中国矿业大学:密码学_Public Key Cryptography

Public Key cryptography 曹天杰 Tianjie Cao ticao(cumt. edu. cn College of Computer science and echnology, China University of Mining and Technology Xuzhou, China 中国矿业大学计算机科学与技术学院 2003.5.30
1 曹天杰 Tianjie Cao tjcao@cumt.edu.cn College of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China 中国矿业大学计算机科学与技术学院 2003.5.30 Public Key Cryptography

Public Key Cryptography The Inventors Whitfield Diffie and martin hellman 1976 Ralph merkle 1978 Trap Door Alice Bob C fKn(P) f 1 (C B B Encryption with one-way function Computation of inverse function One-way functions extremely expensive are often based on welll Joe known hard problems f KR (c) 2
2 Public Key Cryptography • The Inventors – Whitfield Diffie and Martin Hellman 1976 – Ralph Merkle 1978 C = fKB (P) Encryption with one-way function P = f-1 KB (C,TB) Joe P = f-1 KB (C) Alice Bob KB Computation of inverse function extremely expensive Trap Door One-way functions are often based on wellknown hard problems

Public-Key applications can classify uses into 3 categories encryption/decryption(provide secrecy) digital signatures(provide authentication) key exchange(of session keys) some algorithms are suitable for all uses others are specific to one. only three algorithms work well for both encryption and digital signatures: rSA, ElGamal, and Rabin. All of these algorith ms are slow
3 Public-Key Applications • can classify uses into 3 categories: – encryption/decryption (provide secrecy) – digital signatures (provide authentication) – key exchange (of session keys) • some algorithms are suitable for all uses, others are specific to one. Only three algorithms work well for both encryption and digital signatures: RSA, ElGamal, and Rabin. All of these algorithms are slow

Security of Public-Key Algorithms Since a cryptanalyst has access to the public key, he can always choose any message to encrypt Eve can generate a database of all possible session keys encrypted with Bob's public key most public-key algorithms are particularl susceptible to a chosen-ciphertext attack In systems where the digital signature operation is the inverse of the encryption operation this attack is impossible to prevent unless different keys are used for encryption and signatures
4 Security of Public-Key Algorithms • Since a cryptanalyst has access to the public key, he can always choose any message to encrypt. • Eve can generate a database of all possible session keys encrypted with Bob’s public key. • most public-key algorithms are particularly susceptible to a chosen-ciphertext attack • In systems where the digital signature operation is the inverse of the encryption operation, this attack is impossible to prevent unless different keys are used for encryption and signatures

The Knapsack Scheme (Merkle and Hellman, 1978) Given X=(x1,x,,,Xn)and an integer s Finding b=(b, b, .,bn)where b;=0 or 1 such that s==∑b1x NP-Complete in general
5 The Knapsack Scheme (Merkle and Hellman, 1978) • Given X = (x1 , x2 ,…, xn ) and an integer s • Finding B = (b1 , b2 ,…, bn ) where bi = 0 or 1 such that s = = bi xi • NP-Complete in general

Super-Increasing Sequence X=(XI, x2,,n)is super-increasing if ∑ (2, 3, 6, 13, 27, 52)is super-increasing
6 Super-Increasing Sequence • X = (x1 , x2 ,…, xn ) is super-increasing if − = 1 1 i j i j x x • (2,3,6,13,27,52 ) is super-increasing

Greedy method Solve X=(2,36,13,27,52)ands=70 s>52? Yes zb1.s1=70-52=18 18>27?No=>b;=0 ·18>13?Yes=>bA=1.s2=18-13=5 5>6?No=>b2=0 5>3?Yes=>b2=1,S2=5-3=2 B=(12120,1,0,1)
7 Greedy Method • Solve X = (2,3,6,13,27,52 ) and s = 70 • s > 52? Yes ==> b6 = 1, s1 = 70 - 52 = 18 • 18 > 27? No ==> b5 = 0 • 18 > 13? Yes ==> b4 = 1, s2 = 18 - 13 = 5 • 5 > 6? No ==> b3 = 0 • 5> 3? Yes ==> b2 = 1, s2 = 5 - 3 = 2 • b1= 1 • B = (1,1,0,1,0,1)

Greedy method To solve for i=l down to 1 Ifs≥x s=s-X.b.=1 ·Els
8 Greedy Method • To solve: – for i =1 down to 1 • If sxi – s = s-xi , bi = 1 • Else – bi = 0

Knapsack Based Public-Key Key generation Choose a super-increasing sequence ⅹ=( Choose randomly two numbers y and such that GCD(N,Y)=l, and Y>>x
9 Knapsack Based Public-Key • Key Generation: – Choose a super-increasing sequence X = (x1 , x2 ,…, xn ) – Choose randomly two numbers Y and such that GCD(N,Y) = 1, and = n j j Y x 1

Knapsack Based Public-Key Public Key: K=(kI, k,.,kn)where k; =X, n modY Private Keys XN.Y
10 Knapsack Based Public-Key • Public Key: – K = (k1 , k2 ,…, kn ) where ki = xi N mod Y • Private Key: – X, N, Y
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 中国矿业大学:《密码学》PPT教学课件(曹天杰).ppt
- 中国矿业大学:密码学_Outline.ppt
- 中国矿业大学:密码学_NTHEORY2(Group Theory and Number Theory for Cryptology).ppt
- 中国矿业大学:密码学_LECTURE3.ppt
- 中国矿业大学:密码学_Hash Functions.ppt
- 中国矿业大学:密码学_Digital Signature.ppt
- 中国矿业大学:密码学_CRYPTO12(Number Theory).ppt
- 中国矿业大学:密码学_Block ciphers-L&D(Linear and Differential Cryptanalysis).ppt
- 中国矿业大学:密码学_Block ciphers-DES(DATA ENCRYPTION STANDARD).ppt
- 中国矿业大学:密码学_Block ciphers-AES(Advanced Encryption Standard).ppt
- 中国矿业大学:密码学_authentication protocol.ppt
- 湖北工业大学:《数据结构》第9章 排序(2/2).ppt
- 湖北工业大学:《数据结构》第9章 排序(1/2).ppt
- 湖北工业大学:《数据结构》第8章 图(2/2).ppt
- 湖北工业大学:《数据结构》第8章 图(1/2).ppt
- 湖北工业大学:《数据结构》第7章 树和二叉树(Tree & Binary Tree)(5/5).ppt
- 湖北工业大学:《数据结构》第7章 树和二叉树(Tree & Binary Tree)(4/5).ppt
- 湖北工业大学:《数据结构》第7章 树和二叉树(Tree & Binary Tree)(3/5).ppt
- 湖北工业大学:《数据结构》第7章 树和二叉树(Tree & Binary Tree)(2/5).ppt
- 湖北工业大学:《数据结构》第7章 树和二叉树(Tree & Binary Tree)(1/5).ppt
- 中国矿业大学:密码学_Public Key Cryptography.ppt
- 中国矿业大学:密码学_security protocols.ppt
- 《LaTeX2e1》参考书籍PDF电子版:附录A书信的编辑.pdf
- 《LaTeX2e1》参考书籍PDF电子版:附录B参数文献数据库的处理.pdf
- 《LaTeX2e1》参考书籍PDF电子版:附录CTX程序设计.pdf
- 《LaTeX2e1》参考书籍PDF电子版:附录D扩展X.pdf
- 《LaTeX2e1》参考书籍PDF电子版:附录E 计算机现代字体.pdf
- 《LaTeX2e1》参考书籍PDF电子版:第一章 简介.pdf
- 《LaTeX2e1》参考书籍PDF电子版:第二章 命令与环境.pdf
- 《LaTeX2e1》参考书籍PDF电子版:第三章 文档的布局与组织.pdf
- 《LaTeX2e1》参考书籍PDF电子版:第四章 显示文本.pdf
- 《LaTeX2e1》参考书籍PDF电子版:第五章 数学公式.pdf
- 《LaTeX2e1》参考书籍PDF电子版:第六章 图形.pdf
- 《LaTeX2e1》参考书籍PDF电子版:第七章 用户定制TEX.pdf
- 《LaTeX2e1》参考书籍PDF电子版:第八章 高级功能.pdf
- 《LaTeX2e1》参考书籍PDF电子版:第九章 错误消息.pdf
- MIS《管理信息系统概论》教材PPT教学课件(主编:张宽海,共六章).ppt
- 西南师范大学精品课程:《人工智能与机器翻译》课程教学资源(PPT课件)第1章 总论(杨宪泽).ppt
- 西南师范大学精品课程:《人工智能与机器翻译》课程教学资源(PPT课件)第2章 相关知识表示方法.ppt
- 西南师范大学精品课程:《人工智能与机器翻译》课程教学资源(PPT课件)第3章 产生式系统及其搜索方法.ppt