280 likes | 297 Views
Learn about private-key cryptography, public-key encryption, digital signatures, and authentication protocols in this comprehensive guide to modern encryption methods and technologies.
E N D
_r{{x7@xe{s7vys7@r{txzr7cx7Cr7d~zg{r7tengc Hello World and Welcome to The simple crypt Key=23 Private-key Cryptography
Eve ALICE BOB
Eve ALICE BOB Bob’s Public Key Alice’s Public Key Alice’s Public Key Alice’s Public Key Bob’s Public Key Bob’s Public Key Bob’s Private Key Alice’s Private Key
Bob’s Public Key Encryption Locked for Bob
Locked for Bob Bob’s Private Key Decryption
Signing Bob’s Public Key Alice’s Private Key Alice’s Private Key Singed by Alice Singed by Alice Encryption Signed by Alice & Locked for Bob
Decryption Signed by Alice& Locked for Bob Alice’s Public Key Bob’s Private Key Singed by Alice Verification Yes/No! Singed by Alice
Message This is a big secret Message I?~jhYUWEKUia Recipient’s PUBLIC key Message I?~jhYUWEKUia Message This is a big secret Recipient’s private key The Internet
Certificate Authorities • The Certificate Authority (CA) is a trusted third party • Provides the necessary authentication and security infrastructure • The CA creates and issues certificates
Using the CA to Establish Trust The CA 3- Check Signature 1- Establish a Certificate 2- send signed request and certificate Merchant Customer 4-Merchant can trust customer and may continue with trade
Authentication Protocols • General-purpose secure messaging protocols include: • SSL • S/MIME • Secure protocols for electronic commerce include: • EDI/MIME. • SET
SET Byte, June 1997
The Use of Smartcards Byte, June 1997
Minimal Key Lengths for Symmetric Ciphers, Matt Blaze and others, 1996.
RSAfrom the RSA FAQ • RSA is a public-key cryptosystem • take two large primes, p and q, • find their product n = pq; (n is called the modulus) • Choose, e, less than n and relatively prime to (p-1)(q-1), and find its inverse, d, mod (p-1)(q-1), which means that: ed = 1 mod (p-1)(q-1); • e and d are called the public and private exponents, respectively. • The public key is the pair (n,e); • the private key is d. • The factors p and q must be kept secret, or destroyed.
Two numbers are relatively prime when they share no factors in common other than 1. In other words, if the greatest common divisor of a and n is equal to 1. This is written: • gcd(a,n) = 1
It is difficult (presumably) to obtain the private key d from the public key (n,e). • If one could factor n into p and q, however, then one could obtain the private key d. • Thus the entire security of RSA is predicated on the assumption that factoring is difficult.
RSA encryption: • suppose Alice wants to send a private message, m, to Bob. • Alice creates the ciphertext c = m^e mod n, • e and n are Bob's public key. • To decrypt, Bob computes: m = c^d mod n, • and recovers the original message m; the relationship between e and d ensures that Bob correctly recovers m. Since only Bob knows d, only Bob can decrypt.
public-key operations take O(k^2) steps, • private key operations take O(k^3) steps, • key generation takes O(k^4) steps • where k is the number of bits in the modulus