SlideShare a Scribd company logo
4
Most read
5
Most read
6
Most read
Information and Network Security:32
Principles of Public-Key Cryptosystems
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Symmetric vs Public-Key
Public-Key Cryptosystems
Principles of Public-Key Cryptosystems
• Stallings Figure “Public-Key Cryptosystems: Secrecy and Authentication”
illustrates the essential elements of a public-key encryption scheme.
• Note that public-key schemes can be used for either secrecy or authentication, or
both (as shown here). There is some source A that produces a message in
plaintext X The M elements of X are letters in some finite alphabet.
• The message is intended for destination B. B generates a related pair of keys: a
public key, PUb, and a private key, PRb. PRb is known only to B, whereas PUb is
publicly available and therefore accessible by A.
• With the message X and the encryption key PUb as input, A forms the ciphertext
Y = E(PUb, X) The intended receiver, in possession of the matching private key, is
able to invert the transformation: X = D(PRb, Y) An adversary, observing Y and
having access to PUb, but not having access to PRb or X, must attempt to recover
X and/or PRb.
Principles of Public-Key Cryptosystems
• This provides confidentiality. Can also use a public-key encryption to
provide authentication: Y = E(PRa, X); X = D(PUa, Y) To provide both the
authentication function and confidentiality have a double use of the public-
key scheme (as shown here): Z = E(PUb, E(PRa, X)) X = D(PUa, D(PRb, Z))
• In this case, separate key pairs are used for each of these purposes. The
receiver owns and creates secrecy keys, sender owns and creates
authentication keys.
• In practice typically DO NOT do this, because of the computational cost of
public-key schemes. Rather encrypt a session key which is then used with a
block cipher to encrypt the actual message, and separately sign a hash of
the message as a digital signature - this will be discussed more later.
Public-Key Applications
• can classify uses into 3 categories:
• encryption/decryption (provide secrecy)
• digital signatures (provide authentication)
• key exchange (of session keys)
• some algorithms are suitable for all uses, others are
specific to one
• Public-key systems are characterized by the use of a cryptographic
type of algorithm with two keys.
• Depending on the application, the sender uses either the sender’s
private key or the receiver’s public key, or both, to perform some type
of cryptographic function.
• In broad terms, we can classify the use of public-key cryptosystems
into the three categories:
• • Encryption/decryption: The sender encrypts a message with the
recipient’s public key.
• Digital signature: The sender “signs” a message with its private key,
either to the whole message or to a small block of data that is a
function of the message.
• • Key exchange: Two sides cooperate to exchange a session key.
Several different approaches are possible, involving the private key(s)
of one or both parties.
• Some algorithms are suitable for all three applications, whereas
others can be used only for one or two of these applications.
Public-Key Requirements
• Public-Key algorithms rely on two keys where:
• it is computationally infeasible to find decryption key knowing only algorithm
& encryption key
• it is computationally easy to en/decrypt messages when the relevant
(en/decrypt) key is known
• either of the two related keys can be used for encryption, with the other used
for decryption (for some algorithms)
• these are formidable requirements which only a few algorithms have
satisfied
Public-Key Requirements
• need a trapdoor one-way function
• one-way function has
• Y = f(X) easy
• X = f–1(Y) infeasible
• a trap-door one-way function has
• Y = fk(X) easy, if k and X are known
• X = fk
–1(Y) easy, if k and Y are known
• X = fk
–1(Y) infeasible, if Y known but k not known
• a practical public-key scheme depends on a suitable
trap-door one-way function
Security of Public Key Schemes
like private key schemes brute force exhaustive
search attack is always theoretically possible
but keys used are too large (>512bits)
security relies on a large enough difference in
difficulty between easy (en/decrypt) and hard
(cryptanalyse) problems
more generally the hard problem is known, but is
made hard enough to be impractical to break
requires the use of very large numbers
hence is slow compared to private key schemes
Assignment
• Explain the Principles of Public-Key Cryptosystems.

More Related Content

What's hot (15)

DOC
Error Handling in Compiler Design.typeso
BhuvaneswariR27
 
PPTX
Inheritance in OOPS
Ronak Chhajed
 
PDF
Cursors
Isha Aggarwal
 
PDF
CNS - Unit - 1 - Introduction
Gyanmanjari Institute Of Technology
 
PPTX
Key management and distribution
Riya Choudhary
 
PPTX
LZW Presentation.pptx
IsraaAkramBasheer
 
PPT
Introduction
Hiren Selani
 
PPTX
LR(1) and SLR(1) parsing
R Islam
 
PPT
Operating System 2
tech2click
 
PPTX
اسم المصدر
wandaivy
 
PPTX
Stylistic analysis of a poem.pptx
ssuser4f4440
 
PPTX
Confidentiality using symmetric encryption.pptx
AYUSHJAIN152065
 
PPTX
System Programing Unit 1
Manoj Patil
 
PDF
An introduction to X.509 certificates
Stephane Potier
 
PDF
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
 
Error Handling in Compiler Design.typeso
BhuvaneswariR27
 
Inheritance in OOPS
Ronak Chhajed
 
Cursors
Isha Aggarwal
 
CNS - Unit - 1 - Introduction
Gyanmanjari Institute Of Technology
 
Key management and distribution
Riya Choudhary
 
LZW Presentation.pptx
IsraaAkramBasheer
 
Introduction
Hiren Selani
 
LR(1) and SLR(1) parsing
R Islam
 
Operating System 2
tech2click
 
اسم المصدر
wandaivy
 
Stylistic analysis of a poem.pptx
ssuser4f4440
 
Confidentiality using symmetric encryption.pptx
AYUSHJAIN152065
 
System Programing Unit 1
Manoj Patil
 
An introduction to X.509 certificates
Stephane Potier
 
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
 

Similar to Information and network security 32 principles of public key cryptosystems (20)

PPTX
Module2.pptx
ShilpaShettyA1
 
PPTX
Public Key Cryptosystem
Devakumar Kp
 
PPTX
Principles of public key cryptography and its Uses
Mohsin Ali
 
PPTX
Public-Key Cryptography.pptx
AbdulRehman970300
 
PPTX
Information and network security 31 public key cryptography
Vaibhav Khanna
 
PPTX
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
PPTX
3 public key cryptography
Rutvik Mehta
 
PPTX
UNIT-IV.pptx
SunnyAnchews
 
PDF
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
KanchanPatil34
 
PPT
Network and Information Security unit2.ppt.ppt
Vivekananda Gn
 
PDF
paper1.pdf
aminasouyah
 
PDF
doc1.pdf
aminasouyah
 
PDF
sheet1.pdf
aminasouyah
 
PDF
paper8.pdf
aminasouyah
 
PDF
lecture7.pdf
aminasouyah
 
PPTX
Information and data security public key cryptography and rsa
Mazin Alwaaly
 
PDF
2. public key cryptography and RSA
Dr.Florence Dayana
 
PPTX
CNS 3RD UNIT PPT.pptx
pjeraids
 
PDF
Computer security module 3
Deepak John
 
PDF
Vtu network security(10 ec832) unit 3 notes.
Jayanth Dwijesh H P
 
Module2.pptx
ShilpaShettyA1
 
Public Key Cryptosystem
Devakumar Kp
 
Principles of public key cryptography and its Uses
Mohsin Ali
 
Public-Key Cryptography.pptx
AbdulRehman970300
 
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
3 public key cryptography
Rutvik Mehta
 
UNIT-IV.pptx
SunnyAnchews
 
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
KanchanPatil34
 
Network and Information Security unit2.ppt.ppt
Vivekananda Gn
 
paper1.pdf
aminasouyah
 
doc1.pdf
aminasouyah
 
sheet1.pdf
aminasouyah
 
paper8.pdf
aminasouyah
 
lecture7.pdf
aminasouyah
 
Information and data security public key cryptography and rsa
Mazin Alwaaly
 
2. public key cryptography and RSA
Dr.Florence Dayana
 
CNS 3RD UNIT PPT.pptx
pjeraids
 
Computer security module 3
Deepak John
 
Vtu network security(10 ec832) unit 3 notes.
Jayanth Dwijesh H P
 
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 47 authentication applications
Vaibhav Khanna
 
PPTX
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
PPTX
Information and network security 45 digital signature standard
Vaibhav Khanna
 
PPTX
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
PPTX
Information and network security 43 digital signatures
Vaibhav Khanna
 
PPTX
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
PPTX
Information and network security 41 message authentication code
Vaibhav Khanna
 
PPTX
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
 
PPTX
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
PPTX
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
PPTX
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
PPTX
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
PPTX
Information and network security 34 primality
Vaibhav Khanna
 
PPTX
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
PPTX
Information and network security 30 random numbers
Vaibhav Khanna
 
PPTX
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
PPTX
Information and network security 28 blowfish
Vaibhav Khanna
 
PPTX
Information and network security 27 triple des
Vaibhav Khanna
 
PPTX
Information and network security 26 aes decryption and implementational issues
Vaibhav Khanna
 
PPTX
Information and network security 25 algorithmic steps of aes
Vaibhav Khanna
 
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
 
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Vaibhav Khanna
 
Information and network security 26 aes decryption and implementational issues
Vaibhav Khanna
 
Information and network security 25 algorithmic steps of aes
Vaibhav Khanna
 
Ad

Recently uploaded (20)

PPTX
Get Started with Maestro: Agent, Robot, and Human in Action – Session 5 of 5
klpathrudu
 
PPTX
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
PPTX
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
PDF
Open Chain Q2 Steering Committee Meeting - 2025-06-25
Shane Coughlan
 
PPTX
Home Care Tools: Benefits, features and more
Third Rock Techkno
 
PPTX
Smart Doctor Appointment Booking option in odoo.pptx
AxisTechnolabs
 
PPTX
Help for Correlations in IBM SPSS Statistics.pptx
Version 1 Analytics
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PPTX
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
PPTX
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
PPTX
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
PDF
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
PPTX
iaas vs paas vs saas :choosing your cloud strategy
CloudlayaTechnology
 
PDF
Everything you need to know about pricing & licensing Microsoft 365 Copilot f...
Q-Advise
 
PDF
ERP Consulting Services and Solutions by Contetra Pvt Ltd
jayjani123
 
PDF
Empower Your Tech Vision- Why Businesses Prefer to Hire Remote Developers fro...
logixshapers59
 
PDF
The 5 Reasons for IT Maintenance - Arna Softech
Arna Softech
 
PDF
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
PPTX
Finding Your License Details in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
MiniTool Power Data Recovery 8.8 With Crack New Latest 2025
bashirkhan333g
 
Get Started with Maestro: Agent, Robot, and Human in Action – Session 5 of 5
klpathrudu
 
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
Open Chain Q2 Steering Committee Meeting - 2025-06-25
Shane Coughlan
 
Home Care Tools: Benefits, features and more
Third Rock Techkno
 
Smart Doctor Appointment Booking option in odoo.pptx
AxisTechnolabs
 
Help for Correlations in IBM SPSS Statistics.pptx
Version 1 Analytics
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
iaas vs paas vs saas :choosing your cloud strategy
CloudlayaTechnology
 
Everything you need to know about pricing & licensing Microsoft 365 Copilot f...
Q-Advise
 
ERP Consulting Services and Solutions by Contetra Pvt Ltd
jayjani123
 
Empower Your Tech Vision- Why Businesses Prefer to Hire Remote Developers fro...
logixshapers59
 
The 5 Reasons for IT Maintenance - Arna Softech
Arna Softech
 
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
Finding Your License Details in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
MiniTool Power Data Recovery 8.8 With Crack New Latest 2025
bashirkhan333g
 

Information and network security 32 principles of public key cryptosystems

  • 1. Information and Network Security:32 Principles of Public-Key Cryptosystems Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 4. Principles of Public-Key Cryptosystems • Stallings Figure “Public-Key Cryptosystems: Secrecy and Authentication” illustrates the essential elements of a public-key encryption scheme. • Note that public-key schemes can be used for either secrecy or authentication, or both (as shown here). There is some source A that produces a message in plaintext X The M elements of X are letters in some finite alphabet. • The message is intended for destination B. B generates a related pair of keys: a public key, PUb, and a private key, PRb. PRb is known only to B, whereas PUb is publicly available and therefore accessible by A. • With the message X and the encryption key PUb as input, A forms the ciphertext Y = E(PUb, X) The intended receiver, in possession of the matching private key, is able to invert the transformation: X = D(PRb, Y) An adversary, observing Y and having access to PUb, but not having access to PRb or X, must attempt to recover X and/or PRb.
  • 5. Principles of Public-Key Cryptosystems • This provides confidentiality. Can also use a public-key encryption to provide authentication: Y = E(PRa, X); X = D(PUa, Y) To provide both the authentication function and confidentiality have a double use of the public- key scheme (as shown here): Z = E(PUb, E(PRa, X)) X = D(PUa, D(PRb, Z)) • In this case, separate key pairs are used for each of these purposes. The receiver owns and creates secrecy keys, sender owns and creates authentication keys. • In practice typically DO NOT do this, because of the computational cost of public-key schemes. Rather encrypt a session key which is then used with a block cipher to encrypt the actual message, and separately sign a hash of the message as a digital signature - this will be discussed more later.
  • 6. Public-Key Applications • can classify uses into 3 categories: • encryption/decryption (provide secrecy) • digital signatures (provide authentication) • key exchange (of session keys) • some algorithms are suitable for all uses, others are specific to one
  • 7. • Public-key systems are characterized by the use of a cryptographic type of algorithm with two keys. • Depending on the application, the sender uses either the sender’s private key or the receiver’s public key, or both, to perform some type of cryptographic function. • In broad terms, we can classify the use of public-key cryptosystems into the three categories: • • Encryption/decryption: The sender encrypts a message with the recipient’s public key.
  • 8. • Digital signature: The sender “signs” a message with its private key, either to the whole message or to a small block of data that is a function of the message. • • Key exchange: Two sides cooperate to exchange a session key. Several different approaches are possible, involving the private key(s) of one or both parties. • Some algorithms are suitable for all three applications, whereas others can be used only for one or two of these applications.
  • 9. Public-Key Requirements • Public-Key algorithms rely on two keys where: • it is computationally infeasible to find decryption key knowing only algorithm & encryption key • it is computationally easy to en/decrypt messages when the relevant (en/decrypt) key is known • either of the two related keys can be used for encryption, with the other used for decryption (for some algorithms) • these are formidable requirements which only a few algorithms have satisfied
  • 10. Public-Key Requirements • need a trapdoor one-way function • one-way function has • Y = f(X) easy • X = f–1(Y) infeasible • a trap-door one-way function has • Y = fk(X) easy, if k and X are known • X = fk –1(Y) easy, if k and Y are known • X = fk –1(Y) infeasible, if Y known but k not known • a practical public-key scheme depends on a suitable trap-door one-way function
  • 11. Security of Public Key Schemes like private key schemes brute force exhaustive search attack is always theoretically possible but keys used are too large (>512bits) security relies on a large enough difference in difficulty between easy (en/decrypt) and hard (cryptanalyse) problems more generally the hard problem is known, but is made hard enough to be impractical to break requires the use of very large numbers hence is slow compared to private key schemes
  • 12. Assignment • Explain the Principles of Public-Key Cryptosystems.