SlideShare a Scribd company logo
PUBLIC KEY ALGORITHMS
by,
PRIYANKA G. MCA
PUBLIC KEY ALGORITHM
 Commonly we are using this algorithm to encrypt &
decrypt a message/images etc…
 Before this algorithm ,we were using the Symmetric
key algorithm.
 In that algorithm ,both encryption & decryption keys
are same.
 So, the message can easily robbed by a 3rd
party.(drawback of this algorithm).
INTRODUCTION
 In 1976,researchers at Stanford University, Diffie &
Hellman proposed a new kind of cryptosystem.
 Encryption & decryption key were different.
 Decryption key could not feasibly be derived from the
encryption key.
 This algorithm had to meet three requirement,
1. D(E(P))=P
2.It is exceedingly difficult to deduce D from E
3.E cannot be broken by a chosen plaintext attack.
PUBLIC KEY ALGORITHM
 In this algorithm everyone has 2 different keys.
 That is ,
1. public key – not only for personal.
2. private key – only for personal use.
(eg: fb id /email id and password)
 Here, we use
public key for – encryption.
private key for – decryption.
 Every public key must be unlocked by that’s private
key.
EXAMPLE
 ENCRYPTION:
Hi = (h) (i)
=(h+1) (i+1)
ciphertext = (i)(j)=ij
 DECRYPTION:
ciphertext= ij= (i)(j)
=(i-1)(j-1)
plain/orginal text =(h)(i)=Hi
APPLICATIONS
 BANKING - Transactions
 Online payment
 Social medias
 Email
 Etc…….
EXAMPLE:
 2 person named Alice & Bob both are sharing a
message to each other.
 Alice send a message is named P.
P- is a orginal text.
Alice Bob
EB(P) DB(EB(P))=P
o Bob replies to Alice named R
Bob Alice
EA(R) DA(EA(R))=R
No one else can read the encrypted text, because
this encryption system is soo strong .
RSA ALGORITHM
 Discovered by MIT group at 1978.
 The three discoverers Rivest, Shamir, Adlemen
(RSA).
 One of the very strong security based on it.
 This algorithm fully depends on Prime Numbers.
ALGORITHM:
 5 important steps:
1.Choose 2 different large random numbers.
(i,e) p & q
2.Calculate modulus n=p*q
3.Calculate totient function Q(x)=(p-1)(q-1).
4.Choose an random integer, “e” – shoud be
considered as a public key.
condition for choosing “e” is :-
1) 1<e<Q(x) / gcd(e,Q(x))=1
5. Calculate “d”=[1+k(Q(x))]/e ,0<=k<e
 ENCRYPTION:
C=Me mod n
here,
C-ciphertext,M- message
 DECRYPTION:
M=Cd mod n
EXAMPLE
 1.p=3,q=11
 2.n=p*q
 =3*11=33
 3.Q(x)=(p-1)(q-1)
 =(3-1)(11-1)=2*10=20
 4.e=3 1<e<Q(x),gcd(3,20)=1 1*3,1*20
 5.d=1+1(20)/3=21/3=7
 ENCRYPTION:
 S=19 orginal text (plain text value<n)
 C=Me mod n
 =193 mod 33=28
 C=28 cipher text
 DECRYPTION:
 C=28 cipher text
 M=Cd mod n
 =287 mod 33=19
 19=S orginal text
OTHER PUBLIC-KEY ALGORITHMS
 The 1st public-key algorithm was the Knapsack
algorithm.(Merkle & Hellman,1978).
 Here, someone owns a large number of objects, each
with a different weight.
 The owner encodes the message by secretly selecting
a subset of the objects and placing them in the
knapsack.
 The total weight of the objects in the knapsack is made
public ,as is the list of all possible objects.
 The list of objects in the knapsack is kept secret.
 With certain additional restrictions,the problem of
figuring out a possible list of objects with the given
weights was to be computationally infeasible &formed
the basics of the public key algorithm.
THANK YOU…..!

More Related Content

PPTX
Rsa Crptosystem
PPTX
Rsa cryptosystem
PPT
RSA Algorithm
PPT
Rsa rivest shamir adleman
PPTX
RSA ALGORITHM
PDF
Computer Security Lecture 7: RSA
PPTX
Cryptography using rsa cryptosystem
Rsa Crptosystem
Rsa cryptosystem
RSA Algorithm
Rsa rivest shamir adleman
RSA ALGORITHM
Computer Security Lecture 7: RSA
Cryptography using rsa cryptosystem

What's hot (15)

PPTX
Cryptography and RSA algorithm
PDF
RSA Algorithm report
PDF
RSA ALGORITHM
PPTX
RSA algorithm
PPT
PPT
Rsa diffi-network security-itt
PDF
Cyclcone a safe dialect of C
PDF
Analysis of Short RSA Secret Exponent d
PPTX
3 pkc+rsa
PDF
RSA Algorithm
PPTX
Diffie hellman key exchange algorithm
PDF
Solutions to online rsa factoring challenges
PPTX
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
PPT
Lesson 4.1 Extreme Values
PPT
The rsa algorithm
Cryptography and RSA algorithm
RSA Algorithm report
RSA ALGORITHM
RSA algorithm
Rsa diffi-network security-itt
Cyclcone a safe dialect of C
Analysis of Short RSA Secret Exponent d
3 pkc+rsa
RSA Algorithm
Diffie hellman key exchange algorithm
Solutions to online rsa factoring challenges
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
Lesson 4.1 Extreme Values
The rsa algorithm
Ad

Similar to Public key algorithm (20)

PDF
Cs8792 cns - Public key cryptosystem (Unit III)
PPTX
Module-2 Public-Key Cryptography and RSA.pptx
PPTX
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
PPTX
Public key algorithm
PPTX
Rsa algorithm key generation
PPT
PUBLIC KEY & RSA.ppt
PPTX
RSA Algorithem and information about rsa
PDF
F010243136
PPT
Public Key Cryptography and RSA algorithm
PDF
Cryptosystem An Implementation of RSA Using Verilog
PPTX
RSA Algorithm
DOCX
PDF
CRYPTOGRAPHY (2).pdf
PDF
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
PPTX
Information and network security 33 rsa algorithm
PPT
ch09_rsa_nemo.ppt
PDF
Ijetcas14 336
DOC
PPT
Unit --3.ppt
Cs8792 cns - Public key cryptosystem (Unit III)
Module-2 Public-Key Cryptography and RSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Public key algorithm
Rsa algorithm key generation
PUBLIC KEY & RSA.ppt
RSA Algorithem and information about rsa
F010243136
Public Key Cryptography and RSA algorithm
Cryptosystem An Implementation of RSA Using Verilog
RSA Algorithm
CRYPTOGRAPHY (2).pdf
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Information and network security 33 rsa algorithm
ch09_rsa_nemo.ppt
Ijetcas14 336
Unit --3.ppt
Ad

Recently uploaded (20)

PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Updated Idioms and Phrasal Verbs in English subject
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Lesson notes of climatology university.
PDF
RMMM.pdf make it easy to upload and study
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Updated Idioms and Phrasal Verbs in English subject
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Chinmaya Tiranga quiz Grand Finale.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
History, Philosophy and sociology of education (1).pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Lesson notes of climatology university.
RMMM.pdf make it easy to upload and study
Weekly quiz Compilation Jan -July 25.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Final Presentation General Medicine 03-08-2024.pptx
Anesthesia in Laparoscopic Surgery in India
What if we spent less time fighting change, and more time building what’s rig...
Microbial diseases, their pathogenesis and prophylaxis
school management -TNTEU- B.Ed., Semester II Unit 1.pptx

Public key algorithm

  • 2. PUBLIC KEY ALGORITHM  Commonly we are using this algorithm to encrypt & decrypt a message/images etc…  Before this algorithm ,we were using the Symmetric key algorithm.  In that algorithm ,both encryption & decryption keys are same.  So, the message can easily robbed by a 3rd party.(drawback of this algorithm).
  • 3. INTRODUCTION  In 1976,researchers at Stanford University, Diffie & Hellman proposed a new kind of cryptosystem.  Encryption & decryption key were different.  Decryption key could not feasibly be derived from the encryption key.  This algorithm had to meet three requirement, 1. D(E(P))=P 2.It is exceedingly difficult to deduce D from E 3.E cannot be broken by a chosen plaintext attack.
  • 4. PUBLIC KEY ALGORITHM  In this algorithm everyone has 2 different keys.  That is , 1. public key – not only for personal. 2. private key – only for personal use. (eg: fb id /email id and password)  Here, we use public key for – encryption. private key for – decryption.  Every public key must be unlocked by that’s private key.
  • 5. EXAMPLE  ENCRYPTION: Hi = (h) (i) =(h+1) (i+1) ciphertext = (i)(j)=ij  DECRYPTION: ciphertext= ij= (i)(j) =(i-1)(j-1) plain/orginal text =(h)(i)=Hi
  • 6. APPLICATIONS  BANKING - Transactions  Online payment  Social medias  Email  Etc…….
  • 7. EXAMPLE:  2 person named Alice & Bob both are sharing a message to each other.  Alice send a message is named P. P- is a orginal text. Alice Bob EB(P) DB(EB(P))=P o Bob replies to Alice named R Bob Alice EA(R) DA(EA(R))=R No one else can read the encrypted text, because this encryption system is soo strong .
  • 8. RSA ALGORITHM  Discovered by MIT group at 1978.  The three discoverers Rivest, Shamir, Adlemen (RSA).  One of the very strong security based on it.  This algorithm fully depends on Prime Numbers.
  • 9. ALGORITHM:  5 important steps: 1.Choose 2 different large random numbers. (i,e) p & q 2.Calculate modulus n=p*q 3.Calculate totient function Q(x)=(p-1)(q-1). 4.Choose an random integer, “e” – shoud be considered as a public key. condition for choosing “e” is :- 1) 1<e<Q(x) / gcd(e,Q(x))=1 5. Calculate “d”=[1+k(Q(x))]/e ,0<=k<e
  • 10.  ENCRYPTION: C=Me mod n here, C-ciphertext,M- message  DECRYPTION: M=Cd mod n
  • 11. EXAMPLE  1.p=3,q=11  2.n=p*q  =3*11=33  3.Q(x)=(p-1)(q-1)  =(3-1)(11-1)=2*10=20  4.e=3 1<e<Q(x),gcd(3,20)=1 1*3,1*20  5.d=1+1(20)/3=21/3=7
  • 12.  ENCRYPTION:  S=19 orginal text (plain text value<n)  C=Me mod n  =193 mod 33=28  C=28 cipher text  DECRYPTION:  C=28 cipher text  M=Cd mod n  =287 mod 33=19  19=S orginal text
  • 13. OTHER PUBLIC-KEY ALGORITHMS  The 1st public-key algorithm was the Knapsack algorithm.(Merkle & Hellman,1978).  Here, someone owns a large number of objects, each with a different weight.  The owner encodes the message by secretly selecting a subset of the objects and placing them in the knapsack.  The total weight of the objects in the knapsack is made public ,as is the list of all possible objects.  The list of objects in the knapsack is kept secret.  With certain additional restrictions,the problem of figuring out a possible list of objects with the given weights was to be computationally infeasible &formed the basics of the public key algorithm.