From:%20Introduction%20to%20Algorithms%20Cormen,%20Leiserson%20and%20Rivest - PowerPoint PPT Presentation

About This Presentation
Title:

From:%20Introduction%20to%20Algorithms%20Cormen,%20Leiserson%20and%20Rivest

Description:

M = Cd (mod n) Public Key Crytography. 7. Key Selection Phase ... Bob's private keys are. Bob receives a 27 from someone (he thinks it may be Alice? ... – PowerPoint PPT presentation

Number of Views:1735
Avg rating:3.0/5.0
Slides: 14
Provided by: ValuedGate2137
Category:

less

Transcript and Presenter's Notes

Title: From:%20Introduction%20to%20Algorithms%20Cormen,%20Leiserson%20and%20Rivest


1
Public Key Crytography From Introduction to
Algorithms Cormen, Leiserson and Rivest
2
Purpose
To send encrypted messages over an insecure
channel To include an unforgeable digital
signature with electronic messages. Its the
perfect tool for electronically signed
business contracts, electronic checks, and any
documents that need to be private or
authenticated. First introduced by Diffie and
Hellman in 1976
3
The RSA Public-Key Cryptosystem
  • Developed by Rivest, Shamir, and Aldeman in 1977
  • Since then the field of cryptography has
    blossomed

4
The RSA Public-Key Cryptosystem
  • Select at random two large prime numbers p and q.
  • These numbers would normally be about 500
    digits
  • in length.
  • Compute n by the equation n p X q.
  • Compute ?(n) (p 1) X (q 1)
  • Select a small odd integer e that is relatively
    prime to
  • ?(n)

5
The RSA Public-Key Cryptosystem
5. Compute d as the multiplicative inverse of e
modulo ?(n). A theorem in number theory
asserts that d exists and is uniquely
defined. 6. Publish the pair P (e,n) as the RSA
public key. 7. Keep secret the pair S (d,n) as
the RSA secret key.
6
The RSA Public-Key Cryptosystem
8. To encrypt a message M compute C Me
(mod n) 9. To decrypt a message C compute M
Cd (mod n)
7
Key Selection Phase
  • Select at random two large prime numbers p and q.
  • These numbers would normally be about 500
    digits
  • in length.
  • p 3 q 11
  • Compute n by the equation n p X q.
  • n 33

3. Compute ?(n) (p 1) X (q 1)
?(n) (2) X (10) 20

8
Key Selection Phase
p 3 q 11 n 33 ?(n) 20
4. Select a small odd integer e that is
relatively prime to ?(n)
e 3
9
Key Selection Phase
p 3 q 11 n 33 ?(n) 20 e 3

5. Compute d as the multiplicative inverse of e,
modulo ?(n). A theorem in number theory
asserts that d exists and is uniquely defined
(since e and ?(n) are relatively prime).
We need a d so that ed mod ? 1
Lets try 1. 3 X 1 mod 20 3 mod 20 3. Nope.
10
Key Selection Phase
p 3 q 11 n 33 ?(n) 20 e 3

We need a d so that ed mod ? 1
Lets try 2.
3 X 2 mod 20 6 mod 20 6. Nope.
Lets try 7. 3 X 7 mod 20 21 mod 20 1. We
found it!
We need a better way.well see this soon.
11
Key Selection Phase
p 3 q 11 n 33 ?(n) 20 e 3
d 7
6. Publish the pair P (e,n) as the RSA public
key.
Hey everyone, my key pair is 3 and 33
7. Keep secret the pair S (d,n) as the RSA
secret key.
Im not telling anyone about 7 and 33!!
12
Message encoding phase
e 3 n 33
Bobs public keys are
Alice wants to send the letter c to
Bob. Suppose that we have a public code where a
0 b 1 c 3 d 4 and so on
Alices software knows that 8. To
encrypt a message M compute C Me
(mod n)
33 mod 33 27 mod 33 27
13
Message decoding phase
d 7 n 33
Bobs private keys are
Bob receives a 27 from someone (he thinks it may
be Alice?)
9. To decrypt a message C compute M Cd (mod
n)
277 mod 33 10460353203 mod 33 3
Write a Comment
User Comments (0)
About PowerShow.com