SlideShare a Scribd company logo
Information Security
Week 5
Public Key Encryption
• Encryption
When the two parties communicate to each other to transfer the
intelligible or sensible message, referred to as plaintext, is converted
into apparently random nonsense for security purpose referred to as
ciphertext.
The process of changing the plaintext into the ciphertext is referred to
as encryption.
The encryption process consists of an algorithm and a key. The key is
a value independent of the plaintext.
Once the ciphertext is produced, it may be transmitted.
Public Key Encryption
• The security of conventional encryption depends on the major two
factors:
• The Encryption algorithm
• Secrecy of the key
Public Key Encryption
• The algorithm will produce a different output depending on the specific key
being used at the time. Changing the key changes the output of the
algorithm.
Once the ciphertext is produced, it may be transmitted. Upon reception,
the ciphertext can be transformed back to the original plaintext by using a
decryption algorithm and the same key that was used for encryption.
Decryption:
The process of changing the ciphertext to the plaintext that process is
known as decryption.
Asymmetric is a form of Cryptosystem in which encryption and decryption
are performed using different keys-Public key (known to everyone) and
Private key (Secret key). This is known as Public Key Encryption.
Characteristics of Public Encryption key:
• Public key Encryption is important because it is infeasible to determine the
decryption key given only the knowledge of the cryptographic algorithm
and encryption key.
• Either of the two key (Public and Private key) can be used for encryption
with other key used for decryption.
• Due to Public key cryptosystem, public keys can be freely shared, allowing
users an easy and convenient method for encrypting content and verifying
digital signatures, and private keys can be kept secret, ensuring only the
owners of the private keys can decrypt content and create digital
signatures.
• The most widely used public-key cryptosystem is RSA (Rivest–Shamir–
Adleman). The difficulty of finding the prime factors of a composite
number is the backbone of RSA.
Weakness of the Public Key Encryption:
• Public key Encryption is vulnerable to Brute-force attack.
• This algorithm also fails when the user lost his private key, then the
Public key Encryption becomes the most vulnerable algorithm.
• Public Key Encryption also is weak towards man in the middle attack.
In this attack a third party can disrupt the public key communication
and then modify the public keys.
• If user private key used for certificate creation higher in the PKI(Public
Key Infrastructure) server hierarchy is compromised, or accidentally
disclosed, then a “man-in-the-middle attack” is also possible, making
any subordinate certificate wholly insecure. This is also the weakness
of Public key Encryption.
Applications:
• Confidentiality can be achieved using Public Key Encryption. In this
the Plain text is encrypted using receiver public key. This will ensures
that no one other than receiver private key can decrypt the cipher
text.
• Digital signature is for senders authentication purpose. In this sender
encrypt the plain text using his own private key. This step will make
sure the authentication of the sender because receiver can decrypt
the cipher text using senders pubic key only.
• This algorithm can use in both Key-management and securely
transmission of data.
Diffie-Hellman Algorithm
• The key exchange was invented by Whitfield Diffie and Martin
Hellmann in 1976 as the first practical method for establishing a
shared secret code over an open communications channel.
The general idea of the Diffie-Hellmann key exchange involves two
parties exchanging numbers and doing simple calculations in order to
get a common number which serves as the secret key.
Both parties may not know beforehand what the final secret number
is, but after some calculations, both are left with a value that only
they know about which they can use for various purposes like
identification and as a secret key for other cryptographic methods.
Diffie-Hellman Algorithm
• The Diffie-Hellman algorithm is being used to establish a shared secret that
can be used for secret
communications while exchanging data over a public network using the
elliptic curve to generate points and get the secret key using the
parameters.
• For the sake of simplicity and practical implementation of the algorithm,
we will consider only 4 variables one prime P and G (a primitive root of P)
and two private values a and b.
• P and G are both publicly available numbers. Users (say Alice and Bob) pick
private values a and b and they generate a key and exchange it publicly, the
opposite person received the key and from that generates a secret key
after which they have the same secret key to encrypt.
Diffie-Hellman Algorithm
Example
• Step 1: Alice and Bob get public numbers P = 23, G = 9
• Step 2: Alice selected a private key a = 4 and
• Bob selected a private key b = 3
• Step 3: Alice and Bob compute public values
• Alice: x =(9^4 mod 23) = (6561 mod 23) = 6
• Bob: y = (9^3 mod 23) = (729 mod 23) = 16
Example
• Step 4: Alice and Bob exchange public numbers
• Step 5: Alice receives public key y =16 and
• Bob receives public key x = 6
• Step 6: Alice and Bob compute symmetric keys
• Alice: ka = y^a mod p = 65536 mod 23 = 9
• Bob: kb = x^b mod p = 216 mod 23 = 9
• Step 7: 9 is the shared secret.
presentation
• Topics
• RSA Algorithm
• Chinese Remainder Theorem
• Needham Schroder, key Management Distribution, KDC,CRM
Submission date: 13-2-2020
Ad

Recommended

Encryption and Key Distribution Methods
Encryption and Key Distribution Methods
Gulcin Yildirim Jelinek
 
Pooguzhali
Pooguzhali
NIVEDHINIMANIVANNAN
 
Key distribution code.ppt
Key distribution code.ppt
Prabhat Kumar
 
cryptography
cryptography
Jai Nathwani
 
Public key Cryptography & RSA
Public key Cryptography & RSA
Amit Debnath
 
Unit 1
Unit 1
Trupti Kodinariya
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
key distribution in network security
key distribution in network security
babak danyal
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating system
Merlin Florrence
 
Cryptography by gaurav singh
Cryptography by gaurav singh
Gaurav Singh
 
Cryptography
Cryptography
Sandip kumar
 
Cryptography
Cryptography
Nishant Pahad
 
Cryptography
Cryptography
أحلام انصارى
 
Network security
Network security
ABHISHEK KUMAR
 
Cryptographic tools
Cryptographic tools
CAS
 
2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
20 security
20 security
abiy2004
 
Symmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
Encryption ppt
Encryption ppt
Anil Neupane
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
Amit Singh
 
Asymmetric key
Asymmetric key
khushbu chauhan
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
municsaa
 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
Gyanmanjari Institute Of Technology
 
Cryptography
Cryptography
Jens Patel
 
RSA Algoritmn
RSA Algoritmn
Dr. Kapil Gupta
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
Phan Minh
 
Cryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric Encryption
Abdul Manaf Vellakodath
 
Introduction to Cryptography CYB 303.pptx
Introduction to Cryptography CYB 303.pptx
Abolarinwa
 
Unit 3(1)
Unit 3(1)
Vinod Kumar Gorrepati
 

More Related Content

What's hot (20)

key distribution in network security
key distribution in network security
babak danyal
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating system
Merlin Florrence
 
Cryptography by gaurav singh
Cryptography by gaurav singh
Gaurav Singh
 
Cryptography
Cryptography
Sandip kumar
 
Cryptography
Cryptography
Nishant Pahad
 
Cryptography
Cryptography
أحلام انصارى
 
Network security
Network security
ABHISHEK KUMAR
 
Cryptographic tools
Cryptographic tools
CAS
 
2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
20 security
20 security
abiy2004
 
Symmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
Encryption ppt
Encryption ppt
Anil Neupane
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
Amit Singh
 
Asymmetric key
Asymmetric key
khushbu chauhan
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
municsaa
 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
Gyanmanjari Institute Of Technology
 
Cryptography
Cryptography
Jens Patel
 
RSA Algoritmn
RSA Algoritmn
Dr. Kapil Gupta
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
Phan Minh
 
Cryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric Encryption
Abdul Manaf Vellakodath
 
key distribution in network security
key distribution in network security
babak danyal
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating system
Merlin Florrence
 
Cryptography by gaurav singh
Cryptography by gaurav singh
Gaurav Singh
 
Cryptographic tools
Cryptographic tools
CAS
 
2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
20 security
20 security
abiy2004
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
Amit Singh
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
municsaa
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
Phan Minh
 
Cryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric Encryption
Abdul Manaf Vellakodath
 

Similar to information security(Public key encryption its characteristics and weakness, Diffie-Hellman Algorithm with example ) (20)

Introduction to Cryptography CYB 303.pptx
Introduction to Cryptography CYB 303.pptx
Abolarinwa
 
Unit 3(1)
Unit 3(1)
Vinod Kumar Gorrepati
 
CNS 3RD UNIT PPT.pptx
CNS 3RD UNIT PPT.pptx
pjeraids
 
Unit 3(1)
Unit 3(1)
Vinod Kumar Gorrepati
 
international security system data threats
international security system data threats
gacop74666
 
PRINCIPLES OF INFORMATION SYSTEM SECURITY
PRINCIPLES OF INFORMATION SYSTEM SECURITY
gacop74666
 
Ch9_Cryptokkkllllllllllllllllllllk6e.pptx
Ch9_Cryptokkkllllllllllllllllllllk6e.pptx
LaxmanBhandari22
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
daxesh chauhan
 
session6Mdjdjjskskskxkckjdjddddkfjjfjjjj
session6Mdjdjjskskskxkckjdjddddkfjjfjjjj
a7349061
 
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
KanchanPatil34
 
Rsa diffi-network security-itt
Rsa diffi-network security-itt
rameshvvv
 
UNIT-IV.pptx
UNIT-IV.pptx
SunnyAnchews
 
Ch9
Ch9
Mahender Kumar
 
Public key algorithm
Public key algorithm
Prateek Pandey
 
Public key cryptography and RSA
Public key cryptography and RSA
Shafaan Khaliq Bhatti
 
Module 2 of cryptography old scheme VTU ppt
Module 2 of cryptography old scheme VTU ppt
MonaReddy12
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
AsrithaKorupolu
 
Asymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
Editor Jacotech
 
Introduction to Cryptography CYB 303.pptx
Introduction to Cryptography CYB 303.pptx
Abolarinwa
 
CNS 3RD UNIT PPT.pptx
CNS 3RD UNIT PPT.pptx
pjeraids
 
international security system data threats
international security system data threats
gacop74666
 
PRINCIPLES OF INFORMATION SYSTEM SECURITY
PRINCIPLES OF INFORMATION SYSTEM SECURITY
gacop74666
 
Ch9_Cryptokkkllllllllllllllllllllk6e.pptx
Ch9_Cryptokkkllllllllllllllllllllk6e.pptx
LaxmanBhandari22
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
daxesh chauhan
 
session6Mdjdjjskskskxkckjdjddddkfjjfjjjj
session6Mdjdjjskskskxkckjdjddddkfjjfjjjj
a7349061
 
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
KanchanPatil34
 
Rsa diffi-network security-itt
Rsa diffi-network security-itt
rameshvvv
 
Module 2 of cryptography old scheme VTU ppt
Module 2 of cryptography old scheme VTU ppt
MonaReddy12
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
AsrithaKorupolu
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
Editor Jacotech
 
Ad

More from Zara Nawaz (11)

Translation Look Aside buffer
Translation Look Aside buffer
Zara Nawaz
 
information security (network security methods)
information security (network security methods)
Zara Nawaz
 
information security(Feistal Cipher)
information security(Feistal Cipher)
Zara Nawaz
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)
Zara Nawaz
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
Zara Nawaz
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
Zara Nawaz
 
Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
Information Security (Firewall)
Information Security (Firewall)
Zara Nawaz
 
Information security ist lecture
Information security ist lecture
Zara Nawaz
 
Lecture01 algorithm analysis
Lecture01 algorithm analysis
Zara Nawaz
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)
Zara Nawaz
 
Translation Look Aside buffer
Translation Look Aside buffer
Zara Nawaz
 
information security (network security methods)
information security (network security methods)
Zara Nawaz
 
information security(Feistal Cipher)
information security(Feistal Cipher)
Zara Nawaz
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)
Zara Nawaz
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
Zara Nawaz
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
Zara Nawaz
 
Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
Information Security (Firewall)
Information Security (Firewall)
Zara Nawaz
 
Information security ist lecture
Information security ist lecture
Zara Nawaz
 
Lecture01 algorithm analysis
Lecture01 algorithm analysis
Zara Nawaz
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)
Zara Nawaz
 
Ad

Recently uploaded (20)

THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
 
Q1_ENGLISH_PPT_WEEK 1 power point grade 3 Quarter 1 week 1
Q1_ENGLISH_PPT_WEEK 1 power point grade 3 Quarter 1 week 1
jutaydeonne
 
VCE Literature Section A Exam Response Guide
VCE Literature Section A Exam Response Guide
jpinnuck
 
Code Profiling in Odoo 18 - Odoo 18 Slides
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
IIT Kharagpur Quiz Club
 
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Rajdeep Bavaliya
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
 
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
jutaydeonne
 
List View Components in Odoo 18 - Odoo Slides
List View Components in Odoo 18 - Odoo Slides
Celine George
 
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
 
Pests of Maize: An comprehensive overview.pptx
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
 
How payment terms are configured in Odoo 18
How payment terms are configured in Odoo 18
Celine George
 
June 2025 Progress Update With Board Call_In process.pptx
June 2025 Progress Update With Board Call_In process.pptx
International Society of Service Innovation Professionals
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
SHERAZ AHMAD LONE
 
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Rajdeep Bavaliya
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
 
Q1_ENGLISH_PPT_WEEK 1 power point grade 3 Quarter 1 week 1
Q1_ENGLISH_PPT_WEEK 1 power point grade 3 Quarter 1 week 1
jutaydeonne
 
VCE Literature Section A Exam Response Guide
VCE Literature Section A Exam Response Guide
jpinnuck
 
Code Profiling in Odoo 18 - Odoo 18 Slides
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
IIT Kharagpur Quiz Club
 
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Rajdeep Bavaliya
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
 
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
jutaydeonne
 
List View Components in Odoo 18 - Odoo Slides
List View Components in Odoo 18 - Odoo Slides
Celine George
 
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
 
Pests of Maize: An comprehensive overview.pptx
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
 
How payment terms are configured in Odoo 18
How payment terms are configured in Odoo 18
Celine George
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
SHERAZ AHMAD LONE
 
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Rajdeep Bavaliya
 

information security(Public key encryption its characteristics and weakness, Diffie-Hellman Algorithm with example )

  • 2. Public Key Encryption • Encryption When the two parties communicate to each other to transfer the intelligible or sensible message, referred to as plaintext, is converted into apparently random nonsense for security purpose referred to as ciphertext. The process of changing the plaintext into the ciphertext is referred to as encryption. The encryption process consists of an algorithm and a key. The key is a value independent of the plaintext. Once the ciphertext is produced, it may be transmitted.
  • 3. Public Key Encryption • The security of conventional encryption depends on the major two factors: • The Encryption algorithm • Secrecy of the key
  • 4. Public Key Encryption • The algorithm will produce a different output depending on the specific key being used at the time. Changing the key changes the output of the algorithm. Once the ciphertext is produced, it may be transmitted. Upon reception, the ciphertext can be transformed back to the original plaintext by using a decryption algorithm and the same key that was used for encryption. Decryption: The process of changing the ciphertext to the plaintext that process is known as decryption. Asymmetric is a form of Cryptosystem in which encryption and decryption are performed using different keys-Public key (known to everyone) and Private key (Secret key). This is known as Public Key Encryption.
  • 5. Characteristics of Public Encryption key: • Public key Encryption is important because it is infeasible to determine the decryption key given only the knowledge of the cryptographic algorithm and encryption key. • Either of the two key (Public and Private key) can be used for encryption with other key used for decryption. • Due to Public key cryptosystem, public keys can be freely shared, allowing users an easy and convenient method for encrypting content and verifying digital signatures, and private keys can be kept secret, ensuring only the owners of the private keys can decrypt content and create digital signatures. • The most widely used public-key cryptosystem is RSA (Rivest–Shamir– Adleman). The difficulty of finding the prime factors of a composite number is the backbone of RSA.
  • 6. Weakness of the Public Key Encryption: • Public key Encryption is vulnerable to Brute-force attack. • This algorithm also fails when the user lost his private key, then the Public key Encryption becomes the most vulnerable algorithm. • Public Key Encryption also is weak towards man in the middle attack. In this attack a third party can disrupt the public key communication and then modify the public keys. • If user private key used for certificate creation higher in the PKI(Public Key Infrastructure) server hierarchy is compromised, or accidentally disclosed, then a “man-in-the-middle attack” is also possible, making any subordinate certificate wholly insecure. This is also the weakness of Public key Encryption.
  • 7. Applications: • Confidentiality can be achieved using Public Key Encryption. In this the Plain text is encrypted using receiver public key. This will ensures that no one other than receiver private key can decrypt the cipher text. • Digital signature is for senders authentication purpose. In this sender encrypt the plain text using his own private key. This step will make sure the authentication of the sender because receiver can decrypt the cipher text using senders pubic key only. • This algorithm can use in both Key-management and securely transmission of data.
  • 8. Diffie-Hellman Algorithm • The key exchange was invented by Whitfield Diffie and Martin Hellmann in 1976 as the first practical method for establishing a shared secret code over an open communications channel. The general idea of the Diffie-Hellmann key exchange involves two parties exchanging numbers and doing simple calculations in order to get a common number which serves as the secret key. Both parties may not know beforehand what the final secret number is, but after some calculations, both are left with a value that only they know about which they can use for various purposes like identification and as a secret key for other cryptographic methods.
  • 9. Diffie-Hellman Algorithm • The Diffie-Hellman algorithm is being used to establish a shared secret that can be used for secret communications while exchanging data over a public network using the elliptic curve to generate points and get the secret key using the parameters. • For the sake of simplicity and practical implementation of the algorithm, we will consider only 4 variables one prime P and G (a primitive root of P) and two private values a and b. • P and G are both publicly available numbers. Users (say Alice and Bob) pick private values a and b and they generate a key and exchange it publicly, the opposite person received the key and from that generates a secret key after which they have the same secret key to encrypt.
  • 11. Example • Step 1: Alice and Bob get public numbers P = 23, G = 9 • Step 2: Alice selected a private key a = 4 and • Bob selected a private key b = 3 • Step 3: Alice and Bob compute public values • Alice: x =(9^4 mod 23) = (6561 mod 23) = 6 • Bob: y = (9^3 mod 23) = (729 mod 23) = 16
  • 12. Example • Step 4: Alice and Bob exchange public numbers • Step 5: Alice receives public key y =16 and • Bob receives public key x = 6 • Step 6: Alice and Bob compute symmetric keys • Alice: ka = y^a mod p = 65536 mod 23 = 9 • Bob: kb = x^b mod p = 216 mod 23 = 9 • Step 7: 9 is the shared secret.
  • 13. presentation • Topics • RSA Algorithm • Chinese Remainder Theorem • Needham Schroder, key Management Distribution, KDC,CRM Submission date: 13-2-2020