Week 8: 1
4-2023 NT219–Cryptography
NT219- Cryptography
PhD. Ngoc-Tu Nguyen
tunn@uit.edu.vn
Week 8: Modern Asymmetric Ciphers
Week 8: 2
4-2023 NT219–Cryptography
Outline
Why asymmetric cryptography?
Factoring Based Cryptography (P1)
Logarithm Based Cryptography (P2)
ElGamal cipher;
Diffie-Hellman key exchange;
Elliptic Curve Cryptography (P3)
Some advanced cryptography system (quantum
resistance)
Week 8: 3
4-2023 NT219–Cryptography
Why Public-Key Cryptosystems?
To overcome two of the most difficult problems associated with symmetric
encryption:
Key distribution (key for sysmetric encryption)
How to have secure communications in general without having to trust a
K D C with your key
Digital signatures
How to verify that a message comes intact from the claimed sender
Whitfield Diffie and Martin Hellman: proposed a method that addressed
both problems (1976)
Week 8: 4
4-2023 NT219–Cryptography
Moden Asymmetric ciphers
Symmetric cipher vs Asymmetric cipher
(𝑃 𝐾
𝐴
,𝑆 𝐾
𝐴
)
(𝑃 𝐾
𝐴
,𝑆 𝐾
𝐴
)
ID
(𝑃 𝐾
𝐴
,{𝑆 𝐾
𝐴
,𝑆 𝐾
𝐵
,.. })
Hommophic, Searchable encryption,..
Week 8: 5
4-2023 NT219–Cryptography
RSA: Confidentiality
𝐶=𝑚
𝑒
𝐵
𝑚𝑜𝑑 𝑛
𝐵
AB
/ /
=
Protect secret key?
Distribute public keys?
𝑒
𝐵
.𝑑
𝐵
=1𝑚𝑜𝑑 𝜙(𝑛
𝐵
)
𝑒
𝐴
.𝑑
𝐴
=1𝑚𝑜𝑑 𝜙(𝑛
𝐴
)