Lecture 6: Overview of Public-Key Cryptography and RSA

نویسنده

  • Yuan Xue
چکیده

In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first introduce the background of public-key cryptography. Then we will study the model of public-key cryptosystem, and the requirement to design a practical public-key algorithm. Finally, we will study the design of RSA algorithm. The concept of public-key (asymmetric) cryptography evolved from an attempt to address the following two difficult problems associated with the secret-key (symmetric) cryptosystem. • Key distribution. Symmetric encryption requires a shared secret key. As we have seen in the previous lecture, this leads to the problem of key distribution, which in turn requires secret sharing either between the communicating parties or between the communicating hosts and the KDC. • Non-repudiation. In symmetric encryption, the sending party may deny sending the message, because it is possible for the receiver to forge a message based on the same secret key. Accordingly, the receiving party may claim the receipt of a message from the sender which is actually forged by himself. To address both problems, Diffie and Hellman achieved an important breakthrough in 1976. The proposed scheme was radically different from all previous approaches to cryptography. First, it uses a pair of different keys in contrast to one shared key in symmetric encryption. Second, it is based on mathematical functions instead of substitution and permutation. The proposed scheme is called pubic-key (asymmetric) cryptography, which is one of the greatest revolutions in the history of cryptography. Its use of two keys has profound consequences in facilitating key distribution, and providing digital signature. However, the scheme proposed by Diffie and Hellman is not a general-purpose encryption algorithm. It can only provide secure secret key exchange. Thus it presents a challenge for the cryptologists to design a general-purpose encryption algorithm that satisfies the public-key encryption requirements. One of the first responses to the challenge was developed in 1977 by Rivest, Shamir, Adleman at MIT, so called RSA. Since then, the RSA scheme has become the most widely accepted and implemented general-purpose approach to public-key encryption.

منابع مشابه

Comparison of two Public Key Cryptosystems

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...

متن کامل

Review of ElGamal DSS RSA Elliptic Curves

We began the course with a discussion and review of private key cryptography and then started moving into the realm of public key cryptography. During this lecture, we will discuss four public key schemes. Even though RSA preceded the other schemes presented here, we will review ElGamal and introduce DSS rst (both mod p schemes), in hopes of providing more background and motivation for some of ...

متن کامل

Hardware architectures for public key cryptography

This paper presents an overview of hardware implementations for the two commonly used types of Public Key Cryptography, i.e. RSA and Elliptic Curve Cryptography (ECC), both based on modular arithmetic. We first discuss the mathematical background and the algorithms to implement these cryptosystems. Next an overview is given of the different hardware architectures which have been proposed in the...

متن کامل

Bio-Cryptography

7.1 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 7.1.1 Overview of Cryptography . . . . . . . . . . . 130 7.1.2 Symmetric-Key Cryptography . . . . . . . . 130 7.1.3 Substitution and Transposition Techniques . . . . . . . . . . . . . . . . . . . . . . . . . 131 7.1.4 Data Encryption Standard (DES) . . . . . 133 7.1.5 Advanced Encryption Standard (AES) . 134 7.1.6 Public...

متن کامل

Information Security on Elliptic Curves

The aim of this paper is to provide an overview for the research that has been done so far on elliptic curves cryptography role in information security area. The elliptic curves cryptosystem is the newest public-key cryptographic system and represents a mathematically richer procedure then the traditional cryptosystem based on public-key, like RSA, Diffie-Hellman, ElGamal and Digital Signature ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

متن کامل
عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009