Improving Service Credibility Using Password Authenticated Peer Services

Size: px
Start display at page:

Download "Improving Service Credibility Using Password Authenticated Peer Services"

Transcription

1 Improving Service Credibility Using Password Authenticated Peer Services Mathiarasu.G 1, Kanmani sivagar.a 2 Department of Computer science and Engineering,SRM UNIVERSITY, Tamilnadu, India. 1 Department of Computer science and Engineering,SRM UNIVERSITY, Tamilnadu, India. 2 ABSTRACT Password-Authenticated Key Exchange (PAKE) is where a client and a server, who share a password, authenticate each other and meanwhile establish a cryptographic key by exchange of messages. In a scenario where two servers cooperate to authenticate a client and if one server is compromised, the attacker still cannot pretend to be the client with the information from the compromised server. Two-server PAKE are either symmetric in the sense that two peer servers equally contribute to the authentication or asymmetric in the sense that one server authenticates the client with the help of another server. Current symmetric solution for two-server PAKE, where the client can establish different cryptographic keys with the two servers, respectively. This protocol runs in parallel and is more efficient than existing symmetric twoserver PAKE protocol. A solution to redirect the client request using PAKE, if one of the servers fails or crashes in case of Denial of Service attacks and resistance against Denial of service attacks Keywords - Password Aurhenticated Key Exchange,Cryptographic key,denial of service attack I. INTRODUCTION NOWADAYS, passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines (ATMs) and etc. A computer user may require passwords for many purposes: logging in to computer accounts, retrieving from servers, accessing programs,databases, networks, web sites, and even reading the morning newspaper online.earlier password-based authentication systems transmitted a cryptographic hash of the password over a public channel which makes the hash value accessible to an attacker. When this is done, and it is very common,the attacker can work offline, rapidly testing possible passwords against the true password s hash value. Studies have consistently shown that a large fraction of userchosen passwords are readily guessed automatically. For example, according to Bruce Schneier, examining data from a 2006 phishing attack, 55% of MySpace passwords would be crackable in 8 hours using a commercially available Password Recovery Toolkit capable of testing 200,000 passwords per second in 2006 Recent research advances in password-based authentication have allowed a client and a server mutually to authenticate with a password and meanwhile to establish a cryptographic key for secure communications after authentication. In general, current solutions for password-based authentication follow two models. A:PASSWORD-AUTHENTICATED KEY EXCHANGE Two server password-based authentication protocols(two-server PAKE), where two servers cooperate to authenticate a client on the basis of Password Only and if one server is compromised due to Insider Attack or Denial Of Service Attack (DDOS), the attacker still cannot pretend to be the client with the information from the compromised server. Recent research advances in password-based authentication and follow two models.a passwordonly authentication protocol which is both practical and provably-secure under standard cryptographic assumption. Our Protocol is Symmetric and, can run in parallel to establishes secret session keys between the client and two servers, respectively. In :case one of the two servers shuts down due to the denial-of service attack, another server can continue to provide services to authenticated clients. In terms of parallel computation and reliable service, a symmetric protocol is superior to an asymmetric protocol ISSN: Page401

2 B:PKI Based Model The first model, called PKI-based model, assumes that the client keeps the server s public key in addition to share a password with the server. In this setting, the client can send the password to the server by public key encryption. Gong, Lomas, Needham, and Saltzer [1] were the first to present this kind of authentication protocols with heuristic resistant to offline dictionary attacks, and Halevi and Krawczyk [3] were the first to provide formal definitions and rigorous proofs of security for PKI-based model. C:Password Only model The second model is called password-only model.bellovin and Merritt [4] were the first to consider authentication based on password only, and introduced a set of so-called encrypted key exchange (EKE) protocols,where the password is used as a secret key to encrypt random numbers for key exchange purpose. Formal models of security for the password-only authentication were firstly given independently by Bellare, Pointcheval and Rogaway [5], and Boyko, MacKenzie, Patel and Swaminathan [6]. Katz et al. [7] were the first to give a password-only authentication protocol which is both practical and provably-secure under standard cryptographic assumption. II. RELATED WORKS In a single-server PAKE protocol, if the server is compromised,user passwords stored in the server are all disclosed. To address this issue, in 2000, Ford and Kaliski [8] proposed the first threshold PAKE protocol in the PKI-based model, in which n servers cooperate to authenticate a client. Their protocol remains secure as long as n 1 or few servers are compromised. Subsequently, in 2001, Joblon [9] removed the requirement for PKI and suggested a protocol with the similar property in the password-only model. Both the threshold PAKE protocols were not shown to be secure formally. In 2002, MacKenzie et al. [10] gave a protocol in the PKIbased setting, which requires only t out of n servers to cooperate in order to authenticate a client and is secure as long as t 1 or fewer servers are compromised. They were the first to provide a formal security proof for their threshold PAKE protocol in the random oracle model. In 2003, Di Raimondo and Gennaro [11] proposed a protocol in the passwordonly setting, which requires less than 1/3 of the servers to be compromised, with a formal security proof in the standard model.in 2003, Brainard et al. [12] developed the first twoserver protocol in the PKI-based setting. Their protocol and its variant assume a secure channel between the client and the server(s), which would be in practice implemented using public key techniques such as SSL. In 2005, Katz et al. [7] proposed the first two-server password-only authenticated key exchange protocol with a proof of security in the standard model. Their protocol extended and built upon the Katz- Ostrovsky-Yung PAKE protocol [14], called KOY protocol for brevity. In their protocol, a client C randomly chooses a password pw, and two servers A and B are provided random password shares pw1 and pw2 subject to pw1 + pw2 = pw. At high level, their protocol can be viewed as two executions of the KOY protocol, one between the client C and the server A, using the server B to assist with the authentication, and one between the client C and the server B, using the server A to assist with the authentication. The assistance of the other server is necessary since the password is split between two servers. In the end of their protocol, each server and the client agree on a secret session key. Katz et al. s protocol [7] is symmetric where two servers equally contribute to the client authentication and key exchange.for their basic protocol secure against a passive adversary,each party performs roughly twice the amount of works as the KOY protocol. For the protocol secure against active adversaries, the work of the client remains the same but the work of the servers increase by a factor of roughly 2-4. The advantage of Katz et al. s protocols is the protocol structure which supports two servers to compute in parallel, but its disadvantage is inefficiency for practical use. III. PRELIMINARIES A. Diffie-Hellman Key Exchange Protocol Diffie Hellman key exchange (D-H) is a specific method of exchanging cryptographic keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher. The scheme was first published by Whitfield ISSN: Page402

3 Diffie and Martin Hellman in 1976, although it had been separately invented a few years earlier within GCHQ, the British signals intelligence agency,by JamesH.Ellis, Clifford cocks and Malcolm J.Williamson but was kept classified. In 2002, Hellman suggested the algorithm be called Diffie Hellman Merkle key exchange in recognition of Ralph Merkle's contribution to the invention ofpublic-key cryptography (Hellman, 2002). Diffie-Hellman key exchange protocol can be used as follows. 1) Alice and Bob agree on a cyclic group G of large prime order q with a generator g. 2) Alice randomly chooses an integer a from Z q and computes X = ga, while Bob randomly chooses an integer b from Z q and computes Y = gb. Then Alice and Bob exchange X and Y. 3) Alice computes the secret key k1 = Y a = gba, while Bob computes the secret key k2 = Xb = gab.it is obvious that k1 = k2 and thus Alice and Bob have agreed on the same secret key, by which the subsequent communications between them can be protected.diffie-hellman key exchange protocol is secure against any passive adversary, who cannot interact with Alice and Bob, attempting to determine the secret key solely based upon observed data. B.Elgamal encryption The Elgamal encryption system is an asymmetric key encryption algorithm for publickey cryptography which is based on the Diffie Hellman key exchange. It was described by Taher Elgamal in ElGamal encryption is used in the free GNU Privacy Guard software, recent versions of PGP, and other cryptosystems. The Digital Signature Algorithm is a variant of the ElGamal signature scheme, which should not be confused with ElGamal encryption. It consists of key generation, encryption,and decryption algorithms as follows 1) Key Generation: On input a security parameter k, it publishes a cyclic group G of large prime order q with a generator g. Then it chooses a decryption key x randomly from Z q and computes an encryption key y = gx. 2) Encryption: On inputs a message m G and the encryption key y, it chooses an integer r randomly from Z q and outputs a ciphertext C = E(m, y) =(A,B) = (gr,m yr). 3) Decryption: On inputs a ciphertext (A,B), and the decryption key x, it outputs the plaintext m = D(C, x) = B/Ax. ElGamal encryption scheme is a probabilistic encryption scheme. If encrypting the same message with ElGamal encryption scheme several times, it will, in general,yield different ciphertexts. Tsiounis Yung [15] proved ElGamal encryption scheme to be semantically secure under the DDH assumption. ElGamal encryption scheme has useful homomorphic properties as follows: Given an encryption of m, E(m, y) = (A,B), one can compute (A, γb) = E(γm, y) for any γ in G,an encryption of γm, and one can also compute (Aα,Bα) = E(mα, y) for any α in Z q, an encryption of mα. Given encryptions of m1 and m2, E(m1, y) = (A1,B1) and E(m2, y) = (A2,B2), one can compute (A1A2,B1B2) = E(m1m2, y), an encryption of m1m2. IV. OUR PROTOCOL A.Secret Key Establishment The J2EE Environment is setup and Two Peer Servers are initialized and release the public parameters for the user by echange of keys using Diffe-Helman key Exchange.The Secret key is established between Two Servers for further secure communication for Peer Servers.The Secret Session key will ensure that the two servers are Genuinely involed in the process of User Registration and Autheication to provide Peer Services for the Genuine User. Our protocol runs in three phases - initialization, registration and authentication. Of Which Initialization comes Under Secret Key Establishment which uses Diffe-Helman key Exchange. The two peer servers S1 and S2 jointly choose a cyclic group G of large prime order q with a generator g1.next, S1 randomly chooses an integer s1 from Z* q and S2 randomly chooses an integer s2 from Z * q, and S1 and S2 exchange g1^s1 and g1^s2. After that, S1 and S2 jointly publish public system parameters G, q, g1, g2, where g2 = g^s1s2. ISSN: Page403

4 B.User Registration and Authetication: The public parameters released by Peer Servers will be used by client Registration Process, while a user Registering to the Peer Services for Encryption of Password Shares and providing Authetication Information to Server 1 and Server 2 Respectively. Registration and Autheticated Key Exchange are the Next Two Phases of our Protocol. C.Registration We refer to the concept of public key cryptosystem, the encryption key of one server should be unknown to another server and the client needs to remember a password only after registration. Prior to authentication, each client C is required to register both S1 and S2 through different secure channels. First of all, the client C generates decryption and encryption key pairs (xi, yi) where yi = g1^xi 1 for the server Si (i = 1, 2) using the public parameters published by the two servers. Next, the client C chooses a password pwc and encrypts the password using the encryption key y, according to El- Gamal encryption. At last, the client C delivers the password authentication information Auth(1) C = {x1, a1, b1, E(g2^pwC, y2)} to S1 through a secure channel, and the password authentication information Auth(2) C = {x2, a2, b2, E(g2^pwC, y1)} to S2 through another secure channel. After that, the client C remembers the password pwc only. D.Authentication and Key Exchange The two servers S1 and S2 have received the password authentication information of a client C during the registration.the following steps are involved in the process of Authetication. 1. The client C randomly chooses an integer r from Z * q, computes R = g1 ^ r * g 2 ^ pwc and then broadcasts a request message M1 = {C,Req,R} to the two servers S1 and S2 2.The Diffe-Helman Key Exchange Occurs between Peer Servers Which run in parallel and establishes a secret session to fetch the password authentication Information and the two servers mutually generate two values and send Hash functions to Client based on their Password Authetication Informations. 3.The client computes the Hash functions sent and Ex-or ing the Hashes will produce the Hash of his own Password. If the Password Hash and computed Hash are same the cli8ent can ensure that he is connected with Genuine Servers and can continue enjoying Services from Peer Servers with out worry. 4..So the user needs to Remember the Password Only. Not anything else. He is safe and secure under our Proposed Model. V. CONCLUSION Multiple Services are embedded into a single gateway that prevents the flow of our personal data over a public channel during third party transactions. The clients can enjoy the service even a server is disclosed by any kind of attacks even if it is shut down manually for new Deployment purpose. Our Session HandOver Mechanism will handover all the user session at the time of attack to another server. So user Session will retain safe and the requests will be redirected to active server from then. REFERENCES [1] Gong, L., Lomas, T. M. A., Needham, R. M. and Saltzer, J. H. (1993) Protecting poorly-chosen secret from guessing attacks.ieee J. on Selected Areas in Communications, 11(5), [2] Lomas, T. M. A., Gong, L., Saltzer, J. H. and Needham, R. M. (1989) Reducing risks from poorly-chosen keys. ACM Operating Systems Review, 23(5), [3] Halevi, S. and Krawczyk, H. (1999) Public-key cryptography and password protocols. ACM Transactions on Information and System Security, 2(3), [4] Bellovin, S. and Merritt, M. (1992) Encrypted key exchange:password-based protocol secure against dictionary attack. Proc.1992 IEEE Symposium on Research in Security and Privacy,pp [5] Bellare, M., Pointcheval, D. and Rogaway, P. (2000) Authenticated key exchange secure against dictionary attacks. Proc. Eurocrypt 00, pp [6] Boyko, V., Mackenzie, P., and Patel, S. (2000) Provably secure password-authenticated key exchange using Diffie-Hellman. Proc.Eurocrypt 00, pp [7] Katz, J., MacKenzie, P., Taban, G. and Gligor, V. (2005) Twoserver password-only authenticated key exchange. Proc. ACNS 05, pp [8] Ford, W. and Kaliski Jr, B. S. (2000) Server-assisted generation of a strong secret from a password. Proc. IEEE 9th ISSN: Page404

5 International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp [9] Jablon, D (2001) Password authentication using multiple servers.proc. RSA-CT 01, pp [10] Mackenize, P., Shrimpton, T. and Jakobsson, M. (2002) Threshold password-authenticated key exchange. Proc. Crypto 02, pp [11] Di Raimondo, M. and Gennaro, R. (2003) Provably secure threshold password authenticated key exchange. Proc. Eurocrypt 03,pp [12] Brainard, J., Jueles, A., Kaliski, B. S. and Szydlo, M. (2003) A new two-server approach for authentication with short secret. Proc.USENIX Security 03, pp [14] Katz, J., Ostrovsky, R. and Yung, M. (2001) Efficient passwordauthenticated key exchange using human-memorable passwords.proc. Eurocrypt 01, pp [15] Tsiounis, Y. and Yung, M. (1998) On the security of ElGamal based encryption. Proc. PKC 98, pp ISSN: Page405

ID2S Password-Authenticated Key Exchange Protocols

ID2S Password-Authenticated Key Exchange Protocols ID2S Password-Authenticated Key Exchange Protocols A.Sreedhar Reddy 1, Prof.M.Padmavathamma 2. 1 Student, Dept. of MCA, Sri venkateswara university, Tirupati. 2 Professor, Dept. of MCA, Sri venkateswara

More information

Improving Service Credibility in Password Authentication Peer Service

Improving Service Credibility in Password Authentication Peer Service Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.216

More information

Improving Service credibility in Password Authenticated Peer Services Vignesh.R 1, Karthikeyan.C 2, Satheesh.K 3

Improving Service credibility in Password Authenticated Peer Services Vignesh.R 1, Karthikeyan.C 2, Satheesh.K 3 Improving Service credibility in Password Authenticated Peer Services Vignesh.R 1, Karthikeyan.C 2, Satheesh.K 3 M.E, Department of CSE, Arunai Engineering College, Tiruvannamalai, Tamilnadu, India 1 M.E,

More information

An Efficient Two-Server Password Only Authenticated Key Exchange Secure Against Dictionary Attacks

An Efficient Two-Server Password Only Authenticated Key Exchange Secure Against Dictionary Attacks An Efficient Two-Server Password Only Authenticated Key Exchange Secure Against Dictionary Attacks Sonal C. Pansare, Prof.Vaishali Nandedkar II nd Year ME, Department of Computer Engineering, PVPIT, Pune,

More information

ISSN: (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at:

More information

Efficient Two Server Authentication and Verification Using ECC

Efficient Two Server Authentication and Verification Using ECC Efficient Two Server Authentication and Verification Using ECC Seema P. Nakhate 1, Prof. R. M. Goudar 2 Department of Computer Engineering, MIT Academy of Engineering, Alandi (D), Pune, India 1 Department

More information

Identity Based (ID2S) Authenticated Exchange Protocols

Identity Based (ID2S) Authenticated Exchange Protocols 2018 IJSRST Volume 4 Issue 7 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology Identity Based (ID2S) Authenticated Exchange Protocols Seelam Sowjanya 1, Dr. P. G.V. Suresh

More information

Hash Proof Systems and Password Protocols

Hash Proof Systems and Password Protocols Hash Proof Systems and Password Protocols II Password-Authenticated Key Exchange David Pointcheval CNRS, Ecole normale supe rieure/psl & INRIA 8th BIU Winter School Key Exchange February 2018 CNRS/ENS/PSL/INRIA

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

A Non-Exchanged Password Scheme for Password-Based Authentication in Client-Server Systems

A Non-Exchanged Password Scheme for Password-Based Authentication in Client-Server Systems American Journal of Applied Sciences 5 (12): 1630-1634, 2008 ISSN 1546-9239 2008 Science Publications A Non-Exchanged Password Scheme for Password-Based Authentication in Client-Server Systems 1 Shakir

More information

A PROPOSED AUTHENTICATION SCHEME USING THE CONCEPT OF MINDMETRICS

A PROPOSED AUTHENTICATION SCHEME USING THE CONCEPT OF MINDMETRICS A PROPOSED AUTHENTICATION SCHEME USING THE CONCEPT OF MINDMETRICS Nitin Shinde 1, Lalit Shejwal 2, Uditkumar Gupta 3, Priyanka Pawar 4 1, 2, 3, 4 Department of Computer Engineering, Sinhgad Institute of

More information

Password Authenticated Key Exchange by Juggling

Password Authenticated Key Exchange by Juggling A key exchange protocol without PKI Feng Hao Centre for Computational Science University College London Security Protocols Workshop 08 Outline 1 Introduction 2 Related work 3 Our Solution 4 Evaluation

More information

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings Key Exchange References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings Outlines Primitives Root Discrete Logarithm Diffie-Hellman ElGamal Shamir s Three Pass

More information

Part VI. Public-key cryptography

Part VI. Public-key cryptography Part VI Public-key cryptography Drawbacks with symmetric-key cryptography Symmetric-key cryptography: Communicating parties a priori share some secret information. Secure Channel Alice Unsecured Channel

More information

Password-Based Authenticated Key Exchange in the Three-Party Setting

Password-Based Authenticated Key Exchange in the Three-Party Setting Password-Based Authenticated Key Exchange in the Three-Party Setting Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval Departement d Informatique École normale supérieure 45 Rue d Ulm, 75230 Paris

More information

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography CS555 Spring 2012/Topic 16 1 Outline and Readings Outline Private key management between two parties Key management

More information

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7 Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:

More information

Threshold Password-Authenticated Key Exchange

Threshold Password-Authenticated Key Exchange Threshold Password-Authenticated Key Exchange (Extended Abstract) Philip MacKenzie 1, Thomas Shrimpton 2, and Markus Jakobsson 3 1 Bell Laboratories Lucent Technologies Murray Hill, NJ 07974 USA philmac@lucent.com

More information

1 Password-based Authenticated Key Exchange. 2 Game-based Security. 3 Universal Composability. 4 Language-based Authenticated Key Exchange

1 Password-based Authenticated Key Exchange. 2 Game-based Security. 3 Universal Composability. 4 Language-based Authenticated Key Exchange Outline Password-based Authenticated Key Exchange David Pointcheval Ecole Normale Supérieure 1 Password-based Authenticated Key Exchange 2 Game-based Security 3 Universal Composability PKC 2012 Darmstadt,

More information

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lectures 16, 17: Security of RSA El Gamal Cryptosystem Announcement Final exam will be on May 11, 2015 between 11:30am 2:00pm in FMH 319 http://www.njit.edu/registrar/exams/finalexams.php

More information

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen Modern cryptography 2 CSCI 470: Web Science Keith Vertanen Modern cryptography Overview Asymmetric cryptography Diffie-Hellman key exchange (last time) Pubic key: RSA Pretty Good Privacy (PGP) Digital

More information

RSA. Public Key CryptoSystem

RSA. Public Key CryptoSystem RSA Public Key CryptoSystem DIFFIE AND HELLMAN (76) NEW DIRECTIONS IN CRYPTOGRAPHY Split the Bob s secret key K to two parts: K E, to be used for encrypting messages to Bob. K D, to be used for decrypting

More information

Keywords Session key, asymmetric, digital signature, cryptosystem, encryption.

Keywords Session key, asymmetric, digital signature, cryptosystem, encryption. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Review of Diffie

More information

Key Establishment and Authentication Protocols EECE 412

Key Establishment and Authentication Protocols EECE 412 Key Establishment and Authentication Protocols EECE 412 1 where we are Protection Authorization Accountability Availability Access Control Data Protection Audit Non- Repudiation Authentication Cryptography

More information

Server-Assisted Generation of a Strong Secret from a Password

Server-Assisted Generation of a Strong Secret from a Password Server-Assisted Generation of a Strong Secret from a Password Warwick Ford VeriSign Inc wford@verisigncom Burton S Kaliski Jr RSA Laboratories bkaliski@rsasecuritycom Abstract A roaming user who accesses

More information

Password-Based Authenticated Key Exchange in the Three-Party Setting

Password-Based Authenticated Key Exchange in the Three-Party Setting Password-Based Authenticated Key Exchange in the Three-Party Setting Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval Departement d Informatique École Normale Supérieure 45 Rue d Ulm, 75230 Paris

More information

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA Public Key Cryptography, OpenPGP, and Enigmail Cryptography is the art and science of transforming (encrypting) a message so only the intended recipient can read it Symmetric Cryptography shared secret

More information

A Smart Card Based Authentication Protocol for Strong Passwords

A Smart Card Based Authentication Protocol for Strong Passwords A Smart Card Based Authentication Protocol for Strong Passwords Chin-Chen Chang 1,2 and Hao-Chuan Tsai 2 1 Department of Computer Science and Information Engineering, Feng Chia University, Taichung, Taiwan,

More information

Introduction to Cryptography Lecture 7

Introduction to Cryptography Lecture 7 Introduction to Cryptography Lecture 7 El Gamal Encryption RSA Encryption Benny Pinkas page 1 1 Public key encryption Alice publishes a public key PK Alice. Alice has a secret key SK Alice. Anyone knowing

More information

Cryptanalysis of Two Password-Authenticated Key Exchange. Protocols between Clients with Different Passwords

Cryptanalysis of Two Password-Authenticated Key Exchange. Protocols between Clients with Different Passwords International Mathematical Forum, 2, 2007, no. 11, 525-532 Cryptanalysis of Two Password-Authenticated Key Exchange Protocols between Clients with Different Passwords Tianjie Cao and Yongping Zhang School

More information

Password Authenticated Key Exchange by Juggling

Password Authenticated Key Exchange by Juggling Password Authenticated Key Exchange by Juggling Feng Hao 1 and Peter Ryan 2 1 Center for Computational Science, University College London 2 School Of Computing Science, University of Newcastle upon Tyne

More information

One-Time-Password-Authenticated Key Exchange

One-Time-Password-Authenticated Key Exchange One-Time-Password-Authenticated Key Exchange Kenneth G. Paterson 1 and Douglas Stebila 2 1 Information Security Group Royal Holloway, University of London, Egham, Surrey, UK 2 Information Security Institute

More information

Grenzen der Kryptographie

Grenzen der Kryptographie Microsoft Research Grenzen der Kryptographie Dieter Gollmann Microsoft Research 1 Summary Crypto does not solve security problems Crypto transforms security problems Typically, the new problems relate

More information

The Challenges of Distributing Distributed Cryptography. Ari Juels Chief Scientist, RSA

The Challenges of Distributing Distributed Cryptography. Ari Juels Chief Scientist, RSA The Challenges of Distributing Distributed Cryptography Ari Juels Chief Scientist, RSA What is this new and mysterious technology? Hint: It s 20+ years old. R. Ostrovsky and M. Yung. How to withstand

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

J-PAKE: Authenticated Key Exchange without PKI

J-PAKE: Authenticated Key Exchange without PKI J-PAKE: Authenticated Key Exchange without PKI Feng Hao 1 and Peter Ryan 2 1 Thales E-Security, Cambridge, UK 2 Faculty Of Science, University of Luxembourg Abstract. Password Authenticated Key Exchange

More information

Cryptographic Systems

Cryptographic Systems CPSC 426/526 Cryptographic Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-10 In lec-10, we learned: - Consistency models - Two-phase commit - Consensus - Paxos Lecture Roadmap

More information

Cryptographic Primitives and Protocols for MANETs. Jonathan Katz University of Maryland

Cryptographic Primitives and Protocols for MANETs. Jonathan Katz University of Maryland Cryptographic Primitives and Protocols for MANETs Jonathan Katz University of Maryland Fundamental problem(s) How to achieve secure message authentication / transmission in MANETs, when: Severe resource

More information

Encryption 2. Tom Chothia Computer Security: Lecture 3

Encryption 2. Tom Chothia Computer Security: Lecture 3 Encryption 2 Tom Chothia Computer Security: Lecture 3 This Lecture Counter Mode (CTR) enryption Diffie Helleman key exchange Public Key Encryption RSA Signing Combining public and symmetric key encryption

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA

More information

Introduction to Cryptography. Lecture 6

Introduction to Cryptography. Lecture 6 Introduction to Cryptography Lecture 6 Benny Pinkas page 1 1 Data Integrity, Message Authentication Risk: an active adversary might change messages exchanged between Alice and Bob M Alice M M M Bob Eve

More information

Key Agreement. Guilin Wang. School of Computer Science, University of Birmingham

Key Agreement. Guilin Wang. School of Computer Science, University of Birmingham Key Agreement Guilin Wang School of Computer Science, University of Birmingham G.Wang@cs.bham.ac.uk 1 Motivations As we know, symmetric key encryptions are usually much more efficient than public key encryptions,

More information

CS 161 Computer Security

CS 161 Computer Security Raluca Popa Spring 2018 CS 161 Computer Security Homework 2 Due: Wednesday, February 14, at 11:59pm Instructions. This homework is due Wednesday, February 14, at 11:59pm. No late homeworks will be accepted.

More information

Securely Combining Public-Key Cryptosystems

Securely Combining Public-Key Cryptosystems Securely Combining Public-Key Cryptosystems Stuart Haber Benny Pinkas STAR Lab, Intertrust Tech. 821 Alexander Road Princeton, NJ 08540 {stuart,bpinkas}@intertrust.com Abstract It is a maxim of sound computer-security

More information

Secure Multiparty Computation

Secure Multiparty Computation CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

Brief Introduction to Provable Security

Brief Introduction to Provable Security Brief Introduction to Provable Security Michel Abdalla Département d Informatique, École normale supérieure michel.abdalla@ens.fr http://www.di.ens.fr/users/mabdalla 1 Introduction The primary goal of

More information

Introduction to Cryptography Lecture 7

Introduction to Cryptography Lecture 7 Introduction to Cryptography Lecture 7 Public-Key Encryption: El-Gamal, RSA Benny Pinkas page 1 1 Public key encryption Alice publishes a public key PK Alice. Alice has a secret key SK Alice. Anyone knowing

More information

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems

More information

Authenticating People and Machines over Insecure Networks

Authenticating People and Machines over Insecure Networks Authenticating People and Machines over Insecure Networks EECE 571B Computer Security Konstantin Beznosov authenticating people objective Alice The Internet Bob Password= sesame Password= sesame! authenticate

More information

APNIC elearning: Cryptography Basics

APNIC elearning: Cryptography Basics APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security

More information

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography Outline 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

Chapter 9 Public Key Cryptography. WANG YANG

Chapter 9 Public Key Cryptography. WANG YANG Chapter 9 Public Key Cryptography WANG YANG wyang@njnet.edu.cn Content Introduction RSA Diffie-Hellman Key Exchange Introduction Public Key Cryptography plaintext encryption ciphertext decryption plaintext

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment. CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How

More information

More Efficient Password Authenticated Key Exchange Based on RSA

More Efficient Password Authenticated Key Exchange Based on RSA More Efficient Password Authenticated Key Exchange Based on RSA Duncan S. Wong 1, Agnes H. Chan 2, and Feng Zhu 2 1 Department of Computer Science City University of Hong Kong Hong Kong, China duncan@cityu.edu.hk

More information

Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM

Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM Kyu Young Choi 1, Jihoon Cho 1, Jung Yeon Hwang 2, and Taekyoung Kwon 3 1 Samsung SDS, Inc., Seoul, Korea {ky12.choi,jihoon1.cho}@samsung.com

More information

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography 1. Introduction 2. RSA Outline 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

New Public Key Cryptosystems Based on the Dependent RSA Problems

New Public Key Cryptosystems Based on the Dependent RSA Problems New Public Key Cryptosystems Based on the Dependent RSA Problems David Pointcheval LIENS CNRS, École Normale Supérieure, 45 rue d Ulm, 75230 Paris Cedex 05, France. David.Pointcheval@ens.fr http://www.dmi.ens.fr/

More information

Other Topics in Cryptography. Truong Tuan Anh

Other Topics in Cryptography. Truong Tuan Anh Other Topics in Cryptography Truong Tuan Anh 2 Outline Public-key cryptosystem Cryptographic hash functions Signature schemes Public-Key Cryptography Truong Tuan Anh CSE-HCMUT 4 Outline Public-key cryptosystem

More information

Chapter 10 : Private-Key Management and the Public-Key Revolution

Chapter 10 : Private-Key Management and the Public-Key Revolution COMP547 Claude Crépeau INTRODUCTION TO MODERN CRYPTOGRAPHY _ Second Edition _ Jonathan Katz Yehuda Lindell Chapter 10 : Private-Key Management and the Public-Key Revolution 1 Chapter 10 Private-Key Management

More information

CS 161 Computer Security

CS 161 Computer Security Paxson Spring 2013 CS 161 Computer Security 3/14 Asymmetric cryptography Previously we saw symmetric-key cryptography, where Alice and Bob share a secret key K. However, symmetric-key cryptography can

More information

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d) Outline AIT 682: Network and Systems Security 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard Topic 5.2 Public Key Cryptography Instructor: Dr. Kun Sun 2 Public Key

More information

Applied Cryptography and Computer Security CSE 664 Spring 2017

Applied Cryptography and Computer Security CSE 664 Spring 2017 Applied Cryptography and Computer Security Lecture 18: Key Distribution and Agreement Department of Computer Science and Engineering University at Buffalo 1 Key Distribution Mechanisms Secret-key encryption

More information

Key Exchange. Secure Software Systems

Key Exchange. Secure Software Systems 1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?

More information

MTAT Research Seminar in Cryptography IND-CCA2 secure cryptosystems

MTAT Research Seminar in Cryptography IND-CCA2 secure cryptosystems MTAT.07.006 Research Seminar in Cryptography IND-CCA2 secure cryptosystems Dan Bogdanov October 31, 2005 Abstract Standard security assumptions (IND-CPA, IND- CCA) are explained. A number of cryptosystems

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Auth. Key Exchange. Dan Boneh

Auth. Key Exchange. Dan Boneh Auth. Key Exchange Review: key exchange Alice and want to generate a secret key Saw key exchange secure against eavesdropping Alice k eavesdropper?? k This lecture: Authenticated Key Exchange (AKE) key

More information

Lecture 6 - Cryptography

Lecture 6 - Cryptography Lecture 6 - Cryptography CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12 Question Setup: Assume you and I donʼt know anything about

More information

Universally Composable Password-Based Key Exchange

Universally Composable Password-Based Key Exchange Universally Composable Password-Based Key Exchange Ran Canetti 1, Shai Halevi 1, Jonathan Katz 2, Yehuda Lindell 3, and Phil MacKenzie 4 1 IBM T.J. Watson Research Center, Hawthorne, NY, USA. canetti@watson.ibm.com,

More information

Multi-LHL protocol. Marika Mitrengová

Multi-LHL protocol. Marika Mitrengová Multi-LHL protocol Marika Mitrengová Faculty of Mathematics, Physics and Informatics Comenius University, Mlynska dolina, 842 48 Bratislava, Slovakia mitrengova@dcs.fmph.uniba.sk Abstract. We present a

More information

Security Handshake Pitfalls

Security Handshake Pitfalls Security Handshake Pitfalls Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr 1 Cryptographic Authentication Password authentication is subject to eavesdropping Alternative: Cryptographic challenge-response

More information

A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks

A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks Jan Camenisch 1, Nishanth Chandran 2, and Victor Shoup 3 1 IBM Research, work funded

More information

CSE 127: Computer Security Cryptography. Kirill Levchenko

CSE 127: Computer Security Cryptography. Kirill Levchenko CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified

More information

Password. authentication through passwords

Password. authentication through passwords Password authentication through passwords Human beings Short keys; possibly used to generate longer keys Dictionary attack: adversary tries more common keys (easy with a large set of users) Trojan horse

More information

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography

More information

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

Intro to Public Key Cryptography Diffie & Hellman Key Exchange Intro to Public Key Cryptography Diffie & Hellman Key Exchange Course Summary Introduction Stream & Block Ciphers Block Ciphers Modes (ECB,CBC,OFB) Advanced Encryption Standard (AES) Message Authentication

More information

Public-Key Cryptography

Public-Key Cryptography Computer Security Spring 2008 Public-Key Cryptography Aggelos Kiayias University of Connecticut A paradox Classic cryptography (ciphers etc.) Alice and Bob share a short private key using a secure channel.

More information

Internet Research Task Force (IRTF) Category: Informational April 2017 ISSN:

Internet Research Task Force (IRTF) Category: Informational April 2017 ISSN: Internet Research Task Force (IRTF) J. Schmidt Request for Comments: 8125 secunet Security Networks Category: Informational April 2017 ISSN: 2070-1721 Requirements for Password-Authenticated Key Agreement

More information

Password-Based Encryption Analyzed

Password-Based Encryption Analyzed Password-Based Encryption Analyzed Martín Abadi and Bogdan Warinschi Computer Science Department, University of California, Santa Cruz Computer Science Department, Stanford University Abstract. The use

More information

Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh

Protocols II. Computer Security Lecture 12. David Aspinall. 17th February School of Informatics University of Edinburgh Protocols II Computer Security Lecture 12 David Aspinall School of Informatics University of Edinburgh 17th February 2011 Outline Introduction Shared-key Authentication Asymmetric authentication protocols

More information

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong CS573 Data Privacy and Security Cryptographic Primitives and Secure Multiparty Computation Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

On the Difficulty of Protecting Private Keys in Software Environments

On the Difficulty of Protecting Private Keys in Software Environments On the Difficulty of Protecting Private Keys in Software Environments Taekyoung Kwon Sejong University, Seoul 143-747, Korea tkwon@sejong.ac.kr Abstract. This paper makes simple observation on security

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of

More information

Advanced Cryptography 1st Semester Symmetric Encryption

Advanced Cryptography 1st Semester Symmetric Encryption Advanced Cryptography 1st Semester 2007-2008 Pascal Lafourcade Université Joseph Fourrier, Verimag Master: October 22th 2007 1 / 58 Last Time (I) Security Notions Cyclic Groups Hard Problems One-way IND-CPA,

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 11 October 4, 2017 CPSC 467, Lecture 11 1/39 ElGamal Cryptosystem Message Integrity and Authenticity Message authentication codes

More information

Security properties of two authenticated conference key agreement protocols

Security properties of two authenticated conference key agreement protocols Security properties of two authenticated conference key agreement protocols Qiang Tang and Chris J. Mitchell Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX, UK {qiang.tang,

More information

CS 161 Computer Security

CS 161 Computer Security Popa & Wagner Spring 2016 CS 161 Computer Security Discussion 5 Week of February 19, 2017 Question 1 Diffie Hellman key exchange (15 min) Recall that in a Diffie-Hellman key exchange, there are values

More information

A Simple Threshold Authenticated Key Exchange from Short Secrets

A Simple Threshold Authenticated Key Exchange from Short Secrets An extended abstract of this work appears in B. Roy, editor, Advances in Cryptology ASIACRYPT 2005, Lecture Notes in Computer Science Vol. 3788, pages 566 584, Chennai, India, Dec. 4 8, 2005. Springer-Verlag,

More information

Security Handshake Pitfalls

Security Handshake Pitfalls Cryptographic Authentication Security Handshake Pitfalls Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Password authentication is subject to eavesdropping Alternative: Cryptographic challenge-response

More information

to know with whom one is communicating", while the latter are required because cryptographic techniques (such as encryption, etc.) are useless without

to know with whom one is communicating, while the latter are required because cryptographic techniques (such as encryption, etc.) are useless without Forward Secrecy in Password-Only Key Exchange Protocols Jonathan Katz 1;4 Rafail Ostrovsky 2 Moti Yung 3 1 Department of Computer Science, University of Maryland (College Park) jkatz@cs.umd.edu 2 Telcordia

More information

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Data Security and Privacy. Topic 14: Authentication and Key Establishment Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt

More information

Asymmetric Primitives. (public key encryptions and digital signatures)

Asymmetric Primitives. (public key encryptions and digital signatures) Asymmetric Primitives (public key encryptions and digital signatures) An informal, yet instructive account of asymmetric primitives Timeline of the invention of public-key cryptography 1970-1974 British

More information

PROTECTING CONVERSATIONS

PROTECTING CONVERSATIONS PROTECTING CONVERSATIONS Basics of Encrypted Network Communications Naïve Conversations Captured messages could be read by anyone Cannot be sure who sent the message you are reading Basic Definitions Authentication

More information

Network Security Issues and Cryptography

Network Security Issues and Cryptography Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi

More information

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III Cryptography III Public-Key Cryptography Digital Signatures 2/1/18 Cryptography III 1 Public Key Cryptography 2/1/18 Cryptography III 2 Key pair Public key: shared with everyone Secret key: kept secret,

More information

Efficiency Optimisation Of Tor Using Diffie-Hellman Chain

Efficiency Optimisation Of Tor Using Diffie-Hellman Chain Efficiency Optimisation Of Tor Using Diffie-Hellman Chain Kun Peng Institute for Infocomm Research, Singapore dr.kun.peng@gmail.com Abstract Onion routing is the most common anonymous communication channel.

More information

AtLast: Another Three-party Lattice-based PAKE Scheme

AtLast: Another Three-party Lattice-based PAKE Scheme Copyright c 2018 The Institute of Electronics, Information and Communication Engineers SCIS 2018 2018 Symposium on Cryptography and Information Security Niigata, Japan, Jan. 23-26, 2018 The Institute of

More information

Efficient Re-Keyed Encryption Schemes for Secure Communications

Efficient Re-Keyed Encryption Schemes for Secure Communications I J E E E C International Journal of Electrical, Electronics ISSN No. (Online): 2277-2626 and Computer Engineering 3(2): 132-137(2014) Efficient Re-Keyed Encryption Schemes for Secure Communications Md

More information

DISTRIBUTED PASSWORD AUTHENTICATION

DISTRIBUTED PASSWORD AUTHENTICATION DISTRIBUTED PASSWORD AUTHENTICATION Evan Liu, Brendon Go, Kenneth Xu Department of Computer Science Stanford University Stanford, CA 94305, USA {evanliu, bgo, kenxu95}@cs.stanford.edu ABSTRACT Traditional

More information

Public Key Algorithms

Public Key Algorithms Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular

More information

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 2 Due: Friday, 10/28/2016 at 11:55pm PT Will be posted on

More information