The document introduces public-key cryptography. It discusses the key distribution problem with symmetric cryptography and how public-key cryptography solves this. It describes the basic principles of asymmetric cryptography using one-way functions. It also discusses the security mechanisms provided by public-key algorithms like encryption, key establishment, and digital signatures. Finally, it covers some essential number theory concepts like Fermat's Little Theorem and Euler's Theorem that are important to public-key cryptography.
The document introduces public-key cryptography. It discusses the key distribution problem with symmetric cryptography and how public-key cryptography solves this. It describes the basic principles of asymmetric cryptography using one-way functions. It also discusses the security mechanisms provided by public-key algorithms like encryption, key establishment, and digital signatures. Finally, it covers some essential number theory concepts like Fermat's Little Theorem and Euler's Theorem that are important to public-key cryptography.
The document introduces public-key cryptography. It discusses the key distribution problem with symmetric cryptography and how public-key cryptography solves this. It describes the basic principles of asymmetric cryptography using one-way functions. It also discusses the security mechanisms provided by public-key algorithms like encryption, key establishment, and digital signatures. Finally, it covers some essential number theory concepts like Fermat's Little Theorem and Euler's Theorem that are important to public-key cryptography.
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 1
Outline Overview of Public-key Cryptography Pros and Cons of public-key cryptography Essential Number Theory Conclusions Conclusions
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 2
Motivation Key Distribution Problem: The key must be established between Alice and Bob using a secure channel. The communication link for the message is not secure, so sending the key over the channel directly—which would be the most convenient way of transporting it— can’t be done.
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 3
Contd… Number of Keys: Even if we solve the key distribution problem, we must potentially deal with a very large number of keys. If each pair of users needs a separate pair of keys in a network with n users, there are nC2 key pairs, and every user has to store n−1 keys securely. No Protection Against Cheating by Alice or Bob: Alice and Bob have the same capabilities, since they possess the same key.
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 4
Principles of Asymmetric Cryptography
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 5
Security Mechanisms of Public-Key Algorithms
Encryption: We can encrypt messages using
algorithms such as RSA or Elgamal. Key Establishment: there are protocols for establishing secret keys over an insecure channel. Nonrepudiation: Providing nonrepudiation and message integrity can be realized with digital signature algorithms. Identification: We can identify entities using challenge-and-response protocols together with digital signatures,
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 6
Limitation Encryption of data using public key cryptosystem is very computationally intensive. Block /stream ciphers are much faster than public-key cryptosystem. Most practical protocols are hybrid protocols which incorporate both symmetric and public- key approaches.
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 7
Bit lengths of public-key algorithms for different security levels
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 8
Hybrid Protocols
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 9
Public-key Cryptography
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 10
Definitions One-way function: A function f () is a one-way function if: y = f (x) is computationally easy, and x = f -1(y) is computationally infeasible. In mathematical terms, a function is easy to compute if it can be evaluated in polynomial time, i.e., its running time is a polynomial expression. The inverse computation x = f -1(y) should be so computationally intensive that it is not feasible to evaluate it in any reasonable time period, Thus, having data x it is easy to calculate f(x) but, on the other hand, knowing the value of f(x) it is quite difficult to calculate the value of x. We believe certain functions are one-way functions.
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 11
One Way Function
Integer factorization problem, on
which RSA is based
One way Function Discrete logarithm problem, on
which DHKEP, ElGamal
Elliptic Curve Discrete
logarithm problem
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 12
Integer factorization problem Given two large primes, it is easy to compute the product. However, it is very difficult to factor the resulting product. In fact, if each of the primes has 150 or more decimal digits, the resulting product cannot be factored, even with thousands of PCs running for many years.
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 13
Trapdoor one-way function Trapdoor one-way functions are types of one-way functions that contain a kind of "back door" (trapdoor). As in the case of ordinary one-way functions it is easy to compute their values for given data but it is very difficult to compute their inverse functions. However, if one has some additional secret information, he can easily compute the inverse function as well.
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 14
Contd… When n is large, the function y x k mod n is a trapdoor one-way function. Given x, n, and k , it is easy to calculate y. There is not a polynomial time solution to the f-1 function . If we know the trapdoor k s.t. k k 1mod n k We can compute: x y mod n
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 15
Essential Number Theory
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 16
Contd…
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 17
Fermat’s Little Theorem Let a be an integer and p be a prime, then: p 1 a 1 mod p One application is the computation of the inverse in a finite field. p 2 1 a a mod p
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 18
Euler’s Theorem A generalization of Fermat’s Little Theorem to any integer moduli, i.e., moduli that are not necessarily primes, is Euler’s theorem. Let a and m be integers with gcd(a,m) = 1, then: m a 1 mod m Let m = 12 and a = 5.
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 19
Conclusions Public-key algorithms have capabilities that symmetric ciphers don’t have, in particular digital signature and key establishment functions. Public-key algorithms are computationally intensive, and hence are poorly suited for bulk data encryption. Only three families of public-key schemes are widely used. This is considerably fewer than in the case of symmetric algorithms. Euler’s phi function gives us the number of elements smaller than an integer n that are relatively prime to n. This is an important function for the RSA cryptosystem.
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 20
!!!Thank You!!!
Introduction to Cryptography Department of CSE, ISM Dhanbad January 24, 2022 21