Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Asymmetric-Key Cryptography
Cryptography The science of writing in secret code.
Attacks on Digital Signature Algorithm: RSA
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
Public Key Cryptography
Public Encryption: RSA
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 19,20, and 21: April 5, 10, and 12, 2007 Cryptographic Primitives.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Topic 5 Essential Public Key Crypto Methods.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Introduction to Public Key Cryptography
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
CS110: Computers and the Internet Encryption and Certificates.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
Issues in Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Electronic Voting Ronald L. Rivest MIT Laboratory for Computer Science.
Computer encryption is… Based on the science of cryptography.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Midterm Review Cryptography & Network Security
``Chaffing and Winnowing’’ & Crypto Policy Comments Ronald L. Rivest Cryptography and Information Security Group MIT Lab for Computer Science April 1998.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
RSA Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Lecture 2: Introduction to Cryptography
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Elliptic Curve Cryptography
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Encryption CS110: Computer Science and the Internet.
Cryptography Readings Encryption, Decryption, & Digital Certificates.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
CS/COE 1501 Recitation Extended Euclidean Algorithm + Digital Signatures.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
1 Managing Security Additional notes. 2 Intercepting confidential messages Attacker Taps into the Conversation: Tries to Read Messages Client PC Server.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Issues in Cryptography
Lecture 6: Digital Signature
Lecture 10: Network Security.
One Time Signature.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
How to Use Charm Crypto Lib
Presentation transcript:

Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science

Outline u Cryptography can do surprising things u Cryptography needs a secure platform

Cryptography can be surprising u Not only digital signatures: (created with private signing key, verifiable with public key, authenticates both signer and message) u But blind digital signatures: (signer doesn’t see what he is signing)

Cryptography can be surprising u Not only encryption: (provides confidentiality against eavesdroppers, ciphertext can only be decrypted with proper key) u But homomorphic encryption: (product of ciphertexts encrypts sum of plaintexts: E(3) x E(5) = E(8))

Cryptography in Theory Alice SK A Voting System

Cryptography in Practice SK A Alice! Voting System Alice? Crypto needs secure platform; modern OS’s are not very secure.

Can SK A go on a smart card? SK A Alice? Voting System Alice?

(THE END)