Public Key Cryptography - SlideShare [PDF]

Sep 20, 2014 - Public Key Cryptography,Rivest, Shamir & Adleman ,Diffe-Hellman Key Exchange Algorithm,Digital Signat

3 downloads 15 Views 527KB Size

Recommend Stories


Public Key Cryptography
The wound is the place where the Light enters you. Rumi

Public Key Cryptography
Respond to every call that excites your spirit. Rumi

Public Key Cryptography (II)
Live as if you were to die tomorrow. Learn as if you were to live forever. Mahatma Gandhi

Mathematical Background of Public Key Cryptography
You often feel tired, not because you've done too much, but because you've done too little of what sparks

Waste Design | Public Key Cryptography | Computer Network - Scribd [PDF]
A uses the final 8 bytes of sKeyA as the PCBC IV for send. to produce EsKeyA. 21. B uses the final 8 bytes of sKeyB as the PCBC IV for send. 18. B uses the first 56 bytes of sKeyA XOR sKeyB to intialize Blowfish for send and receive. A sends B: RSA(p

Symmetric-Key Cryptography
The wound is the place where the Light enters you. Rumi

Unshared Secret Key Cryptography
Never wish them pain. That's not who you are. If they caused you pain, they must have pain inside. Wish

Definisi kenyamanan - SlideShare [PDF]
Jan 8, 2015 - Definisi Kenyamanan Kolcaba (1992, dalam Potter & Perry, 2005) megungkapkan kenyamanan/rasa nyaman adalah suatu keadaan telah terpenuhinya kebutuhan dasar manu…

Holt.doc - SlideShare [PDF]
Jun 21, 2010 - ... Alternatives •Vocabulary Workshop Tests •Test Answer Keys Available upon request, one per teacher, year of purchase 0030573998/Media Literacy and Communication Skills, 106.92 122.96 VCR and First Course Monitor •Support and P

Maine explosion - SlideShare [PDF]
Dec 19, 2013 - Which do you think would have been the most reliable story? Why ... Document B: New York Times (Modified) MAINE'S HULL WILL DECIDE Divers Will Inspect the Ship's Hull to Find Out Whether the Explosion Was from the Outside or ... Now, f

Idea Transcript


SlideShare Explore Search You

Upload Login Signup

Search

Submit Search

Home Explore Presentation Courses PowerPoint Courses by LinkedIn Learning Search Successfully reported this slideshow.

1 of 188

Public Key Cryptography 11,253 views Share Like Download ...

Public Key Cryptography • It is used two keys for encryption and for decryption. – a public-key, which may be known by a...

Gopal Sakarkar, Professor Follow Published on Sep 20, 2014

Public Key Cryptography,Rivest, Shamir & Adleman ,Diffe-Hellman Key ... Published in: Engineering 0 Comments 16 Likes Statistics Notes

Full Name Comment goes here. 12 hours ago Delete Reply Spam Block Are you sure you want to Yes No Mr. Gopal Sakarkar Your message goes here

Share your thoughts… Post Be the first to comment

Aishwarya Chereddy 3 weeks ago

Yogesh Tamta 3 weeks ago

Sushmita Kura 3 weeks ago Public-Key Characteristics • Public-Key algorithms rely on two keys where: – it is computationally infeasible to find de...

Ragu Varman 1 month ago

01SIngh 1 month ago Show More No Downloads Views Total views 11,253 On SlideShare 0 From Embeds 0 Number of Embeds 8 Actions Shares 0Public key Cryptosystem : Authentication and secrecy Mr. Gopal Sakarkar Downloads 472 Comments 0 Likes 16 Embeds 0 No embeds No notes for slide

Public Key Cryptography 1. 1. Security Concept Part-2 Mr.Gopal Sakarkar Mr. Gopal Sakarkar 2. 2. Public Key Cryptography • It is used two keys for encryption and for decryption. – a public-key, which may be known by anybody, and can be used to encrypt messages – a private-key, known only to the recipient, used to decrypt Mr. Gopal Sakarkar messages • It has six ingredient 1 Plain text 2 Encryption algorithm 3 Public and private keys 4 Ciphertext 5 Decryption algorithm 3. 3. Mr. Gopal Sakarkar 4. 4. Public-Key Characteristics • Public-Key algorithms rely on two keys where: – it is computationally infeasible to find decryption key knowing only algorithm & encryption key – it is computationally easy to en/decrypt messages when the relevant (en/decrypt) key is known – either of the two related keys can be used for encryption, with the other used for decryption (for some algorithms) Mr. Gopal Sakarkar 5. 5. Public key Cryptosystem : Authentication and secrecy Mr. Gopal Sakarkar 6. 6. Requirement of Public key Cryptography 1. It is easy for party B to generate a pair of keys (public key PUb , Mr. Gopal Sakarkar Private key PRb). 2. It is easy for a sender A , knowing the public key and message to be encrypt. C=E(PUb, M) 3. It is easy for receiver B to decrypt the resulting ciphertext using the private key . Requirement of Public key Cryptography 1. It is easy for party B to generate a pair of keys (public key PUb , Mr. Gopal ... M=D(PRb,C)=D[PRb,E(PUb,M)] 4. It is infeasible for an any person , to know the public key PUb to determine the private key PRb. 5. It is infeasible for any person to know the public key PUb and a ciphertext C to recover the original message M. 6. Two keys can be applied in either order M=DP[PUb, E(PRb,M)] = D[PRb,E(PUb, M)] 7. 7. Exercise • Explain the difference between conventional and public key encryption. • What are the different requirements for public key cryptography . Mr. Gopal Sakarkar 8. 8. Related Links • http://docs.sun.com/source/816-6154-10/contents.htm Mr. Gopal Sakarkar 9. 9. RSA • Invented by Rivest, Shamir & Adleman of MIT in Mr. Gopal Sakarkar 1977 • It is a best known & widely used public-key scheme. • It is a block cipher algorithm in which palintext and ciphertext integers between 0 to n-1 for some n. • A typical size for n is 1024 bits or 309 decimal digits. 10. 10. RSA Algorithm Mr. Gopal Sakarkar 11. 11. Mr. Gopal Sakarkar 12. 12. Mr. Gopal Sakarkar 13. 13. An Example • Let p= 3 and q=5, • n= 3 X 5 =15 • Q(n)= (3-1) * (5-1) = 2 x 4= 8 • Select e such that gcd(Q(n), e) =1 where, 1

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.