Attribute Based Encryption

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Russell Martin August 9th, Contents Introduction to CPABE Bilinear Pairings Group Selection Key Management Key Insulated CPABE Conclusion & Future.
Lecture 8: Lattices and Elliptic Curves
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Public Key Model 8. Cryptography part 2.
Chapter 12 Cryptography (slides edited by Erin Chambers)
-Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor.
By Abhijith Chandrashekar and Dushyant Maheshwary.
Lecture 10: Elliptic Curve Cryptography Wayne Patterson SYCS 653 Fall 2009.
An Efficient Identity-based Cryptosystem for
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Application of Elliptic Curves to Cryptography
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Elliptical Curve Cryptography Manish Kumar Roll No - 43 CS-A, S-7 SOE, CUSAT.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Public key ciphers 2 Session 6.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
11 RSA Variants.  Scheme ◦ Select s.t. p and q = 3 mod 4 ◦ n=pq, public key =n, private key =p,q ◦ y= e k (x)=x (x+b) mod n ◦ x=d k (y)=  y mod n.
Lecture 11: Elliptic Curve Cryptography Wayne Patterson SYCS 653 Fall 2008.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Motivation Basis of modern cryptosystems
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Information Security Lab. Dept. of Computer Engineering 251/ 278 PART II Asymmetric Ciphers Key Management; Other CHAPTER 10 Key Management; Other Public.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Elliptic Curve Public Key Cryptography
An Introduction to Pairing Based Cryptography
Public Key Cryptosystem
Asymmetric-Key Cryptography
Network Security Design Fundamentals Lecture-13
Identity Based Encryption
Prelude to Public-Key Cryptography
Public Key Encryption and Digital Signatures
SAKAWP: Simple Authenticated Key Agreement Protocol Based on Weil Pairing Authors: Eun-Jun Yoon and Kee-Young Yoo Src: International Conference on Convergence.
RSA and El Gamal Cryptosystems
IEEE TRANSACTIONS ON INFORMATION THEORY, JULY 1985
An Introduction to Pairing Based Cryptography
Private-Key Cryptography
Elliptic Curve Cryptography (ECC)
Elliptic Curve Cryptography (ECC)
The Application of Elliptic Curves Cryptography in Embedded Systems
Practical Aspects of Modern Cryptography
Introduction to Elliptic Curve Cryptography
CSCE 715: Network Systems Security
Cryptology Design Fundamentals
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Network Security Design Fundamentals Lecture-13
Presentation transcript:

Attribute Based Encryption Diptendu Kar Bruhadeshwar Bezawada Colorado State University

Elliptic Curve Cryptography Background Elliptic Curve Cryptography

Existing Public Key Systems RSA is based upon the ‘belief’ that factoring is ‘difficult’. Other PKS like Diffie-Hellman, El-Gamal relies on Discrete Logarithm Problem (DLP). i.e. Given: g ∈ ℤp , h = ga mod p ; find a. Sophisticated attacks lowers the computation to find “a”. Square root method Baby – Step Giant – Step [1][2][3] Pollard’s rho method [4][5] Index calculus method [6][7][8]

Existing Public Key Systems To counter these attacks – Make “p” quite large ∼ 2048 – 4096 bit numbers. Effect – Increased computation time. Can we find other groups where we can achieve the same security with much less computation time?

Elliptic Curve Cryptosystem Origin – Diophantine Equations [Diophantus – Alexandria, Egypt around 200 A.D] Rational points on the curve: y2 = x3 - x + 9 Elliptic Curve (EC) systems as applied to cryptography were first proposed in 1985 independently by Neal Koblitz and Victor Miller. Only Square root method is applicable to these group (Index Calculus method – not yet found to work)

Elliptic Curve Cryptosystem Applications - Any application where security is needed but lacks the power, storage and computational power that is necessary for our current cryptosystems Wireless communication devices Smart cards Web servers that need to handle many encryption sessions

Elliptic Curve Cryptosystem An elliptic curve is a plane curve defined by an equation of the form where a,b ∈ ℤp , and 4a3 + 27b2 ≠ 0 (mod p) Examples -

EC as cyclic group ℤ11 = {1,2,3,4,5,6,7,8,9,10} Generator (g) = 2 Any element in ℤ11 can be represented as gx mod p Finding other elements (g * g) mod 11 = 4 (g * g * g) mod 11 = 8 … E : y2 = x3 + 2x + 2 mod 17 Generator (P) = (5,1) Other points on the curve. How to find other points on the curve?

Group Operations on EC Main operations - point addition and point multiplication Adding two points that lie on an Elliptic Curve – results in a third point on the curve Point multiplication is repeated addition If P is a known point on the curve (aka Base point/generator) and it is multiplied by a scalar k, Q = k.P is the operation of adding P + P + P + P… +P (k times) Q is the resulting public key and k is the private key in the public-private key pair

Point addition Adding two points on the curve P and Q are added to obtain P+Q which is a reflection of R along the X axis

Point doubling A tangent at P is extended to cut the curve at a point; its reflection is 2P Adding P and 2P gives 3P Similarly, such operations can be performed as many times as desired to obtain Q = kP

EC DLP Discrete Log Problem The security of ECC is due the intractability or difficulty of solving the inverse operation of finding k given Q and P This is termed as the discrete log problem Methods to solve include brute force and Pollard’s Rho attack both of which are computationally expensive or unfeasible for a large p (not as large as in Zp) The version applicable in ECC is called the Elliptic Curve Discrete Log Problem Exponential running time

ℤp and E(ℤp)

Bilinear Pairing Let G1 and G2 be cyclic groups of the same order. Definition - A bilinear map from G1 × G1 to G2 is a function e : G1 × G1 → G2 such that for all u, v ∈ G1 ; a, b ∈ Z, e(ua, vb) = e(ub, va) = e(au, bv) = e(u, v)ab Non – Degenerate There exist u, v ∈ G1 such that e(u,v) ≠ 1 G2 Computable Computing e(u,v) for any u, v ∈ G1 is efficient

Bilinear Pairing We can also use G1 × G2 → Gt as a bilinear map. Let e : G1 × G2 → Gt be a bilinear map. Let g1 and g2 be generators of G1 and G2, respectively. Definition - The map e is an admissible bilinear map if e(g1, g2) generates G2 and e is efficiently computable. Typically G is an elliptic curve (or subgroup thereof) The elliptic curve defined by y2 = x3 + 1 over the finite field Fp (simple example) Gt is normally a finite field

Bilinear Pairing (Modified) Weil pairing and Tate pairing are more or less only known examples Very complicated math No need to understand it to use them Weil and Tate pairings computed using Miller’s algorithm Computationally inexpensive Tate pairing normally somewhat faster than Weil Making these faster still is current research

Why ABE?

Need for ABE Problems with PKI Sender must have recipient’s certificate Complexity of certificate management and CRLs Enter Identity-Based Encryption A public-key encryption system in which an arbitrary string can be used as the public key e.g. Any personal information: e-mail address, postal address, etc. Sender only needs to know recipient’s identity attribute to send an encrypted message Proposed by Shamir in 1984. First IDE system discovered in 2001 by Boneh and Franklin, based on Weil pairing.

IBE

Attribute Based Encryption Attribute-based encryption (ABE): New means for encrypted access control. Ciphertexts not necessarily encrypted to one particular user. Users’ private keys and ciphertexts associated with a set of attributes or a policy over attributes. A “match” between user’s private key and the ciphertext, decryption is possible.

Attribute Based Encryption Type of identity-based encryption One public key Master private key used to make more restricted private keys Two types – KP-ABE and CP-ABE KP-ABE Ciphertext is encrypted with attributes. Policies are enclosed in secret keys. CP-ABE Ciphertext is encrypted under a policy. Secret keys are tied to attributes.

CP-ABE

Policy Features Monotone Access Structure Internal nodes: OR 2 of 3 AND gates OR gates Also k of n threshold gates OR 2 of 3 AND IT dept. OR sales manager exec. level >= 5 marketing hire date < 2002

Setup  

Encryption

Encryption q1(0)=s q2(0)=q1(2) q3(0)=q1(3) q4(0)=q2(4) q5(0)=q2(5)   q1(0)=s q2(0)=q1(2) q3(0)=q1(3) q4(0)=q2(4) q5(0)=q2(5) q6(0)=q3(6) q8(0)=q3(8) q7(0)=q3(7)

Encryption

Key Generation  

Decryption    

Decryption   30

Reference [1] D. Shanks. Class number, a theory of factorization and genera. In Proc. Symp. Pure Math. 20, pages 415—440. AMS, Providence, R.I., 1971. [2] A. Stein and E. Teske, Optimized baby step-giant step methods, Journal of the Ramanujan Mathematical Society 20 (2005), no. 1, 1–32. [3] D. C. Terr, A modification of Shanks’ baby-step giant-step algorithm, Mathematics of Computation 69 (2000), 767–773.  [4] Pollard, J. M. (1978). "Monte Carlo methods for index computation (mod p)". Mathematics of Computation. 32 (143): 918–924. [5] Menezes, Alfred J.; van Oorschot, Paul C.; Vanstone, Scott A. (2001). Chapter 3. Handbook of Applied Cryptography. [6] M.E. Hellman and J.M. Reyneri, Fast computation of discrete logarithms in GF (q),Advances in Cryptology--Proceedings of Crypto, 1983 [7] L. Adleman, A subexponential algorithm for the discrete logarithm problem with applications to cryptography, In 20th Annual Symposium on Foundations of Computer Science, 1979 [8] A. Menezes, P. van Oorschot, S. Vanstone (1997). Handbook of Applied Cryptography. pp. 107–109.

Thank You ! Thoughts ..