Expose Celine

Embed Size (px)

Citation preview

  • 7/31/2019 Expose Celine

    1/10

    The RSA Algorithm

    Table of contents

    Introduction

    Operation of the

    RSA algorithm

    Key generation

    Encryption

    Decryption

    Security

    Conclusion

    The RSA Algorithm

    http://find/
  • 7/31/2019 Expose Celine

    2/10

    The RSA Algorithm

    Table of contents

    Introduction

    Operation of theRSA algorithm

    Key generation

    Encryption

    Decryption

    Security

    Conclusion

    Table of contents

    Introduction

    Operation of the RSA algorithm

    Key generation

    Encryption

    Decryption

    Security

    Conclusion

    http://find/
  • 7/31/2019 Expose Celine

    3/10

    The RSA Algorithm

    Table of contents

    Introduction

    Operation of theRSA algorithm

    Key generation

    Encryption

    Decryption

    Security

    Conclusion

    Introduction

    by Rivest, Shamir & Adleman (RSA) in

    1977

    best known & widely used

    protection of many things (ex credit cards)

    the most secure code

    http://find/
  • 7/31/2019 Expose Celine

    4/10

    The RSA Algorithm

    Table of contents

    Introduction

    Operation of theRSA algorithm

    Key generation

    Encryption

    Decryption

    Security

    Conclusion

    Introduction

    In cryptography, RSA is an algorithm for publickey cryptography.

    The RSA algorithm involves the use of two

    keys :

    a public key, which may be known by

    anybody, and can be used to encrypt

    messages a private key, known only by the recipient,

    and used to decrypt messages

    http://find/
  • 7/31/2019 Expose Celine

    5/10

    The RSA Algorithm

    Table of contents

    Introduction

    Operation of theRSA algorithm

    Key generation

    Encryption

    Decryption

    Security

    Conclusion

    Operation of the RSA algorithmKey generation

    1. Choose 2 distinct random prime numbers :p,q

    2. Compute n= p.q

    3. Compute (n) = (p1)(q1) (Eulerstotient function)

    4. Choose an integer e, such that

    1 < e< (n) and gcd(e,(n)) = 1

    5. Compute d e1 mod [(n)]

    6. Publish the public encryption key : (e,n)

    7. Keep secret private decryption key : (d,n)

    http://find/
  • 7/31/2019 Expose Celine

    6/10

    The RSA Algorithm

    Table of contents

    Introduction

    Operation of theRSA algorithm

    Key generation

    Encryption

    Decryption

    Security

    Conclusion

    Operation of the RSA algorithmEncryption

    To encrypt a message the sender has to :

    obtain public key of recipient (e,n) represent the message as an integer m in

    [0,n1]

    compute : c = me mod n

    http://find/
  • 7/31/2019 Expose Celine

    7/10

    The RSA Algorithm

    Table of contents

    Introduction

    Operation of theRSA algorithm

    Key generation

    Encryption

    Decryption

    Security

    Conclusion

    Operation of the RSA algorithmDecryption

    To decrypt the ciphertext c the recipient :

    uses his private key (d,n)

    computes : m= cd mod n

    http://find/
  • 7/31/2019 Expose Celine

    8/10

    The RSA Algorithm

    Table of contents

    Introduction

    Operation of theRSA algorithm

    Key generation

    Encryption

    Decryption

    Security

    Conclusion

    Security

    When attempting to attack the RSA, theattacker :

    has access to the public key (e,n)

    wants the private key (d,n)

    Three ways to attack RSA :

    force the search of key ( impossible given

    the size of the numbers) launch attacks during the decryption

    mathematical attack

    http://find/http://goback/
  • 7/31/2019 Expose Celine

    9/10

    The RSA Algorithm

    Table of contents

    Introduction

    Operation of theRSA algorithm

    Key generation

    Encryption

    Decryption

    Security

    Conclusion

    SecurityMathematical attack

    To get d :

    factorize n p and q (n) d

    For small numbers, it is very easy to hack a RSA

    code.

    Factorize the number n.

    With Maple : write " ifactor(n) ".

    possible only for numbers < 1035.

    very easy to find large prime numbers.

    http://find/http://goback/
  • 7/31/2019 Expose Celine

    10/10

    The RSA Algorithm

    Table of contents

    Introduction

    Operation of theRSA algorithm

    Key generation

    Encryption

    Decryption

    Security

    Conclusion

    Conclusion

    The RSA algorithm is based on the fact that

    it is far more difficult to factorize a product

    of two primes than it is to multiply the two

    primes.

    Factoring n is the best known attack against

    RSA to date.

    It cannot guarantee 100% security, onlyadded protection.

    http://find/http://goback/