Asymmetric - Key Cryptography
Asymmetric - Key Cryptography
Asymmetric - Key Cryptography
10.3
BITS Pilani, Dubai Campus
General Idea
10.4
BITS Pilani, Dubai Campus
Plaintext/Ciphertext
Unlike in symmetric-key cryptography, plaintext and
ciphertext are treated as integers in asymmetric-key
cryptography.
Encryption/Decryption
C = f (Kpublic , P) P = g(Kprivate , C)
Figure 6.1 Encryption and decryption with DES
Symmetric
Key
10.5
BITS Pilani, Dubai Campus
RSA CRYPTOSYSTEM
10.7
BITS Pilani, Dubai Campus
Procedure
10.8
BITS Pilani, Dubai Campus
Continued
10.9
BITS Pilani, Dubai Campus
10.2.2 Continued
10.10
BITS Pilani, Dubai Campus
10.2.2 Continued
Encryption
10.11
BITS Pilani, Dubai Campus
10.2.2 Continued
Decryption
10.12
BITS Pilani, Dubai Campus
10.2.3 Some Trivial Examples
Example 10. 5
Bob chooses 7 and 11 as p and q and calculates n = 77. The
value of (n) = (7 − 1)(11 − 1) or 60. Now he chooses two
exponents, e and d, from Z60∗. If he chooses e to be 13, then
d is 37. Note that e × d mod 60 = 1 (they are inverses of each
Now imagine that Alice wants to send the plaintext 5 to Bob.
She uses the public exponent 13 to encrypt 5.
10.13
10.2.3 Some Trivial Examples
Example 10. 6
10.14
10.2.3 Some Trivial Examples
Example 10. 7
10.16