Beruflich Dokumente
Kultur Dokumente
Batch: 2005-2006
Group Members
Sadeeq Jan
Charu Gupta
Tariq Saeed
1
Table of Contents
INTRODUCTION
1.1 History of Asymmetric-Key Cryptography
1.2 How Asymmetric Key Cryptography Works
1.3 Comparison between Asymmetric Key Cryptography
and Asymmetric key Cryptography
1.4 The Best of Both
1.5 Requirements of Public Key Cryptography
1.6 Applications for Public Key Cryptosystems
1.6.1 Encryption/Decryption
1.6.2 Authentication/Digital signature
1.6.3 Key exchange
1.6.4 Time Stamping
1.6.5 Electronic Money
3
4
5
9
10
10
11
11
11
11
12
13
13
14
14
14
15
15
16
16
CONCLUSIONS
17
18
INTRODUCTION
Cryptography is the art of achieving security by encoding the messages to make them non
readable. There are two cryptographic mechanisms depending upon the keys used. If the
same key is used for encryption and decryption, we call the mechanism as Symmetric
Key Cryptography and if two different keys are used in cryptographic mechanism,
wherein one key is used for encryption and another, different key is used for decryption,
we call the mechanism as Asymmetric Key Cryptography. Although Symmetric key
cryptography is fast and efficient, it suffers from a disadvantage of key exchange. The
sender and the receiver share the same key and it is difficult to agree upon the key
without letting anyone know about it. Asymmetric key algorithm solves this problem by
using two keys-private key which remains with the party and the public key which is
shared by everyone. To communicate securely over any network, all one needs here is to
publish ones public key. All these public keys can then be stored in a database that
anyone can consult and the private key remains only with the respective individual.
Key ring
Sadeeq
Tariq
Loiuse
Charu
Tariqs private
Key
Transmitted
ciphertext
Plaintext
output
Plaintext
input
Encryption algorithm
Decryption algorithm
If one party wants to send a message to other party, then the 1st party (sender) must have
the public key of the 2nd party (receiver). For example Sadeeq wants to send a message to
Tariq, Sadeeq first encrypts the message with Tariqs Public Key and then transmits it.
Tariq receives the encrypted message and decrypts it with its own private key. No one
except Tariq can decrypt the message because no one knows the private key of Tariq.
There is a simple mathematical basis for this scheme. If one has an extremely large
number that has only two factors which are prime numbers, one can generate a pair of
keys. For example, consider a number 10. The number 10 has only two factors, 5 and 2,
If we apply 5 as an encryption factor; only 2 can be used as the decryption factor.
Nothing else- even 5 cannot do the decryption. Since 10 is a small number it can be
broken easily however for large numbers even years of computation cannot break the
scheme.
Suppose A wants to send a message to B without having to worry about its security. Then
A and B should each have a private key and a public key.
A should keep her private key secret.
B should keep her private key secret.
A should inform B about her public key.
B should inform A about her public key.
4
A Should Know
As Private key
As Public Key
Bs Private Key
Bs Public Key
Yes
Yes
No
Yes
B Should Know
No
Yes
Yes
Yes
Sender A
Plain
text
Receiver
B
Network
Encrypt with Bs
Public key
Cipher
text
Plain
text
Decrypt with
Bs private key
Similarly when B wants to send a message to A, exactly reverse steps take place. B
encrypts the message using As public key. Therefore, only A can decrypt the message
back to its original form, using her private key.
Symmetric
Asymmetric
Speed of en/decryption
Very Fast
Slower
Key agreement/Exchange
Big Problem
No Problem
Same as number
of participants
Use
Plain
Text
(PT)
Sender A
Symmetric key
encryption
algorithm
Cipher
Text
(CT)
Symmetric
Key(K1)
2. A now takes one time symmetric key of step 1(K1) and encrypts K1 with Bs
public key (K2) .The process is called as key wrapping of the symmetric key. As
shown in the figure the symmetric key K1 goes inside the box which is sealed by
Bs public key(K2)
Sender
A
Asymmetric Key
Encryption
algorithm
3. Now A puts the cipher text (CT) and the encrypted symmetric key together inside
a digital envelope.
Cipher
Text
(CT)
Digital Envelope
Sender
A
4. The sender (A) now send the digital envelope which contains the cipher text (CT)
and the one time symmetric key (K1) encrypted with Bs public key (K2) to B
using the one time symmetric key (K1) encrypted with Bs public key,(K2) to B
using the network.
Sender
A
Network
Receiver
B
5. B receives and opens the digital envelope. After B opens the envelope, it receives
two things: Cipher text (CT) and the one time session key (K1) encrypted using Bs
private key(K2).
Cipher
Text
(CT)
Receiver
B
Open
6. Now using the same asymmetric key algorithm as used by A and her private key (K3)
to decrypt the logical box that contains the symmetric key(K1) which was encrypted with
Bs public key(K2). Thus the output of the process is the one time symmetric key K1.
Receiver
B
ASymmetric Key
Decryption
algorithm
7. Finally B applies the same symmetric key algorithm as used by A and the symmetric
key K1 to decrypt the cipher text CT). This process yields the original plain text (PT).
Cipher
Text
(CT)
Receiver
B
Symmetric Key
Decryption
algorithm
Plain
Text
(PT)
10
11
12
Algorithm
RSA
Elliptic curve
Diffie-Hellman
DSS
Encryption/Decryption
yes
Yes
No
No
Digital Signature
Yes
Yes
No
Yes
Key exchange
yes
yes
Yes
No
13
14
15
16
CONCLUSIONS
Public Key Cryptography solves the problem of Key Distribution and verification of
Messages from the sender which exists in Symmetric Key Ciphers. But the most of the
algorithms (e.g. RSA) are slow as compared to DES and other Symmetric Ciphers. Thus
Public Key Cryptography is most suitable for transmission of smaller messages (e.g.
exchange of Session Keys).
A combination of Symmetric and Asymmetric Ciphers produces good results.
17
Date: 2005-09-15
4. http://www.eco.utexas.edu/faculty/Norman/BUS.FOR/course.mat/SSim/life.html
Date: 2005-09-16
18