Cryptography, Information Theory, and Error-Correction. Aiden A. Bruen

Читать онлайн книгу.

Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen


Скачать книгу
alt="upper C plus r upper N"/> is a whole number v, then the remainder of v upon division by upper N must be upper M (see Chapter 19).

      The recipient Bob, however, can calculate upper M immediately from a formula involving his private key consisting of a “decryption index” d along with two prime numbers p, q. The reason is that upper N is the product of p and q. Bob knows p and q. Anybody else, even knowing upper N, cannot in general determine what the factors p, q are in a reasonable amount of time.

      Eve can try guessing the message without knowing d by guessing r 0. Alternatively, Eve can try guessing p and q from which she can calculate d. In other words, Eve can try to guess the private key and then determine the message.

      We detail some potential weaknesses with public key algorithms such as RSA. However, this algorithm is still a central public key algorithm. Its security, when carefully implemented, seems to still be strong after many years of constant use.

      The encryption exponent e mentioned above must be chosen to have no factors in common with p minus 1 and no factors in common with q minus 1. The reason for assuming this is so that d exists. Another reason is that this condition must be satisfied in order that two different messages get two different encryptions. This comes up in Problem 3.1. We mention also that, for a given left-bracket upper N comma e right-bracket, the decryption index need not be unique! We provide several examples. This is important because some attacks on RSA are possible if d is small; we refer to Chapter 7. So if d is not unique, this makes it more difficult to guard against this attack.

      What we mean by “not unique” is that there may be more than one value of d such that the remainder of upper C Superscript d, on division by upper N, is upper M. The reason for nonuniqueness is that, instead of working with left-parenthesis p minus 1 right-parenthesis left-parenthesis q minus 1 right-parenthesis, we can work with any number t that is divisible by p minus 1 and q minus 1, as explained in the algorithm description and in Chapter 19. It is often possible to find t less-than left-parenthesis p minus 1 right-parenthesis left-parenthesis q minus 1 right-parenthesis so that the calculations are simplified, and we get a shortcut even if the resulting d is the same.

      We present new insights on public key and symmetric encryption.

      

      Cryptography is an old subject dating back at least as far as 1500 BCE. A technique developed by Porta associated also with Vigenère in the Middle Ages is close to the cutting edge of part of modern cryptography. Additionally, cryptography is closely connected to information theory and error‐correction, with many fundamental ideas going back to Claude Shannon. Further details about Shannon and the history of cryptography are provided in Chapter 1.

      Cryptography is the art of keeping messages secret. Imagine that A, B are two entities who wish to communicate in secret. Assume A wants to send a secret message to B.

Schematic illustration of the general encryption.
Скачать книгу