RSA Cryptosystem - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

RSA Cryptosystem

Description:

The security of the RSA system is based on the hard problem of factoring a large ... Try all possible keys. Mathematical attacks. Equivalent to factor n. Timing ... – PowerPoint PPT presentation

Number of Views:99
Avg rating:3.0/5.0
Slides: 12
Provided by: Eri758
Category:
Tags: rsa | cryptosystem | keys

less

Transcript and Presenter's Notes

Title: RSA Cryptosystem


1
RSA Cryptosystem
2
What is RSA ?
  • RSA is a public-key cryptosystem.
  • It was developed by Ronald Rivest, Adi Shamir,
    and Leonard Adleman  in 1977.
  • The security of the RSA system is based on the
    hard problem of factoring a large integer.

3
Public-key cryptosystem
  • Encrypt messages with private(public) key and
    decrypt with public(private) key.
  • Its computationally infeasible to determine dk
    given ek and cryptographic algorithm.
  • RSA , ElGamal , Elliptic Curve are well-known
    public-key cryptosystems.

4
C ESK(M)
M DSK(C)
Bob
Alice
Secret-key cryptosystem
CA E(MA ,PKB)
MA D(CA ,PRB)
Alice
Bob
Public-key cryptosystem
5
Why public-key?
  • Key distribution
  • Conventional encryption require to share key in
    advance .
  • Digital signature
  • Secret-key cryptosystem cant provide
    authentication.

6
Secrecy and Authentication
KRa
KUb
y
x
Source A
Encryption Algorithm
Message source
Encryption Algorithm
network
Decryption Algorithm
Decryption Algorithm
Message dest.
Destination B
KRb
KUa
7
RSA algorithm
Key Generation
Select p,q p and q both prime Calculate
Calculate Select integer e Calculate
d Public key KU e,n Private key KR d,n
8
RSA algorithm (continue)
Encryption
Plaintext M lt n Ciphertext C Me ( mod n )

Decryption
Plaintext C Ciphertext M Cd ( mod n )
9
The Security of RSA
  • Possible approaches to attack RSA
  • Brute Force
  • Try all possible keys
  • Mathematical attacks
  • Equivalent to factor n
  • Timing attacks
  • Depending on the Running time of decryption.

10
The Security of RSA
  • Mathematical attacks
  • Factoring a 130 decimal digits (431 bits) has
    been done.
  • Key size
  • 1024 2048 bits will be reasonable in the
    future.

11
Application of RSA
  • E-bank
  • VPN
  • Secure telephones
  • Palm
  • Wireless Devices
  • ex. Ericsson R380s ,Nokia 9210
  • Reference
  • www.rsasecurity.com
Write a Comment
User Comments (0)
About PowerShow.com