Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.

Slides:



Advertisements
Similar presentations
ElGamal Security Public key encryption from Diffie-Hellman
Advertisements

Trusted 3rd parties Basic key exchange
Dan Boneh Public key encryption from Diffie-Hellman ElGamal Variants With Better Security Online Cryptography Course Dan Boneh.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Asymmetric-Key Cryptography
7. Asymmetric encryption-
Secret Handshakes from CA-Oblivious Encryption Asiacrypt 2004, Jeju-do, Korea Claude Castelluccia, Stanisław Jarecki, Gene Tsudik UC Irvine.
Session 4 Asymmetric ciphers.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Identity Based Encryption
A Designer’s Guide to KEMs Alex Dent
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Pass in HW6 now Can use up to 2 late days Can use up to 2 late days But one incentive not to burn them all: teams will get to pick their presentation day.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
Dan Boneh Basic key exchange The Diffie-Hellman protocol Online Cryptography Course Dan Boneh.
Dan Boneh Basic key exchange Public-key encryption Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations The RSA trapdoor permutation Online Cryptography Course Dan Boneh.
Cryptography Overview CS155. Cryptography Is A tremendous tool The basis for many security mechanisms Is not The solution to all security problems Reliable.
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
Codes, Ciphers, and Cryptography-RSA Encryption
Computer Science Public Key Management Lecture 5.
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Dan Boneh Authenticated Encryption Definitions Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
8. Data Integrity Techniques
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Rachana Y. Patil 1 1.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2014 Nitesh Saxena.
Cryptography Lecture 8 Stefan Dziembowski
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Dan Boneh Public Key Encryption from trapdoor permutations PKCS 1 Online Cryptography Course Dan Boneh.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Dan Boneh Basic key exchange Merkle Puzzles Online Cryptography Course Dan Boneh.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Scott CH Huang COM 5336 Lecture 7 Other Public-Key Cryptosystems Scott CH Huang COM 5336 Cryptography Lecture 7.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Dan Boneh Basic key exchange Trusted 3 rd parties Online Cryptography Course Dan Boneh.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
Dan Boneh Odds and ends Deterministic Encryption Online Cryptography Course Dan Boneh.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Dan Boneh Public Key Encryption from trapdoor permutations Constructions Online Cryptography Course Dan Boneh Goal: construct chosen-ciphertext secure.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
How to Use Charm Crypto Lib
Presentation transcript:

Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh

Dan Boneh Recap: public key encryption: (Gen, E, D) E E D D pk mccm sk Gen

Dan Boneh Recap: public-key encryption applications Key exchange (e.g. in HTTPS) Encryption in non-interactive settings: Secure Bob has Alice’s pub-key and sends her an Encrypted File Systems Bob write E(k F, File) E(pk A, K F ) E(pk B, K F ) Alice read File sk A

Dan Boneh Recap: public-key encryption applications Key exchange (e.g. in HTTPS) Encryption in non-interactive settings: Secure Bob has Alice’s pub-key and sends her an Encrypted File Systems Key escrow: data recovery without Bob’s key Bob write E(k F, File) E(pk escrow, K F ) E(pk B, K F ) Escrow Service Escrow Service sk escrow

Dan Boneh Constructions This week: two families of public-key encryption schemes Previous lecture: based on trapdoor functions (such as RSA) – Schemes: ISO standard, OAEP+, … This lecture: based on the Diffie-Hellman protocol – Schemes: ElGamal encryption and variants (e.g. used in GPG) Security goals: chosen ciphertext security

Dan Boneh Review: the Diffie-Hellman protocol (1977) Fix a finite cyclic group G ( e.g G = (Z p ) * ) of order n Fix a generator g in G ( i.e. G = {1, g, g 2, g 3, …, g n-1 } ) AliceBob choose random a in {1,…,n}choose random b in {1,…,n} k AB = g ab = ( g a ) b = A b B a = ( g b ) a = A = g a B = g b

Dan Boneh ElGamal: converting to pub-key enc. (1984) Fix a finite cyclic group G ( e.g G = (Z p ) * ) of order n Fix a generator g in G ( i.e. G = {1, g, g 2, g 3, …, g n-1 } ) AliceBob choose random a in {1,…,n}choose random b in {1,…,n} A = g a B = g b Treat as a public key ct = [, ] compute g ab = A b, derive symmetric key k, encrypt message m with k

Dan Boneh ElGamal: converting to pub-key enc. (1984) Fix a finite cyclic group G ( e.g G = (Z p ) * ) of order n Fix a generator g in G ( i.e. G = {1, g, g 2, g 3, …, g n-1 } ) AliceBob choose random a in {1,…,n}choose random b in {1,…,n} A = g a B = g b Treat as a public key ct = [, ] compute g ab = A b, derive symmetric key k, encrypt message m with k To decrypt: compute g ab = B a, derive k, and decrypt

Dan Boneh The ElGamal system (a modern view) G: finite cyclic group of order n (E s, D s ) : symmetric auth. encryption defined over (K,M,C) H: G 2 K a hash function We construct a pub-key enc. system (Gen, E, D): Key generation Gen: – choose random generator g in G and random a in Z n – output sk = a, pk = (g, h=g a )

Dan Boneh The ElGamal system (a modern view) E ( pk=(g,h), m ) : b Z n, u g b, v h b k H(u,v), c E s (k, m) output (u, c) D ( sk=a, (u,c) ) : v u a k H(u,v), m D s (k, c) output m G: finite cyclic group of order n (E s, D s ) : symmetric auth. encryption defined over (K,M,C) H: G 2 K a hash function R

Dan Boneh ElGamal performance Encryption: 2 exp. (fixed basis) – Can pre-compute [ g (2^i), h (2^i) for i=1,…,log 2 n ] – 3x speed-up (or more) Decryption: 1 exp. (variable basis) E( pk=(g,h), m) : b Z n, u g b, v h b D( sk=a, (u,c) ) : v u a

Dan Boneh End of Segment Next step: why is this system chosen ciphertext secure? under what assumptions?