CSE 5/7353 – February 1 st 2006

13
CSE 5/7353 – February 1 st 2006 Public Key Cryptography

description

CSE 5/7353 – February 1 st 2006. Public Key Cryptography. Keys. Public Key Private Key. Uses. Y = E (Pub , X) X = D(PRb, Y). Uses. Y = E (PRa , X) X = D(PUa, Y). Uses. Z = E (PRb, E((PRa , X)) X = D(PUa, D(PRa, Y). Algorithms. RSA Elliptic Curve Diffie-Hellman DSS. - PowerPoint PPT Presentation

Transcript of CSE 5/7353 – February 1 st 2006

Page 1: CSE 5/7353 – February 1 st  2006

CSE 5/7353 – February 1st 2006

Public Key Cryptography

Page 2: CSE 5/7353 – February 1 st  2006

Keys

• Public Key

• Private Key

Page 3: CSE 5/7353 – February 1 st  2006

Uses

• Y = E (Pub , X)

• X = D(PRb, Y)

Page 4: CSE 5/7353 – February 1 st  2006

Uses

• Y = E (PRa , X)

• X = D(PUa, Y)

Page 5: CSE 5/7353 – February 1 st  2006

Uses

• Z = E (PRb, E((PRa , X))

• X = D(PUa, D(PRa, Y)

Page 6: CSE 5/7353 – February 1 st  2006

Algorithms

• RSA

• Elliptic Curve

• Diffie-Hellman

• DSS

Page 7: CSE 5/7353 – February 1 st  2006

Diffie-Hellman

Page 8: CSE 5/7353 – February 1 st  2006

Diffie-Hellman Example

Page 9: CSE 5/7353 – February 1 st  2006

Hashes

• Calculate hash code

• Encrypt Hash Code for Authentication.

• Message Example

Page 10: CSE 5/7353 – February 1 st  2006

Birthday Attack

Page 11: CSE 5/7353 – February 1 st  2006

Birthday Attack Math

Page 12: CSE 5/7353 – February 1 st  2006

Block Chaining

Page 13: CSE 5/7353 – February 1 st  2006

Meet in the Middle