1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Data security and encryption - Chapter 32: Review 16-30

123 45 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 123
Dung lượng 565,7 KB

Nội dung

The contents of this chapter include all of the following: RSA, RSA En/decryption, Diffie-Hellman key exchange, man-in-the-middle attack, ElGamal cryptography, ElGamal message exchange, hash function, secure hash algorithm, SHA-3 requirements,...

Data Security and Encryption (CSE348) Revision Lectures 16-30 RSA Ø Ø Ø Ø RSA is the best known, and by far the most widely used general public key encryption algorithm First published by Rivest, Shamir & Adleman of MIT in 1978 [RIVE78] The Rivest-Shamir-Adleman (RSA) scheme has since that time ruled supreme as the most widely accepted Implemented general-purpose approach to public3 RSA Ø Ø It is based on exponentiation in a finite (Galois) field over integers modulo a prime, using large integers (eg 1024 bits) Its security is due to the cost of factoring large numbers RSA Ø By Rivest, Shamir & Adleman of MIT in 1977 Ø Best known & widely used public-key scheme Ø based on exponentiation in a finite (Galois) field over integers modulo a prime l nb exponentiation takes O((log n)3) operations (easy) Ø Uses large integers (eg 1024 bits) Ø Security due to cost of factoring large numbers l nb factorization takes O(e log n log log n) operations (hard) RSA En/decryption • • • • The scheme developed by Rivest, Shamir, and Adleman makes use of an expression with exponentials Plaintext is encrypted in blocks with each block having a binary value less than some number n The actual RSA encryption and decryption computations are each simply a single exponentiation mod (n) RSA En/decryption • • • • • Both sender and receiver must know the value of n The sender knows the value of e, and only the receiver knows the value of d Thus, this is a public-key encryption algorithm with a public key of PU = {e, n} and a private key of PR = {d, n} The message must be smaller than the modulus The “magic” is in the choice of the modulus and exponents which makes the system work RSA En/decryption • • • To encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = Me mod n, where 0≤M

Ngày đăng: 20/09/2020, 14:05