Top Banner
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012
13

Key Exchange Methods Diffie-Hellman and RSA

Feb 22, 2016

Download

Documents

tobit

Key Exchange Methods Diffie-Hellman and RSA. CPE 701 Research Case Study Derek Eiler | April 2012. Overview Today’s discussion. Background: “key” cryptography concepts Diffie-Hellman key exchange Public k ey infrastructure (PKI) RSA k ey p air generation. Background A few “key” concepts. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Key Exchange Methods Diffie-Hellman and RSA

Key Exchange MethodsDiffie-Hellman and RSA

CPE 701 Research Case StudyDerek Eiler | April 2012

Page 2: Key Exchange Methods Diffie-Hellman and RSA

OverviewToday’s discussion

• Background: “key” cryptography concepts• Diffie-Hellman key exchange• Public key infrastructure (PKI)• RSA key pair generation

Page 3: Key Exchange Methods Diffie-Hellman and RSA

BackgroundA few “key” concepts

• Encryption: plaintext -> ciphertext• Decryption: ciphertext -> plaintext• Cryptographic function: mathematical

function or algorithm used to encrypt/decrypt• Key: parameter for a cryptographic function• Symmetric vs. asymmetric keys

Page 4: Key Exchange Methods Diffie-Hellman and RSA

So four people walk into a bar…Alice, Bob, Eve, and Mallory

• Alice and Bob want to speak privately over a public channel

• Eve is always eavesdropping on Alice and Bob• Mallory has malicious plans to interfere with

Alice and Bob’s private conversation

Page 5: Key Exchange Methods Diffie-Hellman and RSA

Diffie-Hellman key exchangeThe concept

• Alice and Bob derive a shared secret key over a public channel (no prior arrangements)

• Publicly agree on two public values, and • Each choose a private value, and • Use clever math to compute a shared secret, • Eve and Mallory never overhear enough

information to derive the shared secret

Page 6: Key Exchange Methods Diffie-Hellman and RSA

Diffie-Hellman key exchangeThe math: discrete logarithm problem

Let be a large prime numberLet be an integer < For every number from , inclusive, must have a power such that:

• Solving the is considered (but not proven) hard to do in polynomial time

Page 7: Key Exchange Methods Diffie-Hellman and RSA

Diffie-Hellman key exchangeThe math: discrete logarithm in action

Solve for , given values , , , and knowing:

• Finding is easy if or are known• Quickly solved by brute force if and • What if and ?

Page 8: Key Exchange Methods Diffie-Hellman and RSA

Diffie-Hellman key exchangeExample using small numbers

Alice starts the exchange and tells Bob Privately, Alice chooses and Bob chooses Alice computes and tells Bob the result

Bob computes and tells Alice the result

Since , Alice can compute

Since , Bob can compute

Meanwhile, Eve doesn’t know or and can’t easily derive

Page 9: Key Exchange Methods Diffie-Hellman and RSA

RSA key generationThe concept

• Alice generates a pair of keys, publishing one and keeping the other private

• Anyone may use the published key to encrypt messages intended for Alice

• Only Alice can decrypt messages encrypted with the public key (unless the private key was compromised somehow)

• Alice may also use the key pair to prove her identity

Page 10: Key Exchange Methods Diffie-Hellman and RSA

RSA key generationThe math: factoring problem

• Computing the product of two prime numbers is easy (23*17 = 391)

• Factoring the product of two large prime numbers is “hard”

• Try factoring 123,018,668,453,011,775,513,049,495,838,496,272,077,285,356,959,533,479,219,732,245,215,172,640,050,726,365,751,874,520,219,978,646,938,995,647,494,277,406,384,592,519,255,732,630,345,373,154,826,850,791,702,612,214,291,346,167,042,921,431,160,222,124,047,927,473,779,408,066,535,141,959,745,986,902,143,413

Page 11: Key Exchange Methods Diffie-Hellman and RSA

RSA key generationThe math: public and private key pair

• Calculate the product where and are very large prime numbers (e.g. tens or even hundreds of digits long)

• Carefully choose exponents and such that we can publish the key and retain the corresponding private key

Page 12: Key Exchange Methods Diffie-Hellman and RSA

RSA key generationThe math: “exponential” difficulty

• Choose an such that and is coprime to • How? For each in , test whether until true.*• Choose a such that is divisible by • Now publish and retain the private key

*Euclid’s or Stein’s algorithm are typically used to compute the GCD.