尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
A
PRESENTATION ON CRYPTOGRAPHY USING
RSA CRYPTOSYSTEM
• Guided By- Mr. Chandrakanta Mallik
• Presented By- Abhishek Gautam
Sagarkanya Priyadarsini
 Cryptography is the practice and study of techniques for
conveying information security.
 The goal of Cryptography is to allow the intended recipients of
the message to receive the message securely.
 Network security is one of the several models of security which
exist today. This is most efficient and widely used model.
 Here the focus is to control network access to various hosts and
their services, rather than controlling individual host security.
 Hence, modern cryptography techniques are implemented in the
Network Security Model, as it proves to be affordable, functional
and reliable.
 Plaintext – The message in its original form.
 Ciphertext – Message altered to be unreadable by anyone except
the intended recipients.
 Cipher- The algorithm used to encrypt the message.
 Cryptosystem – The combination of algorithm, key, and key
management functions used to perform cryptographic operations.
 Private-key cryptography or Symmetric-key algorithm
 Public-key cryptography or Asymmetric-key algorithms
 A single key is used for both encryption and decryption. That's
why its called “symmetric” key as well.
 The sender uses the key to encrypt the plain-text and the receiver
applies the same key to decrypt the message.
 The biggest difficulty with this approach, thus, is the distribution
of the key, which generally a trusted third-party VPN does.
 Each user has a pair of keys: a public key and a private key.
 The public key is used for encryption. This is released in public.
 The private key is used for decryption. This is known to the
owner only.
 The most famous algorithm used today is RSA algorithm.
 It is a public key cryptosystem developed in 1976 by MIT
mathematicians - Ronald Rivest, Adi Shamir, and Leonard
Adleman.
 RSA today is used in hundreds of software products and can be
used for digital signatures, or encryption of small blocks of data.
 Euclid's Algorithm and its extension
 Modulo operator, its congruence, and multiplicative inverse
 Euler's Phi Function and Theorem
 It is a method of computing Greatest Common Divisor of two
integers (generally positive) .
 It is based on two observations :
a) If a perfectly divides b, then GCD(a,b) = a
b) If a = b * t + l where t and l are integers, then
GCD(a,b) = GCD(b,l)
 It is applied in chain until the remainder is zero.
 The modulo operation finds the remainder of division of one
number by another.
 For example, 14 mod 12 = 2 , as when 14 is divided by 12 we get
the remainder as 2.
 The modular congruence, indicated by "≡" followed by "mod"
between parentheses, means that the operator "mod", applied to
both members, gives the same result.
 For example, 38 ≡ 14 (mod 12) is same as 38 mod 12 = 14 mod
12 , which both yield 2.
 The modular multiplicative inverse of a mod m is an integer x
such that a*x ≡ 1 (mod m)
 For example, we wish to find modular multiplicative inverse x of
3 mod 11. We can write this as
 3 -1 ≡ x (mod 11) which is same as 3*x ≡ 1 (mod 11)
 Since RHS is 1, we need to find x such that (3*x) mod 11 = 1
which would give minimum positive value of x as 4.
 The Extended Euclid's Algorithm computes the integers x and y
in the equation called Bézout's identity which is :
ax + by = GCD(a,b)
 When a and b are co-primes, x is given as a-1≡ x (mod b) and y
is given as b-1≡ y (mod a)
 Hence we can easily find out the modular multiplicative inverse
this way.
 Euler's Phi function, φ(n) , is an arithmetic function that counts
the positive integers less than or equal to n that are relatively
prime to n, i.e., GCD(k,n)=1 . The number of values of k here is
φ(n).
 For example, φ(8) = 4, since there are 4 integers {1,3,5,7}
 For any prime p, φ(p) = p-1
 Also, for relative primes p and q, φ(p*q) = φ(p)*φ(q)
 Euler's Theorem states that if GCD (a,n)=1, i.e., a and n are co-
primes, then aφ(n)≡ 1 (mod n)
 If n is prime, then we have an-1≡ 1 (mod n)
 If n is the product of two primes p and q, then a(p-1)*(q-1)≡ 1
(mod n) .
This concept forms the basis of encryption process in RSA
cryptosystem.
ALGORITHM
1. A user must first choose two large prime
numbers, say p and q
EXAMPLE
1.Let Alice choose p=11 and q=19.
ALGORITHM
2.Calculate n = p * q
EXAMPLE
2.Alice calculated p * q as 11 * 19 and got
the value of n = 209.
ALGORITHM
3.Calculate φ(n) = (p-1) * (q-1)
EXAMPLE
3.Alice calculated (p-1) * (q-1) as 10 * 18
and got the value of φ(n) = 180.
ALGORITHM
4.Choose a value of e such that
GCD(e,φ(n)) = 1.
EXAMPLE
4.Alice randomly chose e as 103 which is
co-prime to 180.
ALGORITHM
5.Calculate d such that e * d ≡ 1 (mod
φ(n)) , or in other words, find the
modular multiplicative inverse of e.
EXAMPLE
5.To find the required inverse, Alice would
use Euclid's Algorithm in reverse manner
and then use its extension to find the
inverse. Here's how:
 Applying Euclid's:
180 = 1 * 103 + 77
103 = 1 * 77 + 26
77 = 2 * 26 + 25
26 = 1 * 25 + 1
Remember, Alice chose e = 103 and φ(n)
= 180
 Reversing Euclid's:
 1 = 26 – 25
= 26 – (77 – 2*26)
= 3 * 26 – 77 = 3 * (103 –
77) – 77
= 3 * 103 – 4 * 77 = 3 * (103) – 4 *
(180 – 103)
= 7 * 103 – 4 * 180(Bezout's
Identity)
Remember, Bezout's Identity is in the form
ax + by = gcd(a,b)
 Finding Inverse:
We now write our Bézout's Identity as ex + φ(n)y = 1, and we just
determined x as 7.
Now, the inverse of e is e-1≡ x (mod φ(n)) ≡ 7 (mod 180)
Hence, d = 7
ALGORITHM
6.The Public keys are (e,n),
7.The Private keys are (d,n) .
EXAMPLE
6.Alice thus obtained her Public Key as
(103,209) and Private Key as (7, 209)
ALGORITHM
In order to encrypt a number m, we
calculate c≡me (mod n), where c is the
encrypted number and m is less than n,
keeping in mind that the encryption
(public) key is (e,n).
EXAMPLE
Bob wants to send Alice and important
number, say 10. The cipher using Alice's
public key would be c≡10103 (mod 209)
On calculating this, which comes out to be
32, Bob sends it to Alice.
ALGORITHM
In order to decrypt a cipher c, we calculate
m≡cd (mod n), where m is the original
number, keeping in mind that the
decryption (private) key is (d,n) .
EXAMPLE
Alice receives the encrypted number. The
decrypted number using her private key
would be m≡32 7 (mod 209)
On calculating this, she gets m=10, which
was desired.
Key Generation
 Select p, q p and q both prime
 Calculate n n = p × q
 Select integer d gcd((n), d) = 1; 1 < d < (n)
 Calculate e e = d-1 mod (n)
 Public Key KU = {e, n}
 Private Key KR = {d, n}
Encryption
 Plaintext: M < n
 Ciphertext: C = Me (mod n)
Decryption
 Ciphertext: C
 Plaintext: M = Cd (mod n)
 p = 3
 q = 11
 n = p × q = 33 -- This is the modulus
 z = (p-1) × (q -1) = 20 -- This is the totient function (n). There
are 20 relative primes to 33. What are they? 1, 2, 4, 5, 7, 8, 10, 13, 14,
16, 17, 19, 20, 23, 25, 26, 28, 29, 31, 32
 d = 7 -- 7 and 20 have no common factors but 1
 7e = 1 mod 20
 e = 3
 C = Me (mod n)
 M = Cd (mod n)
 At present, 512 bit keys are considered weak, 1024 bit keys are
probably secure enough for most purposes, and 2048 bit keys are
likely to remain secure for decades.
 One should know that RSA is very vulnerable to chosen plaintext
attacks. There is also a new timing attack that can be used to
break many implementations of RSA.
 The RSA algorithm is believed to be safe when used properly, but
one must be very careful when using it to avoid these attacks.
 Brute Force
 Try all possible keys
 Mathematical Attacks
 Factor n
 Calculate (n)
 Timings Attacks
 Use the running time of the algorithm to determine d, the decryption
key
The RSA Cryptosystem is perhaps the most beautiful application of
mathematics. Theorems of Euler and Euclid we discussed were
proved around 300 years ago, and we find it's application today
extensively in network security, computer software algorithms and in
further advancement of technology to create a better world.

More Related Content

What's hot

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
cryptography
cryptographycryptography
cryptography
Abhijeet Singh
 
Unit 3
Unit 3Unit 3
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
JorgeVillamarin5
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Popescu Petre
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
Adri Jovin
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
Hemant Sharma
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
1524 elliptic curve cryptography
1524 elliptic curve cryptography1524 elliptic curve cryptography
1524 elliptic curve cryptography
Dr Fereidoun Dejahang
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
Komal Singh
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
chenlahero
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
 
Number theory and cryptography
Number theory and cryptographyNumber theory and cryptography
Number theory and cryptography
Yasser Ali
 

What's hot (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
cryptography
cryptographycryptography
cryptography
 
Unit 3
Unit 3Unit 3
Unit 3
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
1524 elliptic curve cryptography
1524 elliptic curve cryptography1524 elliptic curve cryptography
1524 elliptic curve cryptography
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Number theory and cryptography
Number theory and cryptographyNumber theory and cryptography
Number theory and cryptography
 

Similar to Rsa cryptosystem

Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
FahmiOlayah
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
ChandraB15
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
DHANABALSUBRAMANIAN
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Ch09
Ch09Ch09
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
Fahad Layth
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
Hossain Md Shakhawat
 
Rsa
RsaRsa
F010243136
F010243136F010243136
F010243136
IOSR Journals
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
ijcncs
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
Nithin Cv
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
rameshvvv
 
The rsa algorithm JooSeok Song
The rsa algorithm JooSeok SongThe rsa algorithm JooSeok Song
The rsa algorithm JooSeok Song
Information Security Awareness Group
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
alagumani1984
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
Marwa Hashem elsherif
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.ppt
ArchanaT30
 
RSA without Padding
RSA without PaddingRSA without Padding
RSA without Padding
Dharmalingam Ganesan
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
Suresh Thammishetty
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Tarek Gaber
 

Similar to Rsa cryptosystem (20)

Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Ch09
Ch09Ch09
Ch09
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
 
Rsa
RsaRsa
Rsa
 
F010243136
F010243136F010243136
F010243136
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
The rsa algorithm JooSeok Song
The rsa algorithm JooSeok SongThe rsa algorithm JooSeok Song
The rsa algorithm JooSeok Song
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.ppt
 
RSA without Padding
RSA without PaddingRSA without Padding
RSA without Padding
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
 

More from Abhishek Gautam

Power Bi Basics
Power Bi BasicsPower Bi Basics
Power Bi Basics
Abhishek Gautam
 
SQL : Structured Query Language
SQL : Structured Query LanguageSQL : Structured Query Language
SQL : Structured Query Language
Abhishek Gautam
 
Apache Pig
Apache PigApache Pig
Apache Pig
Abhishek Gautam
 
Apache Hive
Apache HiveApache Hive
Apache Hive
Abhishek Gautam
 
Big data
Big dataBig data
Big data
Abhishek Gautam
 
Enterprise application environment
Enterprise application environmentEnterprise application environment
Enterprise application environment
Abhishek Gautam
 
Software testing
Software testingSoftware testing
Software testing
Abhishek Gautam
 

More from Abhishek Gautam (7)

Power Bi Basics
Power Bi BasicsPower Bi Basics
Power Bi Basics
 
SQL : Structured Query Language
SQL : Structured Query LanguageSQL : Structured Query Language
SQL : Structured Query Language
 
Apache Pig
Apache PigApache Pig
Apache Pig
 
Apache Hive
Apache HiveApache Hive
Apache Hive
 
Big data
Big dataBig data
Big data
 
Enterprise application environment
Enterprise application environmentEnterprise application environment
Enterprise application environment
 
Software testing
Software testingSoftware testing
Software testing
 

Recently uploaded

Microsoft Azure AD architecture and features
Microsoft Azure AD architecture and featuresMicrosoft Azure AD architecture and features
Microsoft Azure AD architecture and features
ssuser381403
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
ShivangMishra54
 
BBOC407 Module 1.pptx Biology for Engineers
BBOC407  Module 1.pptx Biology for EngineersBBOC407  Module 1.pptx Biology for Engineers
BBOC407 Module 1.pptx Biology for Engineers
sathishkumars808912
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
nonods
 
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 MinutesCall Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
kamka4105
 
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
sonamrawat5631
 
My Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdfMy Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdf
Geoffrey Wardle. MSc. MSc. Snr.MAIAA
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
GOKULKANNANMMECLECTC
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
EMERSON EDUARDO RODRIGUES
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Dr.Costas Sachpazis
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
LokerXu2
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl LucknowCall Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
yogita singh$A17
 
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
dABGO KI CITy kUSHINAGAR Ak47
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
ShurooqTaib
 
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort ServiceCuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
yakranividhrini
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Banerescorts
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
Pallavi Sharma
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Poonam Singh
 

Recently uploaded (20)

Microsoft Azure AD architecture and features
Microsoft Azure AD architecture and featuresMicrosoft Azure AD architecture and features
Microsoft Azure AD architecture and features
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
 
BBOC407 Module 1.pptx Biology for Engineers
BBOC407  Module 1.pptx Biology for EngineersBBOC407  Module 1.pptx Biology for Engineers
BBOC407 Module 1.pptx Biology for Engineers
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
 
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 MinutesCall Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
 
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
🔥Young College Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chan...
 
My Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdfMy Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdf
 
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASICINTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
INTRODUCTION TO ARTIFICIAL INTELLIGENCE BASIC
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl LucknowCall Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
Call Girls In Lucknow 🔥 +91-7014168258🔥High Profile Call Girl Lucknow
 
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
High Profile Call Girls Ahmedabad 🔥 7737669865 🔥 Real Fun With Sexual Girl Av...
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
 
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort ServiceCuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Cuttack Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
 

Rsa cryptosystem

  • 1. A PRESENTATION ON CRYPTOGRAPHY USING RSA CRYPTOSYSTEM • Guided By- Mr. Chandrakanta Mallik • Presented By- Abhishek Gautam Sagarkanya Priyadarsini
  • 2.  Cryptography is the practice and study of techniques for conveying information security.  The goal of Cryptography is to allow the intended recipients of the message to receive the message securely.
  • 3.  Network security is one of the several models of security which exist today. This is most efficient and widely used model.  Here the focus is to control network access to various hosts and their services, rather than controlling individual host security.  Hence, modern cryptography techniques are implemented in the Network Security Model, as it proves to be affordable, functional and reliable.
  • 4.
  • 5.  Plaintext – The message in its original form.  Ciphertext – Message altered to be unreadable by anyone except the intended recipients.  Cipher- The algorithm used to encrypt the message.  Cryptosystem – The combination of algorithm, key, and key management functions used to perform cryptographic operations.
  • 6.  Private-key cryptography or Symmetric-key algorithm  Public-key cryptography or Asymmetric-key algorithms
  • 7.  A single key is used for both encryption and decryption. That's why its called “symmetric” key as well.  The sender uses the key to encrypt the plain-text and the receiver applies the same key to decrypt the message.  The biggest difficulty with this approach, thus, is the distribution of the key, which generally a trusted third-party VPN does.
  • 8.
  • 9.  Each user has a pair of keys: a public key and a private key.  The public key is used for encryption. This is released in public.  The private key is used for decryption. This is known to the owner only.
  • 10.
  • 11.  The most famous algorithm used today is RSA algorithm.  It is a public key cryptosystem developed in 1976 by MIT mathematicians - Ronald Rivest, Adi Shamir, and Leonard Adleman.  RSA today is used in hundreds of software products and can be used for digital signatures, or encryption of small blocks of data.
  • 12.  Euclid's Algorithm and its extension  Modulo operator, its congruence, and multiplicative inverse  Euler's Phi Function and Theorem
  • 13.  It is a method of computing Greatest Common Divisor of two integers (generally positive) .  It is based on two observations : a) If a perfectly divides b, then GCD(a,b) = a b) If a = b * t + l where t and l are integers, then GCD(a,b) = GCD(b,l)  It is applied in chain until the remainder is zero.
  • 14.
  • 15.  The modulo operation finds the remainder of division of one number by another.  For example, 14 mod 12 = 2 , as when 14 is divided by 12 we get the remainder as 2.
  • 16.  The modular congruence, indicated by "≡" followed by "mod" between parentheses, means that the operator "mod", applied to both members, gives the same result.  For example, 38 ≡ 14 (mod 12) is same as 38 mod 12 = 14 mod 12 , which both yield 2.
  • 17.  The modular multiplicative inverse of a mod m is an integer x such that a*x ≡ 1 (mod m)  For example, we wish to find modular multiplicative inverse x of 3 mod 11. We can write this as  3 -1 ≡ x (mod 11) which is same as 3*x ≡ 1 (mod 11)  Since RHS is 1, we need to find x such that (3*x) mod 11 = 1 which would give minimum positive value of x as 4.
  • 18.  The Extended Euclid's Algorithm computes the integers x and y in the equation called Bézout's identity which is : ax + by = GCD(a,b)  When a and b are co-primes, x is given as a-1≡ x (mod b) and y is given as b-1≡ y (mod a)  Hence we can easily find out the modular multiplicative inverse this way.
  • 19.  Euler's Phi function, φ(n) , is an arithmetic function that counts the positive integers less than or equal to n that are relatively prime to n, i.e., GCD(k,n)=1 . The number of values of k here is φ(n).  For example, φ(8) = 4, since there are 4 integers {1,3,5,7}  For any prime p, φ(p) = p-1  Also, for relative primes p and q, φ(p*q) = φ(p)*φ(q)
  • 20.  Euler's Theorem states that if GCD (a,n)=1, i.e., a and n are co- primes, then aφ(n)≡ 1 (mod n)  If n is prime, then we have an-1≡ 1 (mod n)  If n is the product of two primes p and q, then a(p-1)*(q-1)≡ 1 (mod n) . This concept forms the basis of encryption process in RSA cryptosystem.
  • 21. ALGORITHM 1. A user must first choose two large prime numbers, say p and q EXAMPLE 1.Let Alice choose p=11 and q=19.
  • 22. ALGORITHM 2.Calculate n = p * q EXAMPLE 2.Alice calculated p * q as 11 * 19 and got the value of n = 209.
  • 23. ALGORITHM 3.Calculate φ(n) = (p-1) * (q-1) EXAMPLE 3.Alice calculated (p-1) * (q-1) as 10 * 18 and got the value of φ(n) = 180.
  • 24. ALGORITHM 4.Choose a value of e such that GCD(e,φ(n)) = 1. EXAMPLE 4.Alice randomly chose e as 103 which is co-prime to 180.
  • 25. ALGORITHM 5.Calculate d such that e * d ≡ 1 (mod φ(n)) , or in other words, find the modular multiplicative inverse of e. EXAMPLE 5.To find the required inverse, Alice would use Euclid's Algorithm in reverse manner and then use its extension to find the inverse. Here's how:
  • 26.  Applying Euclid's: 180 = 1 * 103 + 77 103 = 1 * 77 + 26 77 = 2 * 26 + 25 26 = 1 * 25 + 1 Remember, Alice chose e = 103 and φ(n) = 180
  • 27.  Reversing Euclid's:  1 = 26 – 25 = 26 – (77 – 2*26) = 3 * 26 – 77 = 3 * (103 – 77) – 77 = 3 * 103 – 4 * 77 = 3 * (103) – 4 * (180 – 103) = 7 * 103 – 4 * 180(Bezout's Identity) Remember, Bezout's Identity is in the form ax + by = gcd(a,b)
  • 28.  Finding Inverse: We now write our Bézout's Identity as ex + φ(n)y = 1, and we just determined x as 7. Now, the inverse of e is e-1≡ x (mod φ(n)) ≡ 7 (mod 180) Hence, d = 7
  • 29. ALGORITHM 6.The Public keys are (e,n), 7.The Private keys are (d,n) . EXAMPLE 6.Alice thus obtained her Public Key as (103,209) and Private Key as (7, 209)
  • 30. ALGORITHM In order to encrypt a number m, we calculate c≡me (mod n), where c is the encrypted number and m is less than n, keeping in mind that the encryption (public) key is (e,n). EXAMPLE Bob wants to send Alice and important number, say 10. The cipher using Alice's public key would be c≡10103 (mod 209) On calculating this, which comes out to be 32, Bob sends it to Alice.
  • 31. ALGORITHM In order to decrypt a cipher c, we calculate m≡cd (mod n), where m is the original number, keeping in mind that the decryption (private) key is (d,n) . EXAMPLE Alice receives the encrypted number. The decrypted number using her private key would be m≡32 7 (mod 209) On calculating this, she gets m=10, which was desired.
  • 32. Key Generation  Select p, q p and q both prime  Calculate n n = p × q  Select integer d gcd((n), d) = 1; 1 < d < (n)  Calculate e e = d-1 mod (n)  Public Key KU = {e, n}  Private Key KR = {d, n}
  • 33. Encryption  Plaintext: M < n  Ciphertext: C = Me (mod n) Decryption  Ciphertext: C  Plaintext: M = Cd (mod n)
  • 34.  p = 3  q = 11  n = p × q = 33 -- This is the modulus  z = (p-1) × (q -1) = 20 -- This is the totient function (n). There are 20 relative primes to 33. What are they? 1, 2, 4, 5, 7, 8, 10, 13, 14, 16, 17, 19, 20, 23, 25, 26, 28, 29, 31, 32  d = 7 -- 7 and 20 have no common factors but 1  7e = 1 mod 20  e = 3  C = Me (mod n)  M = Cd (mod n)
  • 35.  At present, 512 bit keys are considered weak, 1024 bit keys are probably secure enough for most purposes, and 2048 bit keys are likely to remain secure for decades.  One should know that RSA is very vulnerable to chosen plaintext attacks. There is also a new timing attack that can be used to break many implementations of RSA.  The RSA algorithm is believed to be safe when used properly, but one must be very careful when using it to avoid these attacks.
  • 36.  Brute Force  Try all possible keys  Mathematical Attacks  Factor n  Calculate (n)  Timings Attacks  Use the running time of the algorithm to determine d, the decryption key
  • 37. The RSA Cryptosystem is perhaps the most beautiful application of mathematics. Theorems of Euler and Euclid we discussed were proved around 300 years ago, and we find it's application today extensively in network security, computer software algorithms and in further advancement of technology to create a better world.
  翻译: