+ All Categories
Home > Documents > cryptography by asis mohanty

cryptography by asis mohanty

Date post: 29-May-2018
Category:
Upload: asis-mohanty
View: 218 times
Download: 0 times
Share this document with a friend

of 24

Transcript
  • 8/9/2019 cryptography by asis mohanty

    1/24

    Public Key CryptographyAnd RSA

    BY

    Swasti sundar sahoo

    (0501206091)

  • 8/9/2019 cryptography by asis mohanty

    2/24

    Cryptography

    The art of secret message writing.

    Creating texts that can be only read

    by authorized individuals .

  • 8/9/2019 cryptography by asis mohanty

    3/24

    Terminology Plaintext: Original intelligible message

    Encryption algorithm: It performs

    various substitutions andtransformations on the plaintext

    Key: Is a word that is used to encrypt the plaintext

    Ciphertext: Is a scrambled message produced as output

    Decryption algorithm: Opposite of encryption algorithm

  • 8/9/2019 cryptography by asis mohanty

    4/24

  • 8/9/2019 cryptography by asis mohanty

    5/24

    D

    ecryptionThe quickThe quickbrown foxbrown fox

    jumps overjumps over

    the lazythe lazydogdog

    AxCv;5bmEseTfid3)AxCv;5bmEseTfid3)fGsmWe#4^,sdgfMwifGsmWe#4^,sdgfMwi

    r3:dkJeTsY8Rr3:dkJeTsY8R\\s@!q3s@!q3%%

    DecryptionDecryptionAlgorithmAlgorithm

    CipherCipher--texttext

    keykey

    PlainPlain--text outputtext output

  • 8/9/2019 cryptography by asis mohanty

    6/24

    Mathematical Notation

    P: plaintext

    C: ciphertext

    K : key

    E: encryption function

    D: decryption function

    C = Ek(P)

    P = Dk(C)

  • 8/9/2019 cryptography by asis mohanty

    7/24

    Types of Cryptography

    Using Keys

    Secret key cryptography: one key

    Public key cryptography: two keys -

    public, private

  • 8/9/2019 cryptography by asis mohanty

    8/24

    EncryptionEncryptionAlgorithmAlgorithm

    The quickThe quickbrown foxbrown fox

    jumps overjumps overthe lazythe lazy

    dogdog

    AxCv;5bmEseTfid3)AxCv;5bmEseTfid3)fGsmWe#4^,sdgfMwifGsmWe#4^,sdgfMwir3:dkJeTsY8Rr3:dkJeTsY8R\\s@!q3s@!q3

    %%

    The quickThe quickbrown foxbrown fox

    jumps overjumps overthe lazythe lazy

    dogdogDecryptionDecryptionAlgorithmAlgorithm

    PlainPlain--text inputtext inputCipherCipher--texttext

    Same keySame key(shared secret)(shared secret)

    PlainPlain--text outputtext output

    Secret Key Cryptography

  • 8/9/2019 cryptography by asis mohanty

    9/24

    Public Key

    Cryptography

  • 8/9/2019 cryptography by asis mohanty

    10/24

    Public-Key Cryptography 1976: W. Diffie and M.E. Hellman

    proposed the first public-key

    public-key/asymmetric cryptography

    involves the use oftwo keys:

    aprivate-key, which is kept private

    apublic-key, which may be known byanybody

  • 8/9/2019 cryptography by asis mohanty

    11/24

    Essential Steps

    Each user generates a pair of keys Each user places one key in public

    register

  • 8/9/2019 cryptography by asis mohanty

    12/24

    Public Key Cryptography

    EncryptionEncryptionAlgorithmAlgorithm

    Py75c%bn&*)9|fDe^Py75c%bn&*)9|fDe^bDFaq#xzjFr@g5=&nbDFaq#xzjFr@g5=&n

    mdFg$5knvMdrkvegmdFg$5knvMdrkvegMsMs

    The quickThe quickbrown foxbrown fox

    jumps overjumps over

    the lazythe lazydogdog

    ClearClear--text Inputtext Input

    The quickThe quickbrown foxbrown fox

    jumps overjumps over

    the lazythe lazydogdog

    DecryptionDecryptionAlgorithmAlgorithm

    CipherCipher--texttext ClearClear--text Outputtext Output

    Different keysDifferent keys

  • 8/9/2019 cryptography by asis mohanty

    13/24

    Public Key Cryptography

  • 8/9/2019 cryptography by asis mohanty

    14/24

    Public Key Cryptography

  • 8/9/2019 cryptography by asis mohanty

    15/24

    Public Key Cryptography

  • 8/9/2019 cryptography by asis mohanty

    16/24

    Public Key Cryptography

    Solves problem of

    passing the key

    Only the private key

    must be kept secret

    Extremely slow

    Large key size

    Advantage Disadvantages

  • 8/9/2019 cryptography by asis mohanty

    17/24

    RSAAlgorithm

  • 8/9/2019 cryptography by asis mohanty

    18/24

    RSA

    By Rivest, Shamir &Adleman

    Best known & widely used

    It is based on number theory

    The key size ranges between

    512 and 2048

  • 8/9/2019 cryptography by asis mohanty

    19/24

    The RSA Algorithm Key

    Generation1. Selectp,q ; p and qboth prime

    2. Calculate n = p x q

    3. Calculate

    4. Select integere

    5. Calculate d

    )1)(1()( !* qpn

    )(1;1)),(gcd( neen *!*

    )(mod1 ned *!

  • 8/9/2019 cryptography by asis mohanty

    20/24

    Plaintext: p

  • 8/9/2019 cryptography by asis mohanty

    21/24

    RSA Example1. Select primes: p=17 & q=11

    2. Compute n =p*q=1711=187

    3. Compute (n)=(p1)(q-1)=1610=160

    4. Select e : gcd(e,160)=1; e=7

    5 Compute d = e-1 mod J(n) =7 mod 160

    =23

    -1

  • 8/9/2019 cryptography by asis mohanty

    22/24

    Conclusion Cryptography is used to keep secret the

    message. The long message is kept secret

    through symmetric key cryptography due to

    its same encrypt and decrypt key. Public

    key cryptography is efficient for short

    messages and RSA algorithm is a popularalgorithm for public key cryptography.

  • 8/9/2019 cryptography by asis mohanty

    23/24

    Biblography

    Cryptography And Network Security-William Stallings

    Applied Cryptography

    - Bruce Schneier

  • 8/9/2019 cryptography by asis mohanty

    24/24

    THANK YOU


Recommended