Ch5. Cryptography - Asymetrics 1
Ch5. Cryptography - Asymetrics 1
Jumana Khwaileh-LTUC
Learning Objectives
Asymmetric Encryption
Public-Key Cryptography
RSA
El Gamal
Symmetric Cryptography Revisited
• Symmetric algorithms, e.g., AES or 3DES, are very
secure, fast & widespread but:
Key distribution problem: The secret key must be
transported securely
Number of keys: In a network, each pair of users requires an
individual key
n users in the network require n.(n-1)/2 keys, each user
stores (n-1) keys
Alice or Bob can cheat each other, because they have identical keys.
Example: Alice can claim that she never ordered a TV on-line from Bob
(he could have fabricated her order). To prevent this: “non-repudiation”
Idea behind Asymmetric Cryptography
• New Idea: Use the “good old mailbox“ principle
Idea behind Asymmetric Cryptography. Cont.
Principles of Public-Key Cryptosystems
The concept of asymmetric-key cryptography evolved from an attempt to solve two
of the most difficult problems associated with conventional encryption.
Key distribution
• How to have secure communications in general without having to trust a KDC
with your key
Digital signatures
• How to verify that a message comes intact from the claimed sender
Encryption Decryption
Plaintext Public key Private key Ciphertext
algorithm algorithm
• Messages encoded using public key can only be decoded by the private key
• Secret transmission of key for decryption is not required
• Every entity can generate a key pair and release its public key
• Some algorithms are suitable for all three applications, whereas others
can be used only for one or two
Applications for Public-Key Cryptosystems
Encryption Decryption
public privat
Different keys e
Recipient’s Recipient’s
public key private key
Example: Authenticity
Encryption Decryption
public privat
Different keys e
Sender’s Sender’s
public key private key
Public-Key Cryptosystem: Authentication and Secrecy
Creating a Digital Signature
Generate Asymmetric
Hash Encryption
3kJfgf*£$&
Signed
? Compare ?
Document Digital
Signature
pub
Asymmetric Py75c%bn
Decryption