UNIT-4 Asymmetric Ciphers
UNIT-4 Asymmetric Ciphers
Asymmetric
Ciphers
Outline
Public Key Cryptosystems with Applications
Requirements and Cryptanalysis
RSA algorithm
RSA computational aspects and security
Diffie-Hillman Key Exchange algorithm
Man-in-Middle attack
Transmitted
X cipher text X
Y = E(PUa, X)
Plaintext Plaintext
input Encryption Algorithm Decryption Algorithm
output
(e.g. RSA)
Bob Alice
Asymmetric key Encryption with Private Key
The entire encrypted message Alice’s
serves as a digital signature. Public
Joy key ring
Ted
Mike Bob
Transmitted
X cipher text X
Y = E(PRb, X)
Plaintext Plaintext
input Encryption Algorithm Decryption Algorithm
output
(e.g. RSA)
Bob Alice
Authentication and Confidentiality
Source A Source B
PUb PRb
Key pair
PRa PUa source
Key pair
source
PU = { e, n } , PU = { 7, 33 }
For message M = 14
C = 147 mod 33
C = [(141 mod 33) X (142 mod 33) X (144 mod 33)] mod 33
C = (14 X 31 X 4) mod 33 = 1736 mod 33
C = 20
Unit-4 Asymmertic Ciphers 11
Step-3 : Decrypt Message
Encryption Using Public key: M = Cd mod n
PR = { d, n } , PR = { 3, 33 }
For Ciphertext C = 20
M = 203 mod 33
M = [(201 mod 33) X (202 mod 33)] mod 33
M = (20 X 4) mod 33 = 80 mod 33
M = 14
Unit-4 Asymmertic Ciphers 12
Example RSA Algorithm
Encryption Decryption
PU = 7, 33 PR = 3, 33
C = Me mod n PU = { e, n } , PU = { 5, 133 }
For message M = 6
C = 65 mod 133
C = 7776 mod 133
C = 62
Decryption: