Computer Science CSC 774Dr. Peng Ning CSC 774 Advanced Network Security Topic 2.5 Secret Handshake Slides by Tong Zhou.

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

Data Security 1 El_Gamal Cryptography. Data Security2 Introduction El_Gamal is a public-key cryptosystem technique El_Gamal is a public-key cryptosystem.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
BY JYH-HAW YEH COMPUTER SCIENCE DEPT. BOISE STATE UNIVERSITY Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes.
CSC 774 Advanced Network Security
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5 Group Key Management.
IAW 2006 Cascaded Authorization with Anonymous- Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with.
7. Asymmetric encryption-
Secret Handshakes from CA-Oblivious Encryption Asiacrypt 2004, Jeju-do, Korea Claude Castelluccia, Stanisław Jarecki, Gene Tsudik UC Irvine.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
A novel and efficient unlinkable secret handshakes scheme Author: Hai Huang and Zhenfu Cao (PR China) Source: IEEE Comm. Letters 13 (5) (2009) Presenter:
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
Efficient deniable authentication protocol based on generalized ElGamal signature scheme From ELSEVIER Computer Standards & Interface Author: Zuhua Shao.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
Identity Based Encryption
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
Establishment of Conference Keys in Heterogeneous Networks Wade Trappe, Yuke Wang, K. J. Ray Liu ICC IEEE International Conference.
Identity-based authenticated key agreement protocol based on Weil pairing N.P.Smart ELECTRONICS LETTERS 20 th June 2002 vol.38 No13 p Present by.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
Inter-Domain Identity-Based Authenticated Key Agreement Protocols from Weil Pairing Authors: Hong-bin Tasi, Yun-Peng Chiu and Chin-Laung Lei From:ISC2006.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Introduction to Modern Cryptography, Lecture 9 More about Digital Signatures and Identification.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Topic 5 Essential Public Key Crypto Methods.
Key Distribution CS 470 Introduction to Applied Cryptography
Authentication System
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
11/11/20031 Secret Handshakes from Pairing- Based Key Agreements Dirk Balfanz, Glenn Durfee, Narrendar Shankar Diana Smetters, Jessica Staddon, Hao-chi.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Computer Science Public Key Management Lecture 5.
Introduction to Public Key Cryptography
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
By Jyh-haw Yeh Boise State University ICIKM 2013.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
Lecture 11: Strong Passwords
1 Lect. 13 : Public Key Encryption RSA ElGamal. 2 Shamir Rivest Adleman RSA Public Key Systems  RSA is the first public key cryptosystem  Proposed in.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Modern Cryptographic Topics
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Center for Information Security Technologies ID-based Authenticated Key Exchange for Low-Power Mobile Devices K. Y. Choi, J. Y. Hwang, D. H. Lee CIST,
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.
An Improved Efficient Secret Handshakes Scheme with Unlinkability Author: Jie Gu and Zhi Xue Source: IEEE Comm. Letters 15 (2) (2011) Presenter: Yu-Chi.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
Key Management Network Systems Security Mort Anvari.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Cryptography and Network Security Chapter 13
CSC 774 Advanced Network Security
Presentation transcript:

Computer Science CSC 774Dr. Peng Ning CSC 774 Advanced Network Security Topic 2.5 Secret Handshake Slides by Tong Zhou

Computer Science CSC 774Dr. Peng Ning Goals Authenticate without revealing credentials –Consider two groups G 1 and G 2, two parties A  G 1 and B  G 2. A and B wants to authenticate each other. –If G 1 ≠ G 2 : A and B only know they are not in the same group. –If G 1 = G 2 : A and B can authenticate to each other. –A third party learns nothing by observing conversations between A and B.

Computer Science CSC 774Dr. Peng Ning Preliminaries: Pairing-based Cryptography Bilinear Maps: –Two cyclic groups of large prime order q: G 1 and G 2 – is a bilinear map if ê should be computable, non-degenerate and satisfies Bilinear Diffie-Hellman assumption, i.e., given P, aP, bP, cP, it is hard to compute

Computer Science CSC 774Dr. Peng Ning Protocol Sketch Equipped with bilinear map ê and one-way hash function H 1 CA has a master key t. Assume a drivers and cops scenario.

Computer Science CSC 774Dr. Peng Ning Protocol Sketch Driver’s Licence: “p a”,T A T A = tH 1 (“p a-driver”) Traffic cop credential: “xy d”,T B T B = tH 1 (“xy d-cop”) Driver’s licence, please. Please show me your pseudonym. xy d p a

Computer Science CSC 774Dr. Peng Ning Protocol Sketch – Attacker Igor Driver’s Licence: “p a”,T A T A = tH 1 (“p a-driver”) Obtains Bob’s pseudonym “xy d” I am a cop. Driver’s licence, please. Please show me your pseudonym. xy d p a ??? This guy is not a cop.

Computer Science CSC 774Dr. Peng Ning Secret-Handshake Scheme (SHS) SHS.CreateGroup(G): executed by an administrator, generates the group secret GroupSecret G for G. SHS.AddUser(U,G,GroupSecret G ): creates user secret UserSecret U,G for new user U. SHS.HandShake(A,B): Users A and B authenticates each other. B discovers A  G if and only if A  discovers B  G. SHS.TraceUser: Administrator tells the user from a transcript T generated during conversation between A and B. SHS.RemoveUser: Administrator revokes user U

Computer Science CSC 774Dr. Peng Ning Pairing-Based Handshake (PBH) PBH.CreateGroup: Administrator sets GroupSecret G as a random number PBH.AddUser: Administrator generates pseudonyms for users: and then generates the corresponding secret points: where H 1 is a one-way hash function.

Computer Science CSC 774Dr. Peng Ning Pairing-Based Handshake (PBH) PBH.Handshake: AB AB AB

Computer Science CSC 774Dr. Peng Ning Pairing-Based Handshake (PBH) PBH.TraceUser: Since the conversations of handshaking include the pseudonyms, administrator can easily figure out the users. PBH.RemoveUser: Administrator removes user U by broadcasting its pseudonyms to all the other users, so that other users won’t accept pseudonyms of U.

Computer Science CSC 774Dr. Peng Ning Computational Diffie-Hellman Instead of Bilinear Diffie-Hellman CreateGroup: Administrator picks (p,q,g). p and q are primes, g is a generator of a subgroup in of order q. Also, picks up a private key x, and computes the public key y=g x mod p AddUser: For user U, administrator generates id U, then generates a pair so that id U, w, t will be given to the user.

Computer Science CSC 774Dr. Peng Ning Computational Diffie-Hellman Instead of Bilinear Diffie-Hellman AddUser: For user U, administrator generates id U, then generates a pair so that id U, w, t will be given to the user. –How to generate the pair (w,t)? Randomly pick r, compute

Computer Science CSC 774Dr. Peng Ning Computational Diffie-Hellman Instead of Bilinear Diffie-Hellman Handshake: Assume user A has (id A, w A, t A ) and user B has (id B, w B, t B ). Define several marks (ElGamal Encryption): –

Computer Science CSC 774Dr. Peng Ning Computational Diffie-Hellman Instead of Bilinear Diffie-Hellman AB Handshake: AB randomly picks computes AB randomly picks computes verifies resp b AB verifies resp a