An Introduction to Cryptography

Similar documents
Public Key Cryptography

Chapter 8 Public-key Cryptography and Digital Signatures

CRYPTOGRAPHY AND NUMBER THEORY

Cryptography. P. Danziger. Transmit...Bob...

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

10 Modular Arithmetic and Cryptography

CIS 551 / TCOM 401 Computer and Network Security

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Discrete Mathematics GCD, LCM, RSA Algorithm

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Cryptography. pieces from work by Gordon Royle

Week 7 An Application to Cryptography

Encryption: The RSA Public Key Cipher

10 Public Key Cryptography : RSA

Number Theory & Modern Cryptography

Review. CS311H: Discrete Mathematics. Number Theory. Computing GCDs. Insight Behind Euclid s Algorithm. Using this Theorem. Euclidian Algorithm

Integers and Division

Math.3336: Discrete Mathematics. Mathematical Induction

Number theory (Chapter 4)

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL

Topics in Cryptography. Lecture 5: Basic Number Theory

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

ECE596C: Handout #11

RSA. Ramki Thurimella

The RSA public encryption scheme: How I learned to stop worrying and love buying stuff online

Clock Arithmetic and Euclid s Algorithm

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

Public-key Cryptography and elliptic curves

My brief introduction to cryptography

The RSA cryptosystem and primality tests

MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS. CIS 400/628 Spring 2005 Introduction to Cryptography

NUMBER THEORY FOR CRYPTOGRAPHY

Lecture 1: Introduction to Public key cryptography

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.

Simple Math: Cryptography

Number Theory. Modular Arithmetic

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS

Implementation Tutorial on RSA

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

Introduction to Modern Cryptography. Benny Chor

RSA Algorithm. Factoring, EulerPhi, Breaking RSA. Çetin Kaya Koç Spring / 14

THE RSA CRYPTOSYSTEM

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

Cryptography and Number Theory

NET 311D INFORMATION SECURITY

MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY

Introduction to Cryptography. Lecture 6

Introduction to Public-Key Cryptosystems:

Powers in Modular Arithmetic, and RSA Public Key Cryptography

MATH3302 Cryptography Problem Set 2

CS March 17, 2009

Addition. Ch1 - Algorithms with numbers. Multiplication. al-khwārizmī. al-khwārizmī. Division 53+35=88. Cost? (n number of bits) 13x11=143. Cost?

MATHEMATICS EXTENDED ESSAY

W3203 Discrete Mathema1cs. Number Theory. Spring 2015 Instructor: Ilia Vovsha. hcp://

ICS141: Discrete Mathematics for Computer Science I

Discrete mathematics I - Number theory

Number Theory A focused introduction

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

The Hill Cipher A Linear Algebra Perspective

Public-key Cryptography and elliptic curves

Notes. Number Theory: Applications. Notes. Number Theory: Applications. Notes. Hash Functions I

For your quiz in recitation this week, refer to these exercise generators:

CPSC 467b: Cryptography and Computer Security

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers

Ma/CS 6a Class 3: The RSA Algorithm

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Overview. Background / Context. CSC 580 Cryptography and Computer Security. March 21, 2017

Math 299 Supplement: Modular Arithmetic Nov 8, 2013

Cryptography. Course 1: Remainder: RSA. Jean-Sébastien Coron. September 21, Université du Luxembourg

Eindhoven University of Technology MASTER. Kleptography cryptography with backdoors. Antheunisse, M. Award date: 2015

CPSC 467b: Cryptography and Computer Security

Introduction to Cryptography. Lecture 8

Introduction. What is RSA. A Guide To RSA by Robert Yates. Topics

Elementary Number Theory MARUCO. Summer, 2018

CRYPTOGRAPHY AND LARGE PRIMES *

Introduction to Cryptography

ECE 646 Lecture 5. Mathematical Background: Modular Arithmetic

Cryptography and Secure Communication Protocols

Cryptography IV: Asymmetric Ciphers

CS483 Design and Analysis of Algorithms

Algorithmic Number Theory and Public-key Cryptography

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

Asymmetric Encryption

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above.

RSA RSA public key cryptosystem

Cryptosystem. Traditional Cryptosystems: The two parties agree on a secret (one to one) function f. To send a message M, thesendersendsthemessage

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Cryptography: A Fairy Tale for Mathematicians and Starring Mathematicians!

The security of RSA (part 1) The security of RSA (part 1)

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 11 April 2017, 8:30-12:30

A Readable Introduction to Real Mathematics

Classical Cryptography

Mathematical Foundations of Public-Key Cryptography

Chapter 4 Asymmetric Cryptography

Asymmetric Cryptography

Public-Key Encryption: ElGamal, RSA, Rabin

Transcription:

An Introduction to Cryptography Spotlight on Science J. Robert Buchanan Department of Mathematics Spring 2008

What is Cryptography? cryptography: study of methods for sending messages in a form that only be understood by the recipient. cryptanalysis: study of methods for defeating cryptography. cryptology: study of both cryptography and cryptanalysis.

Cryptology Throughout History Subject as old as recorded history.

Cryptology Throughout History Subject as old as recorded history. Julius Caesar used substitution ciphers for military and personal communication.

History (cont.) Enigma patented by Arthur Scherbius in 1918 (became the foundation of German and Japanese codes during WWII). Photo credit: JRB

History (cont.) Since WWII foundation of cryptology has been mathematics, particularly number theory. Photo credit: JRB

Terminology Plaintext: the un-encrypted, clearly readable form of a message. Ciphertext: the encrypted form of the plaintext, readable only with the key to the cipher. To tell them apart we will write plaintext in lowercase and ciphertext in UPPERCASE.

Modular Arithmetic Definition Two integers n and m are congruent modulo k (or equivalent modulo k) written symbolically as when k divides n m evenly. n m (mod k) Example 13 39 (mod 26) since 13 39 26 = 1.

Modular Arithmetic Definition Two integers n and m are congruent modulo k (or equivalent modulo k) written symbolically as when k divides n m evenly. n m (mod k) Example 13 39 (mod 26) since 13 39 26 = 1. What other integers are equivalent to 13 modulo 26?

Monoalphabetic Substitution Ciphers Definition A monoalphabetic substitution cipher substitutes each letter in the plaintext with an alternate letter to form the ciphertext.

Monoalphabetic Substitution Ciphers Definition A monoalphabetic substitution cipher substitutes each letter in the plaintext with an alternate letter to form the ciphertext. Question: how do we make the substitution?

Monoalphabetic Substitution Ciphers Definition A monoalphabetic substitution cipher substitutes each letter in the plaintext with an alternate letter to form the ciphertext. Question: how do we make the substitution? An answer: using modular arithmetic.

Positional Representation of the Alphabet Associate each letter with an integer giving its position in the standard alphabet. a b c d e f g h i j k l m 1 2 3 4 5 6 7 8 9 10 11 12 13 n o p q r s t u v w x y z 14 15 16 17 18 19 20 21 22 23 24 25 0 Take the letter at position i and replace it with the letter at position (i + 5) (mod 26). This is called an additive cipher with key 5.

Example a b c d e f g h i j k l m 1 2 3 4 5 6 7 8 9 10 11 12 13 6 7 8 9 10 11 12 13 14 15 16 17 18 F G H I J K L M N O P Q R n o p q r s t u v w x y z 14 15 16 17 18 19 20 21 22 23 24 25 0 19 20 21 22 23 24 25 0 1 2 3 4 5 S T U V W X Y Z A B C D E

Example a b c d e f g h i j k l m 1 2 3 4 5 6 7 8 9 10 11 12 13 6 7 8 9 10 11 12 13 14 15 16 17 18 F G H I J K L M N O P Q R n o p q r s t u v w x y z 14 15 16 17 18 19 20 21 22 23 24 25 0 19 20 21 22 23 24 25 0 1 2 3 4 5 S T U V W X Y Z A B C D E Now encrypt One if by land, two if by sea.

Plaintext to Ciphertext Plaintext: One if by land, two if by sea. o n e i f b y l a n d t w T S J N K G D Q F S I Y B o i f b y s e a T N K G D X J F Ciphertext: TSJ NK GD QFSI, YBT NK GD XJF.

Questions 1 Can you see any deficiencies in this way of encrypting the plaintext? 2 How could it be improved?

Answers Frequently occurring single letter words ( a and I ), common two-letter combinations ( an, in, if, etc.) called digraphs, and common three-letter combinations ( and, the, ion, etc.) called trigraphs can give clues to the cipher key. To help hide these clues, encrypted messages are often written in letter blocks of length five. Thus our encrypted message would be formatted as: TSJNK GDQFS IYBTN KGDXJ F

Decrypting the Ciphertext Suppose you receive a ciphertext, how do you read it?

Decrypting the Ciphertext Suppose you receive a ciphertext, how do you read it? If you have the key, you must apply its additive inverse cipher to the ciphertext to reveal the plaintext.

Decrypting the Ciphertext Suppose you receive a ciphertext, how do you read it? If you have the key, you must apply its additive inverse cipher to the ciphertext to reveal the plaintext. What is the additive inverse of 5 (mod 26)?

Decrypting the Ciphertext Suppose you receive a ciphertext, how do you read it? If you have the key, you must apply its additive inverse cipher to the ciphertext to reveal the plaintext. What is the additive inverse of 5 (mod 26)? (q + 5) (mod 26) 0 q + 5 26 = 1 q = 21

Decryption A B C D E F G H I J K L M 1 2 3 4 5 6 7 8 9 10 11 12 13 22 23 24 25 0 1 2 3 4 5 6 7 8 v w x y z a b c d e f g h N O P Q R S T U V W X Y Z 14 15 16 17 18 19 20 21 22 23 24 25 0 9 10 11 12 13 14 15 16 17 18 19 20 21 i j k l m n o p q r s t u

Example A B C D E F G H I J K L M v w x y z a b c d e f g h N O P Q R S T U V W X Y Z i j k l m n o p q r s t u Ciphertext H M J J X J G Z W L J W Plaintext

Example A B C D E F G H I J K L M v w x y z a b c d e f g h N O P Q R S T U V W X Y Z i j k l m n o p q r s t u Ciphertext H M J J X J G Z W L J W Plaintext c h e e s e b u r g e r

What if You Don t Have the Key? Questions: 1 If the letter a occurs 10 times in the plaintext and F is substituted for a in the ciphertext, how often will F occur in the ciphertext?

What if You Don t Have the Key? Questions: 1 If the letter a occurs 10 times in the plaintext and F is substituted for a in the ciphertext, how often will F occur in the ciphertext?

What if You Don t Have the Key? Questions: 1 If the letter a occurs 10 times in the plaintext and F is substituted for a in the ciphertext, how often will F occur in the ciphertext? 2 How often do various letters and letter combinations occur in English writing?

Single Letter Frequencies Letter Position Frequency Letter Position Frequency a 1 0.08167 n 14 0.06749 b 2 0.01492 o 15 0.07507 c 3 0.02782 p 16 0.01929 d 4 0.04253 q 17 0.00095 e 5 0.12702 r 18 0.05987 f 6 0.02228 s 19 0.06327 g 7 0.02015 t 20 0.09056 h 8 0.06094 u 21 0.02758 i 9 0.06966 v 22 0.00978 j 10 0.00153 w 23 0.0236 k 11 0.00772 x 24 0.0015 l 12 0.04025 y 25 0.01974 m 13 0.02406 z 26 0.00074

Highest to Lowest Frequencies Letter Position Frequency Letter Position Frequency e 5 0.12702 m 13 0.02406 t 20 0.09056 w 23 0.0236 a 1 0.08167 f 6 0.02228 o 15 0.07507 g 7 0.02015 i 9 0.06966 y 25 0.01974 n 14 0.06749 p 16 0.01929 s 19 0.06327 b 2 0.01492 h 8 0.06094 v 22 0.00978 r 18 0.05987 k 11 0.00772 d 4 0.04253 j 10 0.00153 l 12 0.04025 x 24 0.0015 c 3 0.02782 q 17 0.00095 u 21 0.02758 z 26 0.00074

Challenge Decrypt the following ciphertext: VUNIR RAWBL RQZRR GVATJ VGULB HGBQN LNAQG NYXVA TNOBH GPELC GBTEN CULVU BCRLB HYRNE ARQFB ZRGUV ATNOB HGGUR CBJRE NAQHG VYVGL BSZNG URZNG VPFNA QUBJV GCYNL FNAVZ CBEGN AGEBY RVABH EYVIR FJURA LBHQR PELCG GUVFZ RFFNT RCYRN FRFRA QNARZ NVYGB EBORE GQBGO HPUNA NANGZ VYYRE FIVYY RQBGR QH

Public Key Cryptography In the previous cryptographic systems, the key used to encipher the message must be kept hidden from the public and should be known only by the sender and recipient of the message. There are other cryptographic systems in which each party has a private key (which they keep secret) and a public key which they publish so that others may send them encrypted messages which only they can decrypt. The public key functions as the recipient s cryptographic telephone number.

Overview of Public Key Cryptography Suppose Alice wants to send Bob a message which only Bob will be able to read. 1 Alice looks up Bob s public key and enciphers the plaintext using his public key.

Overview of Public Key Cryptography Suppose Alice wants to send Bob a message which only Bob will be able to read. 1 Alice looks up Bob s public key and enciphers the plaintext using his public key. 2 Alice sends Bob the ciphertext (or even publishes it in the newspaper!).

Overview of Public Key Cryptography Suppose Alice wants to send Bob a message which only Bob will be able to read. 1 Alice looks up Bob s public key and enciphers the plaintext using his public key. 2 Alice sends Bob the ciphertext (or even publishes it in the newspaper!). 3 Bob decrypts the ciphertext using his private key.

RSA Public Key Cryptography One of the most popular public key cryptographic systems is known as RSA. It was developed by Adi Shamir Ronald Rivest Leonard Adelman.

A Little Number Theory Definition A prime number is a whole number p greater than 1 whose only divisors are p and 1. An integer which is not prime is called a composite number.

A Little Number Theory Definition A prime number is a whole number p greater than 1 whose only divisors are p and 1. An integer which is not prime is called a composite number. Definition If a and b are positive integers, the greatest common divisor of a and b is number denoted gcd(a, b) and is the positive integer d satisfying both of the following properties: d divides a and d divides b, if c is and integer and c divides a and c divides b, then c divides d.

A Little Number Theory Definition A prime number is a whole number p greater than 1 whose only divisors are p and 1. An integer which is not prime is called a composite number. Definition If a and b are positive integers, the greatest common divisor of a and b is number denoted gcd(a, b) and is the positive integer d satisfying both of the following properties: d divides a and d divides b, if c is and integer and c divides a and c divides b, then c divides d. Definition If gcd(a, b) = 1 we say that a and b are relatively prime.

Examples Example 4 = gcd(16, 60) 13 = gcd(13, 65)? = gcd(72, 81)

Euclidean Algorithm To find the gcd(a, b): 1 If b divides a evenly, gcd(a, b) = b. 2 If not, replace a by b and replace b by the remainder of a b and go back to step 1. A Java applet implementing the Euclidean Algorithm is also available.

Example Example Find gcd(105, 56) using the Euclidean Algorithm.

Example Example Find gcd(105, 56) using the Euclidean Algorithm. a b 105 56 56 49 49 7 gcd(105, 56) = 7

Linear Combinations Definition If a and b are integers, then an expression of the from ax + by where x and y are also integers is called a linear combination of a and b.

Linear Combinations Definition If a and b are integers, then an expression of the from ax + by where x and y are also integers is called a linear combination of a and b. Theorem If a and b are integers, then gcd(a, b) is the smallest positive integer which can be written as a linear combination of a and b.

Linear Combinations Definition If a and b are integers, then an expression of the from ax + by where x and y are also integers is called a linear combination of a and b. Theorem If a and b are integers, then gcd(a, b) is the smallest positive integer which can be written as a linear combination of a and b. Corollary If a and b are relatively prime then b has a multiplicative inverse modulo a.

Extended Euclidean Algorithm To find x and y such that use the tabular method. gcd(a, b) = ax + by Start the table like this: x y d 1 0 a 0 1 b???

Extended Euclidean Algorithm To find x and y such that gcd(a, b) = ax + by use the tabular method. Start the table like this: x y d 1 0 a 0 1 b??? To fill in the next row: 1 Find q and r such that a b = q + r b. 2 Multiply next to last row by q and subtract from third to last row. 3 Keep appending rows to the table until r = 0.

Example x y d 1 0 105 0 1 56 1 1 49 1 2 7 ( 1)(105) + (2)(56) = 7 A Java applet implementing the Extended Euclidean Algorithm is also available.

Finding a Multiplicative Inverse Verify that 23 and 29 are relatively prime and find the multiplicative inverse of 29 modulo 23. x y d 1 0 29 0 1 23 1 1 6 3 4 5 4 5 1 1 (4)(29) + ( 5)(23) (mod 23) 1 (4)(29) (mod 23) So 4 is the multiplicative inverse of 29 modulo 23.

More Number Theory Definition If N is the set of all positive integers then for each positive integer n define φ(n) to be the number of positive integers less than or equal to n which are relatively prime to n. Such a function φ is called the Euler phi function.

More Number Theory Definition If N is the set of all positive integers then for each positive integer n define φ(n) to be the number of positive integers less than or equal to n which are relatively prime to n. Such a function φ is called the Euler phi function. Example Do you notice a pattern? 80 60 40 20 n

Euler Phi Function n φ(n) n φ(n) 1 1 6 2 2 1 7 6 3 2 8 4 4 2 9 6 5 4 10 4

Euler Phi Function n φ(n) n φ(n) 1 1 6 2 2 1 7 6 3 2 8 4 4 2 9 6 5 4 10 4 Lemma If p is prime, then φ(p) = p 1.

Euler Phi Function n φ(n) n φ(n) 1 1 6 2 2 1 7 6 3 2 8 4 4 2 9 6 5 4 10 4 Lemma If p is prime, then φ(p) = p 1. Lemma If p and q are distinct primes, then φ(pq) = φ(p)φ(q) = (p 1)(q 1).

Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 1 let p = 1009 and q = 2003.

Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 2 forms the product n = pq, 1 let p = 1009 and q = 2003. 2 n = 2021027

Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 2 forms the product n = pq, 3 computes φ(n), 1 let p = 1009 and q = 2003. 2 n = 2021027 3 φ(2021027) = (1009 1)(2003 1) = 2018016

Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 2 forms the product n = pq, 3 computes φ(n), 4 selects integer e such that gcd(e, φ(n)) = 1, 1 let p = 1009 and q = 2003. 2 n = 2021027 3 φ(2021027) = (1009 1)(2003 1) = 2018016 4 e = 1003 (for example)

Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 2 forms the product n = pq, 3 computes φ(n), 4 selects integer e such that gcd(e, φ(n)) = 1, 5 finds the multiplicative inverse d of e (mod φ(n)), 1 let p = 1009 and q = 2003. 2 n = 2021027 3 φ(2021027) = (1009 1)(2003 1) = 2018016 4 e = 1003 (for example) 5 d = 1311811 (for this e)

Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 2 forms the product n = pq, 3 computes φ(n), 4 selects integer e such that gcd(e, φ(n)) = 1, 5 finds the multiplicative inverse d of e (mod φ(n)), 6 private key is d, public key is (e, n). 1 let p = 1009 and q = 2003. 2 n = 2021027 3 φ(2021027) = (1009 1)(2003 1) = 2018016 4 e = 1003 (for example) 5 d = 1311811 (for this e) 6 private key is 1311811, public key is (1003, 2021027).

Getting Public and Private Keys A public agency (call it the Key Utility ) 1 selects two large primes p and q, 2 forms the product n = pq, 3 computes φ(n), 4 selects integer e such that gcd(e, φ(n)) = 1, 5 finds the multiplicative inverse d of e (mod φ(n)), 6 private key is d, public key is (e, n). 1 let p = 1009 and q = 2003. 2 n = 2021027 Remark: only the Key Utility knows p and q. 3 φ(2021027) = (1009 1)(2003 1) = 2018016 4 e = 1003 (for example) 5 d = 1311811 (for this e) 6 private key is 1311811, public key is (1003, 2021027).

Exchanging Messages Suppose Alice and Bob have the following keys. Key Holder Public Key Private Key Alice (e a, n a ) = (1003, 2021027) d a = 1311811 Bob (e b, n b ) = (10007, 2021027) d b = 1197863

Exchanging Messages Suppose Alice and Bob have the following keys. Key Holder Public Key Private Key Alice (e a, n a ) = (1003, 2021027) d a = 1311811 Bob (e b, n b ) = (10007, 2021027) d b = 1197863 Private key d a is known only to Alice (and the Key Utility), while private key d b is known only to Bob (and the Key Utility).

Exchanging Messages Suppose Alice and Bob have the following keys. Key Holder Public Key Private Key Alice (e a, n a ) = (1003, 2021027) d a = 1311811 Bob (e b, n b ) = (10007, 2021027) d b = 1197863 Private key d a is known only to Alice (and the Key Utility), while private key d b is known only to Bob (and the Key Utility). If Alice wants to send the message hi to Bob, she looks up Bob s public key (e b, n b ) and must do two things.

Encrypting Using RSA 1 Alice converts hi to a number, m. Letter h i ASCII Code 104 105 m = 104105

Encrypting Using RSA 1 Alice converts hi to a number, m. Letter h i ASCII Code 104 105 m = 104105 2 Alice creates the ciphertext c using the formula c m e b (mod n b ) c = 104105 10007 (mod 2021027) c = 1086444 and sends it to Bob. Alice can try this Java applet if she needs help with modular exponentiation.

Encrypting Using RSA 1 Alice converts hi to a number, m. Letter h i ASCII Code 104 105 m = 104105 2 Alice creates the ciphertext c using the formula c m e b (mod n b ) c = 104105 10007 (mod 2021027) c = 1086444 and sends it to Bob. Alice can try this Java applet if she needs help with modular exponentiation. Remark: if m > n b Alice breaks the m into chunks smaller than n b.

Bob Decrypts the Ciphertext When Bob receives the ciphertext c he uses his private key d b and computes m c d b (mod n b ) m = 1086444 1197863 (mod 2021027) m = 104105.

Bob Decrypts the Ciphertext When Bob receives the ciphertext c he uses his private key d b and computes m c d b (mod n b ) m = 1086444 1197863 (mod 2021027) m = 104105. ASCII Code 104 105 Letter h i

Is RSA Secure? The security of RSA depends on the difficulty in factoring large numbers like n.

Is RSA Secure? The security of RSA depends on the difficulty in factoring large numbers like n. If n = pq where p and q are prime numbers with more than 500 digits each then n has more than 1000 digits.

Is RSA Secure? The security of RSA depends on the difficulty in factoring large numbers like n. If n = pq where p and q are prime numbers with more than 500 digits each then n has more than 1000 digits. It takes approximately 4.7 10 22 years to factor a 500-digit composite number using today s computers.

Is RSA Secure? The security of RSA depends on the difficulty in factoring large numbers like n. If n = pq where p and q are prime numbers with more than 500 digits each then n has more than 1000 digits. It takes approximately 4.7 10 22 years to factor a 500-digit composite number using today s computers. As computers get faster, we can keep increasing n.

Will We Run Out of Primes? Theorem There are infinitely many prime numbers.

Will We Run Out of Primes? Theorem There are infinitely many prime numbers. Proof. Suppose there are only finitely many primes p 1 < p 2 < < p k.

Will We Run Out of Primes? Theorem There are infinitely many prime numbers. Proof. Suppose there are only finitely many primes p 1 < p 2 < < p k. Form the number q = (p 1 )(p 2 ) (p k ) + 1 > p k. This number is either prime or composite.

Will We Run Out of Primes? Theorem There are infinitely many prime numbers. Proof. Suppose there are only finitely many primes p 1 < p 2 < < p k. Form the number q = (p 1 )(p 2 ) (p k ) + 1 > p k. This number is either prime or composite. 1 q (mod p i )

Will We Run Out of Primes? Theorem There are infinitely many prime numbers. Proof. Suppose there are only finitely many primes p 1 < p 2 < < p k. Form the number q = (p 1 )(p 2 ) (p k ) + 1 > p k. This number is either prime or composite. 1 q (mod p i ) No (known) prime evenly divides q.

Will We Run Out of Primes? Theorem There are infinitely many prime numbers. Proof. Suppose there are only finitely many primes p 1 < p 2 < < p k. Form the number q = (p 1 )(p 2 ) (p k ) + 1 > p k. This number is either prime or composite. 1 q (mod p i ) No (known) prime evenly divides q. Either q itself is prime or there is a prime larger than p k which divides q.

Where Can You Learn More? The modern language of cryptology is mathematics. Major in mathematics in college. Take a course in number theory. The National Security Agency employs and educates cryptologists. The National Cryptologic Museum has exhibits on ancient and modern cryptography.