is it and why do we need it? Admin Assignment 6 4 more assignments:! Assignment 7, due 11/13 5pm! Assignment 8, due 11/20 5pm! Assignments 9 & 10, due 12/9 11:59pm ENCRYPTION David Kauchak CS52 Spring 2015 Admin Midterm next Thursday!

More information

Cryptography. Cryptography is much more than. What is Cryptography, exactly? Why Cryptography? (cont d) Straight encoding and decoding

Cryptography. Cryptography is much more than. What is Cryptography, exactly? Why Cryptography? (cont d) Straight encoding and decoding Copyright 2000-2001, University of Washington Cryptography is much more than Cryptography Cryptography systems allow 2 parties to communicate securely. The intent is to give privacy, integrity and security

More information

Keywords Security, Cryptanalysis, RSA algorithm, Timing Attack

Keywords Security, Cryptanalysis, RSA algorithm, Timing Attack Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Provable Partial Key Escrow

Provable Partial Key Escrow Provable Partial Key Escrow Kooshiar Azimian Electronic Research Center, Sharif University of Technology, and Computer Engineering Department, Sharif University of Technology Tehran, Iran Email: Azimian@ce.sharif.edu

More information

ISSN: (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at:

More information

The Beta Cryptosystem

The Beta Cryptosystem Bulletin of Electrical Engineering and Informatics Vol. 4, No. 2, June 2015, pp. 155~159 ISSN: 2089-3191 155 The Beta Cryptosystem Chandrashekhar Meshram Department of Mathematics, RTM Nagpur University,

More information

PUBLIC KEY CRYPTO. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA

PUBLIC KEY CRYPTO. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA PUBLIC KEY CRYPTO Anwitaman DATTA SCSE, NTU Singapore Acknowledgement: The following lecture slides are based on, and uses material from the text book Cryptography and Network Security (various eds) by

More information

Chapter 7 Public Key Cryptography and Digital Signatures

Chapter 7 Public Key Cryptography and Digital Signatures Chapter 7 Public Key Cryptography and Digital Signatures Every Egyptian received two names, which were known respectively as the true name and the good name, or the great name and the little name; and

More information

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and

More information

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems

More information

Assignment 9 / Cryptography

Assignment 9 / Cryptography Assignment 9 / Cryptography Michael Hauser March 2002 Tutor: Mr. Schmidt Course: M.Sc Distributed Systems Engineering Lecturer: Mr. Owens CONTENTS Contents 1 Introduction 3 2 Simple Ciphers 3 2.1 Vignère

More information

CS3235 Seventh set of lecture slides

CS3235 Seventh set of lecture slides CS3235 Seventh set of lecture slides Hugh Anderson National University of Singapore School of Computing October, 2007 Hugh Anderson CS3235 Seventh set of lecture slides 1 Warp 9... Outline 1 Public Key

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 6 Introduction to Public-Key Cryptography ver. November 18, 2010 These

More information

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005 Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric

More information

Module: Cryptographic Protocols. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Module: Cryptographic Protocols. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security CMPSC443 - Introduction to Computer and Network Security Module: Cryptographic Protocols Professor Patrick McDaniel Spring 2009 1 Key Distribution/Agreement Key Distribution is the process where we assign

More information

Diffie-Hellman Protocol as a Symmetric Cryptosystem

Diffie-Hellman Protocol as a Symmetric Cryptosystem IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.7, July 2018 33 Diffie-Hellman Protocol as a Symmetric Cryptosystem Karel Burda, Brno University of Technology, Brno, Czech

More information

Public Key (asymmetric) Cryptography

Public Key (asymmetric) Cryptography Public-Key Cryptography Public Key (asymmetric) Cryptography Luca Veltri (mail.to: luca.veltri@.veltri@unipr.it) Course of Network Security, Spring 2013 http:// ://www.tlc.unipr.it it/veltri Also referred

More information

RSA Public Key Encryption 1. Ivor Page 2

RSA Public Key Encryption 1. Ivor Page 2 RSA Public Key Encryption 1 RSA Public Key Encryption 1 Ivor Page 2 One of the most important methods of providing secrecy and authentication is encryption. Secrecy means the secure transmission of data

More information

Some Stuff About Crypto

Some Stuff About Crypto Some Stuff About Crypto Adrian Frith Laboratory of Foundational Aspects of Computer Science Department of Mathematics and Applied Mathematics University of Cape Town This work is licensed under a Creative

More information

IMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY

IMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY IMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY Pawanveer Singh 1, Dr. Amanpreet Singh 2, Shelja Jhamb 3 1 Post Graduate Department of Mathematics, Lajpat Rai D. A. V. College Jagraon, (India) 2 Post Graduate

More information

1. Diffie-Hellman Key Exchange

1. Diffie-Hellman Key Exchange e-pgpathshala Subject : Computer Science Paper: Cryptography and Network Security Module: Diffie-Hellman Key Exchange Module No: CS/CNS/26 Quadrant 1 e-text Cryptography and Network Security Objectives

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Giuseppe F. Italiano Universita` di Roma Tor Vergata italiano@disp.uniroma2.it Motivation Until early 70s, cryptography was mostly owned by government and military Symmetric cryptography

More information

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lectures 16, 17: Security of RSA El Gamal Cryptosystem Announcement Final exam will be on May 11, 2015 between 11:30am 2:00pm in FMH 319 http://www.njit.edu/registrar/exams/finalexams.php

More information

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA Public Key Cryptography, OpenPGP, and Enigmail Cryptography is the art and science of transforming (encrypting) a message so only the intended recipient can read it Symmetric Cryptography shared secret

More information

10.1 Introduction 10.2 Asymmetric-Key Cryptography Asymmetric-Key Cryptography 10.3 RSA Cryptosystem

10.1 Introduction 10.2 Asymmetric-Key Cryptography Asymmetric-Key Cryptography 10.3 RSA Cryptosystem [Part 2] Asymmetric-Key Encipherment Asymmetric-Key Cryptography To distinguish between two cryptosystems: symmetric-key and asymmetric-key; To discuss the RSA cryptosystem; To introduce the usage of asymmetric-key

More information

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 ISSN 0976 6464(Print)

More information

Study Guide to Mideterm Exam

Study Guide to Mideterm Exam YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #7 Professor M. J. Fischer February 20, 2012 Study Guide to Mideterm Exam For the exam, you are responsible

More information

LECTURE 4: Cryptography

LECTURE 4: Cryptography CSC 519 Information Security LECTURE 4: Cryptography Dr. Esam A. Alwagait alwagait@ksu.edu.sa Recap form previous Lecture We discussed more symmetric encryption. Books? Security Engineering, Ross Anderson

More information

1.264 Lecture 28. Cryptography: Asymmetric keys

1.264 Lecture 28. Cryptography: Asymmetric keys 1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver

More information

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 2 Cryptography 2.4 Public Key Cryptography Acknowledgments This course is based to

More information

A PROPOSED AUTHENTICATION SCHEME USING THE CONCEPT OF MINDMETRICS

A PROPOSED AUTHENTICATION SCHEME USING THE CONCEPT OF MINDMETRICS A PROPOSED AUTHENTICATION SCHEME USING THE CONCEPT OF MINDMETRICS Nitin Shinde 1, Lalit Shejwal 2, Uditkumar Gupta 3, Priyanka Pawar 4 1, 2, 3, 4 Department of Computer Engineering, Sinhgad Institute of

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 10 Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would

More information

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM ENCRYPTION USING LESTER HILL CIPHER ALGORITHM Thangarasu.N Research Scholar in Department of Computer Science Bharathiar University,Coimbatore Dr.Arul Lawrence SelvaKumar Dean & Professor, Department of

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

CSE 127: Computer Security Cryptography. Kirill Levchenko

CSE 127: Computer Security Cryptography. Kirill Levchenko CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified

More information

Crypto Basics. Recent block cipher: AES Public Key Cryptography Public key exchange: Diffie-Hellmann Homework suggestion

Crypto Basics. Recent block cipher: AES Public Key Cryptography Public key exchange: Diffie-Hellmann Homework suggestion Crypto Basics Recent block cipher: AES Public Key Cryptography Public key exchange: Diffie-Hellmann Homework suggestion 1 What is a cryptosystem? K = {0,1} l P = {0,1} m C = {0,1} n, C C E: P K C D: C

More information

A Tour of Classical and Modern Cryptography

A Tour of Classical and Modern Cryptography A Tour of Classical and Modern Cryptography Evan P. Dummit University of Rochester May 25, 2016 Outline Contents of this talk: Overview of cryptography (what cryptography is) Historical cryptography (how

More information