POWER ANALYSIS ATTACKS - PowerPoint PPT Presentation

1 / 15
About This Presentation
Title:

POWER ANALYSIS ATTACKS

Description:

Public Key Cryptography ( Diffie, Hellman, Merkel 1976) D(E(M)) = M ... 640 was factored in 30 2.2GHz-Opteron-CPU years in 2005 ( 5 months calendar time) ... – PowerPoint PPT presentation

Number of Views:29
Avg rating:3.0/5.0
Slides: 16
Provided by: han101
Category:

less

Transcript and Presenter's Notes

Title: POWER ANALYSIS ATTACKS


1
RSA
Public Key Algorithm
Prepared by Y. Sinan Hanay
05/06/08
UMass
1
2
Outline
  • Cryptography
  • Encryption Schemes
  • RSA
  • Attacks
  • Summary

05/06/08
2
3
Cryptography
  • Secure Communication over Insecure Channel
  • The Need for Cryptography
  • Past
  • Military Communication
  • Present
  • ATM Cards, Internet, Digital Signatures

05/06/08
3
4
Cryptography
MESSAGE (PLAIN TEXT)
Sender
Receiver
Unsecure Channel
SOLUTION
Sender
Receiver
CIPHER TEXT
MESSAGE (PLAIN TEXT)
MESSAGE (PLAIN TEXT)
4
05/06/08
5
Encryption Schemes
  • Symmetric Key Cryptography
  • Caesar Cipher
  • DES, AES, Triple DES
  • Faster
  • Problem Keeping Key Secret
  • DES broken in 22 hours in 1999.

05/06/08
5
6
Publick Key Cryptography
  • Symmetric Key Cryptography
  • DES, AES, Triple DES
  • Faster
  • Problem Keeping Key Secret
  • Public Key Cryptography
  • RSA, El-Gamal, Elliptic Curve
  • Slower
  • Hybrid Cryptosystem
  • Distribute Symmetric Keys with an Asymmetric
    Cryptosystem

05/06/08
6
7
PKC History
  • Public Key Cryptography ( Diffie, Hellman, Merkel
    1976)
  • D(E(M)) M
  • Both E and D are easy to compute
  • One Way and Trapdoor Function
  • E(D(M)) M
  • One Way Function Easy to compute, Hard to
    invert
  • Factoring
  • Subset Sum
  • RSA

05/06/08
7
8
RSA
  • By Rivest, Shamir, Adleman in 1977
  • After working more than 40 candidates
  • Distribution of Symmetric Keys
  • Digital Signature
  • Trapdoor Function

9
RSA Key Generation
  • 1) Choose Two Prime numbers (p and q)?
  • 2) Compute N p q (N is the first
    element of key)?
  • 3) Compute ? ( p 1) ( q - 1)?
  • 4) Find e s.t. e and ? are coprime (elt?).
  • 5) Find d s.t. , d e 1 (mod?)
  • (e, N) Public Key
  • (d, N) Private Key

05/06/08
9
10
RSA Key Generation - Example
  • 1) Choose Two Prime numbers (p and q)?
  • p 179 , q 431
  • 2) Compute N p q (N is the first
    element of key)?
  • N 77149
  • 3) Compute ? ( p 1) ( q 1)?
  • ? 76540
  • 4) Find e s.t. e and ? are coprime (elt?).
  • e 281
  • 5) Find d s.t. , d e 1 (mod?)
  • d 3541
  • (e, N) Public Key (281, 77149)?
  • (d, N) Private Key (3541,77149)?

10
05/06/08
11
RSA Encryption Decryption
  • ENCRYPTION ( e 281, d 3541 , N 77149, m
    21)?
  • m Message, c cipher text
  • c 21281
    mod(77149) 65625
  • DECRYPTION
  • m 656253541
    mod(77149) 21
  • Interactive Applet
  • www-unix.ecs.umass.edu/hanay/RSA

05/06/08
11
12
RSA Applications
  • Digital Signature

Bob
05/06/08
12
13
RSA Vulnerabilities
  • When
  • RSA can be inverted via Chinese Remainder theorem
    if n can be factored out
  • Dixon Factorization
  • Chosen Plain Text Attack
  • Timing Attack

m lt n1/e then eth root of c m
05/06/08
13
14
Summary
  • Security Depends on One-Way, Trapdoor Function
  • Factorization problem
  • RSA-100 was factored in a few days in 1991
  • RSA-640 was factored in 30 2.2GHz-Opteron-CPU
    years in 2005 ( 5 months calendar time)

05/06/08
14
15
Thank You
05/06/08
15
Write a Comment
User Comments (0)
About PowerShow.com