32 64 or 128 bit blocks up to 0 to 255 rounds 0 to

Info icon This preview shows pages 6–9. Sign up to view the full content.

View Full Document Right Arrow Icon
32, 64 or 128 bit blocks, up to 0 to 255 rounds, 0 to 2048 bit keys n RSA patented in 1997 Public Key Cryptography n Employee private and public key n Public made available to anyone wanting to encrypt a message n Private key is used to decrypt n Public Key cannot decrypt the message it encrypted n Ideally private key cannot be derived from the public key n The other can decrypt a message encrypted by one of the keys n Private key is kept private n Possible through the application of one-way functions. Easy to compute in one direction but difficult to compute the other way n In order to be useful should have a trap door, a secret mechanism that enables you to accomplish the reverse function in a one way function n 1,000 to 10,000 times slower than secret key encryption n Hybrids use public key to encrypt the symmetric key
Image of page 6

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
n Important algorithms Diffie-Helllman RSA, El Gamal, Knapsack, Elliptic Curve RSA n Rivest, Shamir and Addleman n Based on difficulty of factoring a number which is the product of two large prime numbers, may be 200 digits each. n Can be used for Encryption, key exchange, and digital signatures Diffie-Hellman n Exchange secret keys over insecure medium without exposing keys n Without additional session key n Primarily key exchange El Gamal n Extended Diffie-Hellman to include signatures and encryption Merkle-Hellman Knapsack n Having set of items with fixed weights n Determining which items can be added in order to obtain a given total weight n Illustrated using Super increasing weights (all weights greater than sum of previous) Elliptic Curve n Elliptic curve discrete logarithm are hard to compute than general discrete logarithm n Smaller key size same level of security n Elliptic curve key of 160 bits = RSA of 1024 bits n Suited to smart cards and wireless devices (less memory and processing) n Digital signatures, encryption and key management Public Key Cryptosystem Algorithms n Factoring of Large Prime Numbers n RSA n Finding the discrete logarithm in a finite field n El Gamal n Diffie-Hellman n Shnorrs signature Algorithm n Elliptic Curve n Nybergrueppels signature algorithm Asymmetric and Symmetric Key Comparisons Asymmetric Key Symmetric Key 512 bits 64 bits 1792 bits 112 bits 2304 bits 128 bits Purpose of Digital Signatures n To detect unauthorized modifications and to authenticate identity and non-repudiation. n Generates block of data smaller than the original data n One way hash functions n One way has produces fixed size output (digest) n No two messages will have same digest n One way no getting original file from hash n Message digest should be calculated using all of original files data n After message digest is calculated it is encrypted with senders private key
Image of page 7
n Receiver decrypts using senders public key, if it opens then it is from the sender.
Image of page 8

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern