Crypto CH 3 ECE
Crypto CH 3 ECE
Crypto CH 3 ECE
Network Security
Chapter- 3
Asymmetric (public) key
cryptography
Public Key
Cryptography
Every Egyptian received two names, which were
known respectively as the true name and the
good name, or the great name and the little
name; and while the good or little name was
made public, the true or great name appears to
have been carefully concealed.
—The Golden Bough, Sir James George Frazer
2
Private-Key Cryptography
From its earliest beginnings to modern times,
virtually all cryptographic systems have been
based on the elementary tools of substitution and
permutation, and can be classed as
private/secret/single key (symmetric) systems.
All classical, and modern block and stream
ciphers are of this form.
traditional private/secret/single key
cryptography uses one key
shared by both sender and receiver
if this key is disclosed communications are
compromised
also is symmetric, parties are equal
3
hence does not protect sender from receiver
forging a message & claiming is sent by sender
Why Public-Key
Cryptography?
• developed to address two key issues:
• key distribution – how to have secure
communications in general without
having to trust a KDC(key distribution
center) with your key
• digital signatures – how to verify a
message comes intact from the claimed
sender
• public invention due to Whitfield Diffie &
Martin Hellman at Stanford University in
1976 4
Public-Key Cryptography
• public-key/two-key/asymmetric cryptography
involves the use of two keys:
• a public-key, which may be known by anybody, and
can be used to encrypt messages, and verify
signatures
• a related private-key, known only to the recipient,
used to decrypt messages, and sign (create)
signatures
• It is computationally infeasible to determine the
decryption key given only knowledge of the
cryptographic algorithm and the encryption key.
• is asymmetric because
• those who encrypt messages or verify signatures
cannot decrypt messages or create signatures
Public-Key Cryptography
Public-Key Cryptography
7
Symmetric vs Public-Key
Public-Key Cryptosystems
• Y = E(PRa, X)
• X = D(PUa, Y) 10
• the entire encrypted message serves as a digital
signature and this provides Authentication
Public-Key Cryptosystems
15
packets are also encrypted.
• Link encryption provides protection against
packet sniffers and eavesdroppers.
• All of the information is encrypted, and the
packets must be decrypted at each hop so the
router, or other intermediate device, knows
where to send the packet next.
• Link encryption occurs at the data link and
physical layers
Confidentiality using Symmetric
Encryption
17
• Disadvantages
• The message is vulnerable at each switch
• Key distribution and management are more
complex because each hop device must receive a
key, and when the keys change, each must be
updated.
End-to-end encryption
• Advantages
• End-to-end encryption relieves the user of
concerns about the degree of security of links
and network
• End-to-end decryption provides a degree of
18
authentication
• Disadvantages
• Only the application layer data is encrypted
(headers are transmitted in clear text)
RSA
19
• uses large integers (eg. 1024 bits)