CSE 599 b : Cryptography ( Winter 2006 ) Lecture 12 : Public Key ( Asymmetric ) Encryption

نویسنده

  • Paul Beame
چکیده

One way to use Diffie-Hellman’s 1976 secret key exchange protocol is to create a key to be used in later rounds for symmetric encryption. This requires multiple rounds of communication. Rivest, Shamir, and Adleman in 1978 developed the one round communication scheme discussed earlier. Namely, in order for Bob to receive messages Bob produces an integer N = pq where p and q are primes of equal length and Bob also produces e relatively prime to φ(N) = (p− 1)(q− 1) and computes d = e−1 mod (p− 1)(q − 1). Bob publishes the public key (N, e) and retains d as his private key. Given messageM , Alice can then compute C = RSA(N,e)(M) = M e mod N and send C to Bob. Bob decrypts by computing C mod N since

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CSE 599 b : Cryptography ( Winter 2006 ) Lecture 4 : More Block Ciphers ; Pseudorandom Generators 13 January 2006

Given a single (M,C) pair with C = DESK(M) and the fact that DES has a key length of 56 bits and brute force key search will succeed on average in 2 trials to find a K ′ such that DESK′(M) = C; moreover it is unlikely that even two different keys will work for the single (M,C) pair since there are more ciphertexts than keys so almost surelyK ′ = K. More sophisticated attacks have been developed...

متن کامل

CSE 599 b : Cryptography ( Winter 2006 ) Lecture 11 : Semantic Security vs Indistinguishability Security 8 February 2006

From now on we will at least aim for the ability to handle chosen plaintext attacks (CPA). Also, of the two versions of chosen ciphertext attack, CCA1 and CCA2, we will only consider CCA2 attacks which allow the chosen ciphertexts to depend on (but be different from) the challenge ciphertext. We also have 3 security notions: Semantic Security (SS), Indistinguishability Security (IND) which is a...

متن کامل

CSE 599 b : Cryptography ( Winter 2006 ) Lecture 13 : Public Key Encryption Schemes 15 February 2006

Recall the collection of functions {BlumN : QRN → QRN} were BlumN = x mod N for so-called Blum integers N that are products of two distinct primes congruent to 3 mod 4 are candidate one-way functions. As we mentioned earlier, inverting for algorithms for BlumN yield algorithms for factoring N . We now show that for N = pq, p 6= q prime, p, q ≡ 3 (mod 4), the pair (p, q) of factors of N forms tr...

متن کامل

Lecture 6: Overview of Public-Key Cryptography and RSA

In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first introduce the background of public-key cryptography. Then we will study the model of public-key cryptosystem, and the requirement to design a practical public-key algorithm. Finally, we will study the design of RSA algorithm. The concept of public-key (asymmet...

متن کامل

Lecture 17 : Constructions of Public - Key Encryption

In the previous lecture, we defined Public-Key Encryption system. We now proceed to define security in these systems. Intuitively, we would like the encryptions of different messages to be indistinguishable, even when the public key is known by the adversary. be a Public-Key Encryption system over the message space M. (Gen, Enc, Dec) is said to be secure, if for all p.p.t. A there exists a negl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006