Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

Similar documents
Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Key Exchange. Secure Software Systems

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Channel Coding and Cryptography Part II: Introduction to Cryptography

Diffie-Hellman. Part 1 Cryptography 136

Chapter 9 Public Key Cryptography. WANG YANG

The most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who

Public Key Algorithms

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 4 The Advanced Encryption Standard (AES) ver. October 28, 2009

UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Introduction to Cryptography ECE 597XX/697XX

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

CSC 474/574 Information Systems Security

Key Management and Distribution

Uzzah and the Ark of the Covenant

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD

CIS 4360 Secure Computer Systems Applied Cryptography

Crypto CS 485/ECE 440/CS 585 Fall 2017

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

Other Topics in Cryptography. Truong Tuan Anh

Public Key Cryptography

Overview. Public Key Algorithms I

CS669 Network Security

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Introduction to Post-Quantum Cryptography

Introduction to Post-Quantum Cryptography

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

PUBLIC KEY CRYPTO. Anwitaman DATTA SCSE, NTU Singapore CX4024. CRYPTOGRAPHY & NETWORK SECURITY 2018, Anwitaman DATTA

Lecture 6: Overview of Public-Key Cryptography and RSA

CPSC 467: Cryptography and Computer Security

Computer Security: Principles and Practice

APNIC elearning: Cryptography Basics

8/30/17. Introduction to Post-Quantum Cryptography. Features Required from Today s Ciphers. Secret-key (Symmetric) Ciphers

Topics. Number Theory Review. Public Key Cryptography

Encryption. INST 346, Section 0201 April 3, 2018

CSE 127: Computer Security Cryptography. Kirill Levchenko

Encryption 2. Tom Chothia Computer Security: Lecture 3

Cryptography and Network Security Chapter 10. Fourth Edition by William Stallings

Kurose & Ross, Chapters (5 th ed.)

Cryptography and Network Security

Cryptographic Concepts

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 4

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

C - Cryptography

Network Security. Chapter 4 Public Key Cryptography. Public Key Cryptography (4) Public Key Cryptography

Advanced Crypto. 2. Public key, private key and key exchange. Author: Prof Bill Buchanan

Computer Security 3/23/18

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

The evolving storage encryption market

PROTECTING CONVERSATIONS

Public-key encipherment concept

CCNA Security 1.1 Instructional Resource

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

A simple approach of Peer-to-Peer E-Cash system

The Design of an Anonymous and a Fair Novel E-cash System

ASYMMETRIC CRYPTOGRAPHY

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Abhijith Chandrashekar and Dushyant Maheshwary

Grenzen der Kryptographie

Overview. Recall Basic Idea. CSC 580 Cryptography and Computer Security. March 9, 2017

Ref:

Chapter 9. Public Key Cryptography, RSA And Key Management

Number Theory and RSA Public-Key Encryption

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

SUMMARY OF INFORMATION ON EACH COURSE

C - Cryptography

Basics of Cryptography

2.1 Basic Cryptography Concepts

Implementation and Benchmarking of Elliptic Curve Cryptography Algorithms

The Application of Elliptic Curves Cryptography in Embedded Systems

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Making and Breaking Ciphers

Cryptographic Systems

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

Introduction to Public-Key Cryptography

Cryptography (Overview)

Digital Signature. Raj Jain

EEC-484/584 Computer Networks

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security

Cryptography V: Digital Signatures

10.1 Introduction 10.2 Asymmetric-Key Cryptography Asymmetric-Key Cryptography 10.3 RSA Cryptosystem

Chapter 7 Public Key Cryptography and Digital Signatures

Using Cryptography CMSC 414. October 16, 2017

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

CSC/ECE 774 Advanced Network Security

Diffie-Hellman Protocol as a Symmetric Cryptosystem

Public Key Cryptography and RSA

CHAPTER 4 VERIFIABLE ENCRYPTION OF AN ELLIPTIC CURVE DIGITAL SIGNATURE

Part VI. Public-key cryptography

CS61A Lecture #39: Cryptography

Transcription:

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 6 Introduction to Public-Key Cryptography ver. November 18, 2010 These slides were prepared by Timo Kasper and Christof Paar and modified by Sam Bowne -- revised 10-16-17

Some legal stuff (sorry): Terms of Use The slides can used free of charge. All copyrights for the slides remain with Christof Paar and Jan Pelzl. The title of the accompanying book Understanding Cryptography by Springer and the author s names must remain on each slide. If the slides are modified, appropriate credits to the book authors and the book title must remain within the slides. It is not permitted to reproduce parts or all of the slides in printed form whatsoever without written consent by the authors. 2

Topics Symmetric Cryptography Revisited Principles of Asymmetric Cryptography Practical Aspects of Public-Key Cryptography Important Public-Key Algorithms Essential Number Theory for Public-Key Algorithms (SKIP) 3

Symmetric Cryptography Revisited

Symmetric Cryptography Revisited Alice Bob x e K (x) y d K (y) x K K The same secret key K is used for encryption and decryption Encryption and Decryption are very similar (or even identical) functions 5

Symmetric Cryptography: Analogy K K Safe with a lock, only Alice and Bob have a copy of the key Alice encrypts -- locks message in the safe with her key Bob decrypts -- uses his copy of the key to open the safe 6

Symmetric Cryptography: Shortcomings Symmetric algorithms, e.g., AES or 3DES, are very secure, fast & widespread but: Key distribution problem: The secret key must be transported securely Number of keys: In a network, each pair of users requires an individual key A B F C E D 7

Symmetric Cryptography: Shortcomings Alice or Bob can cheat each other, because they have identical keys. Alice can sign a contract, and later deny it Bob could have faked the signature Doesn't provide non-repudiation 8

Principles of Asymmetric Cryptography

Idea Behind Asymmetric Cryptography New Idea: Like a mailbox: Everyone can drop a letter But: Only the owner has the correct key to open the box 1976: first publication of such an algorithm by Whitfield Diffie and Martin Hellman,and also by Ralph Merkle. 10

Asymmetric Cryptography: Analogy Safe with public lock and private lock: (K pub ) (K pr ) Alice deposits (encrypts) a message with Bob's - not secret - public key K pub Only Bob has the - secret - private key K pr to retrieve (decrypt) the message 11

Key Generation A message encrypted with a public key can be decrypted with the corresponding private key The keys are related Each user must generate an individual key pair Publish public key where everyone can find it Protect private key so no one else gets it 12

One-Way Functions It must be easy to calculate the public key from the private key So keys can be generated But difficult to calculate the private key from the public key So attacker's can't get the private key 13

Commonly Used One-Way Functions Factorization Finding prime factors of a large number n is known; find p and q Discrete logarithm Find an integer x satisfying this equation a, b, and p are known 14

Logarithms Logarithms to base 10 log(100) = 2, because 10 2 = 100 log(1000) = 3, because 10 3 = 100 log(2) = 0.301 Discrete logarithm Same thing, except on a ring and using only integers Find an integer x satisfying this equation a, b and p are known 15

Practical Aspects of Public-Key Cryptography

Basic Protocol for Public-Key Encryption Alice Bob K pubb (K pubb,k prb ) = K x y=e K pubb (x) y x=d K prb (y) Key Distribution Problem solved * *at least for now; public keys need to be authenticated 18

Uses of Public-Key Cryptography Key Distribution Diffie-Hellman key exchange (DHKE), RSA Without a pre-shared secret (key) Nonrepudiation RSA, DSA or ECDSA (Elliptic Curve Digital Signature Algorithm) Identification Digital signatures Encryption RSA, ECC (Elliptic Curve Cryptography), or Elgamal 19

Disadvantage of Public-Key Cryptography Computationally very intensive 1000 times slower than symmetric algorithms! 20

AES Encryption in Python

RSA Encryption in Python RSA Decryption in Python

Testing Speed in Python

Testing Speed in Python

Testing Speed in Python

Basic Key Transport Protocol 1/2 In practice: Hybrid systems, incorporating asymmetric and symmetric algorithms 1. Key exchange (for symmetric schemes) and digital signatures are performed with (slow) asymmetric algorithms 2. Encryption of data is done using (fast) symmetric ciphers, e.g., block ciphers or stream ciphers 26

Basic Key Transport Protocol 2/2 Example: Hybrid protocol with AES as the symmetric cipher Alice Bob K pubb (K pubb,k prb ) = K Choose random symmetric key K Key Exchange (asymmetric) y 1 = e K pubb(k) y 1 K = d KprB(y 1 ) message x y y 2 = AES K (x) 2 x = AES -1 K (y 2 ) Data Encryption (symmetric) 27

Remaining Problem: Key Authenticity Alice wants to send a message to Bob Attacker can publish a fake public key for Bob Alice uses the fake key, so the attacker can read the message The current solution is digital certificates and Certificate Authorities 28

Important Public-Key Algorithms

Key Lengths and Security Levels Symmetric ECC RSA, DL Remark 64 Bit 128 Bit 700 Bit 80 Bit 160 Bit 1024 Bit 128 Bit 256 Bit 3072 Bit Only short term security (a few hours or days) Medium security (except attacks from big governmental institutions etc.) Long term security (without quantum computers) 31

Quantum Computers The existence of quantum computers would probably be the end for ECC, RSA & DL TEXTBOOK SAYS: At least 2-3 decades away, and some people doubt that QC will ever exist 32

NIST Recommendations from 2016 33

NIST Recommendations from 2016 34

NIST Recommendations from 2016 35

NIST Recommendations from 2016 36

Lessons Learned Public-key algorithms have capabilities that symmetric ciphers don t have, in particular digital signature and key establishment functions. Public-key algorithms are computationally intensive (a nice way of saying that they are slow), and hence are poorly suited for bulk data encryption. Only three families of public-key schemes are widely used. This is considerably fewer than in the case of symmetric algorithms. The extended Euclidean algorithm allows us to compute modular inverses quickly, which is important for almost all public-key schemes. Euler s phi function gives us the number of elements smaller than an integer n that are relatively prime to n. This is important for the RSA crypto scheme. 37