Fundamentals of Computer Security
Spring 2015
Radu Sion
Fundamentals of Computer Security Spring 2015 Radu Sion Key - - PowerPoint PPT Presentation
Fundamentals of Computer Security Spring 2015 Radu Sion Key Exchange Public Key Cryptography Public Key Cryptography Computer Security Fundamentals Fundamentals RSA February 10, 2015 2 Key Exchange Computer Security Fundamentals
Radu Sion
2 February 10, 2015 Computer Security Fundamentals
3 February 10, 2015 Computer Security Fundamentals
4 February 10, 2015 Computer Security Fundamentals
5 February 10, 2015 Computer Security Fundamentals
6 February 10, 2015 Computer Security Fundamentals
– Known to all participants
Kshared = KBob
kAlice mod p
Kshared = KAlice
kBob mod p
– It can be shown these keys are equal
7 February 10, 2015 Computer Security Fundamentals
8 February 10, 2015 Computer Security Fundamentals
Mallory Alice Bob Eve
publicB privateB publicA privateA EpublicB(M)
2
M=DprivateB(EpublicB(M))
3
no problemo
“here’s my key”: publicB
1
M=DprivateB(EpublicB(M))
How does Alice know whom it talks to ? What if Mallory simply replaces the public key with something else (e.g., own) !
9 February 10, 2015 Computer Security Fundamentals
10 February 10, 2015 Computer Security Fundamentals
Mallory Alice Bob Eve
publicB privateB publicA privateA EpublicB(M)
2
M=DprivateB(EpublicB(M))
3
no problemo
as much …
what is Bob’s public key ?
1
Trent
11 February 10, 2015 Computer Security Fundamentals
12 February 10, 2015 Computer Security Fundamentals
13 February 10, 2015 Computer Security Fundamentals
14 February 10, 2015 Computer Security Fundamentals
15 February 10, 2015 Computer Security Fundamentals
16 February 10, 2015 Computer Security Fundamentals
n=pq
1
e=17
2
d = e-1 mod (p-1)(q-1)
Extended Euclidean
3
message m<n
RSA Encryption
c=me mod n
4
RSA Decryption
m=cd mod n
5
Alice Bob
17 February 10, 2015 Computer Security Fundamentals
18 February 10, 2015 Computer Security Fundamentals
19 February 10, 2015 Computer Security Fundamentals
20 February 10, 2015 Computer Security Fundamentals
later, same message m same modulus n
Alice Bob
c1=me1 mod n
1
c2=me2 mod n
1
Modified Extended Euclidean
find r,s: re1 + se2 = 1
2
Extended Euclidean
c2
3
m = c1
r * (c2
4
Eve
public network
21 February 10, 2015 Computer Security Fundamentals
– If I get e(m), I can check if m=m’ – Solution: random pad – we discuss semantic security later
– Select large primes – Find e relatively prime to (p-1)(q-1)
– Also, given a signatures for m1, m2; can compute signature for (some) other messages
22 February 10, 2015 Computer Security Fundamentals
23 February 10, 2015 Computer Security Fundamentals