XTR algorithm for MIKEY

Slides:



Advertisements
Similar presentations
IKE : Internet Key Exchange
Advertisements

Secure Pre-Shared Key Authentication for IKE
Fundamental Elliptic Curve Cryptography Algorithms draft-mcgrew-fundamental-ecc-02
Scott CH Huang COM5336 Cryptography Lecture 14 XTR Cryptosystem Scott CH Huang COM 5336 Cryptography Lecture 10.
The XTR public key system (extended version of Crypto 2000 presentation) Arjen K. Lenstra Citibank, New York Technical University Eindhoven Eric R. Verheul.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Side-Channel Attacks on Smart Cards. Timing Analysis Cryptosystems take different amount of time to process different inputs. Performance optimisations.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
SIP-SAML assisted Diffie-Hellman MIKEY IETF 65 MSEC Mar 21, 2006 Robert Moskowitz.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Information Security for Managers (Master MIS)
Application of Elliptic Curves to Cryptography
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
SMS to Converter - A new approach to send .
Cryptography and Network Security (CS435) Part Eight (Key Management)
Our Lady of the Rosary College S.2 Computer Literacy Lesson 8 Storage Unit Mr. Ku Heung Chin.
AES-CCM Cipher Suites Daniel Bailey Matthew Campagna David McGrew
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Potential vulnerabilities of IPsec-based VPN
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Unit C-Hardware & Software1 GNVQ Foundation Unit C Bits & Bytes.
An additional mode of key distribution in MIKEY draft-ignjatic-msec-mikey-rsa-r-00 D. Ignjatic, L. Dondeti, F. Audet.
Memory The term memory is referred to computer’s main memory, or RAM (Random Access Memory). RAM is the location where data and programs are stored (temporarily),
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Information Security Lab. Dept. of Computer Engineering 251/ 278 PART II Asymmetric Ciphers Key Management; Other CHAPTER 10 Key Management; Other Public.
Security and Performance Trade-off in wireless sensor network
RSA Laboratories’ PKCS Series - a Tutorial
Reviews Rocky K. C. Chang 20 April 2007.
Public Key Encryption.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME
Raspberry Pi.
Brian Weis IETF-62, Minneapolis, MN Mar 10, 2005
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
DEE 3061 – COMPUTER AIDED DESIGN (CAD)
Home: Tel: , H.P.: Office: 공) 7710A
Information Security and Management (Abstract) 5
Privacy & Security.
CSE 4905 IPsec II.
Network Security Unit-III
ABSTRACT   Recent work has shown that sink mobility along a constrained path can improve the energy efficiency in wireless sensor networks. Due to the.
RSA and El Gamal Cryptosystems
Public-key Cryptography
Discussions on New Work Item of Distributed Authentication
Donald E. Eastlake 3rd TSIG SHA etc. Donald E. Eastlake 3rd March.
Asynchronous Cryptology: Implementations and Applications
Improving Lamport One-time Signature Scheme
CSE 4095 Transport Layer Security TLS, Part II
SAML assisted Diffie-Hellman MIKEY
Long-term secure signatures for the IoT
پروتكل آموزش سلامت به مددجو
Elliptic Curve Cryptography (ECC)
Export BGP community information in IPFIX draft-ietf-opsawg-ipfix-bgp-community-02.txt Zhenqiang Li Rong Gu China Mobile Jie Dong Huawei Technologies.
Network Security (contd.)
Asymmetric Cryptography
Elliptic Curve Cryptography (ECC)
Strong Password Authentication Protocols
Fast Authentication in TGai : Updates to EAP-RP
Efficient Short-Password Key Exchange (ESP-KE)
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Introduction to Elliptic Curve Cryptography
Cybersecurity and Data Encryption
One Time Signature.
CSCE 715: Network Systems Security
Tero Kivinen, AuthenTec
Oblivious Transfer.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Tero Kivinen, AuthenTec
Presentation transcript:

XTR algorithm for MIKEY draft-liang-msec-mikey-xtr-00.txt Jing Liang Hui Deng Shouwen Lai

Problem and Goal RFC3830 uses Diffie-Hellman to establish group secure key Performance is not good enough in application of mobile computing devices such as PDA. Our draft is targeted to this problem and we proposed the method of applying XTR for MIKEY.

Performance XTR ECC RSA Operation Speed Fastest 23ms Fast 28ms XTR : Efficient and Compact Subgroup Trace Representation XTR ECC RSA Operation Speed Fastest 23ms Fast 28ms Slow 5ms for 32-bit Key Length Short 170-bit Long 1020-bit Key selection Simplest Hard Simple Pentium III 450 MHz and 96 MB of Ram

XTR-DH message Exchange INITIATOR RESPONDER I_MESSAGE = HDR, T, RAND, [IDi|CERTi], [IDr], {SP}, XTR-DHi, SIGNi ----> R_MESSAGE = <---- HDR, T, [IDr|CERTr], IDi, XTR-DHr, SIGNr 1.Trace(ga) 3.Both parties computes key Trace(gab) 2.Trace(gb)

Work Item? Efficient Multicast Group Key Generation for the smart and resource-constrained device should be a problem ?