1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Data security and encryption - Chapter 16: RSA

57 43 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

The contents of this chapter include all of the following: principles of public-key cryptography, RSA en/decryption, RSA key setup, why RSA works, exponentiation, efficient encryption, efficient decryption, RSA key generation, RSA security, factoring problem, progress in factoring.

Data Security and Encryption (CSE348) Lecture # 16 Review • have considered: – principles of public-key cryptography RSA  RSA is the best known, and by far the most widely used general public key encryption algorithm  First published by Rivest, Shamir & Adleman of MIT in 1978 [RIVE78]  The Rivest-Shamir-Adleman (RSA) scheme has since that time reigned supreme as the most widely accepted  Implemented general-purpose approach to publickey encryption RSA  It is based on exponentiation in a finite (Galois) field over integers modulo a prime, using large integers (eg 1024 bits)  Its security is due to the cost of factoring large numbers RSA  By Rivest, Shamir & Adleman of MIT in 1977  Best known & widely used public-key scheme  based on exponentiation in a finite (Galois) field over integers modulo a prime nb exponentiation takes O((log n)3) operations (easy)  Uses large integers (eg 1024 bits)  Security due to cost of factoring large numbers nb factorization takes O(e log n log log n) operations (hard) RSA En/decryption • The scheme developed by Rivest, Shamir, and Adleman makes use of an expression with exponentials • Plaintext is encrypted in blocks • with each block having a binary value less than some number n • The actual RSA encryption and decryption computations are each simply a single exponentiation mod (n) RSA En/decryption • Both sender and receiver must know the value of n • The sender knows the value of e, and only the receiver knows the value of d • Thus, this is a public-key encryption algorithm with a public key of PU = {e, n} and a private key of PR = {d, n} • The message must be smaller than the modulus • The “magic” is in the choice of the modulus and exponents which makes the system work RSA En/decryption • To encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = Me mod n, where 0≤M

Ngày đăng: 20/09/2020, 14:00

Xem thêm:

TỪ KHÓA LIÊN QUAN

Mục lục

    Data Security and Encryption (CSE348)

    RSA Example - Key Setup

    RSA Example - En/Decryption

    Optimal Asymmetric Encryption Padding (OASP)

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN