1 / 13

Securing Communications…

Securing Communications…. …a look at public-key cryptography and the RSA algorithm. The Security Problem. In the Information Age… Security/privacy is essential to protect secrecy and integrity of messages Authenticity is crucial to validate messages and prevent forgery. “History” of RSA.

conor
Télécharger la présentation

Securing Communications…

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Securing Communications… …a look at public-key cryptography and the RSA algorithm

  2. The Security Problem In the Information Age… • Security/privacy is essential to protect secrecy and integrity of messages • Authenticity is crucial to validate messages and prevent forgery

  3. “History” of RSA • Developed by Ron Rivest, Adi Shamir, Len Adleman in 1977 at MIT • According to Wikipedia…”apocryphally, it was invented at a Passover seder in New York...” • Patented in 1983 by MIT • Patent expired inSeptember 2000

  4. RSA: Part of your life

  5. Number Theory background • Modular arithmetic • Euler’s Totient function • Extended Euclidean Algorithm or greatest common denominator • Exponentiation by Squaring

  6. The RSA concept • In public-key cryptosystems, two keys are used: one public and one private • RSA has these 4 properties: • D(C)=D(E(M))=M • Both E and D are easy to compute • Revealing E does not give away D • E(D(M))=M - for signing messages • Having 1-3 are one-way trap door functions and with 4 they arepermutations

  7. Computing the keys • Choose two very large, random, independent prime numbers, p and q • Find the modulus: n=p*q • Find totient: φ(n)=(p-1)(q-1) • Choose d: 1<d<φ(n) andcoprime to φ(n) • Find e such that e*dΞ1 mod(φ(n)),making e and d multiplicative inverses of each other

  8. Encryption and Decryption • Convert message to numeric values so that m<n • Compute ciphertext c=me mod(n) by exponentiation by squaring • The message can be decrypted so that m=cd mod(n)

  9. My MATLAB code • Pretty simple to implement but numbers in RSA get huge fast • Wrote several simple functions • Important built in functionswere de2bi(), mod(), gcd(),randint(), and primes() • 159 lines of code…with comments and spaces

  10. Cracking RSA • The problem of factoring large numbers • The RSA problem • Timing attack • Chosen plaintext attack • Quantum computing…

  11. RSA factoring challenge • http://en.wikipedia.org/wiki/RSA_Factoring_Challenge • http://www.rsasecurity.com/rsalabs/node.asp?id=2094

  12. Sources… • R.L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. 1977 • Comm Text – Appendix A5 • Wikipedia.com. ‘RSA’

  13. Questions?

More Related