Top Banner
45
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
Page 2: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Public KeyCryptosystems

Symmetric Cryptosystems10/04/23 | pag. 2

Page 3: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

ElGamal Encryption:Based on Diffie Hellman Key Exchange

Cryptography 10/04/23 | pag. 3

Security of Diffie Hellman key exchange not based on integer factoring (like RSA and Rabin)but on the discrete logarithm problem (DLP).

Page 4: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Discrete Logarithm

Cryptography 10/04/23 | pag. 4

Page 5: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Diffie Hellman Key Exchange

Cryptography 10/04/23 | pag. 5

Page 6: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Diffie Hellman Key Exchange

Cryptography 10/04/23 | pag. 6

Choose order g at least 2^160 to prevent Pohlig Hellman.

Page 7: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

ElGamal Key Generation

Cryptography 10/04/23 | pag. 7

Page 8: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

ElGamal Key Encryption

Cryptography 10/04/23 | pag. 8

Page 9: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

ElGamal Key Decryption

Cryptography 10/04/23 | pag. 9

Page 10: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

ElGamal

Cryptography 10/04/23 | pag. 10

Page 11: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

ElGamal and Diffie Hellman

Cryptography 10/04/23 | pag. 11

Page 12: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Hash functions

Symmetric Cryptosystems10/04/23 | pag. 12

Page 13: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Hash Function

Cryptography 10/04/23 | pag. 13

Page 14: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Compression Function

Cryptography 10/04/23 | pag. 14

Page 15: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

One-way Function

Cryptography 10/04/23 | pag. 15

Page 16: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

One-way Function

Cryptography 10/04/23 | pag. 16

Page 17: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Collisions

Cryptography 10/04/23 | pag. 17

Page 18: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Collisions

Cryptography 10/04/23 | pag. 18

Page 19: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Collisions

Cryptography 10/04/23 | pag. 19

Page 20: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Compression function from encryption functions

Cryptography 10/04/23 | pag. 20

Page 21: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Compression function from encryption functions

Cryptography 10/04/23 | pag. 21

Page 22: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Hash functions fromcompression functions

Cryptography 10/04/23 | pag. 22

Page 23: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

SHA-1

Cryptography 10/04/23 | pag. 23

3. The original length of x is written as a 64-bit number.4. Append 3. to x from 2.

Page 24: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

SHA-1

Cryptography 10/04/23 | pag. 24

Page 25: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

SHA-1

Cryptography 10/04/23 | pag. 25

Page 26: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

SHA-1

Cryptography 10/04/23 | pag. 26

Page 27: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Message Authentication Codes

Cryptography 10/04/23 | pag. 27

Page 28: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Message Authentication Codes

Cryptography 10/04/23 | pag. 28

Page 29: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Message Authentication Codes

Cryptography 10/04/23 | pag. 29

Page 30: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Message Authentication Codes

Cryptography 10/04/23 | pag. 30

Page 31: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Digital Signatures & Identification

Symmetric Cryptosystems10/04/23 | pag. 31

Page 32: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Digital Signatures

Cryptography 10/04/23 | pag. 32

Page 33: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

RSA Signatures

Cryptography 10/04/23 | pag. 33

Key Generation:

Page 34: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

RSA Signatures

Cryptography 10/04/23 | pag. 34

Signature Generation:

Page 35: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

RSA Signatures

Cryptography 10/04/23 | pag. 35

Signature Verification:

Page 36: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

RSA Signatures

Cryptography 10/04/23 | pag. 36

Page 37: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

RSA Signatures with Hash Functions

Cryptography 10/04/23 | pag. 37

Page 38: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Other Public Key Digital Signatures

Cryptography 10/04/23 | pag. 38

Page 39: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

ElGamal Signatures

Cryptography 10/04/23 | pag. 39

Key Generation:

Page 40: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

ElGamal Signatures

Cryptography 10/04/23 | pag. 40

Signature Generation:

Page 41: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Cryptography 10/04/23 | pag. 41

Signature Verification:

ElGamal Signatures

Page 42: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

ElGamal Signatures

Cryptography 10/04/23 | pag. 42

Page 43: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Identification

Cryptography 10/04/23 | pag. 43

Page 44: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Identification

Cryptography 10/04/23 | pag. 44

One can use for example• Passwords • Challenge-Response identification based on

• symmetric encryption• public key encryption

• Zero-knowledge proofs

Page 45: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.

Multimedia: crypto is not enough

Symmetric Cryptosystems10/04/23 | pag. 45