SlideShare a Scribd company logo
NETWORK SECURITY
Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D).,
Head, Dept. of CA
Bon Secours College For Women
Thanjavur.
Class : II MSc., CS
Semester : III
Unit : II
Topic : Public Key Cryptography
2/15/2019 1
Public key Cryptography
•Public key cryptography (PKC) is
an encryption technique that uses a paired
public and private key algorithm for secure
data communication.
•A message sender uses a recipient's public
key to encrypt a message.
•To decrypt the sender's message, only the
recipient's private key may be used.
Principles of Public-Key Cryptosystems
• The concept of public-key cryptography evolved from an
attempt to attack two of the most difficult problems
associated with symmetric encryption:
• The communicants already shares a key or someone has been
distributed the key.
• How to secure communications in general without having to trust a
KDC with your key
Key distribution
• How to verify that a message comes intact from the claimed sender
Digital signatures
Public-Key Cryptosystems
• A public-key encryption scheme has six ingredients:
Plaintext
The
readable
message
or data
that is fed
into the
algorithm
as input
Encryption
algorithm
Performs
various
transform
-ations on
the
plaintext
Public key
Used for
encryption
or
decryption
Private key
Used for
encryption
or
decryption
Ciphertext
The
scrambled
message
produced
as output
Decryption
algorithm
Accepts
the
ciphertext
and the
matching
key and
produces
the
original
plaintext
Public-Key
Cryptography
Conventional and Public-Key Encryption
Public-Key Cryptosystem:
encryption using public key -Secrecy
This figure provides confidentiality because two related key used for
encryption other being used for decryption
Public-Key Cryptosystem:
Encryption using private key -Authentication
There is no protection of confidentiality because any observer
can decrypt the message by using the sender’s public key
Public-Key Cryptosystem: Authentication
and Secrecy
we begin as before by encrypting a message, using the sender’s private
key. This provides the digital signature. Next, we encrypt again, using the
receiver’s public key. The final ciphertext can be decrypted only by the
intended receiver, who alone has the matching private key. Thus,
confidentiality is provided
Applications for Public-Key Cryptosystems
• Public-key cryptosystems can be classified into three categories:
• The sender encrypts a message
with the recipient’s public keyEncryption/decryption
• The sender “signs” a message
with its private keyDigital signature
• Two sides cooperate to
exchange a session keyKey exchange
Applications for Public-Key Cryptosystems
Public-Key Requirements
Conditions that these algorithms must fulfil:
1. It is computationally easy for a party B to generate a pair (public-
key PUb, private key PRb)
2. It is computationally easy for a sender A, knowing the public key
and the message to be encrypted, to generate the corresponding
ciphertext
3. It is computationally easy for the receiver B to decrypt the
resulting ciphertext using the private key to recover the original
message
4. It is computationally infeasible for an adversary, knowing the
public key, to determine the private key.
5. It is computationally infeasible for an adversary, knowing the
public key and a ciphertext, to recover the original message.
6. The two keys can be applied in either order.
Public-Key Requirements
trap-door one-way function
•A trapdoor function is a function that is easy to
compute in one direction, yet difficult to compute in
the opposite direction (finding its inverse) without
special information, called the "trapdoor". Trapdoor
functions are widely used in cryptography.
•Y = f(X) easy
•X = f–1(Y) infeasible
Public-Key Requirements
A trap-door one-way function is a family of
invertible functions fk, such that
Y = fk(X) easy, if k and X are known
X = fk
–1(Y) easy, if k and Y are known
X = fk
–1(Y) infeasible, if Y known but k not
known
A practical public-key scheme depends on a
suitable trap-door one-way function
Rivest-Shamir-Adleman (RSA) Scheme
•RSA is the algorithm used by modern computers to
encrypt and decrypt messages. It is an asymmetric
cryptographic algorithm.
•Asymmetric means that there are two different keys.
This is also called public key cryptography, because
one of them can be given to everyone. The other key
must be kept private.
•One of the first successful responses to the challenge
was Developed in 1977 at MIT by Ron Rivest, Adi
Shamir & Len Adleman
RSA Algorithm
•Plaintext is encrypted in blocks with each block having a
binary value less than some number n
•Encryption and decryption are of the following form, for
some plaintext block M and cipher text block C
C = Memod n
M = Cd mod n = (Me)d mod n = Med mod n
•Both sender and receiver must know the value of n
•The sender knows the value of e, and only the receiver knows
the value of d
•This is a public-key encryption algorithm with a public key
of PU={e,n} and a private key of PR={d,n}
Algorithm Requirements
• For this algorithm to be satisfactory for public-key encryption, the
following requirements must be met:
1. It is possible to find values of e, d, n
such that Med mod n = M for all M<n
2. It is relatively easy to calculate Me mod n
and Cd mod n for all values of M < n
3. It is infeasible to determine d given e
and n
RSA Algorithm
Example of RSA Algorithm
2. public key cryptography and RSA
The Security of RSA
Five possible
approaches to
attacking RSA
are:
Brute force
• Involves trying all
possible private
keys
Mathematical attacks
• There are several
approaches, all
equivalent in effort to
factoring the product
of two primes
Timing attacks
• These depend on the
running time of the
decryption algorithm
Hardware fault-based
attack
• This involves inducing
hardware faults in the
processor that is
generating digital
signatures
Chosen ciphertext
attacks
• This type of attack
exploits properties
of the RSA algorithm
Optimal Asymmetric Encryption Padding
(OAEP)
•Optimal Asymmetric Encryption Padding
(OAEP) is a padding scheme often used
together with RSA encryption.
•The OAEP algorithm is a form of Feistel
network which uses a pair of random oracles
G and H to process the plaintext prior to
asymmetric encryption.
Optimal
Asymmetric
Encryption
Padding
(OAEP)
Figure shows OAEP encryption.
1. As a first step, the message M to be encrypted is padded.
A set of optional parameters, P, is passed through a hash
function, H.
2. The output is then padded with zeros to get the desired length in the
overall data block (DB).
3.Next, a random seed is generated and passed through
another hash function, called the mask generating function (MGF).
4. The resulting hash value is bit-by-bit XORed with DB to produce a
maskedDB.
5.The maskedDB is in turn passed through the MGF to form a hash that is
XORed with the seed to produce the masked seed.
6. The concatenation of the masked-seed and the maskedDB forms the
encoded message EM.
Note that the EM includes the padded message, masked by the seed, and
the seed, masked by the maskedDB. The EM is then encrypted using
RSA.
Ad

More Related Content

What's hot (20)

DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
Srinadh Muvva
 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
SHUBHA CHATURVEDI
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
trilokchandra prakash
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
university of education,Lahore
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
Tirthika Bandi
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Transposition Cipher
Transposition CipherTransposition Cipher
Transposition Cipher
daniyalqureshi712
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
DES
DESDES
DES
Naga Srimanyu Timmaraju
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 

Similar to 2. public key cryptography and RSA (20)

Ch9_Cryptokkkllllllllllllllllllllk6e.pptx
Ch9_Cryptokkkllllllllllllllllllllk6e.pptxCh9_Cryptokkkllllllllllllllllllllk6e.pptx
Ch9_Cryptokkkllllllllllllllllllllk6e.pptx
LaxmanBhandari22
 
Pooguzhali
PooguzhaliPooguzhali
Pooguzhali
NIVEDHINIMANIVANNAN
 
12- Public-key Cryptography and RSA the lecture on cryptography
12- Public-key Cryptography and RSA the lecture on cryptography12- Public-key Cryptography and RSA the lecture on cryptography
12- Public-key Cryptography and RSA the lecture on cryptography
arsh4share
 
Public-Key Cryptography.pptx
Public-Key Cryptography.pptxPublic-Key Cryptography.pptx
Public-Key Cryptography.pptx
AbdulRehman970300
 
Ch9
Ch9Ch9
Ch9
Mahender Kumar
 
Network security
Network securityNetwork security
Network security
ABHISHEK KUMAR
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
Mazin Alwaaly
 
CryptographyCryptography Cryptography Cryptography
CryptographyCryptography Cryptography CryptographyCryptographyCryptography Cryptography Cryptography
CryptographyCryptography Cryptography Cryptography
AhmedSaeed115917
 
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
Unit 2_Public Key Cryptograohy_RSA_Example.pdfUnit 2_Public Key Cryptograohy_RSA_Example.pdf
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
KanchanPatil34
 
Introduction to Cryptography CYB 303.pptx
Introduction to Cryptography CYB 303.pptxIntroduction to Cryptography CYB 303.pptx
Introduction to Cryptography CYB 303.pptx
Abolarinwa
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
Vinod Kumar Gorrepati
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
priyapavi96
 
Module2.pptx
Module2.pptxModule2.pptx
Module2.pptx
ShilpaShettyA1
 
engineering cryptography pptxmodule 4 rsa.pptx
engineering cryptography  pptxmodule 4 rsa.pptxengineering cryptography  pptxmodule 4 rsa.pptx
engineering cryptography pptxmodule 4 rsa.pptx
shaziasulthana2
 
Module 2 of cryptography old scheme VTU ppt
Module 2 of cryptography old scheme VTU pptModule 2 of cryptography old scheme VTU ppt
Module 2 of cryptography old scheme VTU ppt
MonaReddy12
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
AsrithaKorupolu
 
Information Security 05- Encryption.pdfn
Information Security 05- Encryption.pdfnInformation Security 05- Encryption.pdfn
Information Security 05- Encryption.pdfn
faiziikanwal47
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
AnmolBansal66
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
Vinod Kumar Gorrepati
 
Ch9_Cryptokkkllllllllllllllllllllk6e.pptx
Ch9_Cryptokkkllllllllllllllllllllk6e.pptxCh9_Cryptokkkllllllllllllllllllllk6e.pptx
Ch9_Cryptokkkllllllllllllllllllllk6e.pptx
LaxmanBhandari22
 
12- Public-key Cryptography and RSA the lecture on cryptography
12- Public-key Cryptography and RSA the lecture on cryptography12- Public-key Cryptography and RSA the lecture on cryptography
12- Public-key Cryptography and RSA the lecture on cryptography
arsh4share
 
Public-Key Cryptography.pptx
Public-Key Cryptography.pptxPublic-Key Cryptography.pptx
Public-Key Cryptography.pptx
AbdulRehman970300
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
Mazin Alwaaly
 
CryptographyCryptography Cryptography Cryptography
CryptographyCryptography Cryptography CryptographyCryptographyCryptography Cryptography Cryptography
CryptographyCryptography Cryptography Cryptography
AhmedSaeed115917
 
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
Unit 2_Public Key Cryptograohy_RSA_Example.pdfUnit 2_Public Key Cryptograohy_RSA_Example.pdf
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
KanchanPatil34
 
Introduction to Cryptography CYB 303.pptx
Introduction to Cryptography CYB 303.pptxIntroduction to Cryptography CYB 303.pptx
Introduction to Cryptography CYB 303.pptx
Abolarinwa
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
priyapavi96
 
engineering cryptography pptxmodule 4 rsa.pptx
engineering cryptography  pptxmodule 4 rsa.pptxengineering cryptography  pptxmodule 4 rsa.pptx
engineering cryptography pptxmodule 4 rsa.pptx
shaziasulthana2
 
Module 2 of cryptography old scheme VTU ppt
Module 2 of cryptography old scheme VTU pptModule 2 of cryptography old scheme VTU ppt
Module 2 of cryptography old scheme VTU ppt
MonaReddy12
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
AsrithaKorupolu
 
Information Security 05- Encryption.pdfn
Information Security 05- Encryption.pdfnInformation Security 05- Encryption.pdfn
Information Security 05- Encryption.pdfn
faiziikanwal47
 
Ad

More from Dr.Florence Dayana (20)

Dr.M.Florence Dayana-Cloud Computing Architecture.pdf
Dr.M.Florence Dayana-Cloud Computing Architecture.pdfDr.M.Florence Dayana-Cloud Computing Architecture.pdf
Dr.M.Florence Dayana-Cloud Computing Architecture.pdf
Dr.Florence Dayana
 
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.Florence Dayana
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.Florence Dayana
 
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxM. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
Dr.Florence Dayana
 
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfM. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
Dr.Florence Dayana
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdf
Dr.Florence Dayana
 
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfM. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
Dr.Florence Dayana
 
Professional English - Reading
Professional English - ReadingProfessional English - Reading
Professional English - Reading
Dr.Florence Dayana
 
Professional English - Speaking
Professional English - SpeakingProfessional English - Speaking
Professional English - Speaking
Dr.Florence Dayana
 
Professional English - Listening
Professional English - ListeningProfessional English - Listening
Professional English - Listening
Dr.Florence Dayana
 
INPUT AND OUTPUT DEVICES.pdf
INPUT  AND OUTPUT DEVICES.pdfINPUT  AND OUTPUT DEVICES.pdf
INPUT AND OUTPUT DEVICES.pdf
Dr.Florence Dayana
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
Dr.Florence Dayana
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket Layer
Dr.Florence Dayana
 
M.florence dayana dream weaver
M.florence dayana   dream weaverM.florence dayana   dream weaver
M.florence dayana dream weaver
Dr.Florence Dayana
 
M.florence dayana computer networks transport layer
M.florence dayana   computer networks transport layerM.florence dayana   computer networks transport layer
M.florence dayana computer networks transport layer
Dr.Florence Dayana
 
M.Florence Dayana Computer Networks Types
M.Florence Dayana  Computer Networks TypesM.Florence Dayana  Computer Networks Types
M.Florence Dayana Computer Networks Types
Dr.Florence Dayana
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
Dr.Florence Dayana
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
Dr.Florence Dayana
 
M.Florence Dayana
M.Florence DayanaM.Florence Dayana
M.Florence Dayana
Dr.Florence Dayana
 
M.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageM.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C Language
Dr.Florence Dayana
 
Dr.M.Florence Dayana-Cloud Computing Architecture.pdf
Dr.M.Florence Dayana-Cloud Computing Architecture.pdfDr.M.Florence Dayana-Cloud Computing Architecture.pdf
Dr.M.Florence Dayana-Cloud Computing Architecture.pdf
Dr.Florence Dayana
 
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.Florence Dayana
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.Florence Dayana
 
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxM. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
Dr.Florence Dayana
 
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfM. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
Dr.Florence Dayana
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdf
Dr.Florence Dayana
 
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfM. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
Dr.Florence Dayana
 
Professional English - Reading
Professional English - ReadingProfessional English - Reading
Professional English - Reading
Dr.Florence Dayana
 
Professional English - Speaking
Professional English - SpeakingProfessional English - Speaking
Professional English - Speaking
Dr.Florence Dayana
 
Professional English - Listening
Professional English - ListeningProfessional English - Listening
Professional English - Listening
Dr.Florence Dayana
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket Layer
Dr.Florence Dayana
 
M.florence dayana dream weaver
M.florence dayana   dream weaverM.florence dayana   dream weaver
M.florence dayana dream weaver
Dr.Florence Dayana
 
M.florence dayana computer networks transport layer
M.florence dayana   computer networks transport layerM.florence dayana   computer networks transport layer
M.florence dayana computer networks transport layer
Dr.Florence Dayana
 
M.Florence Dayana Computer Networks Types
M.Florence Dayana  Computer Networks TypesM.Florence Dayana  Computer Networks Types
M.Florence Dayana Computer Networks Types
Dr.Florence Dayana
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
Dr.Florence Dayana
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
Dr.Florence Dayana
 
M.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageM.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C Language
Dr.Florence Dayana
 
Ad

Recently uploaded (20)

Botany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic ExcellenceBotany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic Excellence
online college homework help
 
LDMMIA Reiki Yoga S5 Daily Living Workshop
LDMMIA Reiki Yoga S5 Daily Living WorkshopLDMMIA Reiki Yoga S5 Daily Living Workshop
LDMMIA Reiki Yoga S5 Daily Living Workshop
LDM Mia eStudios
 
Search Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo SlidesSearch Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo Slides
Celine George
 
UPMVLE migration to ARAL. A step- by- step guide
UPMVLE migration to ARAL. A step- by- step guideUPMVLE migration to ARAL. A step- by- step guide
UPMVLE migration to ARAL. A step- by- step guide
abmerca
 
Form View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo SlidesForm View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo Slides
Celine George
 
Overview Well-Being and Creative Careers
Overview Well-Being and Creative CareersOverview Well-Being and Creative Careers
Overview Well-Being and Creative Careers
University of Amsterdam
 
antiquity of writing in ancient India- literary & archaeological evidence
antiquity of writing in ancient India- literary & archaeological evidenceantiquity of writing in ancient India- literary & archaeological evidence
antiquity of writing in ancient India- literary & archaeological evidence
PrachiSontakke5
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 
Myopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduateMyopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduate
Mohamed Rizk Khodair
 
How to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo SlidesHow to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo Slides
Celine George
 
puzzle Irregular Verbs- Simple Past Tense
puzzle Irregular Verbs- Simple Past Tensepuzzle Irregular Verbs- Simple Past Tense
puzzle Irregular Verbs- Simple Past Tense
OlgaLeonorTorresSnch
 
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptxTERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
PoojaSen20
 
The role of wall art in interior designing
The role of wall art in interior designingThe role of wall art in interior designing
The role of wall art in interior designing
meghaark2110
 
Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...
parmarjuli1412
 
2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx
mansk2
 
All About the 990 Unlocking Its Mysteries and Its Power.pdf
All About the 990 Unlocking Its Mysteries and Its Power.pdfAll About the 990 Unlocking Its Mysteries and Its Power.pdf
All About the 990 Unlocking Its Mysteries and Its Power.pdf
TechSoup
 
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptxU3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
Mayuri Chavan
 
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
parmarjuli1412
 
The History of Kashmir Karkota Dynasty NEP.pptx
The History of Kashmir Karkota Dynasty NEP.pptxThe History of Kashmir Karkota Dynasty NEP.pptx
The History of Kashmir Karkota Dynasty NEP.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
Botany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic ExcellenceBotany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic Excellence
online college homework help
 
LDMMIA Reiki Yoga S5 Daily Living Workshop
LDMMIA Reiki Yoga S5 Daily Living WorkshopLDMMIA Reiki Yoga S5 Daily Living Workshop
LDMMIA Reiki Yoga S5 Daily Living Workshop
LDM Mia eStudios
 
Search Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo SlidesSearch Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo Slides
Celine George
 
UPMVLE migration to ARAL. A step- by- step guide
UPMVLE migration to ARAL. A step- by- step guideUPMVLE migration to ARAL. A step- by- step guide
UPMVLE migration to ARAL. A step- by- step guide
abmerca
 
Form View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo SlidesForm View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo Slides
Celine George
 
Overview Well-Being and Creative Careers
Overview Well-Being and Creative CareersOverview Well-Being and Creative Careers
Overview Well-Being and Creative Careers
University of Amsterdam
 
antiquity of writing in ancient India- literary & archaeological evidence
antiquity of writing in ancient India- literary & archaeological evidenceantiquity of writing in ancient India- literary & archaeological evidence
antiquity of writing in ancient India- literary & archaeological evidence
PrachiSontakke5
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 
Myopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduateMyopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduate
Mohamed Rizk Khodair
 
How to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo SlidesHow to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo Slides
Celine George
 
puzzle Irregular Verbs- Simple Past Tense
puzzle Irregular Verbs- Simple Past Tensepuzzle Irregular Verbs- Simple Past Tense
puzzle Irregular Verbs- Simple Past Tense
OlgaLeonorTorresSnch
 
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptxTERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
PoojaSen20
 
The role of wall art in interior designing
The role of wall art in interior designingThe role of wall art in interior designing
The role of wall art in interior designing
meghaark2110
 
Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...
parmarjuli1412
 
2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx
mansk2
 
All About the 990 Unlocking Its Mysteries and Its Power.pdf
All About the 990 Unlocking Its Mysteries and Its Power.pdfAll About the 990 Unlocking Its Mysteries and Its Power.pdf
All About the 990 Unlocking Its Mysteries and Its Power.pdf
TechSoup
 
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptxU3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
Mayuri Chavan
 
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
parmarjuli1412
 

2. public key cryptography and RSA

  • 1. NETWORK SECURITY Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D)., Head, Dept. of CA Bon Secours College For Women Thanjavur. Class : II MSc., CS Semester : III Unit : II Topic : Public Key Cryptography 2/15/2019 1
  • 2. Public key Cryptography •Public key cryptography (PKC) is an encryption technique that uses a paired public and private key algorithm for secure data communication. •A message sender uses a recipient's public key to encrypt a message. •To decrypt the sender's message, only the recipient's private key may be used.
  • 3. Principles of Public-Key Cryptosystems • The concept of public-key cryptography evolved from an attempt to attack two of the most difficult problems associated with symmetric encryption: • The communicants already shares a key or someone has been distributed the key. • How to secure communications in general without having to trust a KDC with your key Key distribution • How to verify that a message comes intact from the claimed sender Digital signatures
  • 4. Public-Key Cryptosystems • A public-key encryption scheme has six ingredients: Plaintext The readable message or data that is fed into the algorithm as input Encryption algorithm Performs various transform -ations on the plaintext Public key Used for encryption or decryption Private key Used for encryption or decryption Ciphertext The scrambled message produced as output Decryption algorithm Accepts the ciphertext and the matching key and produces the original plaintext
  • 7. Public-Key Cryptosystem: encryption using public key -Secrecy This figure provides confidentiality because two related key used for encryption other being used for decryption
  • 8. Public-Key Cryptosystem: Encryption using private key -Authentication There is no protection of confidentiality because any observer can decrypt the message by using the sender’s public key
  • 9. Public-Key Cryptosystem: Authentication and Secrecy we begin as before by encrypting a message, using the sender’s private key. This provides the digital signature. Next, we encrypt again, using the receiver’s public key. The final ciphertext can be decrypted only by the intended receiver, who alone has the matching private key. Thus, confidentiality is provided
  • 10. Applications for Public-Key Cryptosystems • Public-key cryptosystems can be classified into three categories: • The sender encrypts a message with the recipient’s public keyEncryption/decryption • The sender “signs” a message with its private keyDigital signature • Two sides cooperate to exchange a session keyKey exchange
  • 12. Public-Key Requirements Conditions that these algorithms must fulfil: 1. It is computationally easy for a party B to generate a pair (public- key PUb, private key PRb) 2. It is computationally easy for a sender A, knowing the public key and the message to be encrypted, to generate the corresponding ciphertext 3. It is computationally easy for the receiver B to decrypt the resulting ciphertext using the private key to recover the original message 4. It is computationally infeasible for an adversary, knowing the public key, to determine the private key. 5. It is computationally infeasible for an adversary, knowing the public key and a ciphertext, to recover the original message. 6. The two keys can be applied in either order.
  • 13. Public-Key Requirements trap-door one-way function •A trapdoor function is a function that is easy to compute in one direction, yet difficult to compute in the opposite direction (finding its inverse) without special information, called the "trapdoor". Trapdoor functions are widely used in cryptography. •Y = f(X) easy •X = f–1(Y) infeasible
  • 14. Public-Key Requirements A trap-door one-way function is a family of invertible functions fk, such that Y = fk(X) easy, if k and X are known X = fk –1(Y) easy, if k and Y are known X = fk –1(Y) infeasible, if Y known but k not known A practical public-key scheme depends on a suitable trap-door one-way function
  • 15. Rivest-Shamir-Adleman (RSA) Scheme •RSA is the algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. •Asymmetric means that there are two different keys. This is also called public key cryptography, because one of them can be given to everyone. The other key must be kept private. •One of the first successful responses to the challenge was Developed in 1977 at MIT by Ron Rivest, Adi Shamir & Len Adleman
  • 16. RSA Algorithm •Plaintext is encrypted in blocks with each block having a binary value less than some number n •Encryption and decryption are of the following form, for some plaintext block M and cipher text block C C = Memod n M = Cd mod n = (Me)d mod n = Med mod n •Both sender and receiver must know the value of n •The sender knows the value of e, and only the receiver knows the value of d •This is a public-key encryption algorithm with a public key of PU={e,n} and a private key of PR={d,n}
  • 17. Algorithm Requirements • For this algorithm to be satisfactory for public-key encryption, the following requirements must be met: 1. It is possible to find values of e, d, n such that Med mod n = M for all M<n 2. It is relatively easy to calculate Me mod n and Cd mod n for all values of M < n 3. It is infeasible to determine d given e and n
  • 19. Example of RSA Algorithm
  • 21. The Security of RSA Five possible approaches to attacking RSA are: Brute force • Involves trying all possible private keys Mathematical attacks • There are several approaches, all equivalent in effort to factoring the product of two primes Timing attacks • These depend on the running time of the decryption algorithm Hardware fault-based attack • This involves inducing hardware faults in the processor that is generating digital signatures Chosen ciphertext attacks • This type of attack exploits properties of the RSA algorithm
  • 22. Optimal Asymmetric Encryption Padding (OAEP) •Optimal Asymmetric Encryption Padding (OAEP) is a padding scheme often used together with RSA encryption. •The OAEP algorithm is a form of Feistel network which uses a pair of random oracles G and H to process the plaintext prior to asymmetric encryption.
  • 24. Figure shows OAEP encryption. 1. As a first step, the message M to be encrypted is padded. A set of optional parameters, P, is passed through a hash function, H. 2. The output is then padded with zeros to get the desired length in the overall data block (DB). 3.Next, a random seed is generated and passed through another hash function, called the mask generating function (MGF). 4. The resulting hash value is bit-by-bit XORed with DB to produce a maskedDB. 5.The maskedDB is in turn passed through the MGF to form a hash that is XORed with the seed to produce the masked seed. 6. The concatenation of the masked-seed and the maskedDB forms the encoded message EM. Note that the EM includes the padded message, masked by the seed, and the seed, masked by the maskedDB. The EM is then encrypted using RSA.
  翻译: