19 Asymmetric Key Cryptography 1
19 Asymmetric Key Cryptography 1
INTRODUCTION
◼ is asymmetric because
◼ those who encrypt messages or verify signatures cannot
decrypt messages or create signatures
Public-Key Cryptography
Public-Key Characteristics
Encryption/Decryption
C = f (Kpublic , P) P = g(Kprivate , C)
Trapdoor One-Way Function
Functions
A function as rule mapping a domain to a range
One-Way Function (OWF)
1. f is easy to compute.
2. f −1 is difficult to compute.
Example 10. 2
Superincreasing Tuple
ai ≥ a1 + a2 + … + ai−1
Example 10. 3
As a very trivial example, assume that a = [17, 25, 46, 94, 201,400]
and s = 272 are given. Table 10.1 shows how the tuple x is found
using inv_knapsackSum routine in Algorithm 10.1. In this case x =
[0, 1, 1, 0, 1, 0], which means that 25, 46, and 201 are in the
knapsack.
Secret Communication with Knapsacks.
e
◼ computes: C = M mod n, where 0≤M<n
d
◼ computes: M = C mod n
Jennifer creates a pair of keys for herself. She chooses p = 397 and q
= 401. She calculates
n = 159197. She then calculates f(n) = 158400. She then chooses e =
343 and d = 12007. Show how Ted can send a message to Jennifer if
he knows e and n.