Lecture 4-Asymmetric Encryption Algorithms
Lecture 4-Asymmetric Encryption Algorithms
Security
Lecture 4
Asymmetric Encryption
Algorithms 1
Instructor: Dr. C.I Eke
Asymmetric Encryption
Algorithms 1
Recap on Asymmetric Encryption
• In this technique,
• Sender and receiver use different keys to encrypt and decrypt the
message.
• It is called so because sender and receiver use different keys.
• It is also called as public key cryptography.
Working
• The message exchange using public key cryptography involves the
following steps
Step-01
At sender side,
• Sender encrypts the message using receiver’s public key.
• The public key of receiver is publicly available and known to
everyone.
• Encryption converts the message into a cipher text.
• This cipher text can be decrypted only using the receiver’s private key.
Step-02
• The cipher text is sent to the receiver over the communication channel.
Step-03
At receiver side,
• Receiver decrypts the cipher text using his private key.
• The private key of the receiver is known only to the receiver.
• Using the public key, it is not possible for anyone to determine the
receiver’s private key.
• After decryption, cipher text converts back into a readable format.
Advantages
The advantages of public key cryptography are-
• It is more robust.
• It is less susceptible to third-party security breach attempts.
Disadvantages
The disadvantages of public key cryptography are-
• It involves high computational requirements.
• It is slower than symmetric key cryptography.
Number of Keys Required
To use public key cryptography
• Each individual requires two keys- one public key and one private key.
• For n individuals to communicate, number of keys required = 2 x n =
2n keys.
Asymmetric Encryption Algorithms
The famous asymmetric encryption algorithms are:
1. RSA Algorithm
2. Diffie-Hellman Key Exchange
RSA Algorithm
Let:
• Public key of the receiver = (e , n)
• Private key of the receiver = (d , n)
Then, RSA Algorithm works in the following steps-
Step-01
At sender side,
• Sender represents the message to be sent as an integer between 0 and
n-1.
• Sender encrypts the message using the public key of receiver.
• It raises the plain text message ‘P’ to the eth power modulo n.
• This converts the message into cipher text ‘C’
C = Pe mod n
Step-02
• The cipher text ‘C’ is sent to the receiver over the communication
channel.
Step-03
At receiver side,
• Receiver decrypts the cipher text using his private key.
• It raises the cipher text ‘C’ to the dth power modulo n.
• This converts the cipher text back into the plain text ‘P’.
P = Cd mod n
NOTE
‘e’ and ‘d’ must be multiplicative inverses modulo Ø(n)
Step-01:
• Calculate ‘n’ and toilent function Ø(n).
• Value of n,
•n=pxq
• n = 13 x 17
• ∴ n = 221
Solution (cont.)
Toilent function,
• Ø(n) = (p-1) x (q-1)
• Ø(n) = (13-1) x (17-1)
• ∴ Ø(n) = 192
Step-02:
• We are already given the value of e = 35.
• Thus, public key = (e , n) = (35 , 221)
Solution (cont.)
Step-03:
• Determine ‘d’ such that-
Here,
•The least value of ‘k’ which gives the integer value of ‘d’ is k = 2.
•On substituting k = 2, we get d = 11.