Asymmetric Key Signatures David Evans and Samee Zahur CS4501, Fall 2015.

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

Public Key Cryptosystem
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Cryptography and Network Security
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
7. Asymmetric encryption-
Public Key Algorithms …….. RAIT M. Chatterjee.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
Introduction to Modern Cryptography Homework assignments.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Srineeja Patlolla CS-555.  Discovered by Whitfield Diffie and Martin Hellman  “New Directions in Cryptography”
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Chapter 9 – Public Key Cryptography and RSA Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
ASYMMETRIC CIPHERS.
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Rachana Y. Patil 1 1.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Bob can sign a message using a digital signature generation algorithm
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
Great Theoretical Ideas in Computer Science.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Topic 22: Digital Schemes (2)
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Information Security CS 526
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Elliptic Curve Cryptography
Cryptography and Network Security
Prepared by Dr. Lamiaa Elshenawy
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
DIGITAL SIGNATURE IMPLEMENTATION
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Cryptography and Network Security Chapter 13
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Public Key Encryption and Digital Signatures
RSA and El Gamal Cryptosystems
Digital Signatures Campbell R. Harvey Duke University, NBER and
Pre-image Resistance: Given a, hard to find b such that ____
How to Use Charm Crypto Lib
LAB 3: Digital Signature
Presentation transcript:

Asymmetric Key Signatures David Evans and Samee Zahur CS4501, Fall 2015

Please pay $1000 to my employee --TheBoss You have money!

Real-life Signatures Easy to verify Bank has your signature Forging unlikely Legal consequences of forging Checkbooks are well-guarded Copying it requires physical access Hard to repudiate Bank keeps a copy for few months

Digital Signatures

Topics Asymmetric cryptography Digital signatures Elliptic curve cryptography Implementation pitfalls

Ordinary (or symmetric) crypto Message key

Whitfield Diffie Martin Hellman New Directions in Cryptography, 1976

Diffie-Hellman Key Exchange

Discrete Logarithm Problem

Random element out of …?

Mod 5 Exponentiation … … … … … … Order 1 Order 2

Exponent Modulus

Public-key Cryptography

Man-in-the-Middle (MITM)

Digital Signature

Recall

Discrete-log based signature

ElGamal Signature Scheme

Bitcoin Payment Sign it like a check!

Recap 1.We want to sign transactions digitally on the bitcoin network, such that they are: a)Easy to verify b)Hard to forge c)Hard to repudiate 2.Discrete exponentiation is easy, logarithm is hard 3.We used it to make asymmetric (aka. public) key crypto 4.Same principle used for digital signatures

Avoiding (overly) long numbers

Informal Requirements

Group

Additional Cryptographic Properties Discrete logarithm should be hard Group operation should be efficient Implies small key sizes

Elliptic Curve Cryptography (ECC) Group elements: points on the curve, P, Q, and R Point “addition”: using “geometry”. P+Q=R P Q R

Elliptic “Curve” Image from:

Elliptic Curve Digital Signature Algorithm (ECDSA) ECDSA Inputs: message, private key 1.Pick random k 2.Compute a), let 3.Send with message Verification If, check

Please pay $1000 to my employee --TheBoss You have money! Jason Benjamin

Logistics Next class: hash functions and Bitcoin consensus Checkup 1 on Monday. Includes everything till today