Top Banner
Algebra of RSA codes Yinduo Ma Tong Li
11

Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.

Jan 02, 2016

Download

Documents

Audrey Brooks
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.

Algebra of RSA codes

Yinduo MaTong Li

Page 2: Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.

Ron Rivest, Adi Shamir and Leonard Adleman

Page 3: Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
Page 4: Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.

OperationThe RSA algorithm involves three steps

Key generation

Encryption

Decryption

Page 5: Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.

Operation

Page 6: Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.

Example Choose p = 3 and q = 11

Compute n = p * q = 3 * 11 = 33

Compute φ(n) = (p - 1) * (q - 1) = 2 * 10 = 20

Choose e such that 1 < e < φ(n) and e and n are coprime. Let e = 7

Compute a value for d such that (d * e) % φ(n) = 1. One solution is d = 3 [(3 * 7) % 20 = 1]

Public key is (e, n) => (7, 33)

Private key is (d, n) => (3, 33)

The encryption of m = 2 is c = 27 % 33 = 29

The decryption of c = 29 is m = 293 % 33 = 2

Page 7: Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.

Proof Proof using Fermat's little theorem

Proof using Euler's theorem

Page 8: Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.

Proof Euler's theorem

Goal to show med ≡ m (mod n)

n = pq

ed ≡ 1 (mod φ(n)). ed = 1 + hφ(n)

Assuming that m is relatively prime to n, we have

By Euler's theorem.

Page 9: Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.

Signing message

Page 10: Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.

Attacks Timing attacks

Adaptive chosen ciphertext attacks

Side-channel analysis attacks

Page 11: Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.

Exam question Our public key is (7,33)

pravit key is (3,33)

A ciphertext is 10 , please decryption it.

The decryption of c = 10 is m = 103 % 33 = 10