Академический Документы
Профессиональный Документы
Культура Документы
Security
Algorithms of Public-key Cryptosystems
1N. Hari Nisha , 2Keshiya Anthony, 3A. Suruthi Kaviya , 4S. Anitha , 5S. Aishwarya , 6M.
Vithya
Under the guidance of Project Supervisor
7Mr. J . Sasikumar,
Assistant Professor.
DIVISORS:
A positive integer a is said to divide an integer b if there exists an
integer c such that b=ac and written as b=a.c and written as a│b
Example: 2 │10 as 10=2.5 but 3 does not divide 10 as there does
not exist any integer c such that 10=3.c
Basics: Important concepts in
Number Theory
GREATEST COMMON DIVISOR(GCD):
Let a and b be integers, not both zero .Then the GCD
is the largest positive integer which is factor of both
(a,b).It is denoted by d=(a,b)
Example: 6=(24,30)
µ(n)=(-1)k if a1 =a2=………ak=1
µ(n)=0 otherwise
n: 1 2 3 4 5 6 7 8 9
µ(n) 1 -1 -1 0 -1 1 -1 0 0
ϕ(n)= '1
k 1
ϕ(n) 1 1 2 2 4 2 6 4 6
Key’s properties:
Neither keys can perform both operations
The two keys are mathematically paired
Public key for encryption and private key for
decryption
Examples: RSA,YAK, Various elliptic curve
techniques.
Simple definitions
Plain text is the original message that is to be transmitted in
secret form.
Cipher text is its secret version.
The key is used to formulate the cipher, so the job of the
cryptanalyst is to discover the key and then break code.
The process of converting a plain text to cipher text is
encrypting (enciphering) and the converting device the
encryptor.
The reverse process by the intended recipient who knows the
key is decrypting (deciphering) and it is accomplished by a
decryptor.
Simple definitions
The encryptor and decryptor may be algorithms executed by
people or computers.
Thus the method used by an unintended receiver to recover the
original message is cryptanalysis.
A cryptosystem is a system for encrypting a plain text to a
cipher using a key
Network Security
Responsible for securing all information passed
through networked computers.
With the advent of the World Wide Web and the emergence of
e-commerce applications and social networks, organizations
across the world generate a large amount of data daily.
Information security is the most extreme basic issue in
guaranteeing safe transmission of data through the web.
Network security issues are now becoming important as
society is moving towards digital information age.
As more and more users connect to the internet it attracts a lot
of cyber-attacks.
Network Security can be enhanced through Cryptography.
Applications of Number Theory
in Network Security
Number theory plays an important role in
encryption algorithm.
Many tools in number theory such as
1. Primes
2. Divisors
3. Greatest Common Divisor
4. Co-primes
5. Congruence
6. Euler’s ϕ function
are used in cryptography for security.
RSA Algorithm
RSA is a commonly used asymmetric algorithm.
It was publicly described in 1977 by Ron Rivest, Adi
Shamir, and Leonard Adelman at MIT.
The letters RSA are the initials of their surnames.
It is based on some interesting relationships with prime
numbers.
Its security is derived from the fact that it is difficult to
factor large integers into its prime factors.