KEYNOTE OF THE FUTURE 1: CIARA MOORE CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.

Slides:



Advertisements
Similar presentations
14. Aug Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware SAC 2013, Burnaby, Canada Thomas Pöppelmann and Tim Güneysu.
Advertisements

RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
Data Security 1 El_Gamal Cryptography. Data Security2 Introduction El_Gamal is a public-key cryptosystem technique El_Gamal is a public-key cryptosystem.
COMP 170 L2 Page 1 L06: The RSA Algorithm l Objective: n Present the RSA Cryptosystem n Prove its correctness n Discuss related issues.
+ Accelerating Fully Homomorphic Encryption on GPUs Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang, Berk Sunar ECE Dept., Worcester Polytechnic Institute.
Paper by: Craig Gentry Presented By: Daniel Henneberger.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security.
Data encryption with big prime numbers
Public Key Encryption Algorithm
A Brief Story of Computing on Private Data Ten H Lai Ohio State University.
Lattice-Based Cryptography. Cryptographic Hardness Assumptions Factoring is hard Discrete Log Problem is hard  Diffie-Hellman problem is hard  Decisional.
A PASS Scheme in Clouding Computing - Protecting Data Privacy by Authentication and Secret Sharing Jyh-haw Yeh Dept. of Computer Science Boise State University.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
An Expandable Montgomery Modular Multiplication Processor Adnan Abdul-Aziz GutubAlaaeldin A. M. Amin Computer Engineering Department King Fahd University.
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
Thomas Pöppelmann Hardware Security Group Horst Görtz Institute for IT Security Implementing Lattice-Based Cryptography.
Homomorphic Encryption: WHAT, WHY, and HOW
-Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Sinaia, Romania August, TH Workshop “Software Engineering Education and Reverse Engineering” Dhuratë Hyseni, Betim Çiço South East European University.
HYDRA: A Flexible PQC Processor
Cryptography in a Post Quantum Computing World Máire O’Neill.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Wai Kit Wong, Ben Kao, David W. Cheung, Rongbin Li, Siu Ming Yiu.
Quantum Homomorphic Encryption
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits (cont.), fully homomorphic encryption Eran Tromer.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Dan Boneh Public Key Encryption from trapdoor permutations Is RSA a one-way function? Online Cryptography Course Dan Boneh.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
David Westenberger Lucas Zurek. What’s Happening Now? Silicon-based Computation – Moore’s Law Transistors Physical limitation Then what’s next?
Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms Sarani Bhattacharya and Debdeep Mukhopadhyay Dept. of Computer Science and.
Some Perspectives on Smart Card Cryptography
Accelerating Homomorphic Evaluation on Reconfigurable Hardware Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrian Macias.
* Partially sponsored by IARPA SPAR * Partially sponsored by DARPA PROCEED.
Elliptic Curve Cryptography
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Faster Implementation of Modular Exponentiation in JavaScript
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
KEYNOTE OF THE FUTURE 2: EMMA McLARNON CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
Breaking RSA Encryption Nick Manners. History of Cryptography  Used to be strictly in the domain of governments… state secrets.  Particularly important.
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
RSA Data Security, Inc. PKCS #13: Elliptic Curve Cryptography Standard Burt Kaliski RSA Laboratories PKCS Workshop October 7, 1998.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
1 Introduction to Information Security , Spring 2016 Lecture 4: Applied cryptography: asymmetric Zvi Ostfeld Slides credit: Eran Tromer.
Copyright © Zeph Grunschlag, RSA Encryption Zeph Grunschlag.
Fully Homomorphic Encryption (FHE) By: Matthew Eilertson.
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
Packing Techniques for Homomorphic Encryption Schemes Scott Thompson CSCI-762 4/28/2016.
Quantum Computing: An Introduction
RSA Algorithm Date: 96/10/17 Wun-Long Yang. Outline Introduction to RSA algorithm RSA efficient implementation & profiling.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Supported in part by NIST/U.S. Department of Commerce
Quantum Cryptography Christian Schaffner ICT OPEN 2017
Simplified IDEA Cryptography and Network Security.
Efficient CRT-Based RSA Cryptosystems
FPGA IMPLEMENTATION OF NIST P-384 MODULAR MULTIPLIER
On The Quantitative Hardness of the Closest Vector Problem
Introduction to Elliptic Curve Cryptography
Elliptic-Curve Cryptography (ECC)
Presentation transcript:

KEYNOTE OF THE FUTURE 1: CIARA MOORE CSIT PhD Student QUEEN’S UNIVERSITY BELFAST

@CSIT_QUB Fully Homomorphic Encryption for Cloud Security Data Security Systems Ciara Moore, PhD student 20 March 2015

CLOUD SECURITY

CLOUD COMPUTING DATA CLOUD DATA ENCRYPT DECRYPT OUTPUT COMPUTE

FULLY HOMOMORPHIC ENCRYPTION DATA CLOUD ENCRYPT COMPUTE OUTPUT DECRYPT

HARDWARE SOLUTIONS  FHE over the integers  Encryption step  Multiplication  Modular reduction  Low Hamming weight parameters  Xilinx Virtex-7 FPGA  Speed up factor of up to 130

QUANTUM COMPUTING RSA ECC DSA Quantum-resilient cryptography Public Key CryptographyQuantum Computer

QUANTUM RESILIENT CRYPTOGRAPHY Lattice-based Hash-based Code-based Multivariate

Thank you!