Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography and Network Security
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptography and Network Security Chapter 13
Introduction to Public Key Cryptography
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Digital Signatures Applied Handbook of Cryptography: Chapt 11
Bob can sign a message using a digital signature generation algorithm
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Cryptography, Authentication and Digital Signatures
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Prepared by Dr. Lamiaa Elshenawy
DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Network Security Celia Li Computer Science and Engineering York University.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
COM 5336 Lecture 8 Digital Signatures
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Cryptography and Network Security Chapter 13
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Overview Modern public-key cryptosystems: RSA
Security Outline Encryption Algorithms Authentication Protocols
B. R. Chandavarkar CSE Dept., NITK Surathkal
Digital Signatures…!.
Chapter 13 Digital Signature
Presentation transcript:

Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013

Motivation: Confidentiality : Integrity : Authentication : Nonrepudiation : Keeping information secret from all other than those who are authorized to see it. Ensuring that the information has not been altered by unauthorized entities. The assurance that the communicating party is the one that it claims to be. Preventing the denial of previous commitments or actions.

Motivation: Confidential and Authenticate Traditional Method “Signature- Then- Seal”

Motivation: Confidentiality : How do we get these things in modern cryptography ? Signature Scheme Encryption Scheme Nonrepudiation : Integrity : Authentication :

Signature Scheme RSA Schnorr DSS Others … Motivation: How do we get these things in modern cryptography ?

Encryption Scheme RSA ElGamal Others … Motivation: How do we get these things in modern cryptography ?

In 1997 Yulian Zheng proposed a separate primitive called Signcryption. Is it possible to deliver messages of varying length in a secure and authenticated way with an expense less than that required by “Signature-Then-Encryption ” ? Motivation:

Outline : Why Signcryption ? Signcryption Shortening ElGamal-Based Signatures. Secure Signcryption Scheme. Signcryption Scheme by Y. Zheng.

Why Signcryption ? Cost of Signcryption < Cost of Signature + Cost of Encryption 1.Computational cost 2.Communication overhead

1.Computational cost We estimate computational cost by counting the number of operations involved : Private key encryption and decryption Hashing addition Multiplication Division Exponentiation Why Signcryption ?

2. Communication overhead In addition to computational cost, digital signature and encryption based on public key cryptography also require extra bits to be appended to a message. We call these extra redundant bits the communication overhead involved. Why Signcryption ?

Signcryption Gen Security Parameter key-pair Public Private SC Private key sender, Message, R ID C= SC Private Key ( Message, R ID ) DSCDSC Private Key ( C, S ID ) Private key receiver, C, S ID

Shortening ElGamal-Based Signatures: Key Generation: Choose x randomly from {1, …, p-1} Public key = g x Private key = x Let p is a large prime, q is a large prime factor of p-1 and g is an integer from {1, …, p-1}. Let h: {1,..., p-1} x {0,1} * {1,..., p-1} be a hash function.

Sign : Choose y randomly from {1, …, p-1} r = h( g y mod p, M) s = y / ( r + x ) mod p, where M = message Signature = Let p is a large prime, q is a large prime factor of p-1 and g is an integer from {1, …, p-1}. Let h: {1,..., p-1} x {0,1} * {1,..., p-1} be a hash function. Shortening ElGamal-Based Signatures:

Let p is a large prime, q is a large prime factor of p-1 and g is an integer from {1, …, p-1}. Let h: {1,..., p-1} x {0,1} * {1,..., p-1} be a hash function. Verify : Compute k = ( g x ∙ g r ) s mod p Accept if r = h( k, m) Shortening ElGamal-Based Signatures:

Secure Scheme: Secure Signature Scheme : Unforgeable under adaptively chosen message attack. Secure Encryption Scheme : Indistinguishable against adaptively chosen cipher attack.

Unforgeable : It is computationally infeasible for an adaptive attacker to create a signcrypted text. Non-repudiation : It is computationally feasible for a third party to settle a dispute between signer and receiver where signer denies the fact that he/she is the originator of a signcrypted text. Confidential: It is computationally infeasible for an adaptive attacker to gain any partial information on the contents of a signcrypted text. Secure Signcryption Scheme:

YZ- Signcryption Scheme: Gen : Using this algorithm sender and receiver choose their key-pair. Let x, y from [1,..., q-1] are sender’s and receiver’s private keys and S= g x and R= g y are their respective public keys. p : a large prime ( public ) q : a large prime factor of p-1 ( public ) g : a ( random ) integer in [1,..., p-1] with order q mod p ( public ) h : a one-way hash function ( public )

YZ- Signcryption Scheme: p : a large prime ( public ) q : a large prime factor of p-1 ( public ) g : a ( random ) integer in [1,..., p-1] with order q mod p ( public ) h : a one-way hash function ( public ) S : Sender’s public key R : Receiver’s public key SC : Pick r randomly from [1,..., q-1] 1. compute k = R r mod p. Split k into k 1 and k 2 of appropriate length. 2. n= h(M, k 2 ), where M=message 3. s= r/( n + x ) mod q 4. c = E_k 1 ( M ), where E := Encryption in AES Signcrypted text =

YZ- Signcryption Scheme: DSC : Recover k from n, s, g, p, S and R: 1. k = ( S ∙ g h ) s ・ y mod p 2. Split k into k 1 and k 2 3. M = D_k 1 ( c ), Where D := Decryption in AES 4. Accept M as a valid message if h(M, k 2 ) = n p : a large prime ( public ) q : a large prime factor of p-1 ( public ) g : a ( random ) integer in [1,..., p-1] with order q mod p ( public ) h : a one-way hash function ( public ) S : Sender’s public key R : Receiver’s public key NOTE : D_k 1 ( E_k 1 (M)) = M

Security parameters |p|, |q|, |h(. )| Saving in comp. cost Saving in comm. overhead 768, 152, 8050%76.8% 1024, 160, 8050%81.01% 2048, 192, 9650%87.7% 4096, 256, 12850%91.0% 8192, 320, 16050%94.0% 10240, 320, 16050%96.0% Cost of Signcryption vs. Cost of Sign-Then- Encryption

Question ? Thank You !!!