Elliptic-Curve Cryptography (ECC)

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Public Key Cryptography and the RSA Algorithm
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
ASYMMETRIC CIPHERS.
By Abhijith Chandrashekar and Dushyant Maheshwary.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Elliptical Curve Cryptography Manish Kumar Roll No - 43 CS-A, S-7 SOE, CUSAT.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer and Network Security Rabie A. Ramadan Lecture 6.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Cryptography and Network Security
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Network Security Dr. Syed Ismail Shah
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Key Management Other Public-Key Cryptosystems
Asymmetric-Key Cryptography
CSCE 715: Network Systems Security
Public Key Cryptosystem
Asymmetric-Key Cryptography
Advanced Information Security 5 ECC Cryptography
Message Authentication and Hash Functions
Public-Key Cryptography and RSA
RSA and El Gamal Cryptosystems
Chapter 10 – Key Management; Other Public Key Cryptosystems
Elliptic Curve Cryptography (ECC)
Cryptography and Network Security
NET 311 Information Security
Elliptic Curve Cryptography (ECC)
Enabling Technology1: Cryptography
Diffie-Hellman Key Exchange
NET 311 Information Security
CSCE 715: Network Systems Security
Introduction to Elliptic Curve Cryptography
Chapter 3 - Public-Key Cryptography & Authentication
CSCE 715: Network Systems Security
Introduction to Cryptography
Diffie-Hellman Key Exchange
The RSA Public-Key Encryption Algorithm
Digital Signature Standard (DSS)
Diffie-Hellman Algorithm
Presentation transcript:

Elliptic-Curve Cryptography (ECC) Network Security

Elliptic-Curve Cryptography (ECC) Objectives of the Topic After completing this topic, a student will be able to describe Elliptic-Curve Cryptography (ECC).

Elliptic-Curve Cryptography (ECC) Figures and material in this topic have been adapted from W. Stalling’s “Network Security Essentials ”, 2014. W. Stalling’s “Cryptography and Network Security Principles and Practice”, 2014.

Elliptic-Curve Cryptography (ECC) Most of the products and standards that use public-key cryptography for encryption and digital signatures use RSA.

Elliptic-Curve Cryptography (ECC) The key length for secure RSA use has increased over recent years, and this has put a heavier processing load on applications using RSA.

Elliptic-Curve Cryptography (ECC) This burden has ramifications, especially for electronic commerce sites that conduct large numbers of secure transactions.

Elliptic-Curve Cryptography (ECC) A competing system challenges RSA: elliptic curve cryptography (ECC). It is showing up in standardization efforts, including the IEEE P1363 Standard for Public-Key Cryptography.

Elliptic-Curve Cryptography (ECC) The principal attraction of ECC, compared to RSA, is that it appears to offer equal security for a far smaller key size, thereby reducing processing overhead.

Elliptic-Curve Cryptography (ECC) Although the theory of ECC has been around for some time, it is only recently that products have begun to appear and that there has been sustained cryptanalytic interest in probing for weaknesses.

Elliptic-Curve Cryptography (ECC) Accordingly, the confidence level in ECC is not yet as high as that in RSA.

Elliptic-Curve Cryptography (ECC) An elliptic curve is defined by an equation in two variables with coefficients. For cryptography, the variables and coefficients are restricted to elements in a finite field.

Elliptic-Curve Cryptography (ECC) The addition operation in ECC is the counterpart of modular multiplication in RSA, and multiple addition is the counterpart of modular exponentiation.

Elliptic-Curve Cryptography (ECC) Analog of Diffie-Hellman Key Exchange First pick a large integer q, which is either a prime number p or an integer of the form 2m, and elliptic curve parameters a and b.

Elliptic-Curve Cryptography (ECC) This defines the elliptic group of points Eq(a, b). Next, pick a base point G = (x1, y1) in Ep(a, b) whose order is a very large value n.

Elliptic-Curve Cryptography (ECC) 1. A selects an integer nA less than n. This is A’s private key. A then generates a public key PA = nA x G; the public key is a point in Eq(a, b).

Elliptic-Curve Cryptography (ECC) 2. B similarly selects a private key nB and computes a public key PB. 3. A generates the secret key k = nA x PB. B generates the secret key k = nB x PA.

Elliptic-Curve Cryptography (ECC) The two calculations in step 3 produce the same result because nA x PB = nA x (nB x G) = nB x (nA x G) = nB x PA To break this scheme, an attacker would need to be able to compute k given G and kG, which is assumed to be hard.

Elliptic-Curve Cryptography (ECC) Elliptic Curve Encryption/Decryption: It requires a point G and an elliptic group Eq(a, b) as parameters. Each user A selects a private key nA and generates a public key PA = nA x G.

Elliptic-Curve Cryptography (ECC) To encrypt and send a message Pm to B, A chooses a random positive integer k and produces the ciphertext Cm consisting of the pair of points: Cm = {kG, Pm + kPB} Note that A has used B’s public key PB.

Elliptic-Curve Cryptography (ECC) To decrypt the ciphertext, B multiplies the first point in the pair by B’s private key and subtracts the result from the second point: Pm + kPB - nB(kG) = Pm + k(nBG) - nB (kG) = Pm

Elliptic-Curve Cryptography (ECC) A has masked the message Pm by adding kPB to it. Nobody but A knows the value of k, so even though PB is a public key, nobody can remove the mask kPB.

Elliptic-Curve Cryptography (ECC) There is a computational advantage to using ECC with a shorter key length than a comparably secure RSA. End