Elliptic Curve Cryptography (ECC)

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

Key Management Nick Feamster CS 6262 Spring 2009.
1 390-Elliptic Curves and Elliptic Curve Cryptography Michael Karls.
Lecture 8: Lattices and Elliptic Curves
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
Elliptic Curve. p2. Outline EC over Z p EC over GF(2 n )
Elliptic Curve Cryptography Jen-Chang Liu, 2004 Adapted from lecture slides by Lawrie Brown Ref: RSA Security ’ s Official Guide to Cryptography.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Electronic Payment Systems Lecture 5: ePayment Security II
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
CPE5021 Advanced Network Security --- Advanced Cryptography: Elliptic Curve Cryptography --- Lecture 3 CPE5021 Advanced Network Security --- Advanced Cryptography:
By Abhijith Chandrashekar and Dushyant Maheshwary.
Elliptic Curve Cryptography
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Elliptic Curve Cryptography Implementation & PKI Adoption Brian Saville Jonathan Mitchell.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Elliptical Curve Cryptography Manish Kumar Roll No - 43 CS-A, S-7 SOE, CUSAT.
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
Cryptography and Network Security
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
Elliptic Curve Crypto & ECC Diffie-Hellman Presenter: Le Thanh Binh.
1 Network Security Dr. Syed Ismail Shah
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Information Security Lab. Dept. of Computer Engineering 251/ 278 PART II Asymmetric Ciphers Key Management; Other CHAPTER 10 Key Management; Other Public.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Key Management Other Public-Key Cryptosystems
Asymmetric-Key Cryptography
ASymmetric Key Algorithms
Elliptic Curve Public Key Cryptography
Chapter 9 – Elliptic Curve Cryptography ver. November 3rd, 2009
CSCE 715: Network Systems Security
Public Key Cryptosystem
Asymmetric-Key Cryptography
Network Security Design Fundamentals Lecture-13
Advanced Information Security 5 ECC Cryptography
Message Authentication and Hash Functions
RSA and El Gamal Cryptosystems
Chapter 9 Security 9.1 The security environment
Chapters 14,15 Security.
Elliptic Curves.
Chapter 10 – Key Management; Other Public Key Cryptosystems
Elliptic Curve Cryptography (ECC)
Topic 25: Discrete LOG, DDH + Attacks on Plain RSA
Cryptography and Network Security
Enabling Technology1: Cryptography
Diffie-Hellman Key Exchange
El Gamal and Diffie Hellman
Chapters 14,15 Security.
CSCE 715: Network Systems Security
Practical Aspects of Modern Cryptography
Introduction to Elliptic Curve Cryptography
CSCE 715: Network Systems Security
Cryptology Design Fundamentals
CSCE 715: Network Systems Security
Network Security Design Fundamentals Lecture-13
Elliptic-Curve Cryptography (ECC)
Diffie-Hellman Algorithm
Presentation transcript:

Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree of security, shorter keys are required than RSA Standardized in IEEE P1363 Confidence level not yet as high as that in RSA Much more difficult to explain than RSA YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Named so because they are described by cubic equations Of the form y2 + axy +by = x3 + cx2+ dx + e where all the coefficients are real numbers satisfying some simple conditions Single element denoted O and called the point at infinity or the zero point YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Define the rules of addition over an elliptic curve O serves as the additive identity. Thus O = -O; for any point P on the elliptic curve, P + O = P. P1= (x,y), P2= (x,-y). Then, P1 + P2 + O = O, and therefore P1 = -P2. To add two points Q and R with different x coordinates, draw a straight line between them and find the third point of intersection P1. If the line is tangent to the curve at either Q or R, then P1 = Q or R. Finally, Q + R + P1 = O and Q + R = -P1. YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Define the rules of addition over an elliptic curve (cont’d) To double a point Q, draw the tangent line and find the other point of intersection S. Then Q + Q = 2Q = -S. YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Elliptic curves over finite field Define ECC over a finite field The elliptic group mod p, where p is a prime number Choose 2 nonnegative integers a and b, less than p that satisfy [4a3 + 27b2] (mod p)  0 Ep(a,b) denotes the elliptic group mod p whose element (x,y) are pairs of non-negative integers less than p satisfying y2  x3 + ax + b (mod p) with O YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Elliptic curves over finite field (cont’d) Example: Let p = 23, a = b = 1. This satisfies the condition for an elliptic curve group mod 23. YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Generation of nonnegative integer points from (0,0) to (p,p) in Ep YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Rules of addition over Ep(a,b) YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Rules of addition over Ep(a,b) (cont’d) YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Analog of Diffie-Hellman key exchange Pick a prime number p in the range of 2180 Choose a and b Define the elliptic group of points Ep(a,b) Pick a generator point G = (x,y) in Ep(a,b) such that the smallest value of n for which nG = O be a very large prime number Ep(a,b) and G are known to the participants YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Analog of Diffie-Hellman key exchange (cont’d) YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Analog of Diffie-Hellman key exchange (cont’d) Example: p = 211; for Ep(0,-4), choose G = (2,2). Note that 241G = O. nA =121, and PA = 121(2,2) = (115,48). nB = 203 and PB = 203(2,2) = (130,203). The shared secret key is then 121(130,203) = 203(115,48) = (161,169). For choosing a single number as the secret key, we could simply use the x coordinates or some simple function of the x coordinate. YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Elliptic curve encryption/decryption Encode the plain text m to be sent as an x-y point Pm There are relatively straightforward techniques to perform such mappings Require a point G and an elliptic group Ep(a,b) as parameters Each user A selects a private key nA and generates a public key PA = nA  G YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Elliptic curve encryption/decryption (cont’d) To encrypt and send a message Pm from A to B A chooses a random positive integer k. A then produces the ciphertext Cm consisting of the pair of points: Cm = {kG, Pm + k PB}. A has used B’s public key PB. Two instead of one piece of information are sent. YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Elliptic curve encryption/decryption (cont’d) To decrypt Cm Pm + k PB - nB(kG) = Pm + k (nBG) - nB(kG) = Pm. A has masked Pm by adding k PB to it. An attacker needs to compute k given G and kG, which is assumed hard. YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Elliptic curve encryption/decryption (cont’d) Example: Take p = 751, Ep(-1,188) and G = (0,376). Assume that Pm = (562,201) is to be sent and that the sender chooses a random number k = 386. Assume that the receiver’s public key is PB = (201,5). We have 386(0,376) = (676,558), and (562,201) + 386(201,5) = (385,328). Consequently, {(676,558), (385,328)} is sent as the ciphertext. YSL Information Security -- Public-Key Cryptography

Elliptic Curve Cryptography (cont’d) Computational effort for cryptanalysis of elliptic curve cryptography compared to RSA YSL Information Security -- Public-Key Cryptography