No-Key Cryptography Nathan Marks Based on Massey-Omura US Patent # 4,567,600.

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
RSA.
Public Key Cryptosystem
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Public Key Algorithms …….. RAIT M. Chatterjee.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Lecture 6: Public Key Cryptography
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Application of Elliptic Curves to Cryptography
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Chapter 21 Public-Key Cryptography and Message Authentication.
Elliptic Curve Cryptography Implementation & PKI Adoption Brian Saville Jonathan Mitchell.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
Cryptography and Network Security Public Key Cryptography and RSA.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Fall 2002CS 395: Computer Security1 Chapter 9: Public Key Cryptography.
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Cryptography and Network Security Chapter 13
Appendix 5: Cryptography p
Introduction to Elliptic Curve Cryptography
Presentation transcript:

No-Key Cryptography Nathan Marks Based on Massey-Omura US Patent # 4,567,600

Overview Introduction and Overview Analogy of No-Key Cryptography Basic over-view of No-Key Cryptography Original Massey-Omura Algorithm Variations of Massey-Omura Conclusion Questions

Briefcase Analogy of No-Key Alice wishes to pass Bob information. Alice locks one lock on case. Bob receives case, and locks other half. Alice then unlocks her half. Bob unlocks his half. Bob is able to easily open case.

No-Key Cryptography Overview Alice wishes to send Bob a message. Alice encrypts message with secret key. Bob encrypts message with secret key. Alice decrypts message with her key. Bob decrypts message with his key. Bob can easily retrieve original message.

Differences of Case and Crypto Transferring a physical case much different than digital data. Brute force on case easy (break the case open). Brute force on cipher hard because of encryption with completely secret key. Locks on case do not interfere with each other. Encrypting twice and then decrypting in same order may cause interference.

Problems with No-Key Crypto There are 3 public transfers the size of the message – not one. Not all encryption/decryption algorithms are associative with each other – meaning that encrypting and then decrypting in the incorrect order causes interference. Need of separate authentication for all transmissions.

Original Massey-Omura An algorithm that satisfies necessary mathematical requirements to make No-Key work. Uses finite fields. Relies on Discrete Log Problem for security.

Original Massey-Omura (cont.) Operates in finite field world of GF(2 m ) As shown by Diffie and Hellman in “New Directions in Cryptography” exponentiation in GF(2 m ) is easy (>m, but <2m operations). Taking the logarithm in GF(2 m ) is hard DLP (approx. 2 m /2 operations)

Original Massey-Omura (cont.) The message M is encoded as an element of GF(2 m ) and represented as m binary digits in the manner: M=[b m-1, b m-2,…,b 1,b 0 ] such that b m-1 is the first bit of the message. Both Alive and Bob generate a random # E such that 0<E<2 m-1 Both calculate D for their respective E’s such that: E*D=1 mod 2 m-1

Original Massey-Omura (cont.) Alive calculates M E A (in GF(2 m ))=M 1 Bob receives this value M 1 and calculates M 1 E B (in GF(2 m ))=M 2 Alice receives this value M 2 and calculates M 2 D A (in GF(2 m ))=M 3 This decrypts her part of the encryption. Bob receives this value M 3 and calculates M 3 D B (in GF(2 m ))=M 4 This decrypts his part of the encryption. M 4 = M, therefore Bob has Alice’s message.

Variations of Massey-Omura Elliptic curve version where multiplication of a constant (secret keys) times a point (the encoded message) takes the place of exponentiation. L(D,N) is a LUCAS group where N is a large prime. M is encoded as a point in L(D,N) and the order of L(D,N) is used as the modulus. M is then raised to the power of the secret keys (as in normal Massey-Omura) based on the rules of exponentiation of LUCAS groups.

Conclusions Massey-Omura is a good way of making the No-Key algorithm work mathematically and practically. No-Key systems are Zero-Knowledge, which means they are just as secure as whatever encryption algorithm is used. Even so No-Key seems are not used in practice very much because of the impracticality of having to transfer the entire message three times.

Questions? Questions anyone?

References US Patent #4,567,600 submitted by James L. Massey (Swiss) & Jimmy K Omura(USA) on September 14, Boise State University Mathematics Department Dr. J. von zur Gathen und Dr. J. Teich