Scott CH Huang COM5336 Cryptography Lecture 14 XTR Cryptosystem Scott CH Huang COM 5336 Cryptography Lecture 10.

Slides:



Advertisements
Similar presentations
Asymptotically Optimal Communication for Torus- Based Cryptography David Woodruff MIT Joint work with Marten van Dijk Philips/MIT.
Advertisements

An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Cryptography and Network Security Chapter 9
COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.
The XTR public key system (extended version of Crypto 2000 presentation) Arjen K. Lenstra Citibank, New York Technical University Eindhoven Eric R. Verheul.
7. Asymmetric encryption-
1 The RSA Algorithm Supplementary Notes Prepared by Raymond Wong Presented by Raymond Wong.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Practical Cryptography in High Dimensional Tori Marten van Dijk 1, Robert Granger 2, Dan Page 2, Karl Rubin 3, Alice Silverberg 3, Martijn Stam 2, David.
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
Foundations of Network and Computer Security J J ohn Black Lecture #11 Sep 21 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CPE5021 Advanced Network Security --- Advanced Cryptography: Elliptic Curve Cryptography --- Lecture 3 CPE5021 Advanced Network Security --- Advanced Cryptography:
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
By Jyh-haw Yeh Boise State University ICIKM 2013.
8. Data Integrity Techniques
The RSA Algorithm Rocky K. C. Chang, March
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
Cryptography Lecture 8 Stefan Dziembowski
An Efficient Identity-based Cryptosystem for
Great Theoretical Ideas in Computer Science.
RSA Ramki Thurimella.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Topic 22: Digital Schemes (2)
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Cryptography Lecture 7: RSA Primality Testing Piotr Faliszewski.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Elliptical Curve Cryptography Manish Kumar Roll No - 43 CS-A, S-7 SOE, CUSAT.
Darci Miyashiro Math 480 April 29, 2013
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Controlled Algebras and GII’s Ronald L. Rivest MIT CSAIL IPAM Workshop October 9, 2006.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
The Paillier Cryptosystem
Scott CH Huang COM 5336 Lecture 7 Other Public-Key Cryptosystems Scott CH Huang COM 5336 Cryptography Lecture 7.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Optimizing Robustness while Generating Shared Secret Safe Primes Emil Ong and John Kubiatowicz University of California, Berkeley.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
1 Section Congruences In short, a congruence relation is an equivalence relation on the carrier of an algebra such that the operations of the algebra.
Copyright 2012, Toshiba Corporation. A Survey on the Algebraic Surface Cryptosystems Koichiro Akiyama ( TOSHIBA Corporation ) Joint work with Prof. Yasuhiro.
COM 5336 Lecture 8 Digital Signatures
1 Cryptanalysis Lab Elliptic Curves. Cryptanalysis Lab Elliptic Curves 2 Outline [1] Elliptic Curves over R [2] Elliptic Curves over GF(p) [3] Properties.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2014.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
RSA and El Gamal Cryptosystems
XTR algorithm for MIKEY
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Introduction to Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Scott CH Huang COM5336 Cryptography Lecture 14 XTR Cryptosystem Scott CH Huang COM 5336 Cryptography Lecture 10

Scott CH Huang COM 5336 XTR XTR = ECSTR= Efficient Compact Subgroup Trace Representation. Proposed by A Lenstra & E Verheul. XTR uses an efficient and compact method to represent subgroup elements XTR removes the distinction between conjugates The security of XTR is based on the XTR-Discrete-Logarithm problem in the subgroup of GF(p 6 )  of order dividing p 2  p + 1.

Scott CH Huang COM 5336 Subgroups of GF(p 6 )  p 6  1 = (p  1)(p + 1)(p 2 + p + 1)(p 2  p + 1) Subgroup of order p  1 can be embedded in GF(p)  Subgroup of order p + 1 can be embedded in GF(p 2 )  Subgroup of order p 2 + p + 1 can be embedded in GF(p 3 )  Subgroup of order  6 (p) = p 2  p + 1 cannot be embedded in GF(p t )  for t = 1, 2, 3  (Pohlig-Hellman) order p 2  p + 1 subgroup is as hard as GF(p 6 ) , or if order p 2  p + 1 subgroup is easier than GF(p 6 )  then GF(p 6 )  is at most as hard as GF(p 3 )  (and that is unlikely)

Scott CH Huang COM 5336 Naïve XTR Basics Let p,q be primes. q | p 2  p + 1 Pick an element g of GF(p 6 ) of order q. Construct the cyclic subgroup ={1,g,g 2,...g q-1 }  GF(p 6 )* Apply the GDLP to.

Scott CH Huang COM 5336 XTR Subgroup Element Representation If, then it can be proved that For all and its conjugates can be represented by XTR does not distinguish between and its conjugates. We do not wish to work in. We wish to work in only.

Scott CH Huang COM 5336 XTR-Discrete-Logarithm Problem XTR Setup XTR-DLP: Given. Find We do not need to find. We only need to find We do not need to represent any elements in. We do not need to work in. We’ll only work in. We are interested in the following Given. Compute. (Algorithm 2.37)

Scott CH Huang COM 5336 The XTR Paper Organization Efficient algebraic computation in GF(p 2 ) (§ 2.1) Efficient computation of Tr(g n ) given Tr(g) (§2.2-§2.3) – Algorithm 2.37 (main algorithm) Efficient computation of Tr(g a . g bk ) given Tr(g) and a,b with unknown k. (§2.4) – Algorithm 2.48 (main algorithm)

Scott CH Huang COM 5336 Advantages of XTR The security of the subgroup is believed to be as hard as GF(p 6 )*. We normally need log p 6 = 6 log p bits to represent GF(p 6 )*. However, Tr(h) is in GF(p 2 )*, so we only need log p 2 = 2 log p bits. That's a 66% improvement compared to ordinary DLP-based schemes.

Scott CH Huang COM 5336 XTR vs RSA 170-bit XTR1020-bit RSA Parameter/Key selection73 ms1224 ms Encrypting/Verifying23 ms5 ms (32-bit e) Decrypting/Signing11 ms40 ms (no CRT: 123 ms) Public Key size680 bits1050 bits ID-based Public Key size388 bits510 bits

Scott CH Huang COM 5336 XTR vs ECC over GF(p) 170-bit XTR170-bit ECC Parameter/Key selection73 mshours? Encrypting23 ms (2720)28 ms (3400) Decrypting11 ms (1360)16 ms (1921) Signing11 ms (1360)14 ms (1700) Verifying23 ms (2754)  21 ms (2575) Public Key size680 bits766 bits ID-based Public Key size388 bits304 bits Shared Public Key size340 bits171 bits

Scott CH Huang COM 5336 XTR Summary XTR is secure, efficient, compact, easy to implement, with trivial parameter generation Disadvantages: Do we really trust GF(p 6 )? Multiplication of Tr(g m ) and Tr(g n ) is non-trivial (but can usually be avoided) p 6 grows as fast as RSA moduli (i.e., fast) q grows as fast as ECC subgroups (i.e., slow) log 2 (q)  log 2 (p)  170 only for current security levels

Scott CH Huang COM 5336 Conclusion ECC and XTR are both the most promising asymmetric cryptosystems nowadays. Both cryptosystems are secure, efficient, and suitable for portable devices. The lack of knowledge of their corresponding subgroups may contribute to their security.