Dan Boneh Basic key exchange Public-key encryption Online Cryptography Course Dan Boneh.

Slides:



Advertisements
Similar presentations
Merkle Puzzles Are Optimal
Advertisements

Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Dan Boneh Message integrity Message Auth. Codes Online Cryptography Course Dan Boneh.
ElGamal Security Public key encryption from Diffie-Hellman
Dan Boneh Using block ciphers Modes of operation: one time key Online Cryptography Course Dan Boneh example: encrypted , new key for every message.
Trusted 3rd parties Basic key exchange
Online Cryptography Course Dan Boneh
Dan Boneh Public key encryption from Diffie-Hellman ElGamal Variants With Better Security Online Cryptography Course Dan Boneh.
Cryptography: Review Day David Brumley Carnegie Mellon University.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
1 PRPs and PRFs CS255: Winter Abstract ciphers: PRPs and PRFs, 2.Security models for encryption, 3.Analysis of CBC and counter mode Dan Boneh, Stanford.
Dan Boneh Authenticated Encryption Active attacks on CPA-secure encryption Online Cryptography Course Dan Boneh.
Encryption Public-Key, Identity-Based, Attribute-Based.
Dan Boneh Message Integrity A Parallel MAC Online Cryptography Course Dan Boneh.
1 Brief PRP-PRF Recap CS255 Winter ‘06. 2 PRPs and PRFs PRF: F: K  X  Y such that: exists “efficient” algorithm to eval. F(k,x) PRP: E: K  X  X such.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20.
Identity Based Encryption
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Dan Boneh Basic key exchange The Diffie-Hellman protocol Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations The RSA trapdoor permutation Online Cryptography Course Dan Boneh.
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
0x1A Great Papers in Computer Security
Dan Boneh Authenticated Encryption Definitions Online Cryptography Course Dan Boneh.
Dan Boneh Authenticated Encryption Chosen ciphertext attacks Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Intractable problems Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Dan Boneh Odds and ends Key Derivation Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations Is RSA a one-way function? Online Cryptography Course Dan Boneh.
Dan Boneh Using block ciphers Modes of operation: many time key (CTR) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Attacks on OTP and stream ciphers
Dan Boneh Using block ciphers Modes of operation: many time key (CBC) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Dan Boneh Stream ciphers Pseudorandom Generators Online Cryptography Course Dan Boneh.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Dan Boneh Basic key exchange Merkle Puzzles Online Cryptography Course Dan Boneh.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Dan Boneh Message Integrity CBC-MAC and NMAC Online Cryptography Course Dan Boneh.
Odds and ends Tweakable encryption
Cryptography: Review Day David Brumley Carnegie Mellon University.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Dan Boneh Stream ciphers Stream ciphers are semantically secure Online Cryptography Course Dan Boneh Goal: secure PRG ⇒ semantically secure stream cipher.
Dan Boneh Basic key exchange Trusted 3 rd parties Online Cryptography Course Dan Boneh.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
Dan Boneh Odds and ends Deterministic Encryption Online Cryptography Course Dan Boneh.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Online Cryptography Course Dan Boneh
Dan Boneh Public Key Encryption from trapdoor permutations Constructions Online Cryptography Course Dan Boneh Goal: construct chosen-ciphertext secure.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Using block ciphers Review: PRPs and PRFs
Group theory exercise.
PRPs and PRFs CS255: Winter 2017
Man in the Middle Attacks
Introduction to Symmetric-key and Public-key Cryptography
Cryptographic protocols 2015, Lecture 3 Key Exchange, CDH, DDH
Efficient Short-Password Key Exchange (ESP-KE)
Oblivious Transfer.
Presentation transcript:

Dan Boneh Basic key exchange Public-key encryption Online Cryptography Course Dan Boneh

Dan Boneh Establishing a shared secret Bob Alice Goal: Alice and Bob want shared secret, unknown to eavesdropper For now: security against eavesdropping only (no tampering) eavesdropper ?? This segment: a different approach

Dan Boneh Public key encryption E E D D AliceBob

Dan Boneh Public key encryption Def: a public-key encryption system is a triple of algs. (G, E, D) G(): randomized alg. outputs a key pair (pk, sk) E(pk, m): randomized alg. that takes m ∈ M and outputs c ∈ C D(sk,c): det. alg. that takes c ∈ C and outputs m ∈ M or ⊥ Consistency: ∀ (pk, sk) output by G : ∀ m ∈ M: D(sk, E(pk, m) ) = m

Dan Boneh Semantic Security For b=0,1 define experiments EXP(0) and EXP(1) as: Def: E = (G,E,D) is sem. secure (a.k.a IND-CPA) if for all efficient A: Adv SS [A, E ] = | Pr[EXP(0)=1] – Pr[EXP(1)=1] | < negligible Chal. b Adv. A (pk,sk)  G() m 0, m 1  M : |m 0 | = |m 1 | c  E(pk, m b ) b’  {0,1} EXP(b) pk

Dan Boneh Establishing a shared secret AliceBob (pk, sk) G() “Alice”, pk choose random x ∈ {0,1} 128

Dan Boneh Security (eavesdropping) Adversary sees pk, E(pk, x) and wants x ∈ M Semantic security ⇒ adversary cannot distinguish { pk, E(pk, x), x } from { pk, E(pk, x), rand ∈ M } ⇒ can derive session key from x. Note: protocol is vulnerable to man-in-the-middle

Dan Boneh Insecure against man in the middle As described, the protocol is insecure against active attacks AliceBob MiTM (pk, sk) G() “Alice”, pk (pk’, sk’) G() choose random x ∈ {0,1} 128 “Bob”, E(pk’, x)“Bob”, E(pk, x)

Dan Boneh Public key encryption: constructions Constructions generally rely on hard problems from number theory and algebra Next module: Brief detour to catch up on the relevant background

Dan Boneh Further readings Merkle Puzzles are Optimal, B. Barak, M. Mahmoody-Ghidary, Crypto ’09 On formal models of key exchange (sections 7-9) V. Shoup, 1999

Dan Boneh End of Segment