Cryptography Public-Key Cryptography
Uwe Egly
Vienna University of Technology Institute of Information Systems Knowledge-Based Systems Group
1 / 18
Cryptography Public-Key Cryptography Uwe Egly Vienna University of - - PowerPoint PPT Presentation
Cryptography Public-Key Cryptography Uwe Egly Vienna University of Technology Institute of Information Systems Knowledge-Based Systems Group 1 / 18 Overview Problem of symmetric procedures: Exchange of secret key Solution: public-key
1 / 18
2 / 18
p (the multiplicative group)
p = {α0, α1, α2, . . . , αp−2} = {1, α, α2, . . . , αp−2}
◮ A chooses x and computes X = αx mod p ◮ A sends X to B and keeps x secret ◮ B chooses y and computes Y = αy mod p ◮ B sends Y to A and keeps y secret ◮ A computes Y x and B computes X y
3 / 18
4 / 18
5 / 18
◮ Bijection g : Y → X ◮ For all y ∈ Y, define g(y) = x with x ∈ X and f(x) = y
6 / 18
7 / 18
◮ Let f(x) ≡ x3 mod n and suppose 3d ≡ 1 mod φ(n) ◮ d is the trapdoor information supporting an efficient
◮ Computing f is easy, but computing (from known n and f)
8 / 18
◮ If n ∈ N and m ∈ Z, such that gcd(m, n) = 1, then
9 / 18
10/ 18
11/ 18
12/ 18
13/ 18
14/ 18
15/ 18
◮ Encryption of the plaintext m by c = me mod n ◮ Public key is sufficient for encryption ◮ me mod n is computed efficiently with fast exponentiation
◮ Plaintexts are: {0, 1, . . . , 252} ◮ Encryption of m = 165: 1653 mod 253 = 110 16/ 18
17/ 18
18/ 18