Weak Keys in Diffie- Hellman Protocol Aniket Kate Prajakta Kalekar Deepti Agrawal Under the Guidance of Prof. Bernard Menezes.

Slides:



Advertisements
Similar presentations
Vector Spaces A set V is called a vector space over a set K denoted V(K) if is an Abelian group, is a field, and For every element vV and K there exists.
Advertisements

Mathematics of Cryptography Part II: Algebraic Structures
Cryptography and Network Security, Finite Fields From Third Edition by William Stallings Lecture slides by Mustafa Sakalli so much modified..
Cryptography and Network Security
Chapter 4 Finite Fields. Introduction of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key concern operations on “numbers”
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
Chapter 4 – Finite Fields. Introduction will now introduce finite fields of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key.
1 390-Elliptic Curves and Elliptic Curve Cryptography Michael Karls.
1.  We have studied groups, which is an algebraic structure equipped with one binary operation. Now we shall study rings which is an algebraic structure.
Math 3121 Abstract Algebra I
1.  Detailed Study of groups is a fundamental concept in the study of abstract algebra. To define the notion of groups,we require the concept of binary.
CNS2010handout 8 :: introduction to number theory1 computer and network security matt barrie.
Cryptography and Network Security Chapter 4
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Introduction to Modern Cryptography Lecture 3 (1) Finite Groups, Rings and Fields (2) AES - Advanced Encryption Standard.
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
259 Lecture 14 Elementary Matrix Theory. 2 Matrix Definition  A matrix is a rectangular array of elements (usually numbers) written in rows and columns.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Cryptography Lecture 6 Stefan Dziembowski
M. Khalily Dermany Islamic Azad University.  finite number of element  important in number theory, algebraic geometry, Galois theory, cryptography,
Math 3121 Abstract Algebra I Lecture 3 Sections 2-4: Binary Operations, Definition of Group.
FINITE FIELDS 7/30 陳柏誠.
Equation --- An equation is a mathematical statement that asserts the equality of twomathematicalstatement expressions. An equation involves an unknown,
CPSC 3730 Cryptography and Network Security
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
Cryptography and Network Security Introduction to Finite Fields.
By: Hector L Contreras SSGT / USMC
Numbers, Operations, and Quantitative Reasoning.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Monoids, Groups, Rings, Fields
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Temperature Readings The equation to convert the temperature from degrees Fahrenheit to degrees Celsius is: c(x) = (x - 32) The equation to convert the.
Session 1 Stream ciphers 1.
Chapter 4 – Finite Fields
Public key ciphers 2 Session 6.
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
Information Security Lab. Dept. of Computer Engineering 87/121 PART I Symmetric Ciphers CHAPTER 4 Finite Fields 4.1 Groups, Rings, and Fields 4.2 Modular.
Introduction to Real Analysis Dr. Weihu Hong Clayton State University 8/19/2008.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Great Theoretical Ideas In Computer Science Anupam GuptaCS Fall 2006 Lecture 15Oct 17, 2006Carnegie Mellon University Algebraic Structures: Groups,
Abstract Algebra 2004/9/29Yuh-Ming Huang, CSIE NCNU1 Introduction to Algebra Def 2.0 ( G, * ) G: a set A binary operation * on G : a * b  G  a,b  G.
15-499Page :Algorithms and Applications Cryptography II – Number theory (groups and fields)
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Multiplicative Group The multiplicative group of Z n includes every a, 0
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 4 With Question/Answer Animations 1. Chapter Motivation Number theory is the part of mathematics devoted to the study of the integers and their.
INTRODUCTION SC116: Algebraic Structures Short Title of the Course: ALG Instructor: Professor Samaresh Chatterji.
Prepared By Meri Dedania (AITS) Discrete Mathematics by Meri Dedania Assistant Professor MCA department Atmiya Institute of Technology & Science Yogidham.
13.3 Product of a Scalar and a Matrix.  In matrix algebra, a real number is often called a.  To multiply a matrix by a scalar, you multiply each entry.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-5 Mathematical Background:
Elementary Matrix Theory
Mathematical Background : A quick approach to Group and Field Theory
CS480 Cryptography and Information Security
Properties of Operations
Prelude to Public-Key Cryptography
Quick reviews / corrections
MATH301- DISCRETE MATHEMATICS Copyright © Nahid Sultana Dr. Nahid Sultana Chapter 4: Number Theory and Cryptography.
Complex Number Field Properties
Computer Security Number Theory: Divisibility, Prime Numbers, Greatest Common Divisor, Relative Primality Groups, Rings and Fields November 23, 2018 ©2004,
Public Key Cryptography
I. Finite Field Algebra.
FIELD.
Cryptology Design Fundamentals
Mathematical Background : A quick approach to Group and Field Theory
Mathematical Background: Extension Finite Fields
Presentation transcript:

Weak Keys in Diffie- Hellman Protocol Aniket Kate Prajakta Kalekar Deepti Agrawal Under the Guidance of Prof. Bernard Menezes

Roadmap Introduction to the Diffie-Hellman Protocol Basics of Abstract Algebra Concepts Mathematical attacks on Diffie-Hellman Protocol Diffie-Hellman Problem (DHP) over General Linear Groups (GL n ) Applying concept to Field Extension. Conclusion

Diffie-Hellman Protocol

Diffie-Hellman Conjecture Discrete Logarithm Problem (DLP) To find z given g z Diffie-Hellman problem (DHP) Problem of solving the shared key Diffie-Hellman conjecture (DHC) To solve the DHP we need to solve the DLP

Basics Group (G, +) satisfying the properties of closure, associativity, identity and inverse. Cyclic Group A group that can be generated by a single element g (the group generator). Subgroup Subset H of group elements of a group G that satisfies the four group requirements.

Basics (Cont..) Ring (R, +, *) satisfying the properties of additive associativity, additive commutativity, additive identity, additive inverse, multiplicative associativity and left and right distributivity. Fields Set of elements that satisfies the group axioms for both addition and multiplication and has no zero divisors. General Linear Group General linear group of degree n over a field F (written as GL(n,F)) is the group of n-by-n invertible matrices with entries from F, with the group operation that of ordinary matrix multiplication.

Basics (Cont..) Minimal Polynomial Minimal polynomial of a matrix is the polynomial in A of smallest degree n such that Example For matrix The minimal polynomial is

Basics (Cont..) Irreducible Polynomial A polynomial is said to be irreducible if it cannot be factored into nontrivial polynomials over the same field. Extension Field A field K is said to be an extension field of field F if F is a subfield of K. For example, the complex numbers are an extension field of the real numbers

Trivial attacks on Diffie-Hellman Protocol Simple Exponent 1. k = 1 or l =1 2. k = p-1 or l = p-1 Simple Substitution Attacks g k = 1 or g l = 1

Mathematical attacks on Diffie-Hellman Protocol Subgroup Confinement Attack Example : p = 19, g = 2 Generated group {2, 4, 8, 16, 13, 7, 14, 9, 18, 17, 15, 11, 3, 6, 12, 5, 10, 1} k = 2, A = 2 2 = 4 Subgroup generated by A=S A = {4, 16, 7, 9, 17, 11, 6, 5, 1} l = 3, B = 2 3 = 8 Sub-group generated by B = S B = {8, 7, 18, 11, 12, 1} K ab = 2 6 = 7 Note : K ab belongs to S A intersection S B Solution: Use Safe primes ( p= 2q + 1 )

Mathematical attacks on Diffie- Hellman Protocol (Cont..) Attacks based on composite order subgroup

Diffie-Hellman Problem over General Linear Groups A matrix G in GL n (K) and matrices A = G k and B = G l are given for some unknown positive integers k, l < ord(G). Determine the matrix G kl = A l =B k. The matrix G kl is called the shared key of the DH protocol. The triple (G,A,B) shall be called the public data of the DHP.

Conditions for DHP over GL n There exist polynomial f(x) such that A = f(G) B k = f(B) There exist polynomial g(x) such that B = g(G) A l = g(A)

Example Consider the field be F 53 and G in GL 2 given by Let k = 3, l = 53 then Now the polynomial solution of the linear system A = f(G) gives f(x) = x + 47.

Example (Cont..) The shared key is It is easy to see that G 53×3 = f(B) = B + 47I.

The Modulus Condition The triple (G, k, l) with G in GL n (K) is said to satisfy the modulus condition if any one of the following conditions hold x k mod (MP of G) = x k mod LCM( MP of G, MP of B) Or x l mod (MP of G) = x l mod LCM( MP of G, MP of A)

Implication of Modulus Condition The following statements hold : There exists a polynomial f(x) which satisfies A = f(G) and B k = f(B) iff (G, k, l) satisfies the first modulus condition. Such a polynomial is unique. There exists a polynomial g(x) which satisfies B = g(G) and A l = g(A) iff (G, k, l) satisfies the second modulus condition. Such a polynomial is unique.

Conjugate Class A triple (G, k, l) is said to belong to the conjugate class if minimal polynomial of G and A are same. MP(G) = MP(A) or minimal polynomial of G and B are same. MP(G) = MP(B)

Applying the same concept to Extension Fields Assume extension field of prime field 2 over irreducible polynomial x 3 + x + 1. Let g be the generator of the extension field. Hence,g 3 + g + 1 = 0 Now, generating all the elements of the field…..

Applying Concept to Field Extensions Take k = 6 and l = 2 Now, A = g k = g 6 = g = f(g) B = g l = g 2 Shared key is g 12 = g 7.g 5 = g 5 = g 2 + g+ 1 Also, f(B) = f(g 2 ) = g = g 2 + g+ 1

Conclusion Diffie-Hellman Conjecture does not always hold. For certain class of keys, the shared secret key can be determined without solving the Discrete Logarithm Problem. There is no direct method available till date to enumerate all such keys except for a limited subset of keys that satisfy the Conjugate Class Property.

References W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Trans. on Information Theory, 22:644–654, R. Lidl and G. Pilz. Applied Abstract Algebra. Springer-Verlag, 1st edition edition, A. J. Menezes and Yi-Hong Wu. The discrete logarithm problem in gln. ARS Combinotoria, 47:23– 32, Jean-Francois Raymond and Anton Stiglic. Security issues in the diffie-hellman key agreement protocol. IEEE Trans. on Information Theory, pages 1–17, William Stallings. Cryptography and Network Security. Pearson Education, 3rd edition, 2003.

Notations Used h(G,x): Minimal Polynomial for matrix G h b (x) = LCM(h(G,x), h(B,x) ) h a (x) = LCM(h(G,x), h(A,x) ) f(x) = x k mod h b (x) g(x) = x l mod h a (x)