BIS Unit 3
BIS Unit 3
Unit 3
Public Key
Cryptography
Prepared By
Chaitali J. Vaghela
Lecturer,
Department of Computer
Engineering
Government Polytechnic for
Girls,Ahmedabad.
Contents
❖ Public Key Cryptography
❖ Principles of Public Key Cryptography
❖ Applications of Public Key Cryptography
❖ RSA Algorithm
❖ Digital Signature
❖ Key Management
❖ Public Key Infrastructures
➢ Certificate Authority (CA)
➢ Registration Authority (RA)
➢ Certificate Repositories
➢ Digital Certificate
Public Key Cryptography
❖ In this type of techniques, a pair of keys is used to encrypt and decrypt
information.
❖ A public key is used for encryption and a private key is used for decryption.
❖ Public key and Private Key are different.
❖ The private key is kept by the receiver and the public key is announced to
the public.
❖ Even if the public key is known by everyone the intended receiver can only
decode it because he alone knows the private key.
❖ It is also known as Asymmetric Key Cryptography.
❖ Asymmetric Key Systems are complex and slower.
❖ Example: RSA, Diffie Hellman, DSA, ECDSA, XTR
Public Key Cryptography (Cont.)
Public Key Cryptography (Cont.)
❖ Asymmetric encryption uses a mathematically related pair of keys
for encryption and decryption.
❖ Asymmetric key cipher is a cryptographic scheme requiring two
different keys, one to lock or encrypt the plaintext, and one to
unlock or decrypt the ciphertext.
❖ Neither key will do both functions.
❖ Asymmetric encryption can be linked to a mailbox on the street.
➢ The mailbox is completely public—anyone who knows its location could go to it
and drop in a letter.
➢ However, only the owner of the mailbox has a key which allows him to access it
and read the letters.
Public Key Cryptography (Cont.)
❖ One key is published (public key) and the other is kept private (private
key).
❖ If the lock/encryption key is the one published, the system enables private
communication from the public to the unlocking key's owner.
❖ If the unlock/decryption key is the one published, then the system serves
as a signature verifier of documents locked by the owner of the private
key.
❖ Examples:
➢ RSA (Rivest–Shamir–Adleman)
➢ DSA(Digital Signature Algorithm)
➢ ECC (Elliptical Curve Cryptography)
➢ Diffie–Hellman
Public Key Cryptography (Cont.)
Message M Me mod n C
H 8 87 mod 33 02
E 5 57 mod 33 14
L 12 127 mod 33 12
L 12 127 mod 33 12
O 15 157 mod 33 27
➢ Cipher Text: 02 14 12 12 27
RSA Algorithm (cont.)
❖ Example 3 of RSA algorithm Decryption
➢ Private key is (d, n) => (3, 33)
➢ Cipher Text: 02 14 12 12 27
C Me mod n M Message
2 23 mod 33 8 H
14 143 mod 33 5 E
12 123 mod 33 12 L
12 123 mod 33 12 L
27 273 mod 33 15 O