SlideShare a Scribd company logo
Public key cryptography and
RSA algorithm
Name:R.POONGUZHALI
Class:II Msc Computer Science
Batch:2017-2019
Incharge Staff:Ms.M.Florence Dayana
PUBLIC KEY
CRYPTOGRAPHY
• It is computationally infeasible to determine the decryption key given only
knowledge of the cryptographic algorithm and the encryption key
• Either of the two related keys can be used for encryption, with the other used for
decryption
• A public key encryption scheme has six ingredients
• Plaintext : This is the readable message or data that is fed into the algorithmas
input.
• Encryption algorithm : The encryption algorithm Perform various
transformations on the Plaintext.
• Public and Private keys : This is a pair of keys that have been selected so
that if one is used for encryption the other used for decryption
• Decryption algorithm : This algorithm accepts the ciphertext and thematching
key and Produces the original plaintext.
Key distribution
The communications already shares a key or someonce has been distributed
key
How to secure communications in general without having to trust a KDC
with yours key
Pooguzhali
Pooguzhali
Conventional Encryption Public key Encryption
1. The same algorithm with the same keys used for
encryption and decryption
2. The sender and receiver must share the algorithm
and the key
Need for security
1. The key must be kept secret
2. It must be impossible or at least impractical
decipher a message if the key is kept secret.
1. One algorithms used for encryption and related
algorithm for decryption with a pair or key one or
encryption and to decryption
2. The sender and receiver must each have one of the
matched key
Need for security
1. One of the two must be kept secret
2. It must be impossible or at least impractical to
decipher a message if one of the key secret.
Application for public
key cryptosystems
• Encryption/decryption : The sender encrypts a message with the recipients
public key
• Digital signature : The sender “signs” a message with private key
• Key exchange : Two sides cooperate to exchange a session key.
THE RSA ALGORITHM
RSA
ALGORITH
M
• Ron Rivest , Adi shamir and Len Adleman of MIT1977
• Best know & widely used public key scheme
• Based on exponentials in a finiate field over integers modulo a prime
• Uses the large integers (ex:1024 bits)
• Security due to cost of factoring large number
Each user generates a public/private key pair By :
1. Selecting two large primes at random –P,q
2. Computing their system modulus N=p.q
RSA
use
To encrypt a message M the sender:
• Obtains Public Key of recipient KU={e,N}
• Computes:C=Me mod N, where 0≤M<N
To decrypt the ciphertext C the Owner:
• Uses their private KR={pd,p,q}
• Computes : M= Cd mod N
That the message M must be smaller than the modulus N
Algorithm Requirement
1. It is possible to find values of e,d,f
Such that Med mod n = M for all M<n
It is relatively easy to calculate M mod n
and Cd mod n for all values of M < n
It is infeasible to determine d given e
and n
Pooguzhali
RSA
SECURIT
Y
Three approaches attacking RSA:
• Brute force key search(infeasible given size of numbers)
• Mathematical attacks (based on difficulty of computing)
• Timing attacks(on running of decryption)
Pooguzhali
Optimizing Private key operation
1.Cd mod n =cd mod pq
Compute cd mod p and cd mod q
Use Chinese remainder theorem to compute cd mod pq
Chines remainder theorem requires p-1mod q and q-1mod p.
Since d is much bigger than p,cd mod p=cr mod p where r=d mod(p-1)
1. D=k(p-1)+r
2. Modp : ad=ak(p-1)+r=ak
3. (p)ar=ar[Euler’s theorem]

More Related Content

PDF
Encryption and Key Distribution Methods
Gulcin Yildirim Jelinek
 
PPTX
Public key Cryptography & RSA
Amit Debnath
 
PPTX
Cryptography and RSA algorithm
Saifil Momin
 
PDF
2. public key cryptography and RSA
Dr.Florence Dayana
 
PDF
Public Key Encryption & Hash functions
Dr.Florence Dayana
 
PPTX
Cryptography and network security
Mathan Gopal
 
PPT
Rsa
magentie
 
Encryption and Key Distribution Methods
Gulcin Yildirim Jelinek
 
Public key Cryptography & RSA
Amit Debnath
 
Cryptography and RSA algorithm
Saifil Momin
 
2. public key cryptography and RSA
Dr.Florence Dayana
 
Public Key Encryption & Hash functions
Dr.Florence Dayana
 
Cryptography and network security
Mathan Gopal
 

What's hot (20)

PPTX
RSA Algorithem and information about rsa
Mohsin Ali
 
PPTX
Key distribution code.ppt
Prabhat Kumar
 
PPTX
Cryptography
pravin pandey
 
PPTX
Key Distribution Problem in advanced operating system
Merlin Florrence
 
PPT
Rsa and diffie hellman algorithms
daxesh chauhan
 
PPT
Distribution of public keys and hmac
anuragjagetiya
 
PDF
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
 
PPTX
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
 
PPTX
Public Key Cryptosystem
Devakumar Kp
 
PPT
PUBLIC KEY ENCRYPTION
raf_slide
 
PPTX
Cryptography
Sandip kumar
 
PPTX
3 public key cryptography
Rutvik Mehta
 
PPT
Public key cryptography and RSA
Shafaan Khaliq Bhatti
 
PPTX
Cryptography and Network security # Lecture 5
Kabul Education University
 
PPTX
Cryptography - Simplified - Asymmetric Encryption
Abdul Manaf Vellakodath
 
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
PPT
Final ss2-digital-signature-group5
Phan Minh
 
PPTX
Information and data security public key cryptography and rsa
Mazin Alwaaly
 
RSA Algorithem and information about rsa
Mohsin Ali
 
Key distribution code.ppt
Prabhat Kumar
 
Cryptography
pravin pandey
 
Key Distribution Problem in advanced operating system
Merlin Florrence
 
Rsa and diffie hellman algorithms
daxesh chauhan
 
Distribution of public keys and hmac
anuragjagetiya
 
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
 
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
 
Public Key Cryptosystem
Devakumar Kp
 
PUBLIC KEY ENCRYPTION
raf_slide
 
Cryptography
Sandip kumar
 
3 public key cryptography
Rutvik Mehta
 
Public key cryptography and RSA
Shafaan Khaliq Bhatti
 
Cryptography and Network security # Lecture 5
Kabul Education University
 
Cryptography - Simplified - Asymmetric Encryption
Abdul Manaf Vellakodath
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Final ss2-digital-signature-group5
Phan Minh
 
Information and data security public key cryptography and rsa
Mazin Alwaaly
 
Ad

Similar to Pooguzhali (20)

PPT
PUBLIC KEY & RSA.ppt
RizwanBasha12
 
PPTX
3 pkc+rsa
Shashank Mishra
 
PPTX
Ch9_Cryptokkkllllllllllllllllllllk6e.pptx
LaxmanBhandari22
 
PDF
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
KanchanPatil34
 
PPT
Public Key Cryptography and RSA algorithm
Indra97065
 
PPTX
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
PPT
RSA Algorithm - Public Key Cryptography
Md. Shafiul Alam Sagor
 
PDF
12- Public-key Cryptography and RSA the lecture on cryptography
arsh4share
 
PDF
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
DOC
Unit 3(1)
Vinod Kumar Gorrepati
 
PPTX
Module-2 Public-Key Cryptography and RSA.pptx
AmbikaVenkatesh4
 
PPTX
Public-Key Cryptography.pptx
AbdulRehman970300
 
PPTX
Security - ch3.pptx
HabtamuHaileMichael2
 
PPTX
Security - ch3.pptx
GebrehanaAlemaw
 
PPTX
Public key algorithm
Prateek Pandey
 
DOCX
Unit 3(1)
Vinod Kumar Gorrepati
 
PPTX
Unit 7 : Network Security
Chandan Gupta Bhagat
 
PPT
Encryption
Naiyan Noor
 
PPT
Unit --3.ppt
DHANABALSUBRAMANIAN
 
PUBLIC KEY & RSA.ppt
RizwanBasha12
 
3 pkc+rsa
Shashank Mishra
 
Ch9_Cryptokkkllllllllllllllllllllk6e.pptx
LaxmanBhandari22
 
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
KanchanPatil34
 
Public Key Cryptography and RSA algorithm
Indra97065
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
RSA Algorithm - Public Key Cryptography
Md. Shafiul Alam Sagor
 
12- Public-key Cryptography and RSA the lecture on cryptography
arsh4share
 
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
Module-2 Public-Key Cryptography and RSA.pptx
AmbikaVenkatesh4
 
Public-Key Cryptography.pptx
AbdulRehman970300
 
Security - ch3.pptx
HabtamuHaileMichael2
 
Security - ch3.pptx
GebrehanaAlemaw
 
Public key algorithm
Prateek Pandey
 
Unit 7 : Network Security
Chandan Gupta Bhagat
 
Encryption
Naiyan Noor
 
Unit --3.ppt
DHANABALSUBRAMANIAN
 
Ad

Recently uploaded (20)

PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Software Development Methodologies in 2025
KodekX
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Doc9.....................................
SofiaCollazos
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
The Future of Artificial Intelligence (AI)
Mukul
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 

Pooguzhali

  • 1. Public key cryptography and RSA algorithm Name:R.POONGUZHALI Class:II Msc Computer Science Batch:2017-2019 Incharge Staff:Ms.M.Florence Dayana
  • 2. PUBLIC KEY CRYPTOGRAPHY • It is computationally infeasible to determine the decryption key given only knowledge of the cryptographic algorithm and the encryption key • Either of the two related keys can be used for encryption, with the other used for decryption • A public key encryption scheme has six ingredients • Plaintext : This is the readable message or data that is fed into the algorithmas input. • Encryption algorithm : The encryption algorithm Perform various transformations on the Plaintext.
  • 3. • Public and Private keys : This is a pair of keys that have been selected so that if one is used for encryption the other used for decryption • Decryption algorithm : This algorithm accepts the ciphertext and thematching key and Produces the original plaintext. Key distribution The communications already shares a key or someonce has been distributed key How to secure communications in general without having to trust a KDC with yours key
  • 6. Conventional Encryption Public key Encryption 1. The same algorithm with the same keys used for encryption and decryption 2. The sender and receiver must share the algorithm and the key Need for security 1. The key must be kept secret 2. It must be impossible or at least impractical decipher a message if the key is kept secret. 1. One algorithms used for encryption and related algorithm for decryption with a pair or key one or encryption and to decryption 2. The sender and receiver must each have one of the matched key Need for security 1. One of the two must be kept secret 2. It must be impossible or at least impractical to decipher a message if one of the key secret.
  • 7. Application for public key cryptosystems • Encryption/decryption : The sender encrypts a message with the recipients public key • Digital signature : The sender “signs” a message with private key • Key exchange : Two sides cooperate to exchange a session key.
  • 9. RSA ALGORITH M • Ron Rivest , Adi shamir and Len Adleman of MIT1977 • Best know & widely used public key scheme • Based on exponentials in a finiate field over integers modulo a prime • Uses the large integers (ex:1024 bits) • Security due to cost of factoring large number Each user generates a public/private key pair By : 1. Selecting two large primes at random –P,q 2. Computing their system modulus N=p.q
  • 10. RSA use To encrypt a message M the sender: • Obtains Public Key of recipient KU={e,N} • Computes:C=Me mod N, where 0≤M<N To decrypt the ciphertext C the Owner: • Uses their private KR={pd,p,q} • Computes : M= Cd mod N That the message M must be smaller than the modulus N
  • 11. Algorithm Requirement 1. It is possible to find values of e,d,f Such that Med mod n = M for all M<n It is relatively easy to calculate M mod n and Cd mod n for all values of M < n It is infeasible to determine d given e and n
  • 13. RSA SECURIT Y Three approaches attacking RSA: • Brute force key search(infeasible given size of numbers) • Mathematical attacks (based on difficulty of computing) • Timing attacks(on running of decryption)
  • 15. Optimizing Private key operation 1.Cd mod n =cd mod pq Compute cd mod p and cd mod q Use Chinese remainder theorem to compute cd mod pq Chines remainder theorem requires p-1mod q and q-1mod p. Since d is much bigger than p,cd mod p=cr mod p where r=d mod(p-1) 1. D=k(p-1)+r 2. Modp : ad=ak(p-1)+r=ak 3. (p)ar=ar[Euler’s theorem]