Professional Documents
Culture Documents
Cryptography &
Rsa
Submitted toMr. Mohit Khandelwal
What is Cryptography?
What is Encryption /
Decryption
Encryption
Decryption
Private-Key Cryptography
Public-Key Cryptography
Public-Key Cryptography
public-key/two-key/asymmetric
cryptography involves the use of two keys:
is asymmetric because
Public-Key Cryptography
Public-Key Applications
note (N)=(p-1)(q-1)
RSA Example
1.
2.
Compute n = pq =1711=187
3.
Compute (n)=(p1)(q-1)=1610=160
4.
5.
6.
7.
10
encryption:
C = 887 mod 187 = 11
decryption:
M = 1123 mod 187 = 88
11
12
RSA Security
13
14
15
Ans.
The best size for an RSA modulus depends on
one's security needs. The larger the modulus,
the greater the security, but also the slower the
RSA operations. One should choose a modulus
length upon consideration, first, of one's
security needs, such as the value of the
protected data and how long it needs to be
protected, and, second, of how powerful one's
potential enemies are.
16
17
18
Correct Answers:
Chaining, in addition to secrecy, provides
integrity of data
19
sender is
20
Correct Answers:
A digital signature facilitates non-repudiation.
21
Q4 A certificate, in the RSA system, indicates to the
receiving party that the sender's public key used to
encrypt a message is in fact genuine.
1) True
2) False
22
Correct Answer:
True
A certificate indicates that the public key used to encrypt
a message is bona fide and issued by a Certification
Authority. This prevents encryption using someone else's
public key.
23
Q5 Two security threats that E-commerce must guard against are that
an eavesdropper may _____ Internet communication to obtain _____
information which may then be used by a third party to make _____
purchases. Secondly, a bogus site may be used to obtain _____
without providing any goods or services.
24
Correct Answer
Intercept; confidential; fraudulent; money
25
Q6 Asymmetric Encryption: Why can a message
encrypted with the Public Key only be decrypted with the
receiver's appropriate Private Key?
1.
Not true, the message can also be decrypted with the Public Key.
2. A so called "one way function with back door" is applied for the encryption.
3. The Public Key contains a special function which is used to encrypt the
message and which can only be reversed by the appropriate Private Key.
4. The encrypted message contains the function for decryption which identifies
the Private Key.
Correct Answer
26
27
Q7 Which is the largest disadvantage of the symmetric
Encryption?
Correct Answer
28
29
Q8 _________ ciphers can be categorized into two broad categories:
monoalphabetic and polyalphabetic.
A) Substitution
B) Transposition
C) either (a) or (b)
D) neither (a) nor (b
30
Correct Answer
B) Substitution
31
Q9 The _______ cipher is the simplest monoalphabetic cipher. It
uses modular arithmetic with a modulus of 26.
A)
B)
C)
D)
transposition
additive
shift
none of the above
32
Correct Answer
Shift
33
Q10 A(n) ______ is a keyless substitution cipher with N
inputs and M outputs that uses a formula to define the
relationship between the input stream and the output stream.
A)
B)
C)
D)
S-box
P-box
T-box
none of the above
Correct Answer
34
S-Box
35
Q11 A modern cipher is usually a complex _____cipher made
of a combination of different simple ciphers.
A)
B)
C)
D)
round
circle
square
none of the above
36
Correct Answer
Round
37
Q12 The DES function has _______ components.
A)
B)
C)
D)
2
3
4
5
38
Correct Answer
3
39
Q13 The _________ attack can endanger the security of the
Diffie-Hellman method if two parties are not authenticated to each
other.
A)
B)
C)
D)
man-in-the-middle
cipher text attack
plaintext attack
none of the above
40
Correct Answer
Man-in-the-middle
41
42
Correct Answer
RSA is based upon public key/private key concept. For
authentication one can encrypt the hash (MD5/SHA) of the data with
his private key. This is known as digital signature. And secrecy is
achieved by encrypting the data with the public key of the target
user. Generally we don't use RSA for encryption because of key size
(1024 bits). Rather a symmetric session key (128/256 bit) is
established between communicating parties and is used for
encryption.
43
44
Correct Answer
Yes we can. All the information will be stored in encrypted
form in memory. During fetching, it must be first decrypted
by operating system and then can be read.
45
46
Correct Answer
Ensuring that various cryptographic keys are provided by
their intended users, and only for their intended purposes,
temper resistant hardware is introduced.
An example temper resistant device is your "SMART CARD".
You have to physically possess the device and also have to
possess the PIN or the password to use it.
47
48
Correct Answer
Probabilistic encryption, developed by Goldwasser and
Micali [GM84], is a design approach for encryption where a
message is encrypted into one of many possible cipher texts
(not just a single cipher text as in deterministic encryption).
This is done in such a way that it is provably as hard to obtain
partial information about the message from the cipher text as
it is to solve some hard problem
49
50
Since the time Diffie and Hellman introduced the concept of digital signatures many
signature schemes have been proposed in cryptographic literature. These schemes
can be categorized as either conventional digital signature schemes (for example,
RSA and DSA) or special signature schemes depending on their security features. In
a conventional signature scheme (the original model defined by Diffie and
Hellman), we generally assume the following situation:
1) The signer knows the contents of the message that he has signed.
2) Anyone who knows the public key of the signer can verify the correctness of the
signature at any time without any consent or input from the signer. (Digital
signature schemes with this property are called self-authenticating signature
schemes.)
3) The security of the signature schemes is based on certain complexity-theoretic
assumptions.
51
Thank You