lec-09-rsa - CSE565 S Upadhyaya Lec 9.1 UB Fall 2010 CSE565...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 09/28/10 CSE565: S. Upadhyaya Lec 9.1 UB Fall 2010 CSE565: S. Upadhyaya Lec 9.1 CSE565: Computer Security Lecture 9 Public Key Cryptography and RSA Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York 14260 09/28/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 9.2 Acknowledgments Material for some slides is drawn from Lawrie Brown’s slides 09/28/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 9.3 Motivation (1) Public Key Cryptography Perhaps the only true revolution in the history of cryptography Based on mathematical functions unlike conventional ones DES is a significant advance by IBM, but based on substitution and permutation PKEs are asymmetric techniques -- use two separate keys Enhance confidentiality, key distribution and authentication 09/28/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 9.4 Motivation (2) Addresses two key issues: Key distribution – how to have secure communications in general without having to trust a KDC with your key Digital signatures – how to verify a message comes intact from the claimed sender Public invention due to Whitfield Diffie & Martin Hellman at Stanford in 1976 Known earlier in classified community 09/28/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 9.5 Advantages Advantages of PKE Anyone can send a secret message to a user with fewer keys Conventional systems require a separate key for every pair of users Illustration A,B,C want to set up communication channels in pairs Keys needed -- kAB, kAC, kBC n user system requires n(n-1)/2 keys 09/28/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 9.6 Public-Key Characteristics (1) Public-Key algorithms rely on two keys with the characteristics that it is: Computationally infeasible to find decryption key knowing only algorithm & encryption key Computationally easy to en/decrypt messages when the relevant (en/decrypt) key is known Either of the two related keys can be used for encryption, with the other used for decryption (in some schemes) 09/28/10 UB Fall 2010 CSE565: S. Upadhyaya Lec 9.7 PKE Characteristics (2) Each user has two keys A public key and a private key...
View Full Document

This note was uploaded on 10/12/2010 for the course CSE 565 taught by Professor Shambhu during the Fall '09 term at SUNY Buffalo.

Page1 / 25

lec-09-rsa - CSE565 S Upadhyaya Lec 9.1 UB Fall 2010 CSE565...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online