Encryption-Decryption
Key concept: Plain-Text, Cipher-Text, Key, Algorithm.
Important Terms
Identify Pattern
The strong mathematical functions used in Public Key Cryptography have the unique characteristic that they are almost irreversible,
They can only easily be calculated into one direction and not the opposing.
Steps to Encrypt & Decrypt message
Sharing Public key
Encrypt Message using Public key
Sharing Encrypted Message
Decrypt Message
Identify the Issue with Scenario
Recap
RSA Crypto System
Mathematics behind the algorithm
Key generation
RSA Encryption scheme
RSA Signature scheme
Example
Encryption & Decryption
Encryption:
C = m^e mod n
C = 73 mod 33
C = 343 mod 33
C = 13
Hence the ciphertext c = 13.
Decryption:
M’ = c^d mod n
M’ = 137 mod 33 = 7.
Question
p = 11; q = 13, e = 11; M = 7 e. p = 17; q = 31, e = 7; M = 2
Key Generation
Trapdoor Function
Diffie-Hellman Algorithm
Example
Step 1: Alice and Bob get public numbers
P = 23, G = 9
Step 2: Alice selected a private key a = 4 and
Bob selected a private key b = 3
Step 3: Alice and Bob compute public values
Alice: x =(9^4 mod 23) = (6561 mod 23) = 6
Bob: y = (9^3 mod 23) = (729 mod 23) = 16
Step 4: Alice and Bob exchange public numbers
Step 5: Alice receives public key y =16 and
Bob receives public key x = 6
Step 6: Alice and Bob compute symmetric keys
Alice: ka = y^a mod p = 65536 mod 23 = 9
Bob: kb = x^b mod p = 216 mod 23 = 9
Step 7: 9 is the shared secret.
RABIN Crypto System
Key generation�
Calculation of Ciphertext c
Example
ELGAMAL Cryptosystem
Key aspect
Application:
Algorithm
Mathematics Process
https://www.youtube.com/watch?v=shaQZg8bqUM
https://www.youtube.com/watch?v=NsaXVGmuX18
Chapter 7 Asymmetric-Key Cryptography
Topics Beyond Syllabus Topics
References
Thank you
Question, if any ?