SlideShare a Scribd company logo
DeepDiveintoRSA
Astory
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited. 2
Bjarne Stroustrup Linus Torvalds
Dennis Ritchie
Ropeproblem
3
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Extend both ropes by 1 foot
Ropeproblem
4
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
C1 = 2π R1
C2 = 2π R2
(R2-R1) = (C2-C1)/2π
= 1 foot/2π
Ropeproblem
5
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
RSA– Keygeneration
◦ Choose two primes p and q of approximately equal size so that their product n = pq is
of the required length (1024, 2048…).
◦ Compute φ(n) = (p-1)(q-1).
◦ Choose a public exponent e, 1 < e < φ(n), which is coprime to φ(n), that is, gcd(e,
φ(n))=1. coprime {4, 9}, {8, 21}
◦ Compute a private exponent d that satisfies the congruence ed ≡ 1 (mod φ(n)).
ed = 1+φ(n)*k
◦ Make the public key (n, e) available to others. Keep the private values d, p, q, and
φ(n) secret.
6
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
RSA– Encryption
◦ Encryption c = me mod n, 1 < m < n-1
◦ Decryption m = cd mod n
◦ m = RSAPUBLIC(RSAPRIVATE(m))
7
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
RSA– Period
8
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
p=3, q=5, n=15, φ(n)=(p-1)(q-1)=8, m=2
n 1 2 3 4 5 6 7 8 9 10 11 12
2n 2 4 8 16 32 64 128 256 512 1024 2048 4096
2n mod 15 2 4 8 2 4 8 2 4 8
p=3, q=7, n=21, φ(n)=(p-1)(q-1)=12, m=2
n 1 2 3 4 5 6 7 8 9 10 11 12
2n 2 4 8 16 32 64 128 256 512 1024 2048 4096
2n mod 21 2 4 8 16 11 2 4 8 16 11
φ
φλ
λ
RSA -φ(n)
◦ φ(n) - how many positive integers less than n and coprime to n.
E.g. φ(12)=4 as the 4 integers {1,5,7,11}
◦ For any prime p, φ(p)=p−1, since all numbers less than p are coprime to it.
E.g. φ(7)=6 as the 6 integers {1,2,3,4,5,6}
◦ If m and n are coprime, then φ(m)φ(n)=φ(mn).
Now we understand what is ‘Compute φ(n) = (p-1)(q-1)’
9
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
RSA- Pattern
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
p=7, φ(p)=6, m=2
i 1 2 3 4 5 6
i*m 2 4 6 8 10 12
i*m mod p 2 4 6 3 5
p=12, φ(p)=4, m=5 (m coprime to p)
i 1 5 7 11
i*m 5 25 35 55
i*m mod p 5 1 11
RSA- Fermat’sLittleTheorem
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
p=7, φ(p)=6, m=2
i 1 2 3 4 5 6
i*m 2 4 6 8 10 12
i*m mod p 2 4 6 3 5
m*2m*3m…*(p-1)m ≡ 1*2*3…*(p-1)(mod p) =>
(mp-1)*1*2*3…*(p-1) ≡ 1*2*3…*(p-1)(mod p) =>
mp-1 ≡ 1 (mod p) => mφ(n) ≡ 1 (mod p)
RSA -Proof
◦ Encryption c = me mod n
◦ Decryption m = cd mod n
◦ ed = 1+kφ(n)
◦ cd ≡ med
≡ m1+kφ(n)
≡ m.(mφ(n))k
≡ m.1k ,since mφ(n) ≡ 1 (mod n)
≡ m (mod n).
12
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
RSA -Breaking
◦ me mod n with small e, m is not secure (if me < n)
◦ Today almost in all public keys (e,n), e=3, 17 and 65537, why?
c1 = m3 mod n1, c2 = m3 mod n2, c3 = m3 mod n3
m can be revealed by Chinese remainder theorem
c1* c2* c3 = m3 mod (n1* n2* n3) = m3 (if m3 < n1* n2* n3 )
◦ RSA without padding is vulnerable
13
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
RSA -Breaking
◦ Brute force - Check all odd numbers starting below the square root of n.
◦ Euclidean Algorithm – if you can find two n1 and n2 have a common factor. In the real
world, about two out of 1000 secure web sites RSA moduli do have common factors,
and thus are susceptible to cracking (http://eprint.iacr.org/2012/064.pdf)
◦ Shor's algorithm -Key is to find ‘Period’ which requires a quantum computer
◦ https://en.wikipedia.org/wiki/RSA_Factoring_Challenge
14
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
RSA -Quantumsuperposition
15
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
RSA -Quantumentanglement
16
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
RSA -Quantumcomputer
◦ Qubits – Superposition and Entanglement (n qubits can represent 2n state)
◦ Qubits – State is described in probability amplitude (0.5, 0.866…), (0.5, -0.866…)
17
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Bloch sphere
RSA -Shor'salgorithm
18
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.
Quantum Fourier Transform analogy
Questions?
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited. 19
Copyright ©2017 Genesys.
2001 Junipero Serra Blvd., Daly City, CA 94014
All Rights reserved. Genesys and the Genesys logo are registered trademarks of Genesys. All other company names and logos may be registered
trademarks or trademarks of their respective companies.
Thank You
Visit www.genesys.com or call +1.855.821.0932 for more information
Genesys confidential and proprietary information.
Unauthorized disclosure is prohibited.

More Related Content

PDF
Dijkstra's Algorithm
DOCX
New microsoft word document
PPT
Chapter 06 rsa cryptosystem
PPTX
How do computers exchange secrets using Math?
PDF
RSA cracking puzzle
PDF
Security of RSA and Integer Factorization
PPTX
RSA without Padding
PPT
Lecture6 rsa
Dijkstra's Algorithm
New microsoft word document
Chapter 06 rsa cryptosystem
How do computers exchange secrets using Math?
RSA cracking puzzle
Security of RSA and Integer Factorization
RSA without Padding
Lecture6 rsa

What's hot (14)

PDF
Cyclic Attacks on the RSA Trapdoor Function
PDF
An Analysis of Secure Remote Password (SRP)
PPTX
Secure and privacy-preserving data transmission and processing using homomorp...
PDF
RSA Game using an Oracle
PPTX
Cryptocurrency Jeopardy!
PPTX
Cryptography
PDF
An Analysis of RSA Public Exponent e
PPT
Rsa rivest shamir adleman
PDF
On deriving the private key from a public key
PPTX
Rsa in CTF
PPTX
Introduction to Cryptography
PPT
Computer security
PDF
SSA - PHI-functions Placements
PDF
Dependency Analysis of RSA Private Variables
Cyclic Attacks on the RSA Trapdoor Function
An Analysis of Secure Remote Password (SRP)
Secure and privacy-preserving data transmission and processing using homomorp...
RSA Game using an Oracle
Cryptocurrency Jeopardy!
Cryptography
An Analysis of RSA Public Exponent e
Rsa rivest shamir adleman
On deriving the private key from a public key
Rsa in CTF
Introduction to Cryptography
Computer security
SSA - PHI-functions Placements
Dependency Analysis of RSA Private Variables
Ad

Similar to Deep dive into rsa (20)

PPTX
Information and network security 33 rsa algorithm
PDF
On the Secrecy of RSA Private Keys
PDF
Analysis of Short RSA Secret Exponent d
PDF
PDF
PDF
PDF
Week5 ap3421 2019_part1
PDF
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...
PDF
CNIT 141: 10. RSA
PDF
RSA ALGORITHM
PDF
CNIT 141: 10. RSA
PPT
RSA Algorithm.ppt
PDF
An Introduction to RSA Public-Key Cryptography
PDF
Public-Key Cryptography.pdfWrite the result of the following operation with t...
PPTX
Rsa cryptosystem
PDF
PKC&RSA
PDF
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
PPTX
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
PPTX
RSA-W7(rsa) d1-d2
PPT
Digital Signature Recognition using RSA Algorithm
Information and network security 33 rsa algorithm
On the Secrecy of RSA Private Keys
Analysis of Short RSA Secret Exponent d
Week5 ap3421 2019_part1
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...
CNIT 141: 10. RSA
RSA ALGORITHM
CNIT 141: 10. RSA
RSA Algorithm.ppt
An Introduction to RSA Public-Key Cryptography
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Rsa cryptosystem
PKC&RSA
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
RSA-W7(rsa) d1-d2
Digital Signature Recognition using RSA Algorithm
Ad

Recently uploaded (20)

PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
history of c programming in notes for students .pptx
PDF
Nekopoi APK 2025 free lastest update
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
medical staffing services at VALiNTRY
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
L1 - Introduction to python Backend.pptx
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PDF
System and Network Administraation Chapter 3
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
Operating system designcfffgfgggggggvggggggggg
history of c programming in notes for students .pptx
Nekopoi APK 2025 free lastest update
wealthsignaloriginal-com-DS-text-... (1).pdf
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
medical staffing services at VALiNTRY
Design an Analysis of Algorithms II-SECS-1021-03
Wondershare Filmora 15 Crack With Activation Key [2025
Designing Intelligence for the Shop Floor.pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Softaken Excel to vCard Converter Software.pdf
L1 - Introduction to python Backend.pptx
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Navsoft: AI-Powered Business Solutions & Custom Software Development
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Which alternative to Crystal Reports is best for small or large businesses.pdf
iTop VPN Free 5.6.0.5262 Crack latest version 2025
System and Network Administraation Chapter 3
Upgrade and Innovation Strategies for SAP ERP Customers

Deep dive into rsa

  • 2. Astory Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. 2 Bjarne Stroustrup Linus Torvalds Dennis Ritchie
  • 3. Ropeproblem 3 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Extend both ropes by 1 foot
  • 4. Ropeproblem 4 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. C1 = 2π R1 C2 = 2π R2 (R2-R1) = (C2-C1)/2π = 1 foot/2π
  • 5. Ropeproblem 5 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.
  • 6. RSA– Keygeneration ◦ Choose two primes p and q of approximately equal size so that their product n = pq is of the required length (1024, 2048…). ◦ Compute φ(n) = (p-1)(q-1). ◦ Choose a public exponent e, 1 < e < φ(n), which is coprime to φ(n), that is, gcd(e, φ(n))=1. coprime {4, 9}, {8, 21} ◦ Compute a private exponent d that satisfies the congruence ed ≡ 1 (mod φ(n)). ed = 1+φ(n)*k ◦ Make the public key (n, e) available to others. Keep the private values d, p, q, and φ(n) secret. 6 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.
  • 7. RSA– Encryption ◦ Encryption c = me mod n, 1 < m < n-1 ◦ Decryption m = cd mod n ◦ m = RSAPUBLIC(RSAPRIVATE(m)) 7 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.
  • 8. RSA– Period 8 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. p=3, q=5, n=15, φ(n)=(p-1)(q-1)=8, m=2 n 1 2 3 4 5 6 7 8 9 10 11 12 2n 2 4 8 16 32 64 128 256 512 1024 2048 4096 2n mod 15 2 4 8 2 4 8 2 4 8 p=3, q=7, n=21, φ(n)=(p-1)(q-1)=12, m=2 n 1 2 3 4 5 6 7 8 9 10 11 12 2n 2 4 8 16 32 64 128 256 512 1024 2048 4096 2n mod 21 2 4 8 16 11 2 4 8 16 11 φ φλ λ
  • 9. RSA -φ(n) ◦ φ(n) - how many positive integers less than n and coprime to n. E.g. φ(12)=4 as the 4 integers {1,5,7,11} ◦ For any prime p, φ(p)=p−1, since all numbers less than p are coprime to it. E.g. φ(7)=6 as the 6 integers {1,2,3,4,5,6} ◦ If m and n are coprime, then φ(m)φ(n)=φ(mn). Now we understand what is ‘Compute φ(n) = (p-1)(q-1)’ 9 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.
  • 10. RSA- Pattern Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. p=7, φ(p)=6, m=2 i 1 2 3 4 5 6 i*m 2 4 6 8 10 12 i*m mod p 2 4 6 3 5 p=12, φ(p)=4, m=5 (m coprime to p) i 1 5 7 11 i*m 5 25 35 55 i*m mod p 5 1 11
  • 11. RSA- Fermat’sLittleTheorem Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. p=7, φ(p)=6, m=2 i 1 2 3 4 5 6 i*m 2 4 6 8 10 12 i*m mod p 2 4 6 3 5 m*2m*3m…*(p-1)m ≡ 1*2*3…*(p-1)(mod p) => (mp-1)*1*2*3…*(p-1) ≡ 1*2*3…*(p-1)(mod p) => mp-1 ≡ 1 (mod p) => mφ(n) ≡ 1 (mod p)
  • 12. RSA -Proof ◦ Encryption c = me mod n ◦ Decryption m = cd mod n ◦ ed = 1+kφ(n) ◦ cd ≡ med ≡ m1+kφ(n) ≡ m.(mφ(n))k ≡ m.1k ,since mφ(n) ≡ 1 (mod n) ≡ m (mod n). 12 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.
  • 13. RSA -Breaking ◦ me mod n with small e, m is not secure (if me < n) ◦ Today almost in all public keys (e,n), e=3, 17 and 65537, why? c1 = m3 mod n1, c2 = m3 mod n2, c3 = m3 mod n3 m can be revealed by Chinese remainder theorem c1* c2* c3 = m3 mod (n1* n2* n3) = m3 (if m3 < n1* n2* n3 ) ◦ RSA without padding is vulnerable 13 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.
  • 14. RSA -Breaking ◦ Brute force - Check all odd numbers starting below the square root of n. ◦ Euclidean Algorithm – if you can find two n1 and n2 have a common factor. In the real world, about two out of 1000 secure web sites RSA moduli do have common factors, and thus are susceptible to cracking (http://eprint.iacr.org/2012/064.pdf) ◦ Shor's algorithm -Key is to find ‘Period’ which requires a quantum computer ◦ https://en.wikipedia.org/wiki/RSA_Factoring_Challenge 14 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.
  • 15. RSA -Quantumsuperposition 15 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.
  • 16. RSA -Quantumentanglement 16 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.
  • 17. RSA -Quantumcomputer ◦ Qubits – Superposition and Entanglement (n qubits can represent 2n state) ◦ Qubits – State is described in probability amplitude (0.5, 0.866…), (0.5, -0.866…) 17 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Bloch sphere
  • 18. RSA -Shor'salgorithm 18 Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. Quantum Fourier Transform analogy
  • 19. Questions? Genesys confidential and proprietary information. Unauthorized disclosure is prohibited. 19
  • 20. Copyright ©2017 Genesys. 2001 Junipero Serra Blvd., Daly City, CA 94014 All Rights reserved. Genesys and the Genesys logo are registered trademarks of Genesys. All other company names and logos may be registered trademarks or trademarks of their respective companies. Thank You Visit www.genesys.com or call +1.855.821.0932 for more information Genesys confidential and proprietary information. Unauthorized disclosure is prohibited.