Chapter6-Intro To Public Key-Part1
Chapter6-Intro To Public Key-Part1
Public-Key Cryptography
2/29
Content of this Chapter
3/29
Symmetric Cryptography revisited
Alice Bob
x eK(x) dK(y) x
y
K K
4/29
Symmetric Cryptography: Analogy
K K
Safe with a strong lock, only Alice and Bob have a copy of the key
• Alice encrypts locks message in the safe with her key
• Bob decrypts uses his copy of the key to open the safe
5/29
Symmetric Cryptography: Shortcomings
• Symmetric algorithms, e.g., AES or 3DES, are very secure, fast & widespread but:
n users in the network require keys, each user stores (n-1) keys
Example:
6 users (nodes)
65
15 keys (edges)
2
• Alice or Bob can cheat each other, because they have identical keys.
Example: Alice can claim that she never ordered a TV on-line from Bob (he could
have fabricated her order). To prevent this: „non-repudiation“
6/29
Content of this Chapter
7/29
Idea behind Asymmetric Cryptography
New Idea:
1976: first publication of such an algorithm by Whitfield Diffie and Martin Hellman,and
also by Ralph Merkle.
8/29
Asymmetric (Public-Key) Cryptography
During the key generation, a key pair Kpub and Kpr is computed
9/29
Asymmetric Cryptography: Analogy
(Kpub) (Kpr)
• Alice deposits (encrypts) a message with the - not secret - public key Kpub
• Only Bob has the - secret - private key Kpr to retrieve (decrypt) the message
10/29
Content of this Chapter
11/29
Basic Protocol for Public-Key Encryption
Alice Bob
KpubB (KpubB,KprB) = K
x
y=eKpubB(x) y
x=dKprB(y)
*) at least for now; public keys need to be authenticated, cf.Chptr. 13 of Understanding Cryptogr.
12/29
Security Mechanisms of Public-Key Cryptography
Here are main mechanisms that can be realized with asymmetric cryptography:
13/29
Basic Key Transport Protocol 1/2
1. Key exchange (for symmetric schemes) and digital signatures are performed
with (slow) asymmetric algorithms
2. Encryption of data is done using (fast) symmetric ciphers, e.g., block ciphers
or stream ciphers
14/29
Basic Key Transport Protocol 2/2
Example: Hybrid protocol with AES as the symmetric cipher
Alice Bob
(KpubB,KprB) = K
KpubB
Choose random
symmetric key K Key Exchange
(asymmetric)
y1 = eK (K)
pubB
y1
K = dK (y1)
prB
y2 (symmetric)
y2 = AESK (x) x = AES-1K (y2)
15/29
Content of this Chapter
16/29
How to build Public-Key Algorithms
Asymmetric schemes are based on a „one-way function“ f():
• Computing y = f(x) is computationally easy
• Computing x = f-1(y) is computationally infeasible
Note: The problems are considered mathematically hard, but no proof exists (so far).
17/29
Key Lengths and Security Levels
19/29
Lessons Learned
20/29