1 / 13

RSA Encryption and AES Tie-Ins: Secure Messaging with Public-Key Cryptography

Learn about the concepts of RSA encryption and its relationship with AES. Discover how public-key cryptography enables secure messaging and why it is difficult to factor large numbers. Use Maple software to explore real examples of RSA encryption.

dbond
Download Presentation

RSA Encryption and AES Tie-Ins: Secure Messaging with Public-Key Cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 1 DTTF/NB479: Dszquphsbqiz Day 18 • Announcements: • HW4 – DES due Thursday • I have installed, or will install: Java, C (gcc), Python. • What other languages? Please make appointment to help install required software • Thursday: bring textbook and Maple in class. • Friday: Ch 3 written exam • Term project groups and topics due at end of week 6 • Use ch 10 – 19 as inspiration • Today • Finish Rijndael • RSA concepts • Questions?

  2. Rijndael/AES Tie-ins with Galois field, GF(28): S-box implements z = Ax-1 + b in GF(28) MixColumn multiplies by a matrix in GF(28) to diffuse bits Key schedule (next) uses S-box and powers in GF(28) • Wikipedia’s visuals

  3. Decryption E(k) is: (ARK0, BS, SR, MC, ARK1, … BS, SR, MC, ARK9, BS, SR, ARK10) Each function is invertible: ARK; IBS; ISR; IMC So D(k) is: ARK10, ISR, IBS, ARK9, IMC, ISR, IBS, … ARK1, IMC, ISR, IBS, ARK0) Half-round structure: • Write E(k) = ARK, (BS, SR), (MC, ARK), … (BS, SR), (MC, ARK), (BS, SR), ARK (Note that last MC wouldn’t fit) • D(k) = ARK, (ISR, IBS), (ARK, IMC), (ISR, IBS), … (ARK, IMC), (ISR, IBS), ARK Can write: D(k) = ARK, (IBS, ISR), (IMC, IARK), … (IBS, ISR), (IMC, IARK), (IBS, ISR), ARK

  4. Public-key cryptography is used to send “session” keys for AES to encode messages. • Do you trust 128-bit encryption now? • You should, especially when keys are sent using public key cryptography (next) • Relationship between RSA and AES in http://www.grc.com/securitynow.htm#183. (To get to the point, jump to 51:57; thanks to Matthew Jacobs ‘09 for reference)

  5. Public-key Cryptography 2 • Problem: how can I send my AES key without Eve intercepting it? • Consider a scheme in which everyone publishes a (public) method by which messages can be encrypted and sent to them … but only the publisher can decrypt. • Knowing how to encrypt does not reveal how to decrypt!

  6. RSA (Rivest – Shamir – Adelman) relies on the inability to quickly factor products of large primes 3 For Alice to send a message to Bob. • Bob chooses primes p,q (large, ~100 digits each) • He publishes his public key (n,e): • n = pq • e, a large number such that gcd(e, (p-1)(q-1)) = 1 • Alice has a message m < n. • Otherwise (if m > n), break message into chunks < n • Alice sends c = me(mod n) • Bob computes cd (mod n) = (me)d = m (mod n). • What does he use for d?

  7. Alice – (m)  Bob Bob’s key: n = pq e: gcd(e, (p-1)(q-1)) = 1 This is so d=e-1 mod (p-1)(q-1) exists Alice sends c = me(mod n) Bob computes cd (mod n) = (me)d = m (mod n), where d = e-1 (mod (p-1)(q-1)). Recall Euler’s theorem: as long as gcd(m,n) = 1 So med = m (mod n) iffed = 1 (mod f(n) = 1 (mod (p-1)(q-1)) So d = e-1 mod (p-1)(q-1) 4 Why does decryption work?

  8. Alice has (m)  Bob Bob’s key: n = pq = (13)(17) = 221 e = 35: gcd(e, (p-1)(q-1)) = 1 d=e-1 mod 192 exists: d = ____ m = 20 (letter t) 1-based, so leading ‘a’ = 1 not ignored c = me(mod n) = ____ cd (mod n) = ___ Issues: How does Alice compute 2035(mod 221)? Modular exponentiation Efficiency is O(log e) How does Bob compute d? Extended Euclidean alg. Efficiency is O(log n) And why is this secure? Why can’t Eve calculate d herself? 5-7 Toy example 11 197 20

  9. The security if RSA lies in the difficulty of factoring large numbers 8 • Eve knows e, n, and c only • To find d = e-1 (mod f(n)),Eve needs to know f(n) = (p-1)(q-1) • If she knows n, she can factor it into p and q to find f(n), right? • That’s a big if, since n is ~200 digits long in practice! • Large numbers are hard to factor! • Can’t just test every prime from 1 .. sqrt(n)

  10. The security if RSA lies in the difficulty of factoring large numbers • c = me (mod n) • Can Eve just compute e-th root of c? • Not since mod n • Unless we brute force, but not when n is large!

  11. Is f(n) as hard to find as the factors of n? Claim: factoring n hard  finding f(n) hard Hint: write n and f(n) in terms of p and q.

  12. Next week: finding d is as hard to do as finding the factors of n So Eve has no shortcuts to factoring!

  13. You will need your computer with Maple on it next class to do a real example of RSA Today I demo’ed in Matlab. Unfortunately, Matlab can’t generate large primes quickly. Maple’s nextprime method works well

More Related