Lecture-7-8-Pkey-2-3-8-10 - Public Key Encryption Ratan...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Public Key Encryption Ratan Guha CIS 3360 Security in Computing Spring 2010 2-3- and 2-8-10 Lecture 7 & 8 1 2 Resources Used Cryptography and Network Security, Fourth Edition, by William Stallings Lecture slides for the textbook by Lawrie Brown Lecture slides by Henric Johnson,Blekinge Institute of Technology, Sweden 3 Outline Outline Public Key Encryption Eulers Totient Function ( n) RSA Public Key Encryption Diffie-Hellman Key Exchange Placement of En/Decryption Key Distribution Public-Key Cryptography probably most significant advance in the 3000 year history of cryptography uses two keys a public & a private key asymmetric since parties are not equal uses clever application of number theoretic concepts to function complements rather than replaces private key crypto Why Public-Key Cryptography? developed to address two key issues: key distribution how to have secure communications in general without having to trust a KDC with your key digital signatures how to verify a message comes intact from the claimed sender public invention due to Whitfield Diffie & Martin Hellman at Stanford Uni in 1976 known earlier in classified community Public-Key Cryptography Public-Key Cryptosystems Public-Key Applications can classify uses into 3 categories: encryption/decryption (provide secrecy) digital signatures (provide authentication) key exchange (of session keys) some algorithms are suitable for all uses, others are specific to one Security of Public Key Schemes like private key schemes brute force exhaustive search attack is always theoretically possible but keys used are too large (>512bits) security relies on a large enough difference in difficulty between easy (en/decrypt) and hard (cryptanalyse) problems more generally the hard problem is known, but is made hard enough to be impractical to break requires the use of very large numbers hence is slow compared to private key schemes Eulers Totient Function...
View Full Document

This note was uploaded on 10/05/2010 for the course CIS CIS 3360 taught by Professor Guha during the Spring '10 term at University of Central Florida.

Page1 / 30

Lecture-7-8-Pkey-2-3-8-10 - Public Key Encryption Ratan...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online