Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
1 Cryptosystems Based on Discrete Logarithms. 2 Outline [1] Discrete Logarithm Problem [2] Algorithms for Discrete Logarithm –A trivial algorithm –Shanks’
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Elliptic Curve Cryptography Jen-Chang Liu, 2004 Adapted from lecture slides by Lawrie Brown Ref: RSA Security ’ s Official Guide to Cryptography.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
ASYMMETRIC CIPHERS.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
By Abhijith Chandrashekar and Dushyant Maheshwary.
Elliptic Curve Cryptography
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Digital Signatures: Mathematics Zdeněk Říha. Data authentication Data integrity + data origin Digital signature Asymmetric cryptography public and private.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Application of Elliptic Curves to Cryptography
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Chapter 21 Public-Key Cryptography and Message Authentication.
Elliptic Curve Cryptography Implementation & PKI Adoption Brian Saville Jonathan Mitchell.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Tim Güneysu, Christof Paar and Jan Pelzl.
Elliptic Curve Cryptography
Cryptography and Network Security
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
Elliptic Curve Cryptography Celia Li Computer Science and Engineering November 10, 2005.
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
1 Network Security Dr. Syed Ismail Shah
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Great Theoretical Ideas in Computer Science.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Motivation Basis of modern cryptosystems
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Cryptography and Network Security Chapter 13
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Information Security Lab. Dept. of Computer Engineering 251/ 278 PART II Asymmetric Ciphers Key Management; Other CHAPTER 10 Key Management; Other Public.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Giuseppe Bianchi Lecture 8: Elliptic Curve Crypto A (minimal) introduction.
Elliptic Curve Public Key Cryptography
Chapter 9 – Elliptic Curve Cryptography ver. November 3rd, 2009
Asymmetric-Key Cryptography
Network Security Design Fundamentals Lecture-13
D. Cheung – IQC/UWaterloo, Canada D. K. Pradhan – UBristol, UK
Network Security Unit-III
B. R. Chandavarkar CSE Dept., NITK Surathkal
RSA and El Gamal Cryptosystems
Elliptic Curve Cryptography (ECC)
Topic 25: Discrete LOG, DDH + Attacks on Plain RSA
Elliptic Curve Cryptography (ECC)
The Application of Elliptic Curves Cryptography in Embedded Systems
Diffie-Hellman Key Exchange
CSCE 715: Network Systems Security
El Gamal and Diffie Hellman
Practical Aspects of Modern Cryptography
Introduction to Elliptic Curve Cryptography
CSCE 715: Network Systems Security
Cryptology Design Fundamentals
Network Security Design Fundamentals Lecture-13
Presentation transcript:

Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact implementations for a given level of security, which means faster cryptographic operations, running on smaller chips or more compact software. ● There are extremely efficient, compact hardware implementations available for ECC exponentiation operations, offering potential reductions in implementation footprint even beyond those due to the smaller key length alone.

Elliptic Curve Public Key Cryptography Why ?

Elliptic Curve Public Key Cryptography Group: A set of objects and an operation on pairs of those objects from which a third object is generated. Group must be closed, invertible, the operation must be associative, there must be an identity element. example: integers 0-9 and addition modulo 10 closed: sum of 2 numbers from 0-9 modulo 10 is an integer from 0 to 9. identity: 0 since 0+x = x for any x invertible: x + (10-x) = 0 mod 10 for any x so (10-x) is the inverse of x associative: (x+y)+z = x+(y+z)

Cyclic group: example: If G = { g 0, g 1, g 2, g 3, g 4, g 5 } is a group, then g 6 = g 0, and G is cyclic. Elliptic curve: An elliptic curve is the set of solutions (x,y) to the equation y 2 = x 3 + ax + b where 4 a b 2 0 Elliptic Curve Public Key Cryptography

Define addition of two points J and K: Let O be the identity element (J+O=J) If J = -K then J+K=O If J ≠ K then J+K=L=(x L,y L ) where x L = 2 -x J -x K ; y L = (x J -x K )-y J ; = (y K - y J )/(x K -x J ) If J = K then J+K=L=(x L,y L ) where x L = 2 -2x J ; y L = (x J -x L )-y J ; = (3x J 2 +a)/2y J Elliptic Curve Public Key Cryptography

Geometric explanation: Elliptic Curve Public Key Cryptography

Geometric explanation: Elliptic Curve Public Key Cryptography

Cyclic subgroup: For any point G on the elliptic curve the set { O, G, G+G, G+G+G, G+G+G+G,... } is a cyclic subgroup of the points that are solutions to the elliptic curve – hence multiplying a point G by a scalar k, as in kG = Q, results in another solution Q. Elliptic curve discrete logarithm problem: Given G and Q, it is computationally infeasible to obtain k, if k is sufficiently large. k is the discrete logarithm of Q to the base G. Elliptic Curve Public Key Cryptography

Cryptosystem parameters: The number of integers to use to express points is a prime number p. The public key is a point in the curve and the private key is a random number (the k from before). The public key is obtained by multiplying the private key with the generator point G in the curve. The number n is the smallest positive integer such that nG = O, n had better be prime. The number of points on the elliptic curve divided by n is the parameter h. Elliptic Curve Public Key Cryptography

EC Diffie-Hellman algorithm for key generation: Sender and receiver agree on parameters p, a, b, G, n, h Private keys are random integers d S, and d R, less than n Public keys are e S = d S G and e R = d R G Algorithm for computing a shared secret: Sender computes K = (x K,y K ) = d S e R Receiver computes L = (x L,y L ) = d R e S We know d S e R = d S d R G = d R d S G = d R e S Hence K = L and x K = x L The shared secret is x K Elliptic Curve Public Key Cryptography

EC Digital Signature Algorithm: Sender and receiver agree on parameters p, a, b, G, n, h Sender's private key is a random integer d S, less than n Sender's public key is e S = d S G. Algorithm for computing a digital signature: Compute X = HASH (m) do { Select a random integer k from [1,n−1] Let (x 1,y 1 ) = kG Compute r = x 1 mod n Compute s = k −1 (X + d S r) mod n } while (r == 0 || s == 0) (r,s) is the signature that is sent to the receiver Elliptic Curve Public Key Cryptography

Algorithm for verifying a digital signature: Receiver gets the sender's public key e S and (r,s) and m. Make sure r and s are between 1 and n-1. Compute X = HASH (m) Compute w = s -1 mod n Compute u 1 = Xw mod n Compute u 2 = rw mod n Compute (x 1,y 1 ) = u 1 G + u 2 e S Verify signature if x 1 = r mod n Elliptic Curve Public Key Cryptography