The Pennsylvania State University CSE597B: Special Topics in Network and Systems Security The Miscellaneous Instructor: Sencun Zhu.

Slides:



Advertisements
Similar presentations
Mathematics of Cryptography Part II: Algebraic Structures
Advertisements

Cryptography and Network Security, Finite Fields From Third Edition by William Stallings Lecture slides by Mustafa Sakalli so much modified..
Cryptography and Network Security
Chapter 4 Finite Fields. Introduction of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key concern operations on “numbers”
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
Chapter 4 – Finite Fields. Introduction will now introduce finite fields of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key.
1.  We have studied groups, which is an algebraic structure equipped with one binary operation. Now we shall study rings which is an algebraic structure.
Chap. 4: Finite Fields Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
CNS2010handout 8 :: introduction to number theory1 computer and network security matt barrie.
Cryptography and Network Security Chapter 4
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
Announcements: Ch 3 quiz next week (tentatively Friday). Will include fields (today) Ch 3 quiz next week (tentatively Friday). Will include fields (today)Today:
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
Cryptography & Number Theory
Cryptography and Network Security, Finite Fields From Third Edition by William Stallings Lecture slides by Mustafa Sakalli so much modified..
Public Key Algorithms 4/17/2017 M. Chatterjee.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
ASYMMETRIC CIPHERS.
WHOLE NUMBERS; INTEGERS Whole numbers: Z 0,+ = the natural numbers  {0}. Integers:
Elliptic Curve Cryptography
Number Theory and Advanced Cryptography 1. Finite Fields and AES
FINITE FIELDS 7/30 陳柏誠.
CPSC 3730 Cryptography and Network Security
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
Cryptography and Network Security Introduction to Finite Fields.
By: Hector L Contreras SSGT / USMC
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Monoids, Groups, Rings, Fields
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Session 1 Stream ciphers 1.
Chapter 4 – Finite Fields
Properties of Real Numbers. Sets In mathematics, a set is a collection of things Sets can be studies as a topic all on its own (known as set theory),
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
6.6 Rings and fields Rings  Definition 21: A ring is an Abelian group [R, +] with an additional associative binary operation(denoted · such that.
Fall 2002CS 395: Computer Security1 Chapters 4 and 8: The Mathematics Required for Public Key Cryptography In case you’re beginning to worry that this.
Information Security Lab. Dept. of Computer Engineering 87/121 PART I Symmetric Ciphers CHAPTER 4 Finite Fields 4.1 Groups, Rings, and Fields 4.2 Modular.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
(2 + 1) + 4 = 2 + (1 + 4) Associative Property of Addition.
Ref: Pfleeger96, Ch.31 Properties of Arithmetic Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, 1996.
Lecture 3.1: Public Key Cryptography I CS 436/636/736 Spring 2015 Nitesh Saxena.
Cryptography and Network Security Chapter 4 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
by D. Fisher (2 + 1) + 4 = 2 + (1 + 4) Associative Property of Addition 1.
(2 + 1) + 4 = 2 + (1 + 4) Associative Property of Addition.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
1 Cryptanalysis Lab Elliptic Curves. Cryptanalysis Lab Elliptic Curves 2 Outline [1] Elliptic Curves over R [2] Elliptic Curves over GF(p) [3] Properties.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Mathematical Background : A quick approach to Group and Field Theory
CS480 Cryptography and Information Security
Great Theoretical Ideas In Computer Science
Quick reviews / corrections
Elliptic Curves.
Cryptography and Network Security
I. Finite Field Algebra.
Cryptology Design Fundamentals
Cryptographic Protocols Secret Sharing, Threshold Security
Mathematical Background : A quick approach to Group and Field Theory
Presentation transcript:

The Pennsylvania State University CSE597B: Special Topics in Network and Systems Security The Miscellaneous Instructor: Sencun Zhu

The Pennsylvania State University2 Appetizer Ten scientists are working on a secret project. They wish to lock up the documents in a cabinet so that the cabinet can be opened if and only if five or more of the scientists are present. –What is the smallest number of locks needed? –What is the smallest number of keys to the locks each scientist must carry?

The Pennsylvania State University3 Outline A little maths –Group, ring, (finite) field –Increasing importance in cryptography –AES, Elliptic Curve, Threshold Cryptography Secret sharing and threshold cryptography –Based on slides by Prof. Helger Lipmaa, Helsinki University of Technology Design rules

The Pennsylvania State University4 Group G, a set of elements or “numbers” Obeys: –Closure: if a and b belong to G, a. B is also in G –associative law: (a.b).c = a.(b.c) –has identity e : e.a = a.e = a –has inverses a -1 : a.a -1 = e if commutative a.b = b.a –then forms an abelian group

The Pennsylvania State University5 Cyclic Group Define exponentiation as repeated application of operator –example: a 3 = a.a.a Let identity e be: e=a 0 A group is cyclic if every element is a power of some fixed element –i.e. b = a k for some a and every b in group a is said to be a generator of the group

The Pennsylvania State University6 Ring R, a set of “numbers” with two operations, addition and multiplication: –an abelian group with addition operation –closure under multiplication –associative under multiplication –distributive law: a(b+c) = ab + ac if multiplication operation is commutative, it forms a commutative ring if multiplication operation has inverses and no zero divisors, it forms an integral domain

The Pennsylvania State University7 Field F, a set of numbers with two operations: –F is an integral domain –Multiplicative inverse For each a in F, except 0, there is an element a -1 in F such that a a -1 = a -1 a =1 In essence, a field is a set in which we can do addition, subtraction, multiplication, and division without leaving the set –Division: a/b = a b -1

The Pennsylvania State University8 Galois Fields Finite fields (known as Galois fields) play a key role in cryptography Theorem: the number of elements in a finite field must be a power of a prime p n, denoted as GF(p n ) In particular often use the fields: –GF(p) –GF(2 n )

The Pennsylvania State University9 Galois Fields GF(p) GF(p) is the set of integers {0,1, …, p- 1} with arithmetic operations modulo prime p these form a finite field –since have multiplicative inverses hence arithmetic is “well-behaved” and can do addition, subtraction, multiplication, and division without leaving the field GF(p)

The Pennsylvania State University10 Keep Secrets on a Computer Very difficult Wiping state –Easier in C/C++, difficult in Java Swap file –Virtual memory Caches –Keep copies of data Data retention by memory –SRAM/DRAM could learn and remember data Access by others Data integrity

The Pennsylvania State University11 Key Storage Reliability and confidentiality of important data: –Information can be secured by encryption –After that, many copies of the ciphertext can be made How to secure the secret key? –Encrypting of key — vicious cycle –Replicating key — insecure Idea: distribute the key to a group, s.t. nobody by itself knows it

The Pennsylvania State University12 Secret Sharing:More Motivations USSR: At least two of the three nuclear buttons must have been pressed simultaneously Any other process where you might not trust a single authority Threshold cryptography –Computation can be performed in a distributed way by “trusted” subsets of parties Verifiable SS: One can verify that inputs were shared correctly

The Pennsylvania State University13 Secret Sharing Schemes: Definition A dealer shares a secret key among n parties Each party i in [1, n] receives a share Predefined groups of participants can cooperate to reconstruct the shares Smaller subgroups cannot get any information about the secret

The Pennsylvania State University14 (k, n)-threshold schemes A dealer shares a secret key between n parties Each party i in [1, n] receives a share A group of any k participants can cooperate to reconstruct the shares No group of k-1 participants can get any information about the secret

The Pennsylvania State University15 A Bad Example Let K be a 100-bit block cipher key. –Share it between two parties –Giving to both parties 50 bits of the key Why is this bad? –The requirement ‘Smaller subgroups cannot get any information about the secret’ is violated Ciphertext-only attack –Both participants can recover the plaintext by themselves, by doing a (2^50)-time exhaustive search

The Pennsylvania State University16 (2, 2)-threshold scheme Let s G be a secret from group (G, +). Dealer chooses a uniformly random s 1 G and lets s 2 = s – s 1 The two shares are s 1 and s 2 Given s 1 and s 2, one can successfully recover s = s 1 + s 2 Given only s 1, s 2 is random, vice versa – Pr[s = k | s 2 ] = Pr[s 1 = k - s 2 | s 2 ] = 2^|G | for any k

The Pennsylvania State University17 (n, n)-threshold scheme

The Pennsylvania State University18 Shamir’s (k,n) Threshold Scheme Mathematical basis

The Pennsylvania State University19 Shamir’s (k,n) Threshold Scheme Dealing phase

The Pennsylvania State University20 Shamir’s (k,n) Threshold Scheme

The Pennsylvania State University21 Shamir’s (k,n) Threshold Scheme

The Pennsylvania State University22 Illustration

The Pennsylvania State University23 Shamir’s Scheme: Efficiency

The Pennsylvania State University24 Shamir’s Scheme: Flexibility

The Pennsylvania State University25 Remarks

The Pennsylvania State University26 Design Rules Design rules: –Complexity is the worst energy of security There are no secure complex systems –Correctness must be a local property every part of the system should behave correctly regardless of how the rest of the system works –For a security level of n bits, every cryptographic value should be at least 2n bits long Due to collision attacks –Reliability Do not assume message reliability –TCP cannot prevent active attacks

The Pennsylvania State University27 Presentation Two presentations each class –Let us first see how it will be going Time –30~35 minutes/person, including random interruption –Do not exceed How to give a good talk – How to give a bad talk –