Public Key
Public Key
1
Content
•Public-Key Cryptography : Principles Of Public-Key Cryptography,
RSA Algorithm,
•Key Management, Diffie-Hellman Key Exchange,
• Elgamal Algorithm, Elliptic Curve Cryptography
Essential Steps
• user generates a pair of keys, for the encryption and decryption
• user places one of the two keys:
• in a public register or other accessible file (public key).
• The companion key is kept private (Private Key).
• Each user maintains a collection of public keys obtained from
others.
Public Key Cryptosystem
Public Key Cryptosystem
Public Key Cryptosystems
Public Key Cryptosystems
• With the message X and the encryption key PUb as input, A forms
the ciphertext Y = [Y1, Y2,…YM]
1. Encryption /decryption
• The sender encrypts a message with the recipient’s public key.
2. Digital signature
• The sender “signs” a message with its private key.
• Signing is achieved by a cryptographic algorithm applied to the message or
to a small block of data that is a function of the message.
Applications for Public Key Systems
3. Key Exchange
• Two sides cooperate to exchange a session key. Several different
approaches are possible, involving the private key(s) of one or both parties
RSA Algorithm
2. Calculate n = p x q = 17 × 11 = 187
4. Select e such that e is relatively prime to Φ(n) = 160 and less than
Φ(n); we choose e = 7
RSA Algorithm
5. Determine d such that de ≡ 1 (mod 160) and d < 160.
The correct value is d = 23
because 23 × 7 = 161 = (1 × 160) + 1;
d can be calculated using the extended Euclid’s algorithm.
M = 88
C = 887 mod 187
= (884 mod 187) x (882 mod 187) x (881 mod 187)
= 11
Requirements of RSA Algorithm
• It is possible to find values of e, d, n such that
Med mod n = M for all M < n.
3. Timing attacks
These depend on the running time of the decryption algorithm.
Y2=X3+ax+b
• the elliptic curve is used to generate points and get the secret key
using the parameters.
Example