Cryptography issues – elliptic curves Presented by Tom Nykiel.

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

Public Key Encryptions CS461/ECE422 Fall Reading Material Text Chapters 2 and 20 Handbook of Applied Cryptography, Chapter 8 –
Asymmetric-Key Cryptography
What is Elliptic Curve Cryptography?
Elliptic curve arithmetic and applications to cryptography By Uros Abaz Supervised by Dr. Shaun Cooper and Dr. Andre Barczak.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
Introduction to Modern Cryptography Lecture 5 Number Theory: 1. Quadratic residues. 2. The discrete log problem. Intro to Public Key Cryptography Diffie.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
Cryptography & Number Theory
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
The Diffie-Hellman Algorithm Riley Lochridge April 11, 2003.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CPE5021 Advanced Network Security --- Advanced Cryptography: Elliptic Curve Cryptography --- Lecture 3 CPE5021 Advanced Network Security --- Advanced Cryptography:
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
ASYMMETRIC CIPHERS.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Cryptography ECT 582 – Winter 2004 Robin Burke. Discussion.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 3 Public-Key Cryptography and Key Management.
Application of Elliptic Curves to Cryptography
Great Theoretical Ideas in Computer Science.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
CRYPTOGRAPHY How does it impact cyber security and why you need to know more?
Midterm Review Cryptography & Network Security
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Elliptic Curve Cryptography
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Information Security Lab. Dept. of Computer Engineering 251/ 278 PART II Asymmetric Ciphers Key Management; Other CHAPTER 10 Key Management; Other Public.
Hash Functions Which of these problems is easier to solve:
Asymmetric-Key Cryptography
Appendix 5: Cryptography p
Practical Aspects of Modern Cryptography
Introduction to Elliptic Curve Cryptography
CSCE 715: Network Systems Security
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Cryptography issues – elliptic curves Presented by Tom Nykiel

What are we going to talk about… What is cryptography ? What is cryptography ? Why do we need it ? Why do we need it ? Who uses cryptographic services ? Who uses cryptographic services ? How is it done classically ? How is it done classically ? Elliptic curves Elliptic curves How is it done using elliptic curves ? How is it done using elliptic curves ? Summary Summary

What is cryptography ? Hiding of meaning of messages Hiding of meaning of messages Branch of information theory Branch of information theory Study of information and especially its transmission from place to place Study of information and especially its transmission from place to place In the past mainly encrypting In the past mainly encrypting But now… But now…

Why do we need it ? Information protection services nowadays: Information protection services nowadays: 1. Integrity 2. Authentication 3. Non-repudiation 4. Confidentiality

Who uses cryptographic services ? Banking : ATM, online banking Banking : ATM, online banking Computer science : securing networks and systems Computer science : securing networks and systems Military : securing confidential information Military : securing confidential information Love letters Love letters Much more… Much more…

How is it done classically ? Symmetric approach – both sides have the same amount of information which is used in encrypting process Symmetric approach – both sides have the same amount of information which is used in encrypting process 1. Fast encoding (O(n)) 2. Exponential time complexity key security 3. Short keys Examples : DES, AES, Blowfish, IDEA, Twofish, Serpent Examples : DES, AES, Blowfish, IDEA, Twofish, Serpent

Any problems ? Asymmetric approach : both sides have some information sufficient to encode/decode Asymmetric approach : both sides have some information sufficient to encode/decode May be used in establishing a symmetric key Hundreds or thousands time slower than sym. May be used in establishing a symmetric key Hundreds or thousands time slower than sym. 1. Computationally secure 2. Still good performance 3. Examples: RSA, Diffie-Hellman, El-Gamal,

Computationally hard issues RSA algorithm RSA algorithm - Factorization problem : find such prime numbers p and q for a given n that p*q=n Diffie-Hellman Diffie-Hellman - Discrete logarithm problem : find x such that g^x mod p = A for given g, p and A g^x mod p = A for given g, p and A

Diffie-Hellman scheme

Diffie Hellman… Alice and Bob agree to use a prime number p=23 and base g=5. Alice and Bob agree to use a prime number p=23 and base g=5. Alice chooses a secret integer a=6, then sends Bob (g^a mod p) Alice chooses a secret integer a=6, then sends Bob (g^a mod p) 56 mod 23 = mod 23 = 8. Bob chooses a secret integer b=15, then sends Alice (g^b mod p) Bob chooses a secret integer b=15, then sends Alice (g^b mod p) 515 mod 23 = mod 23 = 19. Alice computes (g^b mod p)^a mod p Alice computes (g^b mod p)^a mod p 196 mod 23 = mod 23 = 2. Bob computes (g^a mod p)^b mod p Bob computes (g^a mod p)^b mod p 815 mod 23 = mod 23 = 2.

Modern cryptography

Elliptic curves In mathematics, an elliptic curve is an algebraic curve defined by an equation of the form In mathematics, an elliptic curve is an algebraic curve defined by an equation of the form Y^2 = X^3 + aX + b, Y^2 = X^3 + aX + b,

Examples…

Modular arithmetic

Addition and multiplication

Hard problems… For given S find P and Q such that P+Q=S – factorization problem For given S find P and Q such that P+Q=S – factorization problem For given G and P find a such that aG=P – discrete logarithm problem For given G and P find a such that aG=P – discrete logarithm problem

Diffie Hellman for EC

Time complexity issues Classical approach – Classical approach – 1. Recall the algorithm of multiplying two num. in O(n^2) O(n^1.58) O(n logn loglog n) time 2. A^B = A^(B/2) * A^(B/2) [ *A] 3. Results in polynomial time in number of bits of the exponent b. Apply the same idea to EC Apply the same idea to EC 1. kA = 2 * (k/2)*A

Key length comparison

References Standards for Efficient Cryptography Group Standards for Efficient Cryptography Group Tutorial EC Tutorial EC RSA labs RSA labs