Beruflich Dokumente
Kultur Dokumente
Illustration :: Encryption
1
Key Usage for Encryption Illustration :: Authentication
A B
Public key Private key
of B of B
EA DA
KUB KRB
Ciphertext
Plaintext Plaintext
C
P P
• Three categories:
a) Encryption/decryption:
The sender encrypts a message with the
Private key recipient’s public key.
Public key
of A b) Digital signature / authentication:
KRA of A The sender signs a message with its
KUA private key.
c) Key exchange:
Two sides cooperate to exhange a session
key.
Requirements
2
The RSA Public Key Algorithm RSA : Key Generation
Example
3
The Security of RSA
Choose x Choose y
X=gx mod n
• Requires no prior communication
between A and B.
• Security depends on difficulty of
computing x, given X = gx mod n .
A Y=gy mod n
B • Choices for g and n are critical.
¾Both n and (n-1)/2 should be prime.
¾n should be large.
• Susceptible to intruder-in-the-middle
Compute Yx mod n Compute Xy mod n
(man-in-the-middle) attack.
¾Active intruder.
4
Man-in-the-Middle Attack A Comparison
Intruder
• Symmetric encryption/decryption is
much faster than asymmetric
encryption/ decryption:
RSA: kilobits/second
DES: megabits/second
⇓
A B DES is about 100 times faster than RSA
• Key size:
¾RSA: selected by user
¾DES: 56 bits
Various Approaches
5
SOLUTIONS TO QUIZ
QUESTIONS ON
LECTURE 32
1. What is the main difference between 3. What is the main difference between
passive and active attacks? substitution cipher and transposition
In passive attack, the opponent passively cipher?
listens to passing packets. In active
In substitution cipher, each letter or group
attacks, the opponent makes some
of letters of the plaintext are replaced by
changes to the packets.
some other letter or group of letters.
2. 10 parties exchange messages securely
In transposition cipher, letters of the
using DES. How many distinct key values
plaintext are permuted in some form.
are required?
4. For breaking transposition ciphers, what 6. What is the key length of DES? How
are the initial guesses that needs to be does triple DES helps to increase the
made? effective key length?
6
Quiz Questions on Lecture 33