Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.

Slides:



Advertisements
Similar presentations
Signatures for Network Coding Denis Charles Kamal Jain Kristin Lauter Microsoft Research.
Advertisements

Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?
Introduction to Elliptic Curves. What is an Elliptic Curve? An Elliptic Curve is a curve given by an equation E : y 2 = f(x) Where f(x) is a square-free.
Russell Martin August 9th, Contents Introduction to CPABE Bilinear Pairings Group Selection Key Management Key Insulated CPABE Conclusion & Future.
Discrete Methods in Mathematical Informatics Lecture 2: Elliptic Curve Cryptography 16 th October 2012 Vorapong Suppakitpaisarn
Graduate School of Natural Science and Technology Okayama University Yumi Sakemi, Hidehiro Kato, Shoichi Takeuchi, Yasuyuki Nogami and Yoshitaka Morikawa.
What is Elliptic Curve Cryptography?
Elliptic curve arithmetic and applications to cryptography By Uros Abaz Supervised by Dr. Shaun Cooper and Dr. Andre Barczak.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
1 Efficient Algorithms for Elliptic Curve Cryptosystems Original article by Jorge Guajardo and Christof Paar Of WPI ECE Department Presentation by Curtis.
Elliptic Curve Cryptography Shane Almeida Saqib Awan Dan Palacio.
Elliptic Curve. p2. Outline EC over Z p EC over GF(2 n )
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Clicker Question 1 What is an equation of the tangent line to the curve f (x ) = x 2 at the point (1, 1)? A. y = 2x B. y = 2 C. y = 2x 2 D. y = 2x + 1.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Electronic Payment Systems Lecture 5: ePayment Security II
CPE5021 Advanced Network Security --- Advanced Cryptography: Elliptic Curve Cryptography --- Lecture 3 CPE5021 Advanced Network Security --- Advanced Cryptography:
Digital Signatures Presented by Olga Shishenina. 2 Outline  Cryptographic goals  Message Authentication Codes (MACs)  Digital signatures RSA digital.
ASYMMETRIC CIPHERS.
By Abhijith Chandrashekar and Dushyant Maheshwary.
Ipsita Sahoo 10IT61B05 School of Information Technology IIT Kharagpur October 29, 2011 E LLIPTIC C URVES IN C RYPTOGRAPHY.
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
An Efficient Identity-based Cryptosystem for
Lecture 7 Discrete Logarithms
Application of Elliptic Curves to Cryptography
Research on the Discrete Logarithm Problem Wang Ping Meng Xuemei
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Scott CH Huang COM5336 Cryptography Lecture 10 Elliptic Curve Cryptography Scott CH Huang COM 5336 Cryptography Lecture 10.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Elliptical Curve Cryptography Manish Kumar Roll No - 43 CS-A, S-7 SOE, CUSAT.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Research on the Discrete Logarithm Problem Wang Ping Meng Xuemei
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Relationships among the Computational Powers of Breaking Dis-hog Cryptosystems K.SAKURAI † H.SHIZUYA (Kyushu Uni) (Tohoku Uni) EUROCRYPTO ‘95 † Partially.
Elliptic curve cryptography ECC is an asymmetric cryptosystem based on the elliptic curve discrete log problem. The ECDLP arises in Abelian groups defined.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Tim Güneysu, Christof Paar and Jan Pelzl.
Elliptic Curve Cryptography
Cryptography and Network Security
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Cryptographic coprocessor
An Introduction to Elliptic Curve Cryptography
Warm-up Find the solutions to the polynomial equation.
Elliptic Curve Cryptography Celia Li Computer Science and Engineering November 10, 2005.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
Kleptography Cryptography with Backdoors Milou Antheunisse.
1 Network Security Dr. Syed Ismail Shah
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Cryptanalysis Lab Elliptic Curves. Cryptanalysis Lab Elliptic Curves 2 Outline [1] Elliptic Curves over R [2] Elliptic Curves over GF(p) [3] Properties.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Motivation Basis of modern cryptosystems
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Information Security Lab. Dept. of Computer Engineering 251/ 278 PART II Asymmetric Ciphers Key Management; Other CHAPTER 10 Key Management; Other Public.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Asymmetric-Key Cryptography
Public Key Cryptosystem
Network Security Design Fundamentals Lecture-13
D. Cheung – IQC/UWaterloo, Canada D. K. Pradhan – UBristol, UK
Elliptic Curves.
Symmetric-Key Cryptography
Introduction to Elliptic Curve Cryptography
Symmetric-Key Cryptography
Presentation transcript:

Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer Engineering Elliptic Curve Cryptography Author & Instructor: Hamed Dashti 1 / 50

Introduction to Modern Cryptography Sharif University Spring 2015  What Is An Elliptic Curve?  Elliptic Curve Structures o ECDLP  Elliptic Curve Cryptography o ECC Diffie-Hellman Key Exchange o ECC ElGamal Public key Cryptosystem o ECC Signature  Lenstra’s Elliptic Curve Factorization Algorithm  Bilinear Pairing o Weil Pairing Outline 2 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 What Is An Elliptic Curve? 3 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 What is an Elliptic Curve? 4 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Defining a group over EC 5 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Addition over EC: A visual example 6 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Addition over EC: An algebraic example 7 / 50

Introduction to Modern Cryptography Sharif University Spring 2015  What happens if we want to add a point P itself? Doubling a point 8 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Example 9 / 50

Introduction to Modern Cryptography Sharif University Spring 2015  Define the inverse of P = (a, b) to be  P = (a,  b).  We want to add P and  P o The line L is a vertical lines!  Define an extra point that lives at infinity! Defining the inverse of a point 10 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 What is an elliptic curve: Recap 11 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Singular points 12 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Theorems about EC 13 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Theorems about EC 14 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 خم‌های بیضوی روی میدان‌های متناهی 15 / 50

Introduction to Modern Cryptography Sharif University Spring 2015  مثال : می خواهیم دو نقطه ( 9 ، 7 ) و ( 1 ، 8 ) را با یکدیگر جمع کنیم. o ابتدا λ را محاسبه می کنیم : 8 o سپس با توجه به قضیه 2 داریم : ( 2 ، 10) خم ‌ های بیضوی روی میدان ‌ های متناهی 16 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 خم ‌ های بیضوی روی میدان ‌ های متناهی 17 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Elliptic Curves over Finite Fields 18 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 The Elliptic Curve Discrete Logarithm Problem (ECDLP) 19 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 ECDLP 20 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 ECDLP 21 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 ECDLP 22 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 ECDLP 23 / 50 The proof is very simple

Introduction to Modern Cryptography Sharif University Spring 2015 Elliptic Curve Cryptography 24 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Elliptic Diffie–Hellman Key Exchange 25 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Elliptic Diffie–Hellman Key Exchange 26 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Elliptic Curve Diffie–Hellman Problem 27 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Elliptic ElGamal Public Key Cryptosystem 28 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Elliptic ElGamal Public Key Cryptosystem 29 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Elliptic ElGamal Public Key Cryptosystem 30 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Elliptic Curve Signatures 31 / 50  We don’t say anything about this, now!

Introduction to Modern Cryptography Sharif University Spring 2015 The Evolution of Public Key Cryptography 32 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 The Evolution of Public Key Cryptography 33 / 50  What happens for RSA and ElGamal?  What about ECC? Quantum Computers will destroy everything!  Lattice-based Cryptography o NTRU o GGH

Introduction to Modern Cryptography Sharif University Spring 2015 The Evolution of Public Key Cryptography 34 / 50  Why use elliptic curves? o reduced key size o hence speed

Introduction to Modern Cryptography Sharif University Spring 2015 Lenstra’s Elliptic Curve Factorization Algorithm 35 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Lenstra’s Elliptic Curve Factorization Algorithm 36 / 50  Pollard’s p  1 Algorithm  It is similar to Pollard Algorithm.  We’ll see an example

Introduction to Modern Cryptography Sharif University Spring 2015 Bilinear Pairings on Elliptic Curves 37 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Bilinear Pairings on Elliptic Curves 38 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Bilinear Pairings on Elliptic Curves 39 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Bilinear Pairings on Elliptic Curves 40 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 برای مطالعه بیشتر ( خارج از درس ) 41 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Bilinear Pairings on Elliptic Curves 42 / 50  The bilinear pairings that we discuss in this section are similar in that they take as input two points on an elliptic curve and give as output a number.

Introduction to Modern Cryptography Sharif University Spring 2015 Bilinear Pairings on Elliptic Curves 43 / 50 These fields are also sometimes called Galois fields

Introduction to Modern Cryptography Sharif University Spring 2015 Bilinear Pairings on Elliptic Curves 44 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 Rational Functions and Divisors on Elliptic Curves 45 / 50  In order to define the Weil and Tate pairings, we need to explain how a rational function on an elliptic curve is related to its zeros and poles.  A rational function is a ratio of polynomials  Definition: Divisor of f(X)

Introduction to Modern Cryptography Sharif University Spring 2015 Bilinear Pairings on Elliptic Curves 46 / 50  Similar to one variable function, we have an associated divisor for two variable function(an elliptic curve).

Introduction to Modern Cryptography Sharif University Spring 2015 Bilinear Pairings on Elliptic Curves 47 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 The Weil Pairing 48 / 50 Definition: The Weil pairing is expressed by the equations: The Weil pairing of P and Q is the quantity

Introduction to Modern Cryptography Sharif University Spring 2015 The Weil Pairing 49 / 50

Introduction to Modern Cryptography Sharif University Spring 2015 The Tate Pairing 50 / 50