Optimal Asymmetric Encryption based on a paper by Mihir Bellare and Phillip Rogaway Team Members  Chris Kellogg  Doug Wagers  Angela Johnston  Kris.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Asymmetric Encryption Prof. Ravi Sandhu. 2 © Ravi Sandhu PUBLIC KEY ENCRYPTION Encryption Algorithm E Decryption Algorithm D Plain- text Plain- text Ciphertext.
RSA.
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Computer Security Set of slides 4 Dr Alexei Vernitski.
Network Security: Lab#2 J. H. Wang Apr. 28, 2011.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Introduction to - Cryptography - PKI (Public Key Infrastructure) - Secure with PGP (Pretty Good Privacy) Dr.Tech. Göran Pulkkis Arcada Polytechnic.
Abdullah Sheneamer CS591-F2010 Project of semester Presentation University of Colorado, Colorado Springs Dr. Edward RSA Problem and Inside PK Cryptography.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
A Designer’s Guide to KEMs Alex Dent
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CS470, A.SelcukRSA1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
Building an Encrypted and Searchable Audit Log 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004 February 5-6; San Diego; CA. Presented.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
ASYMMETRIC CIPHERS.
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 Design, Implementation and Deployment of the iKP Secure Electronic Payment System Mihir Bellare, Juan A. Garay et al. “ … At this day and age it is hardly.
8. Data Integrity Techniques
Digital Signatures Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013.
The RSA Algorithm Rocky K. C. Chang, March
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Elliptic Curve Cryptography
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Lect. 13 : Public Key Encryption RSA ElGamal. 2 Shamir Rivest Adleman RSA Public Key Systems  RSA is the first public key cryptosystem  Proposed in.
RSA Data Security, Inc. PKCS #1 : RSA Cryptography Standard Jessica Staddon RSA Laboratories PKCS Workshop October 7, 1998.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Exercises Information Security Course Eric Laermans – Tom Dhaene.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Elliptic Curve Cryptography Implementation & PKI Adoption Brian Saville Jonathan Mitchell.
Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.
1 Number Theory and Advanced Cryptography 5. Cryptanalysis of RSA Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Presented by Katherine Heller COSC 4765 University of Wyoming April 26, 2011 Image source: PC Dynamics, Inc.
CSC 386 – Computer Security Scott Heggen. Agenda Exploring that locked box thing from Friday?
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Rennes, 02/10/2014 Cristina Onete Attacks on RSA. Safe modes.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Elliptic Curve Cryptography
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Cryptography Readings Encryption, Decryption, & Digital Certificates.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Tae-Joon Kim Jong yun Jun
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Paper On Cryptography CS300 Technical Paper Review Avinash Chambhare Abdus Samad.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Attacks on Public Key Encryption Algorithms
Introduction to security goals and usage of cryptographic algorithms
Rivest, Shamir and Adleman
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
One Time Signature.
Presentation transcript:

Optimal Asymmetric Encryption based on a paper by Mihir Bellare and Phillip Rogaway Team Members  Chris Kellogg  Doug Wagers  Angela Johnston  Kris Anupindi

Overview  Introduction  Review RSA  Optimal RSA Encryption Scheme  Run Example Program  Why Should We Use Optimal RSA?  Conclusion

Introduction What is Optimal RSA?

RSA Review Public Key : pair (e, n) Private Key : pair (d, n) Message : M Encryption : M e mod n Decryption : M d mod n

Optimal RSA Encryption Scheme Terminology  f : RSA encryption function  x : binary message of bit length 352 ( )  G() : Generator function (160 bits -> 352 bits)  H() : Hash function (352 bits -> 160 bits)

Optimal RSA Encryption Scheme Encryption 1. r : Pseudo-Random number of bit length s : x  G(r) (352 bits) 3. t : r  H(s) (160 bits) 4. w : s concat t (512 bits) 5. y : f(w)

Optimal RSA Decryption Scheme Decryption 1. w : f -1 (y) (512 bits) 2. s : the first 352 bits of w 3. t : the last 160 bits of w 4. r : t  H(s) (160 bits) 5. x : s  G(r) (352 bits)

Why should we use Optimal RSA? Efficiency  RSA Encryption is the largest factor in Optimal RSA’s running time.  The Hash Function, the Generator Function, and the Pseudo-Random Generator should have a much lower running time  Thus, Optimal RSA is basically as efficient as RSA Security  The Pseudo-Random generator increases security  Every part of w is required to recover the message

Semantic Security Must have all of w to recover the message Must recover everything in a specific order.

Project Demo

Conclusion Should have “ideal” G & H functions.