public key cryptosystems symmetric cryptosystems 6/05/2014 | pag. 2

45

Upload: jonathan-jenkins

Post on 28-Mar-2015

222 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2
Page 2: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Public KeyCryptosystems

Symmetric Cryptosystems10/04/23 | pag. 2

Page 3: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

ElGamal Encryption:Based on Diffie Hellman Key Exchange

Cryptography 10/04/23 | pag. 3

Security of Diffie Hellman key exchange not based on integer factoring (like RSA and Rabin)but on the discrete logarithm problem (DLP).

Page 4: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Discrete Logarithm

Cryptography 10/04/23 | pag. 4

Page 5: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Diffie Hellman Key Exchange

Cryptography 10/04/23 | pag. 5

Page 6: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Diffie Hellman Key Exchange

Cryptography 10/04/23 | pag. 6

Choose order g at least 2^160 to prevent Pohlig Hellman.

Page 7: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

ElGamal Key Generation

Cryptography 10/04/23 | pag. 7

Page 8: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

ElGamal Key Encryption

Cryptography 10/04/23 | pag. 8

Page 9: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

ElGamal Key Decryption

Cryptography 10/04/23 | pag. 9

Page 10: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

ElGamal

Cryptography 10/04/23 | pag. 10

Page 11: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

ElGamal and Diffie Hellman

Cryptography 10/04/23 | pag. 11

Page 12: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Hash functions

Symmetric Cryptosystems10/04/23 | pag. 12

Page 13: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Hash Function

Cryptography 10/04/23 | pag. 13

Page 14: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Compression Function

Cryptography 10/04/23 | pag. 14

Page 15: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

One-way Function

Cryptography 10/04/23 | pag. 15

Page 16: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

One-way Function

Cryptography 10/04/23 | pag. 16

Page 17: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Collisions

Cryptography 10/04/23 | pag. 17

Page 18: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Collisions

Cryptography 10/04/23 | pag. 18

Page 19: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Collisions

Cryptography 10/04/23 | pag. 19

Page 20: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Compression function from encryption functions

Cryptography 10/04/23 | pag. 20

Page 21: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Compression function from encryption functions

Cryptography 10/04/23 | pag. 21

Page 22: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Hash functions fromcompression functions

Cryptography 10/04/23 | pag. 22

Page 23: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

SHA-1

Cryptography 10/04/23 | pag. 23

3. The original length of x is written as a 64-bit number.4. Append 3. to x from 2.

Page 24: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

SHA-1

Cryptography 10/04/23 | pag. 24

Page 25: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

SHA-1

Cryptography 10/04/23 | pag. 25

Page 26: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

SHA-1

Cryptography 10/04/23 | pag. 26

Page 27: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Message Authentication Codes

Cryptography 10/04/23 | pag. 27

Page 28: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Message Authentication Codes

Cryptography 10/04/23 | pag. 28

Page 29: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Message Authentication Codes

Cryptography 10/04/23 | pag. 29

Page 30: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Message Authentication Codes

Cryptography 10/04/23 | pag. 30

Page 31: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Digital Signatures & Identification

Symmetric Cryptosystems10/04/23 | pag. 31

Page 32: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Digital Signatures

Cryptography 10/04/23 | pag. 32

Page 33: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

RSA Signatures

Cryptography 10/04/23 | pag. 33

Key Generation:

Page 34: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

RSA Signatures

Cryptography 10/04/23 | pag. 34

Signature Generation:

Page 35: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

RSA Signatures

Cryptography 10/04/23 | pag. 35

Signature Verification:

Page 36: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

RSA Signatures

Cryptography 10/04/23 | pag. 36

Page 37: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

RSA Signatures with Hash Functions

Cryptography 10/04/23 | pag. 37

Page 38: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Other Public Key Digital Signatures

Cryptography 10/04/23 | pag. 38

Page 39: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

ElGamal Signatures

Cryptography 10/04/23 | pag. 39

Key Generation:

Page 40: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

ElGamal Signatures

Cryptography 10/04/23 | pag. 40

Signature Generation:

Page 41: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Cryptography 10/04/23 | pag. 41

Signature Verification:

ElGamal Signatures

Page 42: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

ElGamal Signatures

Cryptography 10/04/23 | pag. 42

Page 43: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Identification

Cryptography 10/04/23 | pag. 43

Page 44: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Identification

Cryptography 10/04/23 | pag. 44

One can use for example• Passwords • Challenge-Response identification based on

• symmetric encryption• public key encryption

• Zero-knowledge proofs

Page 45: PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2

Multimedia: crypto is not enough

Symmetric Cryptosystems10/04/23 | pag. 45