Beruflich Dokumente
Kultur Dokumente
T y p e o f P a y m e not lu m e (% ) in M illio n s o f T r a n sV alu en(% ) in T rillio n s o f D o V ac tio s C h ec k s 5 9,4 0 0 .0 (9 6 .3% ) 6 8 .3 (1 2.5 % F e d wire 6 9 .7 (0.1 % ) 2 07 .6 (3 7 .9% C H IP S 4 2 .4 (0.1 % ) 2 62 .3 (4 7 .9% ACH 2 ,20 0.0 (3 .5% ) 9.3 (1 .7 % )
To tal
61 ,7 1 2.10
5 47 .5
Informational tokens
Ecommerce enablers
First Virtual Holdings, Inc. model
Digital currency
Role of encryption
Encryption
The need for encryption in ecommerce
Degree of risk vs. scope of risk Institutional versus individual impact Obvious need for ecurrencies.
Encryption
Each person publishes his or her public key, keeping the secret key secret. Let D be the set of permissible messages
Example: All finite length bit strings or strings of integers
The public key is required to define a one-to-one mapping from the set D to itself (without this requirements, decryption of the message is ambiguous).
Given a message M from Alice to Bob, Alice would encrypt this using Bobs public key to generate the so-called cyphertext C=PB(M). Note that C is thus a permutation of the set D.
The encryption is secure as long as the functions defined by the public key are one-way functions
Encryption
The RSA public key cryptosystem
Finite groups
Finite set of elements (integers) Operation that maps the set to itself (addition, multiplication) Example: Modular (clock) arithmetic
Subgroups
Any subset of a given group closed under the group operation
Z2 (i.e. even integers) is a subgroup (under addition) of Z
Subgroups can be generated by applying the operation to elements of the group Example with mod 12 arithmetic (operation is addition)
Encryption
1 x mod 12
2 x mod 12
Encryption
3 x mod 12
4 x mod 12
Encryption
5 x mod 12
6 x mod 12
Encryption
7 x mod 12
8 x mod 12
Encryption
9 x mod 12
10 x mod 12
Encryption
11 x mod 12
Encryption
A key result: Lagranges Theorem
If S is a subgroup of S, then the number of elements of S divides the number of elements of S. Examples:
Encryption
Solving modular equations
RSA uses modular groups to transform messages (or blocks of numbers representing components of messages) to encrypted form. Ability to compute the inverse of a modular transformation allows decryption. Suppose x is a message, and our cyphertext is y=ax mod n for some numbers a and n. To recover x from y, then, we need to be able to find a number b such that x=by mod n. When such a number exists, it is called the mod n inverse of a. A key result: For any n>1, if a and n are relatively prime, then the equation ax=b mod n has a unique solution modulo n.
Encryption
In the RSA system, the actual encryption is done using exponentiation. A key result:
Encryption
RSA technicals
Select 2 prime numbers p and q Let n=pq Select a small odd integer e relatively prime to (p-1)(q-1) Compute the modular inverse d of e, i.e. the solution to the equation
de = 1 mod ( p 1)( q 1)
Publish the pair P=(e,n) as the public key Keep secret the pair S=(d,n) as the secret key
Encryption
For this specification of the RSA system, the message domain is Zn Encryption of a message M in Zn is done by defining
C = P ( M ) = M e mod n
Decrypting the message is done by computing
S ( C ) = C d mod n
Encryption
Let us verify that the RSA scheme does in fact define an invertible mapping of the message.
For any M Z n
P ( S ( M ) ) = S ( P ( M ) ) = M ed mod n. Since d and e are modular inverses of each other ed = 1 + k ( p 1)( q 1) for some integer k . Hence, M ed mod n = MM k ( p 1)( q1) mod n = MM ( p 1) M k ( q 1) mod n
( q 1) k
Encryption
Note that the security of the encryption system rests on the fact that to compute the modular inverse of e, you need to know the number (p-1)(q-1), which requires knowledge of the factors p and q. Getting the factors p and q, in turn, requires being able to factor the large number n=pq. This is a computationally difficult problem. Some examples: http://econ.gsia.cmu.edu/spear/rsa3.asp
Encryption
Applications
Direct message encryption Digital Signatures
Use secret key to encrypt signature: S(Name) Appended signature to message and send to recipient Recipient decrypts signature using public key: P(S(Name)=Name
Policy Issues
Privacy and verification Transaction costs and micro-payments Monetary effects
Domestic money supply control and economic policy levers International currency exchanges and exchange rate stability
Effects on government
Seniorage Legal issues