The Application of Elliptic Curves Cryptography in Embedded Systems

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Cryptosystem
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Elliptic curve arithmetic and applications to cryptography By Uros Abaz Supervised by Dr. Shaun Cooper and Dr. Andre Barczak.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
ASYMMETRIC CIPHERS.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
By Abhijith Chandrashekar and Dushyant Maheshwary.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Midterm Review Cryptography & Network Security
Chapter 21 Public-Key Cryptography and Message Authentication.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Elliptic Curve Cryptography
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Elliptic Curve Cryptography Celia Li Computer Science and Engineering November 10, 2005.
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Elliptic Curve Public Key Cryptography
Practical Aspects of Modern Cryptography
Public Key Cryptosystem
Asymmetric-Key Cryptography
Network Security Unit-III
PUBLIC-KEY ENCRYPTION Focusing on RSA
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Encryption and Digital Signatures
RSA and El Gamal Cryptosystems
Public Key Encryption and the RSA Algorithm
IEEE TRANSACTIONS ON INFORMATION THEORY, JULY 1985
Rivest, Shamir and Adleman
Practical Aspects of Modern Cryptography
Practical Aspects of Modern Cryptography
Lecture 6: Digital Signature
Practical Aspects of Modern Cryptography
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Introduction to Cryptography
The RSA Public-Key Encryption Algorithm
Campbell R. Harvey Duke University and NBER
How to Use Charm Crypto Lib
LAB 3: Digital Signature
Presentation transcript:

The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China

Introduction to Cryptography Components of a Cryptosystem: Plain text Cipher Code Key Popular Schemes used: Public-key cryptography - Message is encrypted using a public key. - It is decrypted using a private key. - Private key is related to public key. Three pass protocol - Message is encrypted by sender. - Message is super encrypted by receiver. - Sender decrypts message using private key. - Key exchange is not required. Source: http://upload.wikimedia.org/wikipedia/commons/2/2a/ROT13.png

Strategies for Public key Infrastructure RSA (Ron Rivest, Adi Shamir and Len Adleman) - Product of two large prime numbers is used to create a public key and private key. - With suitably large prime numbers, the problem of factorization increases. - Key sizes increase as the need of security level increase. DSA (Digital Signal Algorithm) - Based on the problem of discrete log over finite field. - For a problem a^b = c, ‘a’ and ‘c’ are known, b is required. - Can be solved easily using logarithms. - For larger number the complexity increases and desired level of security is achieved. DSA and RSA are computationally intensive in terms of memory requirement and time. Embedded Systems

Elliptical Curves Basic Properties: Equation of an elliptic curve:   Elliptical Curves Basic Properties: Equation of an elliptic curve: y2 = x3 + ax + b The equation is defined for no repeated factors. Elliptic curve groups are additive groups. The addition of any two points on curve is defined geometrically. Law of addition: P+Q = R. The point –R on the curve is reflected on x-axis to point R. Source: http://www.certicom.com/index.php?action=ecc_tutorial,ecc_tut_2_1

Elliptical Curves for Cryptography Law for doubling a point on elliptic curve P+P = 2P = R. An essential property for cryptography is that a group has a finite number of points. An elliptic curve of underlying field Fp or F2m is used. The modified equation for each underlying field is: y2 mod p = x3 + ax + b mod p y2 + xy = x3 + ax2 + b Elliptic Curve cryptography is based upon the complexity of discrete log problem.

Data security and Embedded systems Need of data security in Embedded Systems - Increase in number of wireless applications - Realization of these application on embedded systems platform. Current Security Algorithms and Embedded System - Time consuming signature generation and authentication. - Large key sizes - RSA and DSA provide a high level of security, but are expensive in terms of memory. - By reducing key size for RSA and DSA, security level is compromised. Elliptical Curve DSA (ECDSA) - Smaller key sizes without compromising level of security. - Quick signature generation and authentication.

ECDSA Implementation The elliptic curve discrete log problem: Given points P and Q in the group, find a number n such that Pn = Q. The private key used is Q. Signature generation: r = x_coord(K = kG) mod p (For any random number k, with G ) s = k^(-1) ( m + nr ) Signature verification: - For a user knowing private key Q and verifying signature for message ‘m’: K' = (s^(-1) m) G + (s^(-1) r) Q. r' = x_coord(K') Accept if r == r’ Source: Embedded.com

Why we obtain smaller key sizes using ECDSA? - RSA and DSA complexity increases as the numbers involved increases. - The use of finite field and modification in the equation of the curve. Source: Embedded.com

- Signature can be calculated before hand. Advantages of using ECDSA on Embedded systems - Signature can be calculated before hand. - Smaller key size. - Less intensive modular operations. - Quick generation of signatures Implementation of ECDSA on TI MSP430x33x - Acceptable performance at lower cost. - Modified underlying field for faster arithmetic operations. - Signature generation time is 3.4 sec ECDSA on Palm PDAs - Signature generation time – 0.9 sec - Signature verification time – 2.4 sec - 163 bit ECDSA key provides same level of security as 1024 RSA key.

Conclusion Performance advantages of ECDSA - Computationally less intensive than RSA and DSA. - High security levels in constrained environments. - Reduction in key size without compromising the data integrity. - By having smaller key sizes and efficient signature generation ECDSA is extremely suitable for embedded applications.