public key rsa encryption
play

Public Key (RSA) Encryption Bernd Schr oder logo1 Bernd Schr - PowerPoint PPT Presentation

Overview Needed Theorems RSA Encryption Public Key (RSA) Encryption Bernd Schr oder logo1 Bernd Schr oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption Overview Needed Theorems RSA


  1. Overview Needed Theorems RSA Encryption Caesarian Cipher 1. In Caesar’s times most people, including Romans, were illiterate. 2. But that did not make written communications safe. There were literate barbarians. 3. Caesarian cipher: Scramble the letters of the alphabet. For example, “hello” becomes “ygaap”. 4. To send the message you need to know how to encode the message: h → y , e → g , l → a , o → p . 5. To read the message you need to know how to decode it: y → h , g → e , a → l , p → o . 6. But for this one, as soon as you can encode, you can decode, too. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  2. Overview Needed Theorems RSA Encryption Caesarian Cipher 1. In Caesar’s times most people, including Romans, were illiterate. 2. But that did not make written communications safe. There were literate barbarians. 3. Caesarian cipher: Scramble the letters of the alphabet. For example, “hello” becomes “ygaap”. 4. To send the message you need to know how to encode the message: h → y , e → g , l → a , o → p . 5. To read the message you need to know how to decode it: y → h , g → e , a → l , p → o . 6. But for this one, as soon as you can encode, you can decode, too. 7. So sender and recipient must keep the code private, which is why this is called “private key encryption”. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  3. Overview Needed Theorems RSA Encryption Problems With Private Key Encryption logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  4. Overview Needed Theorems RSA Encryption Problems With Private Key Encryption 1. If one of the owners of the key reveals the key, all communications are compromised. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  5. Overview Needed Theorems RSA Encryption Problems With Private Key Encryption 1. If one of the owners of the key reveals the key, all communications are compromised. 2. One captured centurion jeopardizes legions. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  6. Overview Needed Theorems RSA Encryption Problems With Private Key Encryption 1. If one of the owners of the key reveals the key, all communications are compromised. 2. One captured centurion jeopardizes legions. (“Wind talkers”.) logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  7. Overview Needed Theorems RSA Encryption Problems With Private Key Encryption 1. If one of the owners of the key reveals the key, all communications are compromised. 2. One captured centurion jeopardizes legions. (“Wind talkers”.) 3. One captured operative jeopardizes a spy network. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  8. Overview Needed Theorems RSA Encryption Problems With Private Key Encryption 1. If one of the owners of the key reveals the key, all communications are compromised. 2. One captured centurion jeopardizes legions. (“Wind talkers”.) 3. One captured operative jeopardizes a spy network. 4. It does not matter how sophisticated the private key code is. From the encoding process, you can find the decoding process. (Enigma.) logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  9. Overview Needed Theorems RSA Encryption Problems With Private Key Encryption 1. If one of the owners of the key reveals the key, all communications are compromised. 2. One captured centurion jeopardizes legions. (“Wind talkers”.) 3. One captured operative jeopardizes a spy network. 4. It does not matter how sophisticated the private key code is. From the encoding process, you can find the decoding process. (Enigma.) 5. But somehow, even though the encoding mechanism for internet transactions is public, internet transactions are considered safe logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  10. Overview Needed Theorems RSA Encryption Problems With Private Key Encryption 1. If one of the owners of the key reveals the key, all communications are compromised. 2. One captured centurion jeopardizes legions. (“Wind talkers”.) 3. One captured operative jeopardizes a spy network. 4. It does not matter how sophisticated the private key code is. From the encoding process, you can find the decoding process. (Enigma.) 5. But somehow, even though the encoding mechanism for internet transactions is public, internet transactions are considered safe??? logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  11. Overview Needed Theorems RSA Encryption Public Key Encryption logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  12. Overview Needed Theorems RSA Encryption Public Key Encryption 1. The problems with private key encryption would be resolved if the decoding mechanism could not be (easily) obtained from the encoding mechanism. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  13. Overview Needed Theorems RSA Encryption Public Key Encryption 1. The problems with private key encryption would be resolved if the decoding mechanism could not be (easily) obtained from the encoding mechanism. 1.1 One captured centurion’s code would not reveal what the others are sending (did not happen). logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  14. Overview Needed Theorems RSA Encryption Public Key Encryption 1. The problems with private key encryption would be resolved if the decoding mechanism could not be (easily) obtained from the encoding mechanism. 1.1 One captured centurion’s code would not reveal what the others are sending (did not happen). 1.2 One captured operative would not be a problem (did not happen until late 1970s). logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  15. Overview Needed Theorems RSA Encryption Public Key Encryption 1. The problems with private key encryption would be resolved if the decoding mechanism could not be (easily) obtained from the encoding mechanism. 1.1 One captured centurion’s code would not reveal what the others are sending (did not happen). 1.2 One captured operative would not be a problem (did not happen until late 1970s). 1.3 Internet transmissions could be considered safe. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  16. Overview Needed Theorems RSA Encryption Public Key Encryption 1. The problems with private key encryption would be resolved if the decoding mechanism could not be (easily) obtained from the encoding mechanism. 1.1 One captured centurion’s code would not reveal what the others are sending (did not happen). 1.2 One captured operative would not be a problem (did not happen until late 1970s). 1.3 Internet transmissions could be considered safe. (We do consider them as safe as can be.) logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  17. Overview Needed Theorems RSA Encryption Public Key Encryption 1. The problems with private key encryption would be resolved if the decoding mechanism could not be (easily) obtained from the encoding mechanism. 1.1 One captured centurion’s code would not reveal what the others are sending (did not happen). 1.2 One captured operative would not be a problem (did not happen until late 1970s). 1.3 Internet transmissions could be considered safe. (We do consider them as safe as can be.) 2. But how do you get something like that? logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  18. Overview Needed Theorems RSA Encryption Public Key Encryption 1. The problems with private key encryption would be resolved if the decoding mechanism could not be (easily) obtained from the encoding mechanism. 1.1 One captured centurion’s code would not reveal what the others are sending (did not happen). 1.2 One captured operative would not be a problem (did not happen until late 1970s). 1.3 Internet transmissions could be considered safe. (We do consider them as safe as can be.) 2. But how do you get something like that? 3. Make breaking the code depend on being able to solve a hard problem, like the factorization of a large number. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  19. Overview Needed Theorems RSA Encryption Proposition. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  20. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  21. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  22. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  23. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  24. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  25. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  26. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  27. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  28. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . Now consider { xy : y = 1 ,..., m − 1 } . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  29. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . Now consider { xy : y = 1 ,..., m − 1 } . For any two distinct y 1 , y 2 ∈ { 1 ,..., m − 1 } with y 1 < y 2 we have that m ∤ ( y 2 − y 1 ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  30. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . Now consider { xy : y = 1 ,..., m − 1 } . For any two distinct y 1 , y 2 ∈ { 1 ,..., m − 1 } with y 1 < y 2 we have that m ∤ ( y 2 − y 1 ) . Hence, x ( y 2 − y 1 ) �≡ 0 ( mod m ) logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  31. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . Now consider { xy : y = 1 ,..., m − 1 } . For any two distinct y 1 , y 2 ∈ { 1 ,..., m − 1 } with y 1 < y 2 we have that m ∤ ( y 2 − y 1 ) . Hence, x ( y 2 − y 1 ) �≡ 0 ( mod m ) , which means that xy 1 �≡ xy 2 ( mod m ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  32. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . Now consider { xy : y = 1 ,..., m − 1 } . For any two distinct y 1 , y 2 ∈ { 1 ,..., m − 1 } with y 1 < y 2 we have that m ∤ ( y 2 − y 1 ) . Hence, x ( y 2 − y 1 ) �≡ 0 ( mod m ) , which means that � � xy 1 �≡ xy 2 ( mod m ) . But then A : = [ xy ] m : y = 1 ,..., m − 1 has m − 1 distinct elements logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  33. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . Now consider { xy : y = 1 ,..., m − 1 } . For any two distinct y 1 , y 2 ∈ { 1 ,..., m − 1 } with y 1 < y 2 we have that m ∤ ( y 2 − y 1 ) . Hence, x ( y 2 − y 1 ) �≡ 0 ( mod m ) , which means that � � xy 1 �≡ xy 2 ( mod m ) . But then A : = [ xy ] m : y = 1 ,..., m − 1 has m − 1 distinct elements and [ 0 ] m is not one of them. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  34. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . Now consider { xy : y = 1 ,..., m − 1 } . For any two distinct y 1 , y 2 ∈ { 1 ,..., m − 1 } with y 1 < y 2 we have that m ∤ ( y 2 − y 1 ) . Hence, x ( y 2 − y 1 ) �≡ 0 ( mod m ) , which means that � � xy 1 �≡ xy 2 ( mod m ) . But then A : = [ xy ] m : y = 1 ,..., m − 1 has m − 1 distinct elements and [ 0 ] m is not one of them. There are exactly m − 1 equivalence classes modulo m that are not [ 0 ] m . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  35. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . Now consider { xy : y = 1 ,..., m − 1 } . For any two distinct y 1 , y 2 ∈ { 1 ,..., m − 1 } with y 1 < y 2 we have that m ∤ ( y 2 − y 1 ) . Hence, x ( y 2 − y 1 ) �≡ 0 ( mod m ) , which means that � � xy 1 �≡ xy 2 ( mod m ) . But then A : = [ xy ] m : y = 1 ,..., m − 1 has m − 1 distinct elements and [ 0 ] m is not one of them. There are exactly m − 1 equivalence classes modulo m that are not � � [ 0 ] m . So A = [ z ] m : z = 1 ,..., m − 1 logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  36. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . Now consider { xy : y = 1 ,..., m − 1 } . For any two distinct y 1 , y 2 ∈ { 1 ,..., m − 1 } with y 1 < y 2 we have that m ∤ ( y 2 − y 1 ) . Hence, x ( y 2 − y 1 ) �≡ 0 ( mod m ) , which means that � � xy 1 �≡ xy 2 ( mod m ) . But then A : = [ xy ] m : y = 1 ,..., m − 1 has m − 1 distinct elements and [ 0 ] m is not one of them. There are exactly m − 1 equivalence classes modulo m that are not � � [ 0 ] m . So A = [ z ] m : z = 1 ,..., m − 1 and [ 1 ] m ∈ A . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  37. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . Now consider { xy : y = 1 ,..., m − 1 } . For any two distinct y 1 , y 2 ∈ { 1 ,..., m − 1 } with y 1 < y 2 we have that m ∤ ( y 2 − y 1 ) . Hence, x ( y 2 − y 1 ) �≡ 0 ( mod m ) , which means that � � xy 1 �≡ xy 2 ( mod m ) . But then A : = [ xy ] m : y = 1 ,..., m − 1 has m − 1 distinct elements and [ 0 ] m is not one of them. There are exactly m − 1 equivalence classes modulo m that are not � � [ 0 ] m . So A = [ z ] m : z = 1 ,..., m − 1 and [ 1 ] m ∈ A . Hence there is a y ∈ { 1 ,..., m − 1 } so that [ x ] m · [ y ] m = [ 1 ] m logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  38. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . Now consider { xy : y = 1 ,..., m − 1 } . For any two distinct y 1 , y 2 ∈ { 1 ,..., m − 1 } with y 1 < y 2 we have that m ∤ ( y 2 − y 1 ) . Hence, x ( y 2 − y 1 ) �≡ 0 ( mod m ) , which means that � � xy 1 �≡ xy 2 ( mod m ) . But then A : = [ xy ] m : y = 1 ,..., m − 1 has m − 1 distinct elements and [ 0 ] m is not one of them. There are exactly m − 1 equivalence classes modulo m that are not � � [ 0 ] m . So A = [ z ] m : z = 1 ,..., m − 1 and [ 1 ] m ∈ A . Hence there is a y ∈ { 1 ,..., m − 1 } so that [ x ] m · [ y ] m = [ 1 ] m , that is, so that xy ≡ 1 ( mod m ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  39. Overview Needed Theorems RSA Encryption Proposition. Let x , m ∈ N have no common factors. Then for all c ∈ N that are not divisible by m, we have that cx �≡ 0 ( mod m ) . Moreover, there is a y ∈ N so that xy ≡ 1 ( mod m ) . Proof. Let b ∈ N be so that bx ≡ 0 ( mod m ) . Then m | bx . Because x and m do not have any common factors, m | b . Hence, if c is not divisible by m , then cx �≡ 0 ( mod m ) . Now consider { xy : y = 1 ,..., m − 1 } . For any two distinct y 1 , y 2 ∈ { 1 ,..., m − 1 } with y 1 < y 2 we have that m ∤ ( y 2 − y 1 ) . Hence, x ( y 2 − y 1 ) �≡ 0 ( mod m ) , which means that � � xy 1 �≡ xy 2 ( mod m ) . But then A : = [ xy ] m : y = 1 ,..., m − 1 has m − 1 distinct elements and [ 0 ] m is not one of them. There are exactly m − 1 equivalence classes modulo m that are not � � [ 0 ] m . So A = [ z ] m : z = 1 ,..., m − 1 and [ 1 ] m ∈ A . Hence there is a y ∈ { 1 ,..., m − 1 } so that [ x ] m · [ y ] m = [ 1 ] m , that is, so that xy ≡ 1 ( mod m ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  40. Overview Needed Theorems RSA Encryption Theorem. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  41. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  42. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  43. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  44. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  45. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  46. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  47. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  48. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  49. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. Induction step. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  50. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. Induction step. ( a + 1 ) p logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  51. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. Induction step. p � p � a k 1 p − k ( a + 1 ) p ∑ = k k = 0 logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  52. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. Induction step. p − 1 p � p � � p � a k 1 p − k = 1 + a p + ( a + 1 ) p ∑ ∑ a k = k k k = 0 k = 1 logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  53. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. Induction step. p − 1 p � p � � p � a k 1 p − k = 1 + a p + ( a + 1 ) p ∑ ∑ a k = k k k = 0 k = 1 1 + a p ( mod p ) ≡ logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  54. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. Induction step. p − 1 p � p � � p � a k 1 p − k = 1 + a p + ( a + 1 ) p ∑ ∑ a k = k k k = 0 k = 1 1 + a p ( mod p ) ≡ 1 + a ( mod p ) ≡ logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  55. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. Induction step. p − 1 p � p � � p � a k 1 p − k = 1 + a p + ( a + 1 ) p ∑ ∑ a k = k k k = 0 k = 1 1 + a p ( mod p ) ≡ 1 + a ( mod p ) ≡ Now let a ∈ N be so that p ∤ a . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  56. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. Induction step. p − 1 p � p � � p � a k 1 p − k = 1 + a p + ( a + 1 ) p ∑ ∑ a k = k k k = 0 k = 1 1 + a p ( mod p ) ≡ 1 + a ( mod p ) ≡ Now let a ∈ N be so that p ∤ a . There is a b ∈ N with ab ≡ 1 ( mod p ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  57. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. Induction step. p − 1 p � p � � p � a k 1 p − k = 1 + a p + ( a + 1 ) p ∑ ∑ a k = k k k = 0 k = 1 1 + a p ( mod p ) ≡ 1 + a ( mod p ) ≡ Now let a ∈ N be so that p ∤ a . There is a b ∈ N with ab ≡ 1 ( mod p ) . Hence a p ≡ a ( mod p ) logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  58. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. Induction step. p − 1 p � p � � p � a k 1 p − k = 1 + a p + ( a + 1 ) p ∑ ∑ a k = k k k = 0 k = 1 1 + a p ( mod p ) ≡ 1 + a ( mod p ) ≡ Now let a ∈ N be so that p ∤ a . There is a b ∈ N with ab ≡ 1 ( mod p ) . Hence a p ≡ a ( mod p ) implies a p b ≡ ab ( mod p ) logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  59. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. Induction step. p − 1 p � p � � p � a k 1 p − k = 1 + a p + ( a + 1 ) p ∑ ∑ a k = k k k = 0 k = 1 1 + a p ( mod p ) ≡ 1 + a ( mod p ) ≡ Now let a ∈ N be so that p ∤ a . There is a b ∈ N with ab ≡ 1 ( mod p ) . Hence a p ≡ a ( mod p ) implies a p b ≡ ab ( mod p ) , which implies a p − 1 ≡ 1 ( mod p ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  60. Overview Needed Theorems RSA Encryption Theorem. Fermat’s Little Theorem . Let p be a prime number. Then for every a ∈ N we have that a p ≡ a ( mod p ) . Moreover, for every a ∈ N that is not divisible by p we have that a p − 1 ≡ 1 ( mod p ) . Proof. Let a ∈ N . We prove a p ≡ a ( mod p ) by induction on a . Base step a = 1: obvious. Induction step. p − 1 p � p � � p � a k 1 p − k = 1 + a p + ( a + 1 ) p ∑ ∑ a k = k k k = 0 k = 1 1 + a p ( mod p ) ≡ 1 + a ( mod p ) ≡ Now let a ∈ N be so that p ∤ a . There is a b ∈ N with ab ≡ 1 ( mod p ) . Hence a p ≡ a ( mod p ) implies a p b ≡ ab ( mod p ) , which implies a p − 1 ≡ 1 ( mod p ) . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  61. Overview Needed Theorems RSA Encryption RSA Encryption logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  62. Overview Needed Theorems RSA Encryption RSA Encryption 1. R. Rivest, A. Shamir, L. Adleman, (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21, 120-126 logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  63. Overview Needed Theorems RSA Encryption RSA Encryption 1. R. Rivest, A. Shamir, L. Adleman, (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21, 120-126 2. p , q : fixed, distinct prime numbers logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  64. Overview Needed Theorems RSA Encryption RSA Encryption 1. R. Rivest, A. Shamir, L. Adleman, (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21, 120-126 2. p , q : fixed, distinct prime numbers 3. n : = pq (must be hard to factor, so large, proprietary prime numbers are used) logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  65. Overview Needed Theorems RSA Encryption RSA Encryption 1. R. Rivest, A. Shamir, L. Adleman, (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21, 120-126 2. p , q : fixed, distinct prime numbers 3. n : = pq (must be hard to factor, so large, proprietary prime numbers are used) 4. ϕ ( n ) : = ( p − 1 )( q − 1 ) logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  66. Overview Needed Theorems RSA Encryption RSA Encryption 1. R. Rivest, A. Shamir, L. Adleman, (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21, 120-126 2. p , q : fixed, distinct prime numbers 3. n : = pq (must be hard to factor, so large, proprietary prime numbers are used) 4. ϕ ( n ) : = ( p − 1 )( q − 1 ) � � � � 5. e ∈ 2 ,..., ϕ ( n ) − 1 must be so that e , ϕ ( n ) = 1 logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  67. Overview Needed Theorems RSA Encryption RSA Encryption 1. R. Rivest, A. Shamir, L. Adleman, (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21, 120-126 2. p , q : fixed, distinct prime numbers 3. n : = pq (must be hard to factor, so large, proprietary prime numbers are used) 4. ϕ ( n ) : = ( p − 1 )( q − 1 ) � � � � 5. e ∈ 2 ,..., ϕ ( n ) − 1 must be so that e , ϕ ( n ) = 1 (there is an efficient algorithm to check e ) logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  68. Overview Needed Theorems RSA Encryption RSA Encryption 1. R. Rivest, A. Shamir, L. Adleman, (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21, 120-126 2. p , q : fixed, distinct prime numbers 3. n : = pq (must be hard to factor, so large, proprietary prime numbers are used) 4. ϕ ( n ) : = ( p − 1 )( q − 1 ) � � � � 5. e ∈ 2 ,..., ϕ ( n ) − 1 must be so that e , ϕ ( n ) = 1 (there is an efficient algorithm to check e ) � � 6. d is so that de ≡ 1 mod ϕ ( n ) , logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  69. Overview Needed Theorems RSA Encryption RSA Encryption 1. R. Rivest, A. Shamir, L. Adleman, (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21, 120-126 2. p , q : fixed, distinct prime numbers 3. n : = pq (must be hard to factor, so large, proprietary prime numbers are used) 4. ϕ ( n ) : = ( p − 1 )( q − 1 ) � � � � 5. e ∈ 2 ,..., ϕ ( n ) − 1 must be so that e , ϕ ( n ) = 1 (there is an efficient algorithm to check e ) � � 6. d is so that de ≡ 1 mod ϕ ( n ) , (there is an efficient algorithm to find d ) logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  70. Overview Needed Theorems RSA Encryption RSA Encryption 1. R. Rivest, A. Shamir, L. Adleman, (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21, 120-126 2. p , q : fixed, distinct prime numbers 3. n : = pq (must be hard to factor, so large, proprietary prime numbers are used) 4. ϕ ( n ) : = ( p − 1 )( q − 1 ) � � � � 5. e ∈ 2 ,..., ϕ ( n ) − 1 must be so that e , ϕ ( n ) = 1 (there is an efficient algorithm to check e ) � � 6. d is so that de ≡ 1 mod ϕ ( n ) , (there is an efficient algorithm to find d ) 7. ( n , e ) is the public key (disseminated) logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  71. Overview Needed Theorems RSA Encryption RSA Encryption 1. R. Rivest, A. Shamir, L. Adleman, (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21, 120-126 2. p , q : fixed, distinct prime numbers 3. n : = pq (must be hard to factor, so large, proprietary prime numbers are used) 4. ϕ ( n ) : = ( p − 1 )( q − 1 ) � � � � 5. e ∈ 2 ,..., ϕ ( n ) − 1 must be so that e , ϕ ( n ) = 1 (there is an efficient algorithm to check e ) � � 6. d is so that de ≡ 1 mod ϕ ( n ) , (there is an efficient algorithm to find d ) 7. ( n , e ) is the public key (disseminated) 8. d is the private key (kept secret) logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  72. Overview Needed Theorems RSA Encryption Sending Messages logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  73. Overview Needed Theorems RSA Encryption Sending Messages 1. The message is a large number m smaller than n (or a string of numbers). logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  74. Overview Needed Theorems RSA Encryption Sending Messages 1. The message is a large number m smaller than n (or a string of numbers). Group letters in blocks and encode them with numbers. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  75. Overview Needed Theorems RSA Encryption Sending Messages 1. The message is a large number m smaller than n (or a string of numbers). Group letters in blocks and encode them with numbers. Make sure a cryptoquote style approach is unlikely to break the code. logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  76. Overview Needed Theorems RSA Encryption Sending Messages 1. The message is a large number m smaller than n (or a string of numbers). Group letters in blocks and encode them with numbers. Make sure a cryptoquote style approach is unlikely to break the code. 2. Encrypted message: c : ≡ m e ( mod n ) (use the positive representative smaller than n for convenience). logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  77. Overview Needed Theorems RSA Encryption Sending Messages 1. The message is a large number m smaller than n (or a string of numbers). Group letters in blocks and encode them with numbers. Make sure a cryptoquote style approach is unlikely to break the code. 2. Encrypted message: c : ≡ m e ( mod n ) (use the positive representative smaller than n for convenience). � c d � 3. Decrypted message: Representative of n that is in { 0 ,..., n − 1 } . logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

  78. Overview Needed Theorems RSA Encryption Sending Messages 1. The message is a large number m smaller than n (or a string of numbers). Group letters in blocks and encode them with numbers. Make sure a cryptoquote style approach is unlikely to break the code. 2. Encrypted message: c : ≡ m e ( mod n ) (use the positive representative smaller than n for convenience). � c d � 3. Decrypted message: Representative of n that is in { 0 ,..., n − 1 } . Why does this work? logo1 Bernd Schr¨ oder Louisiana Tech University, College of Engineering and Science Public Key (RSA) Encryption

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend