1 / 24

Asymmetric Cryptography

Asymmetric Cryptography. Concepts and Concerns. About the Speaker. Chuck Easttom chuck@chuckeasttom.com www.ChuckEasttom.com

zocha
Download Presentation

Asymmetric Cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Asymmetric Cryptography Concepts and Concerns

  2. About the Speaker • Chuck Easttom chuck@chuckeasttom.comwww.ChuckEasttom.com • Certifications A+,Network+, iNet+, Server+, Linux+, MCP (Windows 2000 Pro, VB 6 [Desktop and Distributed]), MCAD, MCSE, MCDBA, MCSA, MCT, MCTS (Windows Server 2008, SQL Server 2008, Visual Studio 2010, Windows 7), MCITP (Windows 7 and SQL Server 2008) CIW Security Analyst, CEH, CHFI, EC Council Certified Security Analyst, EC Council Certified Instructor, CISSP, ISSAP, and others. • Education: B.A. and M.Ed. from Southeastern Oklahoma State University. Ph.D. in progress(A.B.D.) from Northcentral University. • Publications: 13 computer science books. • Worked as a subject matter expert for CompTIA in the creation of the Security+, Server+, and Linux+ exams as well as revising the CTT+. • Created the advanced cryptography course for EC Council • Experience: many years in IT, 10+ years of teaching/training. • Creates study guides for Ucertify.com http://www.ucertify.com/blog/chuck-easttom.html , including their A+ study guide • Frequent expert witness in computer related computer cases • 7 provisional patents

  3. Prime Numbers A prime number is any number whose factors are 1 and itself. So 2, 3, 5, 7, 11, 13, 17, 23, etc. are prime numbers. Prime numbers are used in some public key cryptography algorithms (which we will study in lesson 4) such as RSA. Prime Number Theorem: If a random number N is selected, the chance of it being prime is approximately 1 / ln(N), where ln(N) denotes the natural logarithm of N.

  4. Co-Prime Just as important as prime numbers are in cryptography, co-prime numbers are also important. A co-prime is a number that has no factors in common with another number. For example 3 and 7 are co-prime

  5. Eulers Totient This is actually a part of the RSA Algorithm which we will study in lesson 4. The number of positive integers less than or equal to n that are coprime to n is called the Euler’s Totient of n. So for the number 6, 4 and 5 are coprime with 6. Therefore EulersTotient = 2 For a prime number p the Eulerstotient is always p-1. Symbolized

  6. Eulers Totient Coprime numbers have interesting relationships that are part of algorithms like RSA. For example if m and n are coprime then the totient of m * the totient of n is equal to the totient of (m*n). Put more mathematically If m and n are coprime then (m) * (n) = (mn)

  7. Modulus Operator The modulus operator is simple, and you will see it used in a number of cryptography algorithms. Simply divide A by N and return the remainder. • So 5 mod 2 = 1 • So 12 mod 5 = 2 • Sometimes symbolized as % as in • 5 % 2 = 1

  8. Asymmetric Encryption Asymmetric systems use key pairs which consist of a public key and private key. The public key is made public (for example, by publishing it in a directory) and the private key is kept secret. So the asymmetric cryptography does not involve exchanging a secret key. The public key can be used to encrypt messages and only the recipients private key can decrypt them. Advantages: Provides a secure way to communicate; provides method of validation; non-repudiation Disadvantages: Slower than Symmetric algorithms.

  9. Algorithms • Diffie Hellman • MQV • ElGamal • RSA • DSA • Elliptic Curve

  10. Diffie-Hellman A cryptographic protocol that allows two parties to establish a shared key over an insecure channel. Developed by Whitfield Diffie and Martin Hellman in 1976. An interesting twist is that the method had actually been developed a few years earlier by Malcolm J. Williamson of the British Intelligence Service, but it was classified.

  11. Diffie-Hellman The system has two parameters called p and g. Parameter p is a prime number and parameter g (usually called a generator) is an integer less than p, with the following property: for every number n between 1 and p-1 inclusive, there is a power k of g such that n = gk mod p. Many cryptography textbooks use the fictitious characters ‘alice’ and ‘bob’ to illustrate cryptography and we will do that here as well: • Alice generates a random private value a and Bob generates a random private value b. Both a and b are drawn from the set of integers • They derive their public values using parameters p and g and their private values. Alice's public value is ga mod p and Bob's public value is gb mod p. • They exchange their public values. • Alice computes gab = (gb)a mod p, and Bob computes gba = (ga)b mod p. • Since gab = gba = k, Alice and Bob now have a shared secret key k.

  12. RSA The algorithm was publicly described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT; the letters RSA are the initials of their surnames. This is perhaps the most widely used public key cryptography algorithm in existence today. It is based on some interesting relationships with prime numbers. The security of RSA derives from the fact that it is difficult to factor a large integer composed of two or more large prime factors.

  13. RSA – How does it work • Key generation • Generate two large random primes, p and q, of approximately equal size such that their product n = pq is of the required bit length (such as 128 bits, 256 bits, etc.) • Let n = pq • Let m = (p-1)(q-1) • Choose a small number e, co-prime to m (note: Two numbers are co-prime if they have no common factors.) • Find d, such that de % m = 1 • Publish e and n as the public key.Keep d and n as the secret key.

  14. RSA – How does it work • Encrypt • = Me % n • Put another way • Computes the ciphertext c = me mod n • Decrypt • P = Cd % n • Put another way • Uses his private key (d,n) to compute m = cd mod n.

  15. RSA Normally RSA would be done with very large integers. To make the math easy to follow we will use small integers in this example. (note this example is from Wikipedia): • Choose two distinct prime numbers, such as p = 61 and q = 53. • Compute n = pq giving n = 61 · 53 = 3233. • Compute the totient of the product as φ(n) = (p − 1)(q − 1) giving φ(3233) = (61 − 1)(53 − 1) = 3120. • Choose any number 1 < e < 3120 that is coprime to 3120. Choosing a prime number for e leaves us only to check that e is not a divisor of 3120. Let e = 17. • Compute d, the modular multiplicative inverse of yielding d = 2753. • The public key is (n = 3233, e = 17). For a padded plaintext message m, the encryption function is m17 (mod 3233). • The private key is (n = 3233, d = 2753). For an encrypted ciphertext c, the decryption function is c2753 (mod 3233).

  16. Is RSA Still Secure? • Heninger and Shacham • Zhao and Qi • Yeh, Huang, Lin, and Chang • Hinek

  17. Heninger and Shacham • Heninger and Shacham (2009) found that RSA implementations that utilized a smaller modulus were susceptible to cryptanalysis attacks. \A smaller modulus can increase the efficiency of an RSA implementation, but as Heninger and Shacham (2009) showed, it may also decrease the efficacy.

  18. Heninger and Shacham • Heninger and Shacham (2009) utilized the fact of the smaller modulus to reduce the set of possible factors, thus decreasing the time needed to factor the public key of an RSA implementation. It is in fact a common practice to use a specific modulus e = 216 + 1= 65537 (Heninger & Shacham, 2009). If an RSA Implementation is using this common value for e, then factoring the public key is a much simpler process

  19. Zhao and Qi • Zhao and Qi (2007) also utilized implementations that have a smaller modulus operator. The authors of this study also applied modular arithmetic, a subset of number theory, to analyzing weaknesses in RSA. Many implementations of RSA use a shorter modulus operator in order to make the algorithm execute more quickly.

  20. Resources • Hinek, M. (2009). Cryptanalysis of RSA and its variants. England: Chapman and Hall. • Heninger, N., Shacham, H. (2009). Reconstructing RSA private keys from random key bit. Advances in Cryptology Lecture Notes in Computer Science, 1 (1). doi:10.1007/978-3-642-03356-8_1. • Yeh, Y., Huang, T., Lin, H., Chang, Y. (2009). A study on parallel RSA factorization. Journal of Computers, 4 (2), 112-118. doi:10.4304/jcp.4.2.112-118 • Zhao, Y., Qi, W. (2007). Small private-exponent attack on RSA with primes sharing bits. Lecture Notes in Computer Science, 2007, 4779 (2007) 221-229. doi: 10.1007/978-3-540-75496-1_15

  21. Elliptic Curve This algorithm was first described in 1985 by Victor Miller (IBM) and Neil Koblitz (University of Washington) . The security of Elliptic Curve cryptography is based on the fact that finding the discrete logarithm of a random elliptic curve element with respect to a publicly-known base point is difficult to the point of being impractical to do. The size of the elliptic curve determines the difficulty of the finding the algorithm, and thus the security of the implementation. The level of security afforded by an RSA-based system with a large modulus can be achieved with a much smaller elliptic curve group.

  22. Elliptic Curve The U.S. National Security Agency has endorsed ECC by including schemes based on it in its Suite B set of recommended algorithms and allows their use for protecting information classified up to top secret with 384-bit keys

  23. Elliptic Curve It is based on equations of the form y2 = x3 + Ax + B along with a distinguished point at infinity, denoted An elliptic curve is the set of solutions to the equation given above. All the points which satisfy the equation plus a point at infinity lies on the elliptic curve. The public key is a point in the curve, obtained by multiplying the private key with the generator point (called G). The private key is a random number.

  24. Want to learn more? • My Blog • My website www.ChuckEasttom.com

More Related