The document discusses the RSA and MD5 algorithms. It provides an overview of how RSA works, including key generation, encryption, and decryption. It also explains the MD5 hashing algorithm and its use in ensuring data integrity. Both algorithms are commonly used in security and encryption applications.
PGP and S/MIME are two standards for securing email. PGP provides encryption and authentication independently of operating systems using symmetric and asymmetric cryptography. S/MIME uses X.509 certificates and defines how to cryptographically sign, encrypt, and combine MIME entities for authentication and confidentiality using algorithms like RSA, DSS, and 3DES. DKIM allows a sending domain to cryptographically sign emails to assert the message's origin and prevent spoofing, while the email architecture standards like RFC 5322 and MIME define message formatting and how attachments are represented.
The document discusses cryptography concepts including encryption, decryption, symmetric and asymmetric encryption techniques, cryptanalysis methods like brute force attacks, and the importance of secret keys. Symmetric encryption uses a shared secret key by both sender and receiver, while asymmetric encryption uses different public/private keys. Cryptanalysis aims to discover plaintext or keys by techniques like brute force trials or exploiting algorithm weaknesses. Longer cryptographic keys increase the difficulty of brute force attacks breaking the encryption.
The document summarizes the RSA encryption algorithm. It begins by explaining that RSA was developed in 1977 by Rivest, Shamir and Adleman. It then provides an example to demonstrate how RSA works step-by-step, generating keys, encrypting a message and decrypting the ciphertext. Finally, it discusses some challenges with breaking RSA encryption, including brute force attacks and mathematical attacks based on factoring the encryption keys, as well as timing attacks that aim to deduce keys based on variations in processing time.
Public key cryptography uses two keys, a public key that can encrypt messages and a private key that decrypts messages. It has six components: plain text, encryption algorithm, public and private keys, ciphertext, and decryption algorithm. Some key characteristics are that it is computationally infeasible to determine the private key from the public key alone, and encryption/decryption is easy when the relevant key is known. The requirements of public key cryptography are that it is easy to generate a public-private key pair, easy to encrypt with the public key, easy for the recipient to decrypt with the private key, and infeasible to determine the private key from the public key or recover the plaintext from the ciphertext and public key alone
Symmetric and asymmetric encryption methods are compared. Symmetric encryption uses a single shared key for encryption and decryption while asymmetric encryption uses two separate keys: a public key for encryption and a private key for decryption. The main advantages of symmetric encryption are that it is simple and fast but key distribution is insecure. Asymmetric encryption is more secure for key distribution since users only need to share public keys, but it is more complex computationally.
This document presents a seminar on cryptography. It begins with an introduction to cryptography and its purpose in ensuring confidentiality, integrity and accuracy of communications. It then defines cryptography and discusses secret key cryptography which uses a single shared key for encryption and decryption, and public key cryptography which uses separate public and private keys. The document outlines the architecture and process of cryptography, along with common cryptographic algorithms like symmetric and asymmetric key cryptography and hash functions. It also discusses different types of attacks on cryptography like cipher text only and chosen plaintext attacks. The conclusion emphasizes using the appropriate cryptographic algorithm according to the requirements for security and speed of message transmission.
- DES (Data Encryption Standard) is a symmetric block cipher algorithm that encrypts data in 64-bit blocks using a 56-bit key. It was the first encryption standard adopted by the U.S. government for protecting sensitive unclassified federal government information.
- DES works by performing 16 rounds of complex substitutions and permutations on each data block, encrypting it using the key. It has various modes of operation like ECB, CBC, CFB, OFB, and CTR that specify how it operates on data.
- In 1998, DES was broken using a brute force attack by the Electronic Frontier Foundation in just 3 days, showing the need for stronger algorithms like AES which replaced DES as the encryption standard
Digital signatures allow users to authenticate messages, verify authorship, and detect modifications. The document discusses digital signature requirements and attacks. It then summarizes the ElGamal digital signature scheme, which uses exponentiation in a finite field for encryption and verification based on discrete logarithms. The signature process and an example are provided to illustrate how ElGamal digital signatures are generated and verified.
traditional private/secret/single key cryptography uses one key
Key is shared by both sender and receiver
if the key is disclosed communications are compromised
also known as symmetric, both parties are equal
hence does not protect sender from receiver forging a message & claiming is sent by sender
The document discusses the OSI security architecture and common network security threats and defenses. It begins with an introduction to the OSI security architecture proposed by ITU-T as a standard for defining and providing security across network layers. It then discusses (1) specific security mechanisms like encryption and digital signatures and pervasive mechanisms like security audits; (2) common passive and active security threats like eavesdropping and denial of service attacks; and (3) that passive attacks focus on prevention while active attacks require detection and recovery. It concludes with exercises asking about these topics.
A birthday attack is a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory. This attack can be used to abuse communication between two or more parties. The attack depends on the higher likelihood of collisions found between random attack attempts and a fixed degree of permutations
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
This document discusses Mandatory Access Control (MAC) and Role-Based Access Control (RBAC) for multilevel security. It describes how MAC classifies data and users based on security levels like Top Secret, Secret, Confidential and Unclassified. It also explains how MAC enforces restrictions on user access to data based on user clearance levels. RBAC associates privileges with roles rather than individual users, allowing multiple users to be assigned the same role and privileges. The document outlines how roles can be created, privileges assigned, and separation of duties enforced through RBAC.
In cryptography, a one-time pad (OTP) is an encryption technique that cannot be cracked if used correctly. In this technique, a plaintext is paired with a random ...
The document discusses authentication protocols and digital signatures. It describes mutual authentication protocols that allow two parties to verify each other's identities and exchange session keys. It also discusses one-way authentication protocols. The document focuses on explaining the Digital Signature Standard (DSS) and the Digital Signature Algorithm (DSA). It provides details on how DSA uses public/private key pairs to generate and verify digital signatures for authenticating messages and senders.
This presentation introduces Feistel encryption and decryption. It discusses the Feistel cipher structure which partitions the input block into two halves and processes them through multiple rounds of substitution and permutation. It shows diagrams of the Feistel encryption and decryption processes. It also covers the design features of Feistel networks such as block size, key size, number of rounds, and sub-key generation. Finally, it provides an example of the round function that performs a bitwise XOR of the left half and output of a function applied to the right half and sub-key.
Intruders in cns. Various intrusion detection and prevention technique.pptxSriK49
油
The document discusses system security and intruders. It defines different types of intruders like masqueraders, misfeasors, and clandestine users. It also describes various intrusion techniques used by intruders like asymmetric routing, buffer overflow attacks, scripts, protocol-specific attacks, traffic flooding, trojans, and worms. The document then discusses intrusion detection systems, their classifications into network IDS, host IDS, protocol-based IDS, application protocol-based IDS, and hybrid IDS. It also covers signature-based and anomaly-based detection methods of IDS. Finally, it discusses password management as the front line of defense against intruders.
Public key cryptography uses two keys - a public key that can be shared openly and a private key that is kept secret. The RSA algorithm, invented in 1977, is the most widely used public key cryptosystem. It uses a public and private key pair generated from two large prime numbers. The public key is used to encrypt messages, while the private key is used to decrypt messages. The security of RSA relies on the difficulty of factoring the product of the two primes.
Security Hash Algorithm (SHA) was developed in 1993 by the National Institute of Standards and Technology (NIST) and National Security Agency (NSA).
It was designed as the algorithm to be used for secure hashing in the US Digital Signature Standard.
Hashing function is one of the most commonly used encryption methods. A hash is a special mathematical function that performs one-way encryption.
SHA-l is a revised version of SHA designed by NIST and was published as a Federal Information Processing Standard (FIPS).
Like MD5, SHA-l processes input data in 512-bit blocks.
SHA-l generates a 160-bit message digest. Whereas MD5 generated message digest of 128 bits.
The procedure is used to send a non secret but signed message from sender to receiver. In such a case following steps are followed:
1. Sender feeds a plaintext message into SHA-l algorithm and obtains a 160-bit SHA-l hash.
2. Sender then signs the hash with his RSA private key and sends both the plaintext message and the signed hash to the receiver.
3. After receiving the message, the receiver computes the SHA-l hash himself and also applies the sender's public key to the signed hash to obtain the original hash H.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
An introduction to asymmetric cryptography with an in-depth look at RSA, Diffie-Hellman, the FREAK and LOGJAM attacks on TLS/SSL, and the "Mining your P's and Q's attack".
Symmetric encryption and message confidentialityCAS
油
Symmetric Encryption Principles
Data Encryption Standard
Advanced Encryption Standard
Stream Ciphers and RC4
Cipher Block Modes of Operation
Key Distribution
The document discusses encryption and decryption techniques including symmetric and asymmetric cryptosystems. It describes the goals of cryptography including confidentiality, integrity, authentication, and non-repudiation. The document outlines the RSA cryptosystem including key generation, encryption, and digital signatures. It also discusses hashing, the discrete logarithm problem, and how elliptic curves can be used in cryptography.
Public-Key Cryptography.pdfWrite the result of the following operation with t...FahmiOlayah
油
Write the result of the following operation with the correct number of significant figure of 0.248?Write the result of the following operation with the correct number of signi
- DES (Data Encryption Standard) is a symmetric block cipher algorithm that encrypts data in 64-bit blocks using a 56-bit key. It was the first encryption standard adopted by the U.S. government for protecting sensitive unclassified federal government information.
- DES works by performing 16 rounds of complex substitutions and permutations on each data block, encrypting it using the key. It has various modes of operation like ECB, CBC, CFB, OFB, and CTR that specify how it operates on data.
- In 1998, DES was broken using a brute force attack by the Electronic Frontier Foundation in just 3 days, showing the need for stronger algorithms like AES which replaced DES as the encryption standard
Digital signatures allow users to authenticate messages, verify authorship, and detect modifications. The document discusses digital signature requirements and attacks. It then summarizes the ElGamal digital signature scheme, which uses exponentiation in a finite field for encryption and verification based on discrete logarithms. The signature process and an example are provided to illustrate how ElGamal digital signatures are generated and verified.
traditional private/secret/single key cryptography uses one key
Key is shared by both sender and receiver
if the key is disclosed communications are compromised
also known as symmetric, both parties are equal
hence does not protect sender from receiver forging a message & claiming is sent by sender
The document discusses the OSI security architecture and common network security threats and defenses. It begins with an introduction to the OSI security architecture proposed by ITU-T as a standard for defining and providing security across network layers. It then discusses (1) specific security mechanisms like encryption and digital signatures and pervasive mechanisms like security audits; (2) common passive and active security threats like eavesdropping and denial of service attacks; and (3) that passive attacks focus on prevention while active attacks require detection and recovery. It concludes with exercises asking about these topics.
A birthday attack is a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory. This attack can be used to abuse communication between two or more parties. The attack depends on the higher likelihood of collisions found between random attack attempts and a fixed degree of permutations
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
This document discusses Mandatory Access Control (MAC) and Role-Based Access Control (RBAC) for multilevel security. It describes how MAC classifies data and users based on security levels like Top Secret, Secret, Confidential and Unclassified. It also explains how MAC enforces restrictions on user access to data based on user clearance levels. RBAC associates privileges with roles rather than individual users, allowing multiple users to be assigned the same role and privileges. The document outlines how roles can be created, privileges assigned, and separation of duties enforced through RBAC.
In cryptography, a one-time pad (OTP) is an encryption technique that cannot be cracked if used correctly. In this technique, a plaintext is paired with a random ...
The document discusses authentication protocols and digital signatures. It describes mutual authentication protocols that allow two parties to verify each other's identities and exchange session keys. It also discusses one-way authentication protocols. The document focuses on explaining the Digital Signature Standard (DSS) and the Digital Signature Algorithm (DSA). It provides details on how DSA uses public/private key pairs to generate and verify digital signatures for authenticating messages and senders.
This presentation introduces Feistel encryption and decryption. It discusses the Feistel cipher structure which partitions the input block into two halves and processes them through multiple rounds of substitution and permutation. It shows diagrams of the Feistel encryption and decryption processes. It also covers the design features of Feistel networks such as block size, key size, number of rounds, and sub-key generation. Finally, it provides an example of the round function that performs a bitwise XOR of the left half and output of a function applied to the right half and sub-key.
Intruders in cns. Various intrusion detection and prevention technique.pptxSriK49
油
The document discusses system security and intruders. It defines different types of intruders like masqueraders, misfeasors, and clandestine users. It also describes various intrusion techniques used by intruders like asymmetric routing, buffer overflow attacks, scripts, protocol-specific attacks, traffic flooding, trojans, and worms. The document then discusses intrusion detection systems, their classifications into network IDS, host IDS, protocol-based IDS, application protocol-based IDS, and hybrid IDS. It also covers signature-based and anomaly-based detection methods of IDS. Finally, it discusses password management as the front line of defense against intruders.
Public key cryptography uses two keys - a public key that can be shared openly and a private key that is kept secret. The RSA algorithm, invented in 1977, is the most widely used public key cryptosystem. It uses a public and private key pair generated from two large prime numbers. The public key is used to encrypt messages, while the private key is used to decrypt messages. The security of RSA relies on the difficulty of factoring the product of the two primes.
Security Hash Algorithm (SHA) was developed in 1993 by the National Institute of Standards and Technology (NIST) and National Security Agency (NSA).
It was designed as the algorithm to be used for secure hashing in the US Digital Signature Standard.
Hashing function is one of the most commonly used encryption methods. A hash is a special mathematical function that performs one-way encryption.
SHA-l is a revised version of SHA designed by NIST and was published as a Federal Information Processing Standard (FIPS).
Like MD5, SHA-l processes input data in 512-bit blocks.
SHA-l generates a 160-bit message digest. Whereas MD5 generated message digest of 128 bits.
The procedure is used to send a non secret but signed message from sender to receiver. In such a case following steps are followed:
1. Sender feeds a plaintext message into SHA-l algorithm and obtains a 160-bit SHA-l hash.
2. Sender then signs the hash with his RSA private key and sends both the plaintext message and the signed hash to the receiver.
3. After receiving the message, the receiver computes the SHA-l hash himself and also applies the sender's public key to the signed hash to obtain the original hash H.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
An introduction to asymmetric cryptography with an in-depth look at RSA, Diffie-Hellman, the FREAK and LOGJAM attacks on TLS/SSL, and the "Mining your P's and Q's attack".
Symmetric encryption and message confidentialityCAS
油
Symmetric Encryption Principles
Data Encryption Standard
Advanced Encryption Standard
Stream Ciphers and RC4
Cipher Block Modes of Operation
Key Distribution
The document discusses encryption and decryption techniques including symmetric and asymmetric cryptosystems. It describes the goals of cryptography including confidentiality, integrity, authentication, and non-repudiation. The document outlines the RSA cryptosystem including key generation, encryption, and digital signatures. It also discusses hashing, the discrete logarithm problem, and how elliptic curves can be used in cryptography.
Public-Key Cryptography.pdfWrite the result of the following operation with t...FahmiOlayah
油
Write the result of the following operation with the correct number of significant figure of 0.248?Write the result of the following operation with the correct number of signi
Symmetric encryption suffers from several key distribution and management problems in modern distributed communication environments. Asymmetric encryption solves these issues by using public/private key pairs, allowing anyone to encrypt messages using the public key but only the private key holder can decrypt. Digital signatures, key certification through public key infrastructure (PKI), and hash functions are important applications of asymmetric cryptography.
Public-key cryptography uses two keys: a public key to encrypt messages and verify signatures, and a private key for decryption and signing. RSA is the most widely used public-key cryptosystem, using large prime factorization and exponentiation modulo n for encryption and decryption. While faster than brute-force, breaking RSA remains computationally infeasible with sufficiently large key sizes over 1024 bits.
The document provides an overview of public key encryption and related concepts. It discusses how public key encryption uses key pairs (public and private keys) to securely encrypt and decrypt messages. The main public key encryption algorithms covered are RSA, ElGamal, and elliptic curve cryptography. The document also discusses hash functions and their uses in message integrity and digital signatures. Common hashing algorithms like SHA, MD2, MD4, and MD5 are explained. The use of encryption for network security is covered, including IPsec, ISAKMP, and wireless security protocols like WEP and WPA/WPA2. Finally, various types of cryptographic attacks are defined.
The document discusses the RSA algorithm for cryptography. It begins by explaining that RSA was created by Ron Rivest, Adi Shamir, and Leonard Adleman in 1977. It uses logarithmic functions to encrypt and decrypt data in a way that is difficult to break, even with powerful computers. RSA can encrypt generic data to enable secure sharing and can verify digital signatures. It works using a public key that encrypts data and a private key that decrypts it. The document then provides examples of how RSA encryption works step-by-step using prime numbers to generate keys. It discusses the security of RSA and how increasing the key size makes it more difficult to break through brute force attacks or factorization. Proper key management is
Public-key cryptography uses two keys: a public key that can encrypt messages and verify signatures, and a private key known only to the recipient that decrypts messages and signs them. RSA is an example of an asymmetric encryption algorithm that is widely used, using a public and private key pair generated from large prime numbers. It allows easy encryption with the public key but mathematically secure decryption only with the corresponding private key.
This document discusses public key cryptography and the RSA algorithm. It begins by explaining the limitations of private key cryptography and how public key cryptography addresses issues like key distribution and digital signatures. It then describes how RSA works, using two keys - a public key for encryption and a private key for decryption. It explains the key generation process, how messages are encrypted and decrypted, and discusses the mathematical principles and security of the RSA algorithm.
This document provides a summary of public key encryption and digital signatures. It begins by reviewing symmetric cryptography and its limitations in key distribution. It then introduces public key encryption, where each party has a public and private key pair. The document outlines the RSA algorithm and how it uses large prime number factorization problems to encrypt and decrypt messages. It also discusses how digital signatures can provide authentication, integrity, and non-repudiation for electronic messages and contracts using public key techniques like RSA.
1. The document discusses principles of secure communication including secrecy, authentication, and message integrity. It describes passive and active intrusion types.
2. Symmetric and public key cryptography methods are covered, including AES, RSA, digital signatures, hashes, and their use for encryption, authentication, and ensuring message integrity.
3. Secure email is discussed as an application, where a symmetric session key is used to encrypt messages and that key is encrypted with the recipient's public key for delivery.
This is Cryptography presentation. This explains fundamental concepts of cryptography.This starts from very basic topics and then moving to the important concepts used in today's cryptosystems. This can be used by college students as their project ppts.
The document discusses cryptography and the RSA encryption algorithm. It begins with an introduction to cryptography and its uses. It then covers the history of cryptography, common security issues, and different cryptographic techniques like symmetric and asymmetric encryption. The document focuses on explaining the RSA algorithm, how it works using public and private keys, and why factoring large numbers makes RSA secure. It provides an overview of the key aspects of cryptography and the RSA algorithm.
This document provides an overview of cryptography including:
1. Cryptography is the process of encoding messages to protect information and ensure confidentiality, integrity, authentication and other security goals.
2. There are symmetric and asymmetric encryption algorithms that use the same or different keys for encryption and decryption. Examples include AES, RSA, and DES.
3. Other techniques discussed include digital signatures, visual cryptography, and ways to implement cryptography like error diffusion and halftone visual cryptography.
Public key cryptography uses two keys - a public key for encryption and a private key for decryption. The RSA algorithm is a widely used public key cryptosystem that is based on the difficulty of factoring large prime numbers. It uses a public key for encryption and a related private key for decryption. The security of RSA relies on the fact that it is computationally infeasible to determine the private key from the public key for sufficiently large key sizes.
Public key cryptography uses two keys: a public key to encrypt messages and a private key to decrypt them. The RSA algorithm is based on the difficulty of factoring large prime numbers. It works by having users generate a public/private key pair and publishing their public key. To encrypt a message, the sender uses the recipient's public key. Only the recipient can decrypt with their private key. The security of RSA relies on the computational difficulty of factoring the modulus used to generate the keys.
Public-key cryptography uses two keys: a public key for encryption and digital signatures, and a private key for decryption and signature verification. RSA is the most widely used public-key cryptosystem, using large prime factorization and modular exponentiation. It allows secure communication without prior key exchange. While brute force attacks on RSA are infeasible due to large key sizes, its security relies on the difficulty of factoring large numbers.
Public key cryptography uses two keys - a public key that can encrypt messages but not decrypt them, and a private key that can decrypt messages but not encrypt them. The RSA algorithm is a commonly used public key cryptosystem. It works by having users generate a public/private key pair using large prime numbers, then messages can be encrypted with the public key and decrypted with the private key. The security of RSA relies on the difficulty of factoring large numbers.
The document discusses using the RSA algorithm to provide data security in cloud computing. It begins with an objective to ensure security and optimize encryption/decryption time using RSA. It then provides background on cloud computing and the need for security. It describes the RSA algorithm, including key generation, encryption, and decryption. It also discusses a proposed method to improve data security and decrease execution time by increasing key length.
2. INTRODUCTION TO RSA
RSA Algorithm was discovered by a group of three scientists
namely Ron Rivest,Adi Shamir and Len Adleman and was first
published in 1978.
The RSA scheme is a block cipher in which the plain text and
cipher text are integers between 0 and n-1 for some n.
A Typical size of n is 1024 bits or 309 decimal digits.
This is a public key encryption scheme.
2
3. In this scheme two pairs of integers {e, n} and {d, n} are used.
First of them i.e. {e.n} is called the RSA public key and the
other one i.e. {d, n} is called the RSA secret key.
The sender uses the public key and encrypts the message
say M into cipher text as
C = M^e mod n.
Where C is the cipher text and M is the message or the plane
text
At the receiving end the receiver accept the cipher text C and
decrypt the C into M using secret key {d, n}-
M = C^d mod n. 3
4. EXAMPLE:
Let , e=3, d=7, n=33.
Suppose the message is SUN and we use the
numeric values of the characters according to their
serial in alphabets.
4
Plaintext Ciphertext(C) after decryption
Sym num M^3 M^3 mod33 C^7 C^7mod33 sym
S 19 6859 28 13492928512 19 S
U 21 9261 21 1801088541 21 U
N 14 2744 5 78125 14 N
5. KEY GENERATION
Each user generates a public/private key pair by:
selecting two large primes at random - p, q
computing their system modulus N=p.q
note 淡(N)=(p-1)(q-1)
selecting at random the encryption key e
where 1<e<淡(N), gcd(e,淡(N))=1
solve following equation to find decryption key d
e.d=1 mod 淡(N) and 0dN
publish their public encryption key: KU={e,N}
keep secret private decryption key: KR={d,p,q} 5
6. To encrypt a message M the sender:
obtains public key of recipient KU={e,N}
computes: C=Me mod N, where 0M<N
to decrypt the ciphertext C the owner:
uses their private key KR={d,p,q}
computes: M=Cd mod N
note that the message M must be smaller than the
modulus N (block if needed)
6
7. ap-1 mod p = 1
where p is prime and gcd(a,p)=1
also known as Fermats Little Theorem
useful in public key and primality testing
when doing arithmetic modulo n
complete set of residues is: 0..n-1
reduced set of residues is those numbers
(residues) which are relatively prime to n
eg for n=10,
complete set of residues is {0,1,2,3,4,5,6,7,8,9}
reduced set of residues is {1,3,7,9}
7
8. to compute 淡(n) need to count number of elements
to be excluded
in general need prime factorization, but for
p (p prime) 淡(p) = p-1
for p.q (p,q prime) 淡(p.q) = (p-1)(q-1)
Eg:
淡(37) = 36
淡(21) = (31)(71) = 26 = 12
8
9. a generalisation of Fermat's Theorem
a淡(n)mod N = 1
where gcd(a,N)=1
Eg:
a=3;n=10; 淡(10)=4;
hence 34 = 81 = 1 mod 10
a=2;n=11; 淡(11)=10;
hence 210 = 1024 = 1 mod 11
9
10. a淡(n)mod N = 1 where gcd(a,N)=1
in RSA have:N=p.q
N)=(p-1)(q-1)
carefully chosen e & d to be inverses mod 淡(N)
hence e.d=1+k.淡(N) for some k
hence :
Cd = (Me)d = M1+k.淡(N) = M1.(M淡(N))q = M1.(1)q
= M1 = M mod N
10
11. Select primes: p=17 & q=11
Compute n = pq =1711=187
Compute 淡(n)=(p1)(q-1)=1610=160
Select e : gcd(e,160)=1; choose e=7
Determine d: de=1 mod 160 and d < 160 Value is
d=23 since 237=161= 10160+1
Publish public key KU={7,187}
Keep secret private key KR={23,17,11}
11
RSA EXAMPLE
12. sample RSA encryption/decryption is:
given message M = 88 (nb. 88<187)
encryption:
C = 887 mod 187 = 11
decryption:
M = 1123 mod 187 = 88
12
13. APPLICATIONS
RSA is widely used for encryption and decryption in
message communication for making the
communication secure.
It is used for digital signature.
It is used for key distribution.
RSA is used in e-commerce and remote banking.
13
14. CONCLUSION
After the study, I find that RSA is a powerful and
most widely used scheme for encryption /
decryption and digital signature. It is more secure
than that of DES and others. But as we know that
the key length for secure RSA use has increased
over recent years, and this has put a heavier
processing load on applications using RSA. This
burden has ramifications, especially for electronic
commerce sites that conduct large numbers of
transactions.
Recently, a competing system has begun to
challenge RSA: elliptic curve cryptography (ECC).
14
15. The principal attraction of ECC, compared to RSA,
is that it appears to offer equal security for a far
smaller key size; thereby reducing processing
overhead but the confidence level in ECC is not yet
as high as that is in RSA. Also RSA is
fundamentally easier to explain than that of ECC.
15
16. INTRODUCTION TO MD5
MD5 Message Digest is a widely used hash
technique, such that it will produce 128-bit hash
value we need to convert the input data into bytes
in order to convert it to hash value. This is useful in
many security applications and it ensures data
integrity.
16
17. ALGORITHM CHARACTERISTICS:-
Message-Digest (Fingerprint) algorithms are special
functions which transform input of (usually) arbitrary
length into output (so-called "message digest") of
constant length. These transformation functions
must fulfill these requirements:
no one should be able to produce two different
inputs for which the transformation function returns
the same output
no one should be able to produce input for given
pre-specified output
17
18. Message-Digest algorithms serve in digital signature
applications for guaranteeing consistency (integrity) of data.
Commonly used model is as follows (message-digest in
cooperation with asymmetric cryptography):
Sender creates input message (M) and computes its message
digest . Then he uses his private key and encrypts message
digest.
Encrypted message digest is attached to the input message
and the whole message is sent to receiver.
Receiver gets the message and extracts the encrypted
message digest. Then he computes his own message digest
of the received message. He also decodes received message
digest with sender's public key and gets decoded message
digest. Then he compares both message digests. When both
message digests are equal, the message was not modified
during the data transmission. 18
19. MD5 ALGORITHM DESCRIPTION
MD5 algorithm takes input message of arbitrary length
and generates 128-bit long output hash. MD5 hash
algorithm consist of 5 steps.
Step 1. Append Padding Bits
Step 2. Append Length
Step 3. Initialize MD Buffer
Step 4. Process Message in 16-Word Blocks
Step 5. Output
19
20. MD5 ALGORITHM USES
MD5 is commonly used hash algorithm. It can be
found in many implementations (available on some
Unix-based system as utility md5; class
MD5CryptoServiceProvider in Microsoft's .NET
Framework (namespace
System.Security.Cryptography).example
implementation in Visual C++ or JavaScript, etc.). It
is used sometimes as file CRC function (Napster...)
or one-way cipher in authentication operations (for
storing user password hash).
MD5 is also used in conjunction with other
cryptographic methods in digital signature
applications or in protocols like SSL and others. 20
21. CONCLUSION:-
Both produce the MD5 hash value. The difference
between the two samples is the leading bit in each
nibble has been flipped. Hash value is not
encrypted one exactly, so you cant retrieve the
actual value.
21