SIGNCRYPTION Dr. Attila A. Yavuz.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Updates on Signcryption Yuliang Zheng UNC Charlotte IEEE P1363 Meeting, UCSB 8/22/2002.
Public Key Cryptosystem
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
The XTR public key system (extended version of Crypto 2000 presentation) Arjen K. Lenstra Citibank, New York Technical University Eindhoven Eric R. Verheul.
Network Security Review. Secure channel Communication security Confidentiality Message Traffic Authentication Integrity How to achieve? Establish shared.
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Public Key Cryptography
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Mid-term Review Network Security. Secure channel SSL (and many others:incl. IPSEC) Shared key establishing Trusted party (Kerberos, etc. - to be covered)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad and Alexander W. Dent University of Bergen, Norway Royal Holloway, University of London,
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Cryptography and Network Security Chapter 13
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Bob can sign a message using a digital signature generation algorithm
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
By Abhijith Chandrashekar and Dushyant Maheshwary.
1 Optimal Mail Certificates in Mail Payment Applications Leon Pintsov Pitney Bowes 2nd CACR Information Security Workshop 31 March 1999.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Some Perspectives on Smart Card Cryptography
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
Coded Modulation and the Arrival of Signcryption Yuliang Zheng University of North Carolina at Charlotte Enhancing Crypto-Primitives with.
Elliptic Curve Cryptography
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
1 Introduction to Information Security , Spring 2016 Lecture 4: Applied cryptography: asymmetric Zvi Ostfeld Slides credit: Eran Tromer.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Network security Cryptographic Principles
Overview Modern public-key cryptosystems: RSA
Public Key Cryptosystem
Asymmetric-Key Cryptography
Public Key Encryption Systems
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Encryption and Digital Signatures
Cryptography and Network Security
Sindhusha Doddapaneni
CS/ECE 578 Cyber-Security
Digital signatures.
Digital Signatures Last Updated: Oct 14, 2017.
Digital Signature Schemes and the Random Oracle Model
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Public Key Infrastructure
Digital Signature Schemes and the Random Oracle Model
Security in Network Communications
Rivest, Shamir and Adleman
Public-key encryption
The Application of Elliptic Curves Cryptography in Embedded Systems
Digital Signatures…!.
El Gamal and Diffie Hellman
Practical Aspects of Modern Cryptography
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Public Key Encryption Systems
Network Security Tutorial-16 Design Fundamentals PGP ET-IDA-082
Elliptic-Curve Cryptography (ECC)
Digital Signature Standard (DSS)
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
How to Use Charm Crypto Lib
Presentation transcript:

SIGNCRYPTION Dr. Attila A. Yavuz

Signcryption Provides the functions of digital signature unforgeability & non-repudiation public key encryption confidentiality Has a significantly smaller comp. & comm. cost Cost (signcryption) << Cost (signature) + Cost (encryption)

Signcryption -- public & secret parameters Public to all p : a large prime q : a large prime factor of p-1 g : 0<g<p & with order q mod p G: 1-way hash H: 1-way hash (E,D) : private-key encryption & decryption algorithms

Signcryption -- 1st example (c,r,s) m (c,r,s)

Signcryption – 2nd example (c,r,s) m (c,r,s)

Signcryption – 3rd example (c,r,s) m (c,r,s)

Major instantiations of signcryption based on DL on an Elliptic Curve Zheng, CRYPTO’97 Zheng & Imai IPL 1998 based on other sub-groups (e.g. XTR) Lenstra & Verheul, CRYPTO2000 Gong & Harn, IEEE-IT 2000 based on DL on finite field based on factoring / residuosity Steinfeld & Zheng, ISW2000 Zheng, PKC2001 More efficient

Signcryption v.s. Signature-then-Encryption (a) Signcryption based on DL m sig EXP=1+1.17 (b) Signature-then-Encryption based on RSA m sig EXP=2+2 (c) Signature-then-Encryption based on DL m sig gx EXP=3+2.17

DL Signcryption v.s. sign-then-encrypt # of multiplications |p|=|n|

DL Signcryption v.s. sign-then-encrypt comm. overhead (# of bits) |p|=|n|

Security Proofs Analysis given in the Crypto’97 paper was informal Rigorous proofs (reductions) established Results presented at PKC02 in Paris, Feb. 2002 Proof techniques applicable to signcryption schemes based on DL and EC

Developments Full version of the proof paper and updated descriptions of concrete signcryption schemes available at IEEE P1363 website Security proofs for combined signature and encryption including signcryption Parallel signcryption ID-based signcryption Threshold signcryption