A Public Key Crypto System On Real and Com. Complex Numbers
|
|
- Valerie Andrews
- 6 years ago
- Views:
Transcription
1 A Public Key Crypto System On Real and Complex Numbers ISITV, Université du Sud Toulon Var BP 56, La Valette du Var cedex May 8, 2011
2 Motivation Certain rational interval maps can be used to define a cryptographically difficult problem based on entropy. This is exploited to define a fast and efficient block cipher with a public key, i.e. a Public Key Cryptosystem. The strength of the system will be studied. Parameters requirements will be derived. Implementation details will be presented.
3 Structure of the Presentation 1 The concept of One Way Function for Real Numbers. 2 Trap Door 3 The Interval Maps. 4 The New crypto-system. 5 Complex Field Case
4 One way Functions The concept of one way function (OWF) was introduced in the seventies, linking mathematical considerations of a mapping and its converse with two different computational complexities. The two most studied OWF are : The discrete exponential and the discrete logarithm function on a finite prime field The RSA problem linking a specific couple of exponentiations on a certain finite ring linked to the factorisation problem of factoring two integers.
5 One way Functions 2 These OWF are linked to a computationally hard problem. This means that, in each instance, finding a solution requires testing all ( or nearly all) the elements of a set to see if it is a solution to the problem. The set is of very large cardinality, without any possible strategy of converging to a solution and thus reducing the computational effort.
6 Entropy Based One Way Functions We introduce another kind of computationally hard problem which relies on another paradigm: The Entropy Based Pre-image Search Problem. It is applied using iterated interval maps. Suppose there is a function f(), real valued defined on the unit interval, computable in polynomial time, such that for any y of the unit interval the set A y of preimages of y is a set of (arbitarily) large cardinality, with computation parameters that are tractable. Such a mapping is called an entropy based OWF.
7 Computing the value f(x) is done in polynomial time. Finding a pre-image of a given element is done in polynomial time by the well known algorithms. However, with adequate parameters, finding all the pre-images is not possible with available memory resources, in a fixed reasonable interval of time.
8 Quadratic Curve
9 Cubic Curve
10 The Polynomial Interval Maps The new scheme requires interval maps with, for each element, a large set of pre-images. The scheme starts with polynomial interval maps: f(x) = α.x 2 mod 1 g(x) = β.x 3 mod 1 The coefficients must satisfy α > 2 and β > 2. The variable x belongs to the unit interval I = [0, 1]
11 Properties of f() The mapping f() has the functional property f(λ.x) = λ 2 f(x) mod 1 for all real valued λ < 1. The mappings f() is surjective (onto).
12 Properties of g() The mapping g() has the functional property g(λ.x) = λ 3 g(x) mod 1 for all real valued λ < 1. The mappings g() is surjective (onto). This property will serve as a trap door in the PKC.
13 Existence and Computational Problems Associated to Interval Maps To these mappings two algorithmic problems can be deduced. These will be used in a cryptographic context with adequate parameters.
14 Computational Problem for Iterated Polynomial Maps CPPM Given a set of values consisting in the evaluation of two points on the unit interval with the two mapping f(), g() defined in the preceding section, Given (f(a), g(a), f(b), g(b)) compute the values (f(a.b), g(a.b)). The solution of the problem is the following. The set of pre-images of an element a in the unit interval for f(), E f (a) = {x [0, 1] s.t. f(x) = a} is a set with α points lying in the unit interval. Computation of individual elements is possible in polynomial time. The same can be said for the set E g (a) = {x [0, 1]s.t. g(x) = a} for the mapping g(). In this setting the search for the element a is equivalent to computing the intersection of E g (a) and E f (a).
15 Computational Problem for Polynomial Maps CPPM If another pre-image of f(a) say a is used instead of a the inequality g(a.b) g(a.b) will be true and the problem will not be solved. The same can be said with b another pre-image of b for the mapping g().
16 The Decisional Problem for Polynomial maps DPPM The decision problem associated to the iterated interval maps can be defined as follows for a couple of iterated interval maps f() and g(). Given a set of values for three points of the unit interval a, b, c. (f(a), g(a), f(b), g(b), f(c), g(c)) Decide if c = a.b. The decisional problem is solved if an instance of the existence problem are solved. Therefore solving the decision problem is at least as hard as the computational problem.
17 Encoding Data on the Unit Interval Suppose that the words of plaintext are n -bit sequences which must be coded. Pre-compute the sequence a i = 2 i+1 i = 0,..., n 1 With the help of the sequence a i, a block of n bits x 0,..., x n 1 is encoded into the floating point number: n 1 y = x i a i 0 This coding method is efficient if the a i are pre-computed, since the computation of y involves only sums.
18 Decoding Numbers into Bit Sequences To obtain the bit sequence x 0,..., x n 1 associated to a floating point number y, one uses a knapsack linear decoding algorithm which runs as follows: Input y, output x 0,..., x n 1 for( i=0,i<n;i++) { if y > a i { x i =1 y=y-a i } else x i =0; } The floating points used to represent the binary data must be coded on at least n bits. However the precision must be 2 n bits in order that computational noise does not interfere with significant data.
19 Computing a Random pre -image for f() The analytical expression for the modular mapping f() can be quite hard to obtain if α is large. However with the non modular version the algorithm becomes quite simple. Suppose you want to compute a pre-image of y for y = α.x 2. Choose a random integer r such that 0 < t = y + r < α Compute x = (t/α) the result x is a random pre-image of y Remark One must note that the random integer r can be chosen to be really random since it must never be recomputed.
20 The associated PKC With the usual convention we will suppose that Alice wants to encipher a message to Bob in such a way that only Bob can decipher it. The Secret Key Belonging to Bob The secret key and characteristic quantity of the destination of the message is a real number s in the unit interval. They can be associated is associated to 2 different n bit sequences as shown earlier. The real number s is specific to one user and can be used to encipher many plaintext messages. The images f(s) and g(s) must be computed and kept secret. The block size n must be specified by Bob. The usual values are 128,256,512,1024.
21 The Public Key of Bob The public key of Bob is made of the following data. 1 The block length n, as well as α and β. 2 (f(s), g(s)) which are the images by the mapping f() ang g() of the secret key s. 3 The function f(x) = α x 2 and g(x) = β.x 3.
22 How Alice computes a cryptogram(enciphering) Let M the plaintext (sequence of bits) and r m the real number associated to a block of n bits, less than 1 associated to the message to be enciphered, by the method described. Alice begins by choosing by computing a (random) pre-image x of r m for the mapping f(). She then computes g(x.s) using the trap door property of g(). She also computes g(x).
23 Encrypting 2 2 The real number c 2 = g(x.s) The cryptogram of r m is a couple of real numbers: 1 The real number c 1 = x.g(x).g(x.s).
24 (Deciphering) Let c 1, c 2 be the cryptogram of r m, message enciphered for Bob, who has the secret quantity r. The deciphering of cryptogram by Bob has two steps 1 He computes d = g(x) with the trap dooor and 1/s 2 He computes t = c1 /(d.c 2 ). The real number t is equal to x. 3 He computes the iterated image of the result using f(). r m = f(t) = f(x) He then extracts the binary plaintext sequence x i from r m with a knapsack algorithm.
25 Soundness of the System Any user knowing the public key can encipher a message to Bob. Only Bob can perform the first step of the deciphering algorithm since it involves using the secret key. The second step can which relies on the first one cannot be done.
26 The Zero Knowledge Property of the PKC The presented PKC can be made zero knowledge if enough redundancy is introduced. The algorithm becomes Zero knowledge when the entropy of x is as large as the entropy of m. This depends on te size of α. If α > 2 n The the number of possible pre-images of r m and hence of cryptograms, is at least as large as the number of possible plaintext. Thus the ZK property is obtained
27 The Complex Case Setting 1 Let x m, y m be two real numbers less than 1, associated to M a 2.n bit sequence. Let be the modulus and be the argument. ρ m = x 2 m + y 2 m θ m = argcos(x/ρ m ) Le D be the complex disc, centered at 0 with radius 2.
28 The Complex Case Setting 2 Let α and β be two complex numbers with large modulus. Let f(z) = α.z 2 Let g(z) = β.z 3
29 The Complex Case Setting 3 Let z = (ρ z, θ z ) and z = (ρ z, θ z ) be two complex numbers in the disc D. The modular product z.z is defined as follows: ρ zz = ρ z.ρ z mod 2 and θ zz = θ z + θ z mod 2.π
30 The Complex Case PKC With the above conventions, the PKC definition is transposed to the complex case. -The length of the key is 2.n bits for a block length of 2.n bits. -The number of pre-images for the function f() and g() is evaluated in the same way for the modulii of the complex numbers involved. -The cryptogram is made of 2 complex numbers. -The security analysis is transposable.
31 The Secret Key Belonging to Bob The secret key and characteristic quantity of the destination of the message is a couple of real number x s, y s in the unit interval. They can be associated is associated to 2 n bit sequences as shown earlier. The complex numbers z s is specific to one user and can be used to encipher many plaintext messages. The images f(s) and g(s) must be computed. The block size n must be specified by Bob. The usual values are 128,256,512,1024.
32 The Public Key of Bob The public key of Bob is made of the following data. 1 The block length n, as well as α and β complex numbers with large modulii. 2 (f(s), g(s)) which are the images by the mapping f() ang g() of the secret key s. 3 The function f(x) = α x 2 and g(x) = β.x 3.
33 How Alice computes a cryptogram(enciphering) Let M the plaintext (sequence of bits) and z m = (x m, y m ) the complex number associated to a block of 2.n bits, less than 1 associated to the message to be enciphered, by the method descrided. Alice begins by choosing by computing a (random) pre-image x of z m for the mapping f(). She then computes g(x.s) using the trap door property of g(). She also computes g(x).
34 Encrypting 2 The cryptogram of z m is a couple of complex numbers: 1 The complex number c 1 = x.g(x).g(x.s). 2 The complex number c 2 = g(x.s)
35 (Deciphering) Let c 1, c 2 be the cryptogram of z m, message enciphered for Bob, who has the secret quantities r. The deciphering of cryptogram by Bob has two steps 1 He computes d = g(x) with the trap dooor and s 1 2 He computes t = c1 /(d.c 2 ). The complex number t is equal to x. 3 He computes the iterated image of the result using f(). z m = f(t) = f(x) He then extracts the binary plaintext sequence x i y i from ρ m, θ m with a knapsack algorithm applied to the real and complex part.
Key Management and Distribution
CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 10 Key Management; Other Public Key Cryptosystems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan
More informationIntroduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption
Introduction to Cryptography and Security Mechanisms: Unit 5 Public-Key Encryption Learning Outcomes Explain the basic principles behind public-key cryptography Recognise the fundamental problems that
More informationChapter 9. Public Key Cryptography, RSA And Key Management
Chapter 9 Public Key Cryptography, RSA And Key Management RSA by Rivest, Shamir & Adleman of MIT in 1977 The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on
More informationLECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)
Department of Software The University of Babylon LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY (One-Way Functions and ElGamal System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationCryptography and Network Security Chapter 10. Fourth Edition by William Stallings
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Chapter 10 Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture out of the
More informationSpring 2010: CS419 Computer Security
Spring 2010: CS419 Computer Security Vinod Ganapathy Lecture 7 Topic: Key exchange protocols Material: Class handout (lecture7_handout.pdf) Chapter 2 in Anderson's book. Today s agenda Key exchange basics
More informationCHAPTER 7. Copyright Cengage Learning. All rights reserved.
CHAPTER 7 FUNCTIONS Copyright Cengage Learning. All rights reserved. SECTION 7.1 Functions Defined on General Sets Copyright Cengage Learning. All rights reserved. Functions Defined on General Sets We
More informationFunctions. How is this definition written in symbolic logic notation?
functions 1 Functions Def. Let A and B be sets. A function f from A to B is an assignment of exactly one element of B to each element of A. We write f(a) = b if b is the unique element of B assigned by
More informationIntroduction to Cryptography and Security Mechanisms. Abdul Hameed
Introduction to Cryptography and Security Mechanisms Abdul Hameed http://informationtechnology.pk Before we start 3 Quiz 1 From a security perspective, rather than an efficiency perspective, which of the
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 10 Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would
More informationIntroduction to Cryptography Lecture 7
Introduction to Cryptography Lecture 7 Public-Key Encryption: El-Gamal, RSA Benny Pinkas page 1 1 Public key encryption Alice publishes a public key PK Alice. Alice has a secret key SK Alice. Anyone knowing
More informationThis chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest
1 2 3 This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest PKCS, Diffie- Hellman key exchange. This first published
More informationDefinition. A Taylor series of a function f is said to represent function f, iff the error term converges to 0 for n going to infinity.
Definition A Taylor series of a function f is said to represent function f, iff the error term converges to 0 for n going to infinity. 120202: ESM4A - Numerical Methods 32 f(x) = e x at point c = 0. Taylor
More informationRSA. Public Key CryptoSystem
RSA Public Key CryptoSystem DIFFIE AND HELLMAN (76) NEW DIRECTIONS IN CRYPTOGRAPHY Split the Bob s secret key K to two parts: K E, to be used for encrypting messages to Bob. K D, to be used for decrypting
More informationUnderstanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography
Understanding Cryptography by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 9 Elliptic Curve Cryptography ver. February 2nd, 2015 These slides were prepared by Tim Güneysu, Christof Paar
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA
More informationOverview. Public Key Algorithms I
Public Key Algorithms I Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.lsu.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601-04/ Louisiana State
More informationCryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL
Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E
More informationIntroduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell
Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering
More informationIntro to Public Key Cryptography Diffie & Hellman Key Exchange
Intro to Public Key Cryptography Diffie & Hellman Key Exchange Course Summary Introduction Stream & Block Ciphers Block Ciphers Modes (ECB,CBC,OFB) Advanced Encryption Standard (AES) Message Authentication
More informationDistributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography
More informationCS Network Security. Nasir Memon Polytechnic University Module 7 Public Key Cryptography. RSA.
CS 393 - Network Security Nasir Memon Polytechnic University Module 7 Public Key Cryptography. RSA. Course Logistics Homework 2 revised. Due next Tuesday midnight. 2/26,28/02 Module 7 - Pubic Key Crypto
More informationLecture IV : Cryptography, Fundamentals
Lecture IV : Cryptography, Fundamentals Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University Spring 2012 Basic Principles
More informationTHREE LECTURES ON BASIC TOPOLOGY. 1. Basic notions.
THREE LECTURES ON BASIC TOPOLOGY PHILIP FOTH 1. Basic notions. Let X be a set. To make a topological space out of X, one must specify a collection T of subsets of X, which are said to be open subsets of
More informationCS 161 Computer Security
Paxson Spring 2013 CS 161 Computer Security 3/14 Asymmetric cryptography Previously we saw symmetric-key cryptography, where Alice and Bob share a secret key K. However, symmetric-key cryptography can
More informationFunctions. Def. Let A and B be sets. A function f from A to B is an assignment of exactly one element of B to each element of A.
Functions functions 1 Def. Let A and B be sets. A function f from A to B is an assignment of exactly one element of B to each element of A. a A! b B b is assigned to a a A! b B f ( a) = b Notation: If
More informationCryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building
Cryptographic Techniques Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building Outline Data security Cryptography basics Cryptographic systems DES RSA C. H. HUANG IN CML 2 Cryptography
More informationTopics. Number Theory Review. Public Key Cryptography
Public Key Cryptography Topics 1. Number Theory Review 2. Public Key Cryptography 3. One-Way Trapdoor Functions 4. Diffie-Helman Key Exchange 5. RSA Cipher 6. Modern Steganography Number Theory Review
More information10.1 Introduction 10.2 Asymmetric-Key Cryptography Asymmetric-Key Cryptography 10.3 RSA Cryptosystem
[Part 2] Asymmetric-Key Encipherment Asymmetric-Key Cryptography To distinguish between two cryptosystems: symmetric-key and asymmetric-key; To discuss the RSA cryptosystem; To introduce the usage of asymmetric-key
More informationCHAPTER 5 NEW ENCRYPTION SCHEME USING FINITE STATE MACHINE AND GENERATING FUNCTION
4 CHAPTER 5 NEW ENCRYPTION SCHEME USING FINITE STATE MACHINE AND GENERATING FUNCTION 5.1 INTRODUCTION Cryptography is the science of writing in secret code and is ancient art. But modern cryptography is
More informationPublic Key Cryptography and the RSA Cryptosystem
Public Key Cryptography and the RSA Cryptosystem Two people, say Alice and Bob, would like to exchange secret messages; however, Eve is eavesdropping: One technique would be to use an encryption technique
More informationPublic Key Cryptography and RSA
Public Key Cryptography and RSA Major topics Principles of public key cryptosystems The RSA algorithm The Security of RSA Motivations A public key system is asymmetric, there does not have to be an exchange
More informationCryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.
Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets
More informationPublic-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7
Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:
More informationSecure Multiparty Computation
CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1
ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD 1 Recommended Book Steven Levy. Crypto. Penguin books. 2001. A non-technical account of the history of public-key cryptography and the colorful characters
More informationLecture 17: Continuous Functions
Lecture 17: Continuous Functions 1 Continuous Functions Let (X, T X ) and (Y, T Y ) be topological spaces. Definition 1.1 (Continuous Function). A function f : X Y is said to be continuous if the inverse
More informationPROTECTING CONVERSATIONS
PROTECTING CONVERSATIONS Basics of Encrypted Network Communications Naïve Conversations Captured messages could be read by anyone Cannot be sure who sent the message you are reading Basic Definitions Authentication
More informationNotes for Lecture 10
COS 533: Advanced Cryptography Lecture 10 (October 16, 2017) Lecturer: Mark Zhandry Princeton University Scribe: Dylan Altschuler Notes for Lecture 10 1 Motivation for Elliptic Curves Diffie-Hellman For
More informationElliptic Curve Cryptography
Elliptic Curve Cryptography Cryptography is the science of securely transmitting information such that nobody but the intended recipient may understand its contents. Cryptography has existed in some form
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 7 January 30, 2012 CPSC 467b, Lecture 7 1/44 Public-key cryptography RSA Factoring Assumption Computing with Big Numbers Fast Exponentiation
More informationEncryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC.
Encryption Providing Perfect Secrecy Presented at Calgary Unix Users Group. November 27, 2001 by: Mario Forcinito, PEng, PhD With many thanks to Prof. Aiden Bruen from the Mathematics Department, University
More informationA SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS
A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS Ounasser Abid 1 and Omar Khadir 2 1, 2 Laboratory of Mathematics, Cryptography and Mechanics, FSTM University Hassan II of Casablanca, Morocco
More information6. Symmetric Block Cipher BLOWFISH Performance. Memory space. 3. Simplicity The length of the key. The length of the data block is 64.
belongs to the same class of conventional symmetric ciphers. The basic principles of have been published in 1994 by Bruce Schneier, as an alternative to the Data encryption standard (DES) to satisfy the
More informationEncrypted Data Deduplication in Cloud Storage
Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline
More informationPublic Key Cryptography
graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,
More informationPublic Key Cryptosystem Based on Numerical Methods
Global Journal of Pure and Applied Mathematics. ISSN 0973-178 Volume 13, Number 7 (17), pp. 310-3112 Research India Publications http://www.ripublication.com Public Key Cryptosystem Based on Numerical
More informationAnalysis, demands, and properties of pseudorandom number generators
Analysis, demands, and properties of pseudorandom number generators Jan Krhovják Department of Computer Systems and Communications Faculty of Informatics, Masaryk University Brno, Czech Republic Jan Krhovják
More informationCryptographic protocols
Cryptographic protocols Lecture 3: Zero-knowledge protocols for identification 6/16/03 (c) Jussipekka Leiwo www.ialan.com Overview of ZK Asymmetric identification techniques that do not rely on digital
More informationUNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Introduction to Cryptography ECE 597XX/697XX
UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 10 Digital Signatures Israel Koren ECE597/697 Koren Part.10.1 Content of this part
More informationDigital Signatures. KG November 3, Introduction 1. 2 Digital Signatures 2
Digital Signatures KG November 3, 2017 Contents 1 Introduction 1 2 Digital Signatures 2 3 Hash Functions 3 3.1 Attacks.................................... 4 3.2 Compression Functions............................
More informationElliptic Curve Public Key Cryptography
Why? Elliptic Curve Public Key Cryptography ECC offers greater security for a given key size. Why? Elliptic Curve Public Key Cryptography ECC offers greater security for a given key size. The smaller key
More informationPublic-key encipherment concept
Date: onday, October 21, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on Public Key Cryptography Public-key encipherment concept Each user in a secure communication
More informationAnalysis of Partially and Fully Homomorphic Encryption
Analysis of Partially and Fully Homomorphic Encryption Liam Morris lcm1115@rit.edu Department of Computer Science, Rochester Institute of Technology, Rochester, New York May 10, 2013 1 Introduction Homomorphic
More informationMath236 Discrete Maths with Applications
Math236 Discrete Maths with Applications P. Ittmann UKZN, Pietermaritzburg Semester 1, 2012 Ittmann (UKZN PMB) Math236 2012 1 / 33 Key size in RSA The security of the RSA system is dependent on the diculty
More information2. Functions, sets, countability and uncountability. Let A, B be sets (often, in this module, subsets of R).
2. Functions, sets, countability and uncountability I. Functions Let A, B be sets (often, in this module, subsets of R). A function f : A B is some rule that assigns to each element of A a unique element
More informationProgramming Techniques in Computer Algebra
Programming Techniques in Computer Algebra Prof. Dr. Wolfram Koepf Universität Kassel http://www.mathematik.uni-kassel.de/~koepf March 18, 2010 Yaounde, Cameroon Abstract Topics of This Talk In this talk
More informationIntroduction to Cryptography Lecture 7
Introduction to Cryptography Lecture 7 El Gamal Encryption RSA Encryption Benny Pinkas page 1 1 Public key encryption Alice publishes a public key PK Alice. Alice has a secret key SK Alice. Anyone knowing
More informationAlgorithms (III) Yijia Chen Shanghai Jiaotong University
Algorithms (III) Yijia Chen Shanghai Jiaotong University Review of the Previous Lecture Factoring: Given a number N, express it as a product of its prime factors. Many security protocols are based on the
More informationIntroduction to Elliptic Curve Cryptography
A short and pleasant Introduction to Elliptic Curve Cryptography Written by Florian Rienhardt peanut.@.bitnuts.de Abstract This is a very basic and simplified introduction into elliptic curve cryptography.
More informationPublic Key Algorithms
Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular
More informationASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1
ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD 1 Recommended Book Steven Levy. Crypto. Penguin books. 2001. A non-technical account of the history of public-key cryptography and the colorful characters
More informationChapter 3 Public Key Cryptography
Cryptography and Network Security Chapter 3 Public Key Cryptography Lectured by Nguyễn Đức Thái Outline Number theory overview Public key cryptography RSA algorithm 2 Prime Numbers A prime number is an
More informationAlgorithms (III) Yu Yu. Shanghai Jiaotong University
Algorithms (III) Yu Yu Shanghai Jiaotong University Review of the Previous Lecture Factoring: Given a number N, express it as a product of its prime factors. Many security protocols are based on the assumed
More informationCSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography
CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography Outline 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography
More informationModern Cryptography Activity 1: Caesar Ciphers
Activity 1: Caesar Ciphers Preliminaries: The Caesar cipher is one of the oldest codes in existence. It is an example of a substitution cipher, where each letter in the alphabet is replaced by another
More informationA nice outline of the RSA algorithm and implementation can be found at:
Cryptography Lab: RSA Encryption and Decryption Lab Objectives: After this lab, the students should be able to Explain the simple concepts of encryption and decryption to protect information in transmission.
More informationAlgorithms (III) Yijia Chen Shanghai Jiaotong University
Algorithms (III) Yijia Chen Shanghai Jiaotong University Review of the Previous Lecture Factoring: Given a number N, express it as a product of its prime factors. Many security protocols are based on the
More informationChannel Coding and Cryptography Part II: Introduction to Cryptography
Channel Coding and Cryptography Part II: Introduction to Cryptography Prof. Dr.-Ing. habil. Andreas Ahrens Communications Signal Processing Group, University of Technology, Business and Design Email: andreas.ahrens@hs-wismar.de
More informationRSA (algorithm) History
RSA (algorithm) RSA is an algorithm for public-key cryptography that is based on the presumed difficulty of factoring large integers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 158
Enhancing The Security Of Koblitz s Method Using Transposition Techniques For Elliptic Curve Cryptography Santoshi Pote Electronics and Communication Engineering, Asso.Professor, SNDT Women s University,
More informationReals 1. Floating-point numbers and their properties. Pitfalls of numeric computation. Horner's method. Bisection. Newton's method.
Reals 1 13 Reals Floating-point numbers and their properties. Pitfalls of numeric computation. Horner's method. Bisection. Newton's method. 13.1 Floating-point numbers Real numbers, those declared to be
More informationOutline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA
CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography 1. Introduction 2. RSA Outline 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography
More informationAbhijith Chandrashekar and Dushyant Maheshwary
By Abhijith Chandrashekar and Dushyant Maheshwary Introduction What are Elliptic Curves? Curve with standard form y 2 = x 3 + ax + b a, b ϵ R Characteristics of Elliptic Curve Forms an abelian group Symmetric
More informationPublic-Key Cryptography
Computer Security Spring 2008 Public-Key Cryptography Aggelos Kiayias University of Connecticut A paradox Classic cryptography (ciphers etc.) Alice and Bob share a short private key using a secure channel.
More informationFunctions 2/1/2017. Exercises. Exercises. Exercises. and the following mathematical appetizer is about. Functions. Functions
Exercises Question 1: Given a set A = {x, y, z} and a set B = {1, 2, 3, 4}, what is the value of 2 A 2 B? Answer: 2 A 2 B = 2 A 2 B = 2 A 2 B = 8 16 = 128 Exercises Question 2: Is it true for all sets
More informationApplications of The Montgomery Exponent
Applications of The Montgomery Exponent Shay Gueron 1,3 1 Dept. of Mathematics, University of Haifa, Israel (shay@math.haifa.ac.il) Or Zuk 2,3 2 Dept. of Physics of Complex Systems, Weizmann Institute
More informationCryptography Worksheet
Cryptography Worksheet People have always been interested in writing secret messages. In ancient times, people had to write secret messages to keep messengers and interceptors from reading their private
More informationOutline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)
Outline AIT 682: Network and Systems Security 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard Topic 5.2 Public Key Cryptography Instructor: Dr. Kun Sun 2 Public Key
More informationClassic Cryptography: From Caesar to the Hot Line
Classic Cryptography: From Caesar to the Hot Line Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Overview of the Lecture Overview of Cryptography and Security Classical
More informationZero Knowledge Protocol
Akash Patel (SJSU) Zero Knowledge Protocol Zero knowledge proof or protocol is method in which a party A can prove that given statement X is certainly true to party B without revealing any additional information
More informationInternational Journal of Scientific & Engineering Research Volume 9, Issue 5, May ISSN
International Journal of Scientific & Engineering Research Volume 9, Issue 5, May2018 2014 ISSN 22295518 McEliece in RADG using Diffie Hellman Security System Zahraa Naseer 1,* 1,**, and Salah Albermany0F
More informationCS669 Network Security
UNIT II PUBLIC KEY ENCRYPTION Uniqueness Number Theory concepts Primality Modular Arithmetic Fermet & Euler Theorem Euclid Algorithm RSA Elliptic Curve Cryptography Diffie Hellman Key Exchange Uniqueness
More informationCryptographic Checksums
Cryptographic Checksums Mathematical function to generate a set of k bits from a set of n bits (where k n). k is smaller then n except in unusual circumstances Example: ASCII parity bit ASCII has 7 bits;
More informationח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms
Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,
More informationLecture 19 - Oblivious Transfer (OT) and Private Information Retrieval (PIR)
Lecture 19 - Oblivious Transfer (OT) and Private Information Retrieval (PIR) Boaz Barak November 29, 2007 Oblivious Transfer We are thinking of the following situation: we have a server and a client (or
More informationChapter 7 Public Key Cryptography and Digital Signatures
Chapter 7 Public Key Cryptography and Digital Signatures Every Egyptian received two names, which were known respectively as the true name and the good name, or the great name and the little name; and
More informationChapter 9 Public Key Cryptography. WANG YANG
Chapter 9 Public Key Cryptography WANG YANG wyang@njnet.edu.cn Content Introduction RSA Diffie-Hellman Key Exchange Introduction Public Key Cryptography plaintext encryption ciphertext decryption plaintext
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 11 October 4, 2017 CPSC 467, Lecture 11 1/39 ElGamal Cryptosystem Message Integrity and Authenticity Message authentication codes
More informationSome Stuff About Crypto
Some Stuff About Crypto Adrian Frith Laboratory of Foundational Aspects of Computer Science Department of Mathematics and Applied Mathematics University of Cape Town This work is licensed under a Creative
More informationDigital Signatures 1
Digital Signatures 1 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants of the ElGamal Signature Scheme The Digital Signature Algorithm
More informationPoint-Set Topology 1. TOPOLOGICAL SPACES AND CONTINUOUS FUNCTIONS
Point-Set Topology 1. TOPOLOGICAL SPACES AND CONTINUOUS FUNCTIONS Definition 1.1. Let X be a set and T a subset of the power set P(X) of X. Then T is a topology on X if and only if all of the following
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 7 February 5, 2013 CPSC 467b, Lecture 7 1/45 Stream cipher from block cipher Review of OFB and CFB chaining modes Extending chaining
More informationUNIVERSIDAD CARLOS III DE MADRID Escuela Politécnica Superior Departamento de Matemáticas
UNIVERSIDAD CARLOS III DE MADRID Escuela Politécnica Superior Departamento de Matemáticas a t e a t i c a s PROBLEMS, CALCULUS I, st COURSE. FUNCTIONS OF A REAL VARIABLE BACHELOR IN: Audiovisual System
More informationComputer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a
More informationIssues in Information Systems Volume 18, Issue 2, pp , 2017
IMPLEMENTING ELLIPTIC CURVE CRYPTOGRAPHY USING MICROSOFT EXCEL Abhijit Sen, Kwantlen Polytechnic University, abhijit.sen@kpu.ca ABSTRACT Microsoft Excel offers a number of data manipulation tools that
More informationElliptic Curve Cryptography
Elliptic Curve Cryptography Dimitri Dimoulakis, Steve Jones, and Lee Haughton May 05 2000 Abstract. Elliptic curves can provide methods of encryption that, in some cases, are faster and use smaller keys
More informationPublic Key Cryptography
Public Key Cryptography Giuseppe F. Italiano Universita` di Roma Tor Vergata italiano@disp.uniroma2.it Motivation Until early 70s, cryptography was mostly owned by government and military Symmetric cryptography
More informationStudies on Modular Arithmetic Hardware Algorithms for Public-key Cryptography
Studies on Modular Arithmetic Hardware Algorithms for Public-key Cryptography Marcelo Emilio Kaihara Graduate School of Information Science Nagoya University January 2006 iii Dedicated to my father. Abstract
More informationFunctions and Sequences Rosen, Secs. 2.3, 2.4
UC Davis, ECS20, Winter 2017 Discrete Mathematics for Computer Science Prof. Raissa D Souza (slides adopted from Michael Frank and Haluk Bingöl) Lecture 8 Functions and Sequences Rosen, Secs. 2.3, 2.4
More information