Intro To Modern Crypto
Intro To Modern Crypto
Introduction to
Modern Cryptography
2
Origins
AES Encryption
Process
5
AES
Structure
7
AES Round
19
AES Key Expansion
AES Key
Expansion
AES Example
Encryption
23
AES Example
Avalanche
24
Public Key Cryptography and RSA
► public-key/two-key/asymmetric cryptography
involves the use of two keys:
►a public-key, which may be known by anybody,
and can be used to encrypt messages, and verify
signatures
► a related private-key, known only to the recipient,
used to decrypt messages, and sign (create)
signatures
► infeasible
to determine private key from public
► is asymmetric because
► thosewho encrypt messages or verify signatures
cannot decrypt messages or create signatures
29
Public-Key Cryptography
30
Symmetric vs
Public-Key
31
Public-Key Cryptosystems
32
Public-Key Applications
= M1.(1)k = M1 = M mod n
40
RSA Example - Key Setup
c = 0; f = 1
for i = k downto 0
do c = 2 x c
f = (f x f) mod n
if bi == 1 then
c = c + 1
f = (f x a) mod n
return f
44
Efficient Encryption
Progress in
Factoring
51
Timing Attacks
Optimal
Asymmetric
Encryption
Padding
(OASP)