SlideShare a Scribd company logo
BY
RAFIDH
PUBLIC-KEY
CRYPTOGAPHY
AND RSA
Outline
principles of public--key
cryptography
RSA algorithm,
implementation, security
Structure Cipher Systems
Symmetric
algorithm
Stream Cipher Block Cipher
AESRC4
Cipher Systems
DES
ASymmetric
algorithm
RSA
Public key
encryption
Asymmetric encryption is a form of cryptosystem in which
encryption and decryption are performed using the different
keys—one a public key and one a private key. It is also known as
public-key encryption.
 Asymmetric encryption transforms plaintext into ciphertext
using a one of two keys and an encryption algorithm. Using the
paired key and a decryption algorithm, the plaintext is
recovered from the ciphertext.
 Asymmetric encryption can be used for confidentiality,
authentication, or both.
 The most widely used public-key cryptosystem is RSA. The
difficulty of attacking RSA is based on the difficulty of finding
the prime factors of a composite number.
Key points
PUBLIC-KEY CRYPTOGAPHY
The concept of public-key cryptography evolved
from an attempt to attack two of the most difficult
problems associated with symmetric encryption :
 The first problem is that of key distribution .
The second problem and one that was apparently
unrelated to the first, was that of digital
signatures.
 Asymmetric algorithms rely on one key for encryption and a
different but related key for decryption .These algorithms
have the following important characteristic.
 It is computationally infeasible to determine the decryption
key given only knowledge of the cryptographic algorithm
and the encryption key.
Public-Key Cryptosystems
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
 Plaintext: This is the readable message or data that is fed
into the algorithm as input.
 Encryption algorithm: The encryption algorithm performs
various transformations on the plaintext.
 Public and private keys: This is a pair of keys that have
been selected so that if one is used for encryption, the other is
used for decryption. The exact transformations performed by
the algorithm depend on the public or private key that is
provided as input.
scheme has six ingredients
 Ciphertext: This is the scrambled message produced
as output. It depends on the plaintext and the key.
For a given message, two different keys will produce
two different ciphertexts.
 Decryption algorithm: This algorithm accepts the
ciphertext and the matching key and produces the
original plaintext.
1. Each user generates a pair of keys to be used for the encryption
and decryption of messages.
2. Each user places one of the two keys in a public register or other
accessible file. This is the public key.The companion key is kept
private.
3. If Bob wishes to send a confidential message to Alice, Bob
encrypts the message using Alice’s public key.
4. When Alice receives the message, she decrypts it using her
private key. No other recipient can decrypt the message because
only Alice knows Alice’s private key.
The essential steps are the following :
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
 Encryption /decryption: The sender encrypts a message with
the recipient’s public key.
 Digital signature: The sender “signs” a message with its
private key. Signing is achieved by a cryptographic algorithm
applied to the message or to a small block of data of the
message.
 Key exchange: Two sides cooperate to exchange a session key.
Applications for Public-Key Cryptosystems
Information and data security public key cryptography and rsa
1. It is computationally easy for a party B to generate a pair
(public key PUb, private key PRb).
2. It is computationally easy for a sender A, knowing the public
key and the message to be encrypted,M, to generate the
corresponding ciphertext:
C = E(PUb,M)
3. It is computationally easy for the receiver B to decrypt the
resulting ciphertext using the private key to recover the
original message:
M = D(PRb, C) = D[PRb, E(PUb,M)]
Requirements for Public-Key
Cryptography
4. It is computationally infeasible for an adversary, knowing the
public key, PUb, to determine the private key,PRb.
5. It is computationally infeasible for an adversary, knowing the
public key, PUb, and a ciphertext, C, to recover the original
message,M. We can add a sixth requirement that, although useful,
is not necessary for all public-key applications:
6. The two keys can be applied in either order:
M = D[PUb, E(PRb,M)] = D[PRb, E(PUb,M)]
Requirements for Public-Key
Cryptography
 developed in 1977 by Ron Rivest, Adi Shamir, and Len Adleman
at MIT and first published in 1978 .
 The RSA scheme is a block cipher in which the plaintext and
ciphertext are integers between 0 and n - 1 for some n.
 A typical size for n is 1024 bits, or 309 decimal digits.
 Encryption and decryption are of the following form, for some
plaintext block M and ciphertext block C.

THE RSA ALGORITHM
Both sender and receiver must know the
value of n.
 The sender knows the value of e.
 only the receiver knows the value of d.
 public key of PU = {e, n}.
 a private key of PR = {d, n}.
THE RSA ALGORITHM
the following requirements must be met
Information and data security public key cryptography and rsa
 The resulting keys are public key PU = {7, 187} and private
key PR = {23, 187}, the example shows the use of these keys
for plaintext M = 88 .
 For encryption
 88^7 mod 187 = [(88^4 mod 187) × (88^2 mod 187)
 × (88^1 mod 187)] mod 187
 88^1 mod 187 = 88
 88^2 mod 187 = 7744 mod 187 = 77
 88^4 mod 187 = 59,969,536 mod 187 = 132
 88^7 mod 187 = (88 × 77 × 132) mod 187 = 894,432 mod 187
= 11
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
RSA Processeing of Multiple Blocks
Four possible approaches to attacking the RSA algorithm are
 Brute force: This involves trying all possible private keys.
 Mathematical attacks: There are several approaches, all
equivalent in effort to factoring the product of two primes.
 Timing attacks: These depend on the running time of the
decryption algorithm.
 Chosen ciphertext attacks: This type of attack exploits properties
of the RSA algorithm.
The Security of RSA
Information and data security public key cryptography and rsa

More Related Content

What's hot (20)

PPT
Ch11 Basic Cryptography
Information Technology
 
PPTX
kerberos
sameer farooq
 
PPT
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
PPTX
Cryptography
Darshini Parikh
 
PPTX
Asymmetric Cryptography.pptx
diaa46
 
PPT
overview of cryptographic techniques
Shubham Jain
 
PDF
RSA ALGORITHM
Dr. Shashank Shetty
 
PPTX
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
Qualcomm
 
PPTX
cryptography
Abhijeet Singh
 
PPTX
Symmetric ciphermodel
priyapavi96
 
PPTX
Cryptography.ppt
Uday Meena
 
PPT
Classical cryptography
Aravindharamanan S
 
PPTX
RSA ALGORITHM
Sathish Kumar
 
PPTX
Cryptography.ppt
kusum sharma
 
PPTX
Cryptography
research30
 
PDF
symmetric key encryption algorithms
Rashmi Burugupalli
 
PPTX
Substitution cipher and Its Cryptanalysis
Sunil Meena
 
PPT
PUBLIC KEY ENCRYPTION
raf_slide
 
PPTX
SSL TLS Protocol
Devang Badrakiya
 
PDF
2. Stream Ciphers
Sam Bowne
 
Ch11 Basic Cryptography
Information Technology
 
kerberos
sameer farooq
 
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Cryptography
Darshini Parikh
 
Asymmetric Cryptography.pptx
diaa46
 
overview of cryptographic techniques
Shubham Jain
 
RSA ALGORITHM
Dr. Shashank Shetty
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
Qualcomm
 
cryptography
Abhijeet Singh
 
Symmetric ciphermodel
priyapavi96
 
Cryptography.ppt
Uday Meena
 
Classical cryptography
Aravindharamanan S
 
RSA ALGORITHM
Sathish Kumar
 
Cryptography.ppt
kusum sharma
 
Cryptography
research30
 
symmetric key encryption algorithms
Rashmi Burugupalli
 
Substitution cipher and Its Cryptanalysis
Sunil Meena
 
PUBLIC KEY ENCRYPTION
raf_slide
 
SSL TLS Protocol
Devang Badrakiya
 
2. Stream Ciphers
Sam Bowne
 

Viewers also liked (6)

PPT
Network Management Security NS8
koolkampus
 
PPT
Public Key Cryptography and RSA algorithm
Indra97065
 
PPTX
Firewall Design and Implementation
ajeet singh
 
PPT
Lecture 5 ip security
rajakhurram
 
PPTX
x.509-Directory Authentication Service
Swathy T
 
PPTX
IP Security
Keshab Nath
 
Network Management Security NS8
koolkampus
 
Public Key Cryptography and RSA algorithm
Indra97065
 
Firewall Design and Implementation
ajeet singh
 
Lecture 5 ip security
rajakhurram
 
x.509-Directory Authentication Service
Swathy T
 
IP Security
Keshab Nath
 
Ad

Similar to Information and data security public key cryptography and rsa (20)

PPTX
Module2.pptx
ShilpaShettyA1
 
PPT
Network and Information Security unit2.ppt.ppt
Vivekananda Gn
 
PPTX
3 public key cryptography
Rutvik Mehta
 
DOCX
Prime Numbers, Fermat’s and Euler’s theorem, discrete logarithm. ASYMMETRIC C...
AneesFathima46
 
PPTX
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
PDF
Pooguzhali
NIVEDHINIMANIVANNAN
 
PPT
PUBLIC KEY & RSA.ppt
RizwanBasha12
 
PPTX
CNS 3RD UNIT PPT.pptx
pjeraids
 
DOC
Unit 3(1)
Vinod Kumar Gorrepati
 
PDF
12- Public-key Cryptography and RSA the lecture on cryptography
arsh4share
 
PDF
2. public key cryptography and RSA
Dr.Florence Dayana
 
PPTX
Principles of public key cryptography and its Uses
Mohsin Ali
 
PDF
RSA 32-bit Implementation Technique
Universitas Pembangunan Panca Budi
 
PPTX
Public Key Cryptosystem
Devakumar Kp
 
PPTX
Public key algorithm
Prateek Pandey
 
PPTX
Public-Key Cryptography.pptx
AbdulRehman970300
 
PDF
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
KanchanPatil34
 
PDF
Vtu network security(10 ec832) unit 3 notes.
Jayanth Dwijesh H P
 
PDF
international security system data threats
gacop74666
 
Module2.pptx
ShilpaShettyA1
 
Network and Information Security unit2.ppt.ppt
Vivekananda Gn
 
3 public key cryptography
Rutvik Mehta
 
Prime Numbers, Fermat’s and Euler’s theorem, discrete logarithm. ASYMMETRIC C...
AneesFathima46
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
PUBLIC KEY & RSA.ppt
RizwanBasha12
 
CNS 3RD UNIT PPT.pptx
pjeraids
 
12- Public-key Cryptography and RSA the lecture on cryptography
arsh4share
 
2. public key cryptography and RSA
Dr.Florence Dayana
 
Principles of public key cryptography and its Uses
Mohsin Ali
 
RSA 32-bit Implementation Technique
Universitas Pembangunan Panca Budi
 
Public Key Cryptosystem
Devakumar Kp
 
Public key algorithm
Prateek Pandey
 
Public-Key Cryptography.pptx
AbdulRehman970300
 
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
KanchanPatil34
 
Vtu network security(10 ec832) unit 3 notes.
Jayanth Dwijesh H P
 
international security system data threats
gacop74666
 
Ad

More from Mazin Alwaaly (20)

PPTX
Pattern recognition voice biometrics
Mazin Alwaaly
 
PPTX
Pattern recognition palm print authentication system
Mazin Alwaaly
 
PPTX
Pattern recognition on line signature
Mazin Alwaaly
 
PPTX
Pattern recognition multi biometrics using face and ear
Mazin Alwaaly
 
PPTX
Pattern recognition IRIS recognition
Mazin Alwaaly
 
PPT
Pattern recognition hand vascular pattern recognition
Mazin Alwaaly
 
PPTX
Pattern recognition Hand Geometry
Mazin Alwaaly
 
PPTX
Pattern recognition forensic dental identification
Mazin Alwaaly
 
PPT
Pattern recognition fingerprints
Mazin Alwaaly
 
PPTX
Pattern recognition facial recognition
Mazin Alwaaly
 
PPTX
Pattern recognition ear as a biometric
Mazin Alwaaly
 
PPTX
Pattern recognition 3d face recognition
Mazin Alwaaly
 
PPTX
Multimedia multimedia over wireless and mobile networks
Mazin Alwaaly
 
PPT
Multimedia network services and protocols for multimedia communications
Mazin Alwaaly
 
PPTX
Multimedia content based retrieval in digital libraries
Mazin Alwaaly
 
PPTX
Multimedia lossy compression algorithms
Mazin Alwaaly
 
PPTX
Multimedia lossless compression algorithms
Mazin Alwaaly
 
PPTX
Multimedia basic video compression techniques
Mazin Alwaaly
 
PPT
Multimedia image compression standards
Mazin Alwaaly
 
PPTX
Multimedia fundamental concepts in video
Mazin Alwaaly
 
Pattern recognition voice biometrics
Mazin Alwaaly
 
Pattern recognition palm print authentication system
Mazin Alwaaly
 
Pattern recognition on line signature
Mazin Alwaaly
 
Pattern recognition multi biometrics using face and ear
Mazin Alwaaly
 
Pattern recognition IRIS recognition
Mazin Alwaaly
 
Pattern recognition hand vascular pattern recognition
Mazin Alwaaly
 
Pattern recognition Hand Geometry
Mazin Alwaaly
 
Pattern recognition forensic dental identification
Mazin Alwaaly
 
Pattern recognition fingerprints
Mazin Alwaaly
 
Pattern recognition facial recognition
Mazin Alwaaly
 
Pattern recognition ear as a biometric
Mazin Alwaaly
 
Pattern recognition 3d face recognition
Mazin Alwaaly
 
Multimedia multimedia over wireless and mobile networks
Mazin Alwaaly
 
Multimedia network services and protocols for multimedia communications
Mazin Alwaaly
 
Multimedia content based retrieval in digital libraries
Mazin Alwaaly
 
Multimedia lossy compression algorithms
Mazin Alwaaly
 
Multimedia lossless compression algorithms
Mazin Alwaaly
 
Multimedia basic video compression techniques
Mazin Alwaaly
 
Multimedia image compression standards
Mazin Alwaaly
 
Multimedia fundamental concepts in video
Mazin Alwaaly
 

Recently uploaded (20)

PPTX
GB1 Q1 04 Life in a Cell (1).pptx GRADE 11
JADE ACOSTA
 
PPT
Introduction of animal physiology in vertebrates
S.B.P.G. COLLEGE BARAGAON VARANASI
 
PPTX
Anatomy and physiology of digestive system.pptx
Ashwini I Chuncha
 
PPTX
Vectors and applications of genetic engineering Pptx
Ashwini I Chuncha
 
PPTX
Pratik inorganic chemistry silicon based ppt
akshaythaker18
 
PDF
The-Origin- of -Metazoa-vertebrates .ppt
S.B.P.G. COLLEGE BARAGAON VARANASI
 
PDF
Introduction of Animal Behaviour full notes.pdf
S.B.P.G. COLLEGE BARAGAON VARANASI
 
PPTX
formations-of-rock-layers-grade 11_.pptx
GraceSarte
 
PDF
The role of the Lorentz force in sunspot equilibrium
Sérgio Sacani
 
PPTX
Immunopharmaceuticals and microbial Application
xxkaira1
 
PPTX
Phage Therapy and Bacteriophage Biology.pptx
Prachi Virat
 
PPTX
Structure and uses of DDT, Saccharin..pptx
harsimrankaur204
 
PDF
Pharma Part 1.pdf #pharmacology #pharmacology
hikmatyt01
 
PPTX
Diuretic Medicinal Chemistry II Unit II.pptx
Dhanashri Dupade
 
PPTX
MODULE 2 Effects of Lifestyle in the Function of Respiratory and Circulator...
judithgracemangunday
 
PDF
A proposed mechanism for the formation of protocell-like structures on Titan
Sérgio Sacani
 
PDF
NRRM 330 Dynamic Equlibrium Presentation
Rowan Sales
 
PPTX
Different formulation of fungicides.pptx
MrRABIRANJAN
 
PPTX
Animal Reproductive Behaviors Quiz Presentation in Maroon Brown Flat Graphic ...
LynetteGaniron1
 
PDF
Continuous Model-Based Engineering of Software-Intensive Systems: Approaches,...
Hugo Bruneliere
 
GB1 Q1 04 Life in a Cell (1).pptx GRADE 11
JADE ACOSTA
 
Introduction of animal physiology in vertebrates
S.B.P.G. COLLEGE BARAGAON VARANASI
 
Anatomy and physiology of digestive system.pptx
Ashwini I Chuncha
 
Vectors and applications of genetic engineering Pptx
Ashwini I Chuncha
 
Pratik inorganic chemistry silicon based ppt
akshaythaker18
 
The-Origin- of -Metazoa-vertebrates .ppt
S.B.P.G. COLLEGE BARAGAON VARANASI
 
Introduction of Animal Behaviour full notes.pdf
S.B.P.G. COLLEGE BARAGAON VARANASI
 
formations-of-rock-layers-grade 11_.pptx
GraceSarte
 
The role of the Lorentz force in sunspot equilibrium
Sérgio Sacani
 
Immunopharmaceuticals and microbial Application
xxkaira1
 
Phage Therapy and Bacteriophage Biology.pptx
Prachi Virat
 
Structure and uses of DDT, Saccharin..pptx
harsimrankaur204
 
Pharma Part 1.pdf #pharmacology #pharmacology
hikmatyt01
 
Diuretic Medicinal Chemistry II Unit II.pptx
Dhanashri Dupade
 
MODULE 2 Effects of Lifestyle in the Function of Respiratory and Circulator...
judithgracemangunday
 
A proposed mechanism for the formation of protocell-like structures on Titan
Sérgio Sacani
 
NRRM 330 Dynamic Equlibrium Presentation
Rowan Sales
 
Different formulation of fungicides.pptx
MrRABIRANJAN
 
Animal Reproductive Behaviors Quiz Presentation in Maroon Brown Flat Graphic ...
LynetteGaniron1
 
Continuous Model-Based Engineering of Software-Intensive Systems: Approaches,...
Hugo Bruneliere
 

Information and data security public key cryptography and rsa

  • 2. Outline principles of public--key cryptography RSA algorithm, implementation, security
  • 3. Structure Cipher Systems Symmetric algorithm Stream Cipher Block Cipher AESRC4 Cipher Systems DES ASymmetric algorithm RSA Public key encryption
  • 4. Asymmetric encryption is a form of cryptosystem in which encryption and decryption are performed using the different keys—one a public key and one a private key. It is also known as public-key encryption.  Asymmetric encryption transforms plaintext into ciphertext using a one of two keys and an encryption algorithm. Using the paired key and a decryption algorithm, the plaintext is recovered from the ciphertext.  Asymmetric encryption can be used for confidentiality, authentication, or both.  The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on the difficulty of finding the prime factors of a composite number. Key points
  • 5. PUBLIC-KEY CRYPTOGAPHY The concept of public-key cryptography evolved from an attempt to attack two of the most difficult problems associated with symmetric encryption :  The first problem is that of key distribution . The second problem and one that was apparently unrelated to the first, was that of digital signatures.
  • 6.  Asymmetric algorithms rely on one key for encryption and a different but related key for decryption .These algorithms have the following important characteristic.  It is computationally infeasible to determine the decryption key given only knowledge of the cryptographic algorithm and the encryption key. Public-Key Cryptosystems
  • 9.  Plaintext: This is the readable message or data that is fed into the algorithm as input.  Encryption algorithm: The encryption algorithm performs various transformations on the plaintext.  Public and private keys: This is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption. The exact transformations performed by the algorithm depend on the public or private key that is provided as input. scheme has six ingredients
  • 10.  Ciphertext: This is the scrambled message produced as output. It depends on the plaintext and the key. For a given message, two different keys will produce two different ciphertexts.  Decryption algorithm: This algorithm accepts the ciphertext and the matching key and produces the original plaintext.
  • 11. 1. Each user generates a pair of keys to be used for the encryption and decryption of messages. 2. Each user places one of the two keys in a public register or other accessible file. This is the public key.The companion key is kept private. 3. If Bob wishes to send a confidential message to Alice, Bob encrypts the message using Alice’s public key. 4. When Alice receives the message, she decrypts it using her private key. No other recipient can decrypt the message because only Alice knows Alice’s private key. The essential steps are the following :
  • 14.  Encryption /decryption: The sender encrypts a message with the recipient’s public key.  Digital signature: The sender “signs” a message with its private key. Signing is achieved by a cryptographic algorithm applied to the message or to a small block of data of the message.  Key exchange: Two sides cooperate to exchange a session key. Applications for Public-Key Cryptosystems
  • 16. 1. It is computationally easy for a party B to generate a pair (public key PUb, private key PRb). 2. It is computationally easy for a sender A, knowing the public key and the message to be encrypted,M, to generate the corresponding ciphertext: C = E(PUb,M) 3. It is computationally easy for the receiver B to decrypt the resulting ciphertext using the private key to recover the original message: M = D(PRb, C) = D[PRb, E(PUb,M)] Requirements for Public-Key Cryptography
  • 17. 4. It is computationally infeasible for an adversary, knowing the public key, PUb, to determine the private key,PRb. 5. It is computationally infeasible for an adversary, knowing the public key, PUb, and a ciphertext, C, to recover the original message,M. We can add a sixth requirement that, although useful, is not necessary for all public-key applications: 6. The two keys can be applied in either order: M = D[PUb, E(PRb,M)] = D[PRb, E(PUb,M)] Requirements for Public-Key Cryptography
  • 18.  developed in 1977 by Ron Rivest, Adi Shamir, and Len Adleman at MIT and first published in 1978 .  The RSA scheme is a block cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n.  A typical size for n is 1024 bits, or 309 decimal digits.  Encryption and decryption are of the following form, for some plaintext block M and ciphertext block C.  THE RSA ALGORITHM
  • 19. Both sender and receiver must know the value of n.  The sender knows the value of e.  only the receiver knows the value of d.  public key of PU = {e, n}.  a private key of PR = {d, n}. THE RSA ALGORITHM
  • 22.  The resulting keys are public key PU = {7, 187} and private key PR = {23, 187}, the example shows the use of these keys for plaintext M = 88 .  For encryption  88^7 mod 187 = [(88^4 mod 187) × (88^2 mod 187)  × (88^1 mod 187)] mod 187  88^1 mod 187 = 88  88^2 mod 187 = 7744 mod 187 = 77  88^4 mod 187 = 59,969,536 mod 187 = 132  88^7 mod 187 = (88 × 77 × 132) mod 187 = 894,432 mod 187 = 11
  • 26. RSA Processeing of Multiple Blocks
  • 27. Four possible approaches to attacking the RSA algorithm are  Brute force: This involves trying all possible private keys.  Mathematical attacks: There are several approaches, all equivalent in effort to factoring the product of two primes.  Timing attacks: These depend on the running time of the decryption algorithm.  Chosen ciphertext attacks: This type of attack exploits properties of the RSA algorithm. The Security of RSA