19 Asymmetric Cryptography
19 Asymmetric Cryptography
GROUP MEMBERS
1. MEHNAZ
2. SHUJAAT AHMED
3. SHAHADAT HUSSAIN
4. SHABANA NAZ
TABLE OF CONTENT
WHAT IS ASYMMETRIC CRYPTOGRAPHY
MODULE OBJECTIVES
ASYMMETRIC ENCRYPTION FOR MESSAGE CONFIDENTIALITY
DIGITAL SIGNATURE FOR AUTHENICATION
What is Cryptography?
Cryptography is a method of protecting information and communications through the use of
so that only those for whom the information is intended can read and process it.
ASYMMETRIC CRYPTOGRAPHY
• Asymmetric cryptography, also known as public-key cryptography, is a
cryptographic system that uses a pair of mathematically related keys for secure
communication. Unlike symmetric cryptography, which uses a single key for both
encryption and decryption, asymmetric cryptography employs two different
keys: a public key and a private key.
• Public Key: Each user generates a pair of keys, consisting of a public key and a
private key. The public key is freely distributed and can be made available to
anyone.
• Private Key: The private key is kept secret and known only to the owner. It should
never be shared with anyone else
EXAMPLE
• One popular example of asymmetric cryptography is the RSA algorithm, named after its
inventors, Rivest, Shamir, and Adelman. Here's a simplified example of how RSA works:
• Key Generation:
• Bob generates a public-private key pair. The public key consists of two components: the modulus
(N) and the encryption exponent (e), while the private key contains the decryption exponent (d).
• Bob keeps the private key secret and shares the public key with others.
• Encryption:
• Alice wants to send a confidential message to Bob.
• Alice obtains Bob's public key (N, e).
• She converts her message into a numerical representation, typically using a scheme like ASCII or
Unicode.
• Alice raises each character to the power of e and takes the modulus N to obtain the
encrypted value for each character.
• She sends the encrypted message to Bob.
• Decryption:
• Bob receives the encrypted message from Alice.
• He uses his private key (d) to decrypt each character.
• Bob raises each encrypted character to the power of d and takes the modulus N to
obtain the original numerical representation of the message.
• He converts the numerical representation back into readable text, revealing the
decrypted message.
• The security of RSA lies in the difficulty of factoring large numbers into their prime
factors. Breaking RSA encryption requires finding the prime factors of the modulus N,
which becomes computationally infeasible for sufficiently large prime numbers.
MODULE OBJECTIVES