El Gamal and Diffie Hellman

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Public Key Cryptosystem
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Chapter 7-1 Signature Schemes.
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Bob can sign a message using a digital signature generation algorithm
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Topic 22: Digital Schemes (2)
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Prepared by Dr. Lamiaa Elshenawy
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Public-Key Cryptography ElGamal Public-Key Crypto-System
Outline Primitive Element Theorem Diffie Hellman Key Distribution
Public Key Cryptosystem
Asymmetric-Key Cryptography
Key Exchange References: Applied Cryptography, Bruce Schneier
DTTF/NB479: Dszquphsbqiz Day 26
Public Key Encryption and Digital Signatures
RSA and El Gamal Cryptosystems
Elliptic Curves.
IEEE TRANSACTIONS ON INFORMATION THEORY, JULY 1985
Topic 25: Discrete LOG, DDH + Attacks on Plain RSA
Asymmetric Cryptography
Diffie-Hellman Key-Exchange Algorithm
Foundations of Network and Computer Security
Public Key Cryptography Diffie-Hellman, Discrete Log, RSA
Diffie-Hellman Key Exchange
Digital Signatures.
El Gamal and Diffie Hellman
Key Establishment Protocols ~
Introduction to Elliptic Curve Cryptography
Discrete Log ElGamal Cryptosystem
Chapter 13 Digital Signature
CSCE 715: Network Systems Security
Introduction to Modern Cryptography
Cryptology Design Fundamentals
One Way Functions Motivation Complexity Theory Review, Motivation
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

El Gamal and Diffie Hellman ElGamal Cryptosystem In Practice Diffie-Hellman DSA El Gamal and Diffie Hellman CSCI284, 162 Spring 2009 GWU

The ElGamal Cryptosystem is based on the Discrete Log problem: Given a multiplicative group G, an element  G such that o() = n, and an element  <> Find the unique integer x, 0  x  n-1 such that  = x x denoted as log Not known to be doable in polynomial time, however exponentiation is. Hence DL is a possible one-way function 2/28/2019 CS284-162/Spring09/GWU/Vora/ElGamal

CS284-162/Spring09/GWU/Vora/ElGamal El Gamal Cryptosystem Let p a prime such that DL in Zp* is infeasible Let  Zp* be a primitive element P = Zp* C = Zp* X Zp* and K = {(p, , a, ): =a (mod p)} public key = (p, , ) and private key = a For a secret random number k Zp-1 eK(x, k) = (y1, y2) y1 = k mod p y1 = xk mod p dK (y1, y2) = y2( y1a)-1 mod p 2/28/2019 CS284-162/Spring09/GWU/Vora/ElGamal

CS284-162/Spring09/GWU/Vora/ElGamal Example p = 2579  = 2 a = 1391 Encrypt message: 2079 2/28/2019 CS284-162/Spring09/GWU/Vora/ElGamal

CS284-162/Spring09/GWU/Vora/ElGamal Practicalities More efficient attacks possible unless elliptic curve DL, for which these efficient attacks are not known. Modulus required for security: 2160 with elliptic curves 21880 without DL over elliptic curves very hot problem. 2/28/2019 CS284-162/Spring09/GWU/Vora/ElGamal

Diffie-Hellman Key Exchange Protocol for exchanging secret key over public channel. Select global parameters p, n and . p is prime and  is of order n in Zp*. These parameters are public and known to all. 2/28/2019 CS284-162/Spring09/GWU/Vora/ElGamal

Diffie-Hellman Key Exchange

Diffie-Hellman Key Exchange contd. Alice privately selects random b and sends to Bob b mod p. Bob privately selects random c and sends to Alice c mod p. Alice and Bob privately compute bc mod p which is their shared secret. An observer Oscar can compute bc if he knows either c or b or can solve the discrete log problem. This is a key agreement protocol. 2/28/2019 CS284-162/Spring09/GWU/Vora/ElGamal

Diffie-Hellman problem Given a multiplicative group G, an element G of order n and two elements ,   <> Computational Diffie-Hellman: Find  such that log   log   log (mod n) Equivalently, given b, and c find bc Decision Diffie-Hellman Given an additional   <> Determine if log   log   log (mod n) Equivalently, given b, c, and d determine if d  bc (mod n) 2/28/2019 CS284-162/Spring09/GWU/Vora/ElGamal

CS284-162/Spring09/GWU/Vora/ElGamal An attack Diffie-Hellman key exchange is susceptible to a man-in-the-middle attack. Mallory captures b and c in transmission and replaces with own b’ and c’. Essentially runs two Diffie-Hellman’s. One with Alice and one with Bob. 2/28/2019 CS284-162/Spring09/GWU/Vora/ElGamal

Digital Signatures

CS284-162/Spring09/GWU/Vora/ElGamal Definition P: set of plaintext S: set of signatures K: keyspace private function: sigk: P  S public function: verK : P X S  {true, false} verK(m, s) = true iff sigK(m) = s; else verK(m, s) = false {m, sigK(m)} is a signed message 2/28/2019 CS284-162/Spring09/GWU/Vora/ElGamal

RSA encryption can be used for signatures Attacks: incorrect public key, no message attack Protection from attacks: use redundancy functions, for example, message is of the form of two identical concatenated strings Signatures on digests. Requirements of hash function? 2/28/2019 CS284-162/Spring09/GWU/Vora/ElGamal

El Gamal Digital Signature, basis for DSA DSA uses SHA-1 in addition to a DS scheme For a key K= (p, , , a);  = a mod p; a private Choose random k invertible mod p-1 sigK(x, k) = (=k mod p, =(x-a)k-1 mod p-1) verK(x, (G, D)) = true  GGD=x mod p 2/28/2019 CS284-162/Spring09/GWU/Vora/ElGamal