0% found this document useful (0 votes)
4 views

RSA slides

The document discusses asymmetric key cryptography, particularly focusing on RSA, which involves a public and private key pair for secure communication. It outlines the advantages and disadvantages of symmetric versus asymmetric cryptography, key management challenges, and the mathematical foundation of RSA operations. The document emphasizes the importance of using longer key lengths for enhanced security and the need for careful implementation to prevent vulnerabilities.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

RSA slides

The document discusses asymmetric key cryptography, particularly focusing on RSA, which involves a public and private key pair for secure communication. It outlines the advantages and disadvantages of symmetric versus asymmetric cryptography, key management challenges, and the mathematical foundation of RSA operations. The document emphasizes the importance of using longer key lengths for enhanced security and the need for careful implementation to prevent vulnerabilities.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Asymmetric key/ Public key security

1
Symmetric and asymmetric key cryptography
Symmetric key Cryptography Asymmetric key Cryptography
Key Pair Key Pair
Key Key
(dA , PA) Exchange Public Keys (dB , PB)
Sk Sk

Public
Key PB Public
Key PA

Advantages: Advantages:
• Efficiency • No need to deliver private key
Disadvantages: • Scalability
• Need secure channel in provisioning • Secure against honest but curious TTP
phase Disadvantages:
• Rely on trust of TTP • Increased computational and
• Key renewing can be difficult communication costs
• Scalability • Need to manage certificates and a
revocation list
|2
Key management
problems

• From 1976, new idea


• Every user has private and public key pair

• Alice can put letter in post box of Bob


• Post box is public key of Bob
• Key of box is private key of Bob

• 1977: Ron Rivest, Adi Shamir, Leonard


Adleman (RSA)

3
Key Generation Encryption & Decryption
• Choose p and q
• Compute n = p * q • Public key is (e, n) , Private key is (d, n)
• Compute φ(n) = (p - 1) * (q - 1)
• The encryption of m is c =me mod n
• Choose e such that 1 < e < φ(n) and e and φ (n) are coprime.
• Compute a value for d such that (d * e) mod φ(n) = 1. • The decryption of m = cd mod n

• Public key is (e, n)


• Private key is (d, n)

4
RSA operations are done over the integer ring Zn(i.e., arithmetic modulo n), where n = p *
q, with p, q being large primes

Encryption and decryption are simply exponentiations in the ring.

In practice c, e, n and d are very long integer numbers (≥ 1024 bits)

The security of the scheme relies on the fact that it is hard to derive the “private exponent”
d given the public-key (n, e)

5
Communication using RSA between Alice and Bob

Alice Bob (Kpub, Kpr)


Kpub
Message=m
M=EKpub(m) M
m=DKpr(M)

6
Communication using RSA between Alice and Bob
7
Implementation aspects

The RSA cryptosystem uses only one arithmetic operation (modular exponentiation)
which makes it conceptually a simple asymmetric scheme

Even though conceptually simple, due to the use of very long numbers, RSA is orders
of magnitude slower than symmetric schemes, e.g., DES, AES

When implementing RSA (esp. on a constrained device such as smartcards or cell


phones) close attention has to be paid to the correct choice of arithmetic algorithms

8
RSA is the most widely used public-key cryptosystem

RSA is mainly used for key transport and digital signatures

The public key e can be a short integer, the private key d needs to have the full length of
the modulus n

RSA relies on the fact that it is hard to factorize n

Currently 1024-bit cannot be factored, but progress in factorization could bring this into
reach within 10-15 years. Hence, RSA with a 2048 or 3076 bit modulus should be used for
long-term security

A naïve implementation of RSA allows several attacks, and in practice RSA should be
used together with padding

You might also like