Cryptography New
Cryptography New
Hieroglyph
The encryption process where same keys are used for encrypting and decrypting the information
is known as Symmetric Key Encryption.
• A few well-known examples of symmetric key encryption methods are
• Trust Issue : Since the sender and the receiver use the same symmetric
key, there is an implicit requirement that the sender and the receiver
‘trust’ each other.
Asymmetric Key Encryption
Asymmetric Key Encryption
• The encryption process where different keys are used for encrypting
and decrypting the information is known as Asymmetric Key
Encryption.
Steganography
Calculate n= p*q
Calculate ø(n)=(p-1)*(q-1)
d=(1+k ø(n))/e
d. e mod ø(n)=1
• The base (g) is derived from a cyclic group (G) that is normally
generated well before the other steps take place.
• (0,1,2,3,4) +4
• For our example, let’s say that the modulus (p) is 17, while the base
(g) is 4.
• s = Ba mod p
• s = 163 mod 17
• s = 4,096 mod 17
• s = 16
• Bob then performs what is essentially the same calculation, but with
the number that Alice sent him (A), as well as his own secret number
(b):
• s = Ab mod p
• s = 136 mod 17
• s = 4,826,809 mod 17
• s = 16
Why is the Diffie-Hellman key exchange secure?
• On a mathematical level,
• These are calculations which are simple to do one way, but much
more difficult to calculate in reverse.
• Suppose that two parties A and B wish to setup a common secret key
(D-H key) between themselves using the Diffie-Hellman key exchange
technique. They agree on 7 as the modulus and 3 as the primitive root.
Party A chooses 2 and party B chooses 5 as their respective secrets.
Their D-H key is
• Primitive root = g = 3
Modulus = p = 7
Xa = 2 and Xb = 5
Ya = 32 mod 7 = 2
Yb = 35 mod 7 = 5
We assume D-H key to be K.
K = YaXb mod 7
K = 25mod 7 = 4
Or
K = YbXa mod 7
K = 52 mod 7 = 4
Digital Signature