CSE 599 b : Cryptography ( Winter 2006 ) Lecture 12 : Public Key ( Asymmetric ) Encryption
نویسنده
چکیده
One way to use Diffie-Hellman’s 1976 secret key exchange protocol is to create a key to be used in later rounds for symmetric encryption. This requires multiple rounds of communication. Rivest, Shamir, and Adleman in 1978 developed the one round communication scheme discussed earlier. Namely, in order for Bob to receive messages Bob produces an integer N = pq where p and q are primes of equal length and Bob also produces e relatively prime to φ(N) = (p− 1)(q− 1) and computes d = e−1 mod (p− 1)(q − 1). Bob publishes the public key (N, e) and retains d as his private key. Given messageM , Alice can then compute C = RSA(N,e)(M) = M e mod N and send C to Bob. Bob decrypts by computing C mod N since
منابع مشابه
CSE 599 b : Cryptography ( Winter 2006 ) Lecture 4 : More Block Ciphers ; Pseudorandom Generators 13 January 2006
Given a single (M,C) pair with C = DESK(M) and the fact that DES has a key length of 56 bits and brute force key search will succeed on average in 2 trials to find a K ′ such that DESK′(M) = C; moreover it is unlikely that even two different keys will work for the single (M,C) pair since there are more ciphertexts than keys so almost surelyK ′ = K. More sophisticated attacks have been developed...
متن کاملCSE 599 b : Cryptography ( Winter 2006 ) Lecture 11 : Semantic Security vs Indistinguishability Security 8 February 2006
From now on we will at least aim for the ability to handle chosen plaintext attacks (CPA). Also, of the two versions of chosen ciphertext attack, CCA1 and CCA2, we will only consider CCA2 attacks which allow the chosen ciphertexts to depend on (but be different from) the challenge ciphertext. We also have 3 security notions: Semantic Security (SS), Indistinguishability Security (IND) which is a...
متن کاملCSE 599 b : Cryptography ( Winter 2006 ) Lecture 13 : Public Key Encryption Schemes 15 February 2006
Recall the collection of functions {BlumN : QRN → QRN} were BlumN = x mod N for so-called Blum integers N that are products of two distinct primes congruent to 3 mod 4 are candidate one-way functions. As we mentioned earlier, inverting for algorithms for BlumN yield algorithms for factoring N . We now show that for N = pq, p 6= q prime, p, q ≡ 3 (mod 4), the pair (p, q) of factors of N forms tr...
متن کاملLecture 6: Overview of Public-Key Cryptography and RSA
In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first introduce the background of public-key cryptography. Then we will study the model of public-key cryptosystem, and the requirement to design a practical public-key algorithm. Finally, we will study the design of RSA algorithm. The concept of public-key (asymmet...
متن کاملLecture 17 : Constructions of Public - Key Encryption
In the previous lecture, we defined Public-Key Encryption system. We now proceed to define security in these systems. Intuitively, we would like the encryptions of different messages to be indistinguishable, even when the public key is known by the adversary. be a Public-Key Encryption system over the message space M. (Gen, Enc, Dec) is said to be secure, if for all p.p.t. A there exists a negl...
متن کامل