NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Cryptography encryption authentication digital signatures
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Modern Cryptography New Directions in Cryptography W.Diffie & M.E.Hellman Probabilistic Encryption S.Goldwasser & S.Micali.
Session 4 Asymmetric ciphers.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 9 – Public Key Cryptography and RSA Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Computer Security CS 426 Lecture 3
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Chapter 12 Cryptography (slides edited by Erin Chambers)
EE5552 Network Security and Encryption block 4 Dr. T.J. Owens CEng MIET Dr T. Itagaki MIET, MIEEE, MAES.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
The RSA Algorithm Rocky K. C. Chang, March
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
I-4 security.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Public-Key Cryptography CS110 Fall Conventional Encryption.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
CPS 290 Computer Security Network Tools Cryptography Basics CPS 290Page 1.
Lecture 2: Introduction to Cryptography
Overview of Cryptography & Its Applications
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Intro to Cryptography Lesson Introduction
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Computer Security (CS4800)
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Basics of Cryptography
Asymmetric-Key Cryptography
Cryptography.
Presentation transcript:

NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park

Contents  Introduction  Conventional Cryptography  Public Key Cryptography  One-Way Authentication  Problem Interrelations  Problem Trap Doors  Computational Complexity  Q&A

Introduction  The best known cryptographic problem is that of privacy: preventing the unauthorized extraction of information from communications over an insecure channel

Conventional Cryptography (1/2)  Symmetric-key algorithms  Encipher: transmitter generates a plaintext P, produces the ciphertext C, C=S K (P)  The key K is transmitted only to the legitimate receiver via a secure channel  Decipher: receiver decipher C by operating: S K -1 (C)=S K -1 (S K (P))=P TRANSMITTER MESSAGE SOURCE KEY SOURCE RECEIVER CRYPTANALYST P K C=S K (P) P=S K -1 (C) P

Conventional Cryptography (2/2)  Computationally secure  Unconditionally secure: one time pad(OTP)  Computationally infeasible  Threats  Ciphertext Only Attack  Known Plaintext Attack  Chosen Plaintext Attack (IFF attack)

Public Key Cryptography (1/4)  Symmetric key algorithm has some problems => Public key cryptography TRANSMITTER MESSAGE SOURCE KEY SOURCE #1 RECEIVER CRYPTANALYST P P KEY SOURCE #2 P Flow of information in public key system

Public Key Cryptography (2/4)  Public key cryptosystem: a pair of families {E K } K ∈ {K} and {D K } K ∈ {K} of algorithms representing invertible transformations, E K :{M} → {M} D K :{M} → {M} on a finite message space {M} 1) for every K in {K}, E K is the inverse of D K 2) for every K in {K} and M in {M}, the algorithms E K and D K are easy to compute 3) for almost every K in {K}, each easily computed algorithms equivalent to D K is computational in feasible to derive from E K 4) for every K in {K}, it is feasible to compute inverse pairs E K and D K form K

Public Key Cryptography (3/4)  Concepts  Y = a X mod q (1 ≤ X ≤ q-1) Easy to compute  X = log a Y mod q (1 ≤ Y ≤ q-1) Difficult  Key exchange Concepts  User i place this in public: Y i = a X i mod q  Key in Communication between User i and User j (K ij ): K ij = a X i X j mod q  User i obtains K ij : K ij = Y j X i mod q = (a X j ) x i mod q = a X j X i = a X i X j mod q  User j obtains K ij : K ij = Y i X j mod q  Other User can obtains K ij by “K ij = Y i (log a Y j ) mod q”. But.

Public Key Cryptography (4/4)  Concepts

One-Way Authentication  Authentication is at the heart of any system involving contracts and billing  It must be easy for anyone to recognize the signature as authentic, but impossible for anyone other than the legitimate signer to produce it  Login problem in a multiuser computer system  One-way function  Public key cryptosystem can be used to produce a true one-way authentication system

Interrelation (1/4)  A cryptosystem which is secure against known plaintext attack (KPA) can be used to produce a one-way function P0P0 X Y = f(x) Key Plaintext Cipher text Take: 1. {S K :{P}  {C}} KE{K}  secure against KPA 2. Fix P = P 0 Consider: f:{K}  {C} defined by f(X) = S X (P 0 ) Conclusion: This function is one-way because solving for X given f(X) is equivalent to cryptanalytic problem of finding the key from single known plaintext cryptogram pair.

Interrelation (2/4)  One-way functions are basic to both block ciphers and key generators  A key generator is a pseudorandom bit generator whose output, key stream, is added modulo 2 to message represented in binary form, in imitation of a one-time pad The key is used as “seed” which determines the pseudorandom key stream sequence Message added modulo 2 (XOR) Key Generator key

Interrelation (3/4)  For the system to be secure, computation of the key from the key stream must be computationally infeasible  While, they system to be usable, calculation of the key stream from the key must be computationally simple  A good key generator is one-way function

Interrelation (4/4)  A public key cryptosystem can be used to generate a one-way authentication Authentication  Digital Signature Alice wants to send M to Bob computes C = D alice’s PriK (M)  to Bob Bob received message C and Computes E alice’s PubK (C)  recover M Then, Bob can used the value of C as a proof that the message come from Alice

Trap Door (1/2)  The previous case shows that without information about deciphering key, by knowing only the enciphering key and the message C  it is computationally infeasible to find message M  As such a public key system is really a set of trap- door one-way functions  For such function, only through knowledge of certain trap-door information can one easily find the easily computed inverse

Trap Door (2/2)  A trap-door cryptosystem can be used to produce a public key distribution system B’s trap door cryptosystem plaintext key Computed cryptogram B’s trap door cryptosystem trap door key User A User B

Computational Complexity (1)  Neither public key cryptosystem nor one-way authentication system can be unconditionally secure because the public information always determines the secret information uniquely among the member of finite set The cryptosystem is analogous with set mapping from infinite set to finite set (because the use of modulus) With unlimited computation, the problem could therefore be solved by Straightforward search public informationsecret information

Computational Complexity (2)  The cryptanalytic difficulty of a system whose encryption and decryption operations can be done in P (polynomial) time can not be greater than NP (non-deterministic polynomial) NP P Cryptanalytic problem can be solved by finding key, inverse image, etc  finite set Choose the key non-deterministically and verify in P time that it is the correct one Since, by assumption, encryption takes only P time the cryptanalysis takes only NP time

Conclusion  This paper basically introduces a new away to encrypt/decrypt message  Previous way  one key is used both for encryption and decryption.  New way  used different key for encryption and decryption  There are two things suggested:  Public key system  One-way authentication system based on public key

 Q&A Thank You!