LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)

Similar documents
Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Public Key Algorithms

CS408 Cryptography & Internet Security

Introduction to Cryptography Lecture 7

Introduction to Cryptography Lecture 7

Chapter 9. Public Key Cryptography, RSA And Key Management

Public Key Cryptography

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Security in Distributed Systems. Network Security

CSC 474/574 Information Systems Security

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Overview. Public Key Algorithms I

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Lecture 3.4: Public Key Cryptography IV

UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Introduction to Cryptography ECE 597XX/697XX

Lecture 6: Overview of Public-Key Cryptography and RSA

CPSC 467: Cryptography and Computer Security

The most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who

Recovery. Independent Checkpointing

Public Key Algorithms

Public Key Cryptography and RSA

Cryptography and Network Security. Sixth Edition by William Stallings

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

RSA. Public Key CryptoSystem

RSA (material drawn from Avi Kak Lecture 12, Lecture Notes on "Computer and Network Security" Used in asymmetric crypto.

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

10.1 Introduction 10.2 Asymmetric-Key Cryptography Asymmetric-Key Cryptography 10.3 RSA Cryptosystem

Lecture IV : Cryptography, Fundamentals

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography

Channel Coding and Cryptography Part II: Introduction to Cryptography

Number Theory and RSA Public-Key Encryption

The Application of Elliptic Curves Cryptography in Embedded Systems

Lecture 15: Public Key Encryption: I

CS 161 Computer Security

Public Key Algorithms

Chapter 9 Public Key Cryptography. WANG YANG

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

1.264 Lecture 28. Cryptography: Asymmetric keys

Chapter 3 Public Key Cryptography

Key Exchange. Secure Software Systems

Chapter 7 Public Key Cryptography and Digital Signatures

Public Key Cryptography

Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Cryptography V: Digital Signatures

Cryptography V: Digital Signatures

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Digital Signatures. Luke Anderson. 7 th April University Of Sydney.

Public-key encipherment concept

CS 161 Computer Security

Public-Key Cryptography

Lecture 2 Applied Cryptography (Part 2)

Key Management and Distribution

Topics. Number Theory Review. Public Key Cryptography

Cryptographic Systems

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

ECC Elliptic Curve Cryptography. Foundations of Cryptography - ECC pp. 1 / 31

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

ISA 662 Internet Security Protocols. Outline. Prime Numbers (I) Beauty of Mathematics. Division (II) Division (I)

Public Key (asymmetric) Cryptography

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Lecture III : Communication Security Mechanisms

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

LECTURE 4: Cryptography

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1

Public Key Encryption. Modified by: Dr. Ramzi Saifan

Public Key Cryptography and the RSA Cryptosystem

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Computer Security 3/23/18

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Other Topics in Cryptography. Truong Tuan Anh

Prime Field over Elliptic Curve Cryptography for Secured Message Transaction

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

Homework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

Applied Cryptography and Computer Security CSE 664 Spring 2018

Public-Key Cryptography

The Beta Cryptosystem

Network Security. Chapter 4 Public Key Cryptography. Public Key Cryptography (4) Public Key Cryptography

2 Handout 20: Midterm Quiz Solutions Problem Q-1. On-Line Gambling In class, we discussed a fair coin ipping protocol (see lecture 11). In it, Alice a

CS1800 Discrete Structures Fall 2017 October 25, CS1800 Discrete Structures Midterm Version B

A nice outline of the RSA algorithm and implementation can be found at:

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

CS1800 Discrete Structures Fall 2017 October 25, CS1800 Discrete Structures Midterm Version B

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

EEC-484/584 Computer Networks

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1

Lecture 6 - Cryptography

Cryptography and Network Security

Cryptography and Network Security

Introduction. Cambridge University Press Mathematics of Public Key Cryptography Steven D. Galbraith Excerpt More information

Keywords Session key, asymmetric, digital signature, cryptosystem, encryption.

ASYMMETRIC CRYPTOGRAPHY

Cryptography and Network Security

Lecture 19: cryptographic algorithms

CS61A Lecture #39: Cryptography

Transcription:

Department of Software The University of Babylon LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY (One-Way Functions and ElGamal System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

One-Way Functions (OWF) A one-way function is a function that is easy to compute and difficult to reverse Examples of OWF that we ll use in this lecture to explain public-key systems: Multiplication of two primes Modular exponentiation OWF: Multiplying two Primes Multiplication of two prime numbers is believed to be a one-way function. We say believed because nobody has been able to prove that it is hard to factorise. Given two primes numbers p and q It s easy to find n=p.q However, starting from n, it s difficult to find p and q Is it prime factorization?

OWF: Modular Exponentaition The process of exponentiation just means raising numbers to a power. Raising a to the power b, normally denoted a b just means multiplying a by itself b times. In other words: a b = a x a x a x x a Modular exponentiation means computing a b modulo some other number n. We tend to write this as a b mod n. Modular exponentiation is easy.

El-Gamal ElGamal is another public-key encryption We will also take a look at the ElGamal public key cipher system for a number of reasons: To show that RSA is not the only public key system To exhibit a public key system based on a different one way function ElGamal is the basis for several well-known cryptosystems

El-Gamal ElGamal is another public-key encryption We will also take a look at the ElGamal public key cipher system for a number of reasons: To show that RSA is not the only public key system To exhibit a public key system based on a different one way function ElGamal is the basis for several well-known cryptosystems

El-Gamal algorithm (key generation) Key generation for ElGamal public-key encryption Each entity A creates a public key and a corresponding private keys Generate a large prime number p (1024 bits) Generate a generator g of the multiplicative group Z * p of the integers modulo p Select a random integer x, 1 x p-2 Compute y = g x mod p A s public key is (p, g, y) To be published A s private key is x To be kept secret by A

El-Gamal algorithm (key generation) Example Step 1: Let p = 2357 Step 2: Select a generator g = 2 of Z * 2357 Step 3: Choose a private key x = 1751 Step 4: Compute y = 2 1751 (mod 2357) = 1185 Public key is (2357,2,1185) Private key is 1751

ElGamal algorithm (Encryption/decryption) Summary: Samaher encrypts a message m for Eman, which eman decrypts Encryption: samaher should de the following Obtain Eman s authentic public key (p, g, y). Represent the message as an integer in the interval [0,p-1] Select an integer k, 1 k p-2 Compute w=g k mod p and v=m.(y) k mod p Send the ciphertext c = (w, v) to Eman Decryption A uses the private key x to compute z= w p -1-x mod p A computes M= z.v mod p

ElGamal algorithm (Encryption/decryption) Encryption To encrypt m = 2035 using Public key (2357,2,1185) Generate a random number k = 1520 Compute w = 2 1520 mod 2357 = 1430 v = 2035 x 1185 1520 mod 2357 =697 Cipher Text: c = (1430, 697) Decryption z= w p-1-x mod p = 1430 605 mod 2357 =872 872x697 mod 2357 = 2035

ElGamal Properties There is a message expansion by a factor of 2 i.e., the cipher text is twice as long as the corresponding plaintext Requires a random number generator (k) Relies on discrete algorithm problem, i.e., having y= g x mod p it s hard to find x (the private key) ElGamal encryption is randomized (coming from the random number k), RSA encryption is deterministic. ElGamal is the basis of many other algorithms (e.g., DSA)

Summary RSA is a public key encryption algorithm whose security is believed to be based on the problem of factoring large numbers ElGamal is a public key encryption algorithm whose security is believed to be based on the discrete logarithm problem RSA is generally favoured over ElGamal for practical rather than security reasons RSA and ElGamal are less efficient and fast to operate than most symmetric encryption algorithms because they involve modular exponentiation