Fundamental Elliptic Curve Cryptography Algorithms draft-mcgrew-fundamental-ecc-02

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

PAR for P Title: Standard for Pairing based Cryptographic Techniques June 4, 2005 PAR for IEEE P
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Key Establishment Schemes Workshop Document October 2001.
SIP Authentication using EC- SRP5 Protocol draft-liu-sipcore-ecc-srp5-00.txt Authors: Fuwen Liu, Minpeng Qi and Min Zuo.
A One Round Protocol for Tripartite Diffie Hellman By Dane Vanden Berg.
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
Elliptic Curve Cryptography Shane Almeida Saqib Awan Dan Palacio.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
ASYMMETRIC CIPHERS.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
DSA (Digital Signature Algorithm) Tahani Aljehani.
By Abhijith Chandrashekar and Dushyant Maheshwary.
A. Steffen, CryptoStrength.pptx 1 Information Security 2 (InfSi2) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Elliptic Curve Cryptography
Digital Signatures: Mathematics Zdeněk Říha. Data authentication Data integrity + data origin Digital signature Asymmetric cryptography public and private.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Optimal Mail Certificates in Mail Payment Applications Leon Pintsov Pitney Bowes 2nd CACR Information Security Workshop 31 March 1999.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Asymmetric Key Signatures David Evans and Samee Zahur CS4501, Fall 2015.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Elliptic Curve Cryptography-based Authorization & Key Agreement for IEEE m IEEE Presentation Submission Template (Rev. 9) Document Number:
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Basic Elliptic Curve Cryptography 1Lt Peter Hefley 90 OSS Instructor Fall ‘06.
Some Perspectives on Smart Card Cryptography
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Chapter 10
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
May 30 th – 31 st, 2006 Sheraton Ottawa. Implementing Advanced Cryptography - Suite-B William Billings, CISSP Chief Security Advisor Microsoft US Federal.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Tim Güneysu, Christof Paar and Jan Pelzl.
Cryptography and Network Security
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
RSA Data Security, Inc. PKCS #13: Elliptic Curve Cryptography Standard Burt Kaliski RSA Laboratories PKCS Workshop October 7, 1998.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Motivation Basis of modern cryptosystems
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Information Security Lab. Dept. of Computer Engineering 251/ 278 PART II Asymmetric Ciphers Key Management; Other CHAPTER 10 Key Management; Other Public.
Giuseppe Bianchi Lecture 8: Elliptic Curve Crypto A (minimal) introduction.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Elliptic Curve Public Key Cryptography
Chapter 9 – Elliptic Curve Cryptography ver. November 3rd, 2009
Network Security Design Fundamentals Lecture-13
Dan Brown, Certicom Research November 10, 2004
Public Key Encryption and Digital Signatures
MIRACL & PBC Yung-Hsiang Liu.
Diffie-Hellman Key-Exchange Algorithm
Diffie-Hellman Key Exchange
El Gamal and Diffie Hellman
Introduction to Elliptic Curve Cryptography
Cryptology Design Fundamentals
Network Security Design Fundamentals Lecture-13
Presentation transcript:

Fundamental Elliptic Curve Cryptography Algorithms draft-mcgrew-fundamental-ecc-02

Elliptic Curve Cryptography Alternative to integer-based Key Exchange and Signature algorithms Smaller keys and signatures More efficient at higher security levels

Diffie Hellman AliceBob x = random g x mod p g y mod p y = random (g x ) y mod p(g y ) x mod p= g is number < p

EC Diffie Hellman AliceBob x = random gxgx gygy y = random (gx)y(gx)y (gy)x(gy)x = g is element of EC group G

Cryptographic Groups Prime Group Element is number x < p Prime modulus p Generator g < p Order n EC Group Element is (x, y) with x, y < p with y 2 = x 3 + ax + b mod p Prime modulus p Parameters a, b < p Generator (g x, g y ) Order n ECC Parameter Set

Public Key Sizes From RFC3766, Determining Strengths For Public Keys Used For Exchanging Symmetric Keys 30x

ECC Efficient at High Security Security Computational Cost ECC Integer

fECC draft-mcgrew-fundamental-ecc – Informational – First published 7/09 – Comments received and incorporated in -02 Closely based on pre-1994 references – Security: survived > 16 years of review – IPR: simplifies analysis

Timeline …… ECC invented ECDH [M1985] EC ElGamal [K1987] ECC Implementation [BC1989] Homogeneous Coordinates [KMOV1991] EC ElGamal Signatures [A1992] Meta ElGamal Signatures [HMP1994] Abbreviated EC ElGamal Signatures [KT1994]

Layers Crypto Algorithms Elliptic Curve Arithmetic Modular Arithmetic Key Exchange, Signatures Coordinates, Representation +, -, *, / fECC Scope

fECC Diffie-Hellman Miller 1985 Compatible with IKE (RFC 4753) Compatible with ECDH (IEEE 1363, ANSI X9.62) – Curves over GF(p) with cofactor=1 – ECSVDP-DH primitive – Key Derivation Function is identity function

fECC Signatures Koyama and Tsuruoka, 1994 Horster, Michels, and Petersen, 1994 KT-IV Signatures – Compatible with ECDSA (IEEE 1363, ANSI X9.62) KT-I Signatures – Not interoperable with standard

ECC Parameter Sets Compatible – Suite B USG Cryptographic Interoperability Strategy Uses NIST P256, P384, P521 – Other NIST curves over GF(p) – RFC 5639 Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation – WAPI ISO/IEC JTC 1/SC 6 Proposal Not compatible – DJB’s Curve25519 protocol

Not in Scope EC Group Parameter Generation Identity-based crypto Edwards’ coordinates GF(2 m ) curves Mod p arithmetic optimizations Certificate details Exotic groups (hyperelliptic, braids, …) …

Possible Future Drafts Optimizations – Modular arithmetic Efficient primes – Elliptic Curve arithmetic Priority: preserve interoperability and compatibility with standards

Conclusions Draft ready for RFC ECC deserves serious consideration – fECC is secure and performs well Recommendation: IETF work using ECC should explicitly allow fECC –… implementations MAY use [fECC] …

Questions?

(x3,y3) = (x1,y1) × (x2,y2) x3 = ((y2-y1)/(x2-x1)) 2 - x1 – x2 y3 = (x1-x3)(y2-y1)/(x2-x1) – y1

A Group × , 5 2 =4, 5 3 =6, 5 4 =2, 5 5 =3, 5 6 =1 Multiplication modulo 7