Abstract
But how is it possible that you can encrypt, but you cannot decrypt even with the help of the largest and most modern computers? The keyword we want to explore in this chapter is public-key ciphers, where you can make the key publicly known. RSA is based on the difficulty of decomposing large natural numbers into factors in a reasonable time, Diffie-Hellman and ElGamal use the problem that one cannot compute so-called discrete logarithms efficiently enough. Here we do not get into trouble with ECDH, but we do get onto elliptic curves. Since public-key ciphers need much more computing time than symmetric ciphers, they are usually only used for secret key exchange for e.g. Triple-DES or AES. Even with public-key ciphers, of course, there are constant efforts to crack the methods. Here, we learn Pollard’s methods for efficiently factorizing large natural numbers in many cases to attack RSA. We also try to use baby-step-giant-step and Pohlig-Hellman to solve the discrete logarithm in reasonable computation time. In the practical examples, we take a closer look at working securely on the Internet, wireless WLAN and the Bluetooth radio interface.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bernstein, D., Lange, T.: SafeCurves: choosing safe curves for elliptic-curve cryptography (Internet-information). Eindhoven/Niederlande. https://safecurves.cr.yp.to/. Accessed 10 Apr 2019
Beutelspacher, A., Neumann, H., Schwarzpaul, T.: Kryptografie in Theorie und Praxis (Lehrbuch). Vieweg+Teubner, Wiesbaden (2010)
Bluetooth: Bluetooth core specification v. 5.0 (Technische Spezifikation). (2016). https://www.bluetooth.com/specifications/bluetooth-core-specification
Buchmann, J.: EinfĂ¼hrung in die Kryptographie (Lehrbuch). Springer Spektrum, Berlin (2016)
Bundesamt fĂ¼r Sicherheit in der Informationstechnik: Kryptographische Verfahren 1: Empfehlungen und SchlĂ¼ssellängen (Technische Richtlinie). Bonn/Deutschland (2018). https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr02102/index_htm.html;jsessionid=D4F0ACAD39ED0893ECBE3F951AE6B66C.2_cid360
Bundesamt fĂ¼r Sicherheit in der Informationstechnik: Kryptographische Verfahren 2: Verwendung von Transport Layer Security (TLS) (Technische Richtlinie). Bonn/Deutschland (2018). https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr02102/index_htm.html;jsessionid=D4F0ACAD39ED0893ECBE3F951AE6B66C.2_cid360
Bundesamt fĂ¼r Sicherheit in der Informationstechnik: Sichere Nutzung von WLAN (Technische Richtlinie). Bonn/Deutschland (2018). https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Internetsicherheit/isi_wlan_leitlinie.pdf?__blob=publicationFile
Fox, D.: Sicherheit des bluetooth-standards (Ăœbersichtsartikel). Tagungsband des Deutschen IT-Sicherheitskongresses des BSI, Ingelheim/Deutschland (2003). https://www.secorvo.de/publikationen/bluetooth-sicherheit-fox-2003.pdf
Hauck, P.: Kryptologie und Datensicherheit (Vorlesungsskript). TĂ¼bingen, Deutschland (2009)
Hauck, P.: Primzahltests und Faktorisierungsalgorithmen (Vorlesungsskript), TĂ¼bingen, Deutschland (2007)
Koblitz, N.: A Course in Number Theory and Cryptography (Lehrbuch). Springer, New York (1994)
Manz, O.: Fehlerkorrigierende Codes (Lehrbuch). Springer Vieweg, Wiesbaden (2017)
U.S. Government (USG): Mathematical routines for the NIST prime elliptic curves (Technische Spezifikation). (2010). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.204.9073&rep=rep1&type=pdf
Wikipedia: Diffie-Hellman-SchlĂ¼sselaustausch (Internet-Enzyklopädie). (geöffnet 10 Apr 2019). https://de.wikipedia.org/wiki/Diffie-Hellman-Schl%C3%BCsselaustausch
Wikipedia: Pollard’s rho algorithm for logarithms (Internet-Enzyklopädie). https://en.wikipedia.org/wiki/Pollard%27s_rho_algorithm_for_logarithms. Accessed 10 Apr 2019
Wikipedia: Quadratisches Sieb (Internet-Enzyklopädie). https://de.wikipedia.org/wiki/Quadratisches_Sieb. Accessed 10 Apr 2019
Wikipedia: Transport Layer Security (Internet-Enzyklopädie). https://de.wikipedia.org/wiki/Transport_Layer_Security. Accessed 10 Apr 2019
Wikipedia: Transport Layer Security engl. (Internet-Enzyklopädie). https://en.wikipedia.org/wiki/Transport_Layer_Security. Accessed 10 Apr 2019
Wikipedia: WPA2 (Internet-Enzyklopädie). https://de.wikipedia.org/wiki/WPA2. Accessed 10 Apr 2019
Willems, W.: Codierungstheorie und Kryptographie (Lehrbuch). Birkhäuser-Springer, Basel (2008)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer-Verlag GmbH, DE, part of Springer Nature
About this chapter
Cite this chapter
Manz, O. (2022). Public-Key Ciphers. In: Encrypt, Sign, Attack. Mathematics Study Resources, vol 4. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-66015-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-662-66015-7_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-66014-0
Online ISBN: 978-3-662-66015-7
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)