Application OF: Presented by
Application OF: Presented by
OF
PRESENTED BY>
by Ritu Sharma
Cryptographic Security
C
C could view the secret message by
eavesdropping on the communication.
Loss of privacy/confidentiality
by Ritu Sharma
2
Cryptographic Security
(2)
C
C could alter/corrupt the message, or the message could change while
in transit. If B does not detect this, then we have Loss of Integrity
(3)
m
C
If B cannot verify the source entity of the information then we
lack authentication
by Ritu Sharma
3
Cryptographic Security
(4)
by Ritu Sharma
4
Cryptographic Security
by Ritu Sharma
5
Cryptographic Security
Sender
(encryption)
(encryption key)
Receiver
(decryption)
(decryption key)
(encryption)
(key)
by Ritu Sharma
7
Pi
Pi+1
Ci
(encryption)
Ci+1
(key)
by Ritu Sharma
8
Pi
Pi+1
Ci
(encryption)
Ci+1
(key)
by Ritu Sharma
9
Sender
(encryption)
(K)
EK(M) = C
Receiver
(decryption)
(K)
DK(C) = M
by Ritu Sharma
10
by Ritu Sharma
11
Forms of Cryptosystems
Public Key (asymmetric):
Requirements:
1. For every message M, encrypting with public key and then
decrypting resulting ciphertext with matching private key
results in M.
2. Encryption and Decryption can be efficiently applied to M
3. It is impractical to derive decryption key from encryption key.
Sender
(encryption)
(public key
of Receiver)
Receiver
(decryption)
(private key
of Receiver)
by Ritu Sharma
12
Cryptographic Security
(1)
(2)
by Ritu Sharma
13
Cryptographic Security
RivestShamirAdelman (RSA)
Method
RivestShamirAdelman (RSA)
Method
Cd
B
mod
M
Me mod
C
n
n
(e,
(d, n)
n)Key for
Encryption
Decryption Key for user B
user B
(Bs PrivateKey)
(Bs Public Key)
by Ritu Sharma
16
RSA Method
Example:
1. p = 5, q = 11 and n = 55.
(p1)x(q1) = 4 x 10 = 40
2. A valid d is 23 since GCD(40, 23) = 1
3. Then e = 7 since:
23 x 7 = 161 modulo 40 = 1
in other words
e = 23-1 (mod 40) = 7
by Ritu Sharma
17
by Ritu Sharma
18