13
BY- ARUSH SAXENA (HOTBURN)

BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

BY- ARUSH SAXENA

(HOTBURN)

Page 2: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

Review of Cryptography and its terms -oEncryption,

oDecryption,

oAuthentication,

oDigital signature.

What is RSA ? Key Generation Algorithm Encryption Decryption

Usage of RSA RSA Security Implementation Tools

Page 3: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

decryption

algorithm

encryption

algorithmmessage

message

Transmission Channel

encryption key

decryption key

Page 4: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

Encryption: The transformation of data into a formunreadable by anyone is known as encryption.

Decryption: It is the opposite of encryption. It mayrequire secret decryption key.

Authentication: Authentication in a digital setting is aprocess whereby the receiver of a digital message canbe confident of the identity of the sender and/or theintegrity of the message. Authentication protocols canbe based on either conventional secret-keycryptosystems like DES or on public-key systems likeRSA; authentication in public-key systems uses digitalsignatures.

Digital Signature: It is an unforgeable piece of dataasserting that a named person wrote or otherwiseagreed to the document to which the signature isattached.

Page 5: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

Public Key algorithm invented in 1977 by Ron

Rivest, Adi Shamir and Leonard Adleman (RSA).

Supports Encryption and Digital Signature.

Most Widely used public Key Algorithm.

Gets its security from integer factorization

Problem.

Relatively easy to understand and implement.

Page 6: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

A public encryption method that relies on a public encryption algorithm, a public decryption algorithm, and a public encryption key.

Using the public key and encryption algorithm, everyone can encrypt a message.

The decryption key is known only to authorized parties.

Page 7: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

p and q are two prime numbers. n = pq pi = (p-1)(q-1)Choose e is such that 1 < e < pi and gcd(pi,e) = 1.Compute d is such that d=e-1 mod(pi). The public key is (n, e) and the private key is (n,

d).

Page 8: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

Sender ‘A’ does the following:-• Obtains the public key (n, e).

• Represents the plaintext message as a positive

integerm.

• Computes the ciphertext c = me mod n.

• Sends the ciphertext c to ‘B’.

Page 9: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

Recipient B does the following:-• Uses his private key (n, d) to compute

m = cd mod n.

• Extracts the plaintext from the message

representativem.

Page 10: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

RSA is used in security protocols such as:-IPSEC -- IP Data Security

-TLS/SSL -- transport data security (web)

-PGP -- email security

-SSH -- terminal connection security

-SILC -- conferencing service security

Page 11: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

RSA gets its security from factorization problem. Difficulty of factoring large numbers is the basis of security of RSA. Over 1000 bits long numbers are used.

Integer factorization problem (finding number's prime factors):o Positive integer n, find its prime factors: n = p1 p2 ... pi

where, pi is positive distinct prime number. Example: 257603 = 41 * 61 * 103

o Factorization algorithms can be used to factor faster than brute forcing: Trial division, Pollard's rho, Pollard's p-1, Quadratic sieve, elliptic curve factorization, Random square factoring, Number field sieve, etc.

Page 12: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation

In order to implement RSA one requiresArbitrary Precision Arithmetic

Pseudo Random Number Generator(PRNG)

Prime Number Generator

Page 13: BY- ARUSH SAXENA (HOTBURN)...BY- ARUSH SAXENA (HOTBURN) Review of Cryptography and its terms - oEncryption, oDecryption, oAuthentication, oDigital signature. What is RSA ? Key Generation