Class-5-24-10

Class-5-24-10 - MODERN CRYPTOGRAPHY next MODERN...

Info iconThis preview shows pages 1–19. Sign up to view the full content.

View Full Document Right Arrow Icon
MODERN CRYPTOGRAPHY next
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
MODERN CRYPTOGRAPHY 2. The opponent has access to any amount of corresponding Plaintext - Ciphertext pairs 3. The opponent may have access to the key used in the encrypting transformation E (M) = C k 1. The opponent knows the system being used 4. Security is to be achieved by the opponent not being able to construct the decrypting transformation D (C) = M k next
Background image of page 2
THE EULER PHI FUNCTION next
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
THE EULER FERMAT THEOREM Example This number is a prime Amazing?? next
Background image of page 4
Sample Problems 3 next
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Prove the basic principle an use it to next
Background image of page 6
next
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
next
Background image of page 8
HOW IT IS USED 1. Bob chooses two large primes p and q and computes m= p x q 2. Bob picks an encrypting exponent e 4. Bob computes the decrypting exponent d BOB m and e public p q and secret 5. Alice to send a message 1 < M < m to Bob computes 6. Bob to decrypt C computes next
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
WHY DOES IT WORK? RECALL EULER FERMAT ?
Background image of page 10
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 12
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 14
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 16
Background image of page 17

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 18
Background image of page 19
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 19

Class-5-24-10 - MODERN CRYPTOGRAPHY next MODERN...

This preview shows document pages 1 - 19. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online