Dan Boneh Basic key exchange Merkle Puzzles Online Cryptography Course Dan Boneh.

Slides:



Advertisements
Similar presentations
Merkle Puzzles Are Optimal
Advertisements

Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Trusted 3rd parties Basic key exchange
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dan Boneh Authenticated Encryption Active attacks on CPA-secure encryption Online Cryptography Course Dan Boneh.
Dan Boneh Message Integrity A Parallel MAC Online Cryptography Course Dan Boneh.
7. Asymmetric encryption-
Cryptography for Backup Navigation
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Dan Boneh Intro. Number Theory Modular e’th roots Online Cryptography Course Dan Boneh.
Dan Boneh Collision resistance Generic birthday attack Online Cryptography Course Dan Boneh.
Dan Boneh Basic key exchange The Diffie-Hellman protocol Online Cryptography Course Dan Boneh.
Diffie-Hellman Key Exchange
Dan Boneh Basic key exchange Public-key encryption Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
Dan Boneh Block ciphers The data encryption standard (DES) Online Cryptography Course Dan Boneh.
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
Dan Boneh Authenticated Encryption Definitions Online Cryptography Course Dan Boneh.
Dan Boneh Authenticated Encryption Chosen ciphertext attacks Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
Lecture 11: Key Distribution
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Lecture 3: Cryptography Support Services: Key Management
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Security: An Overview of Cryptographic Techniques /440 With slides from: Debabrata Dash, Nick Feamster, Gregory Kesden, Vyas Sekar and others.
Dan Boneh Block ciphers More attacks on block ciphers Online Cryptography Course Dan Boneh.
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Dan Boneh Using block ciphers Modes of operation: many time key (CTR) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Attacks on OTP and stream ciphers
Dan Boneh Public Key Encryption from trapdoor permutations PKCS 1 Online Cryptography Course Dan Boneh.
Encryption.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Dan Boneh Using block ciphers Modes of operation: many time key (CBC) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Dan Boneh Stream ciphers Pseudorandom Generators Online Cryptography Course Dan Boneh.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
Dan Boneh Stream ciphers Stream ciphers are semantically secure Online Cryptography Course Dan Boneh Goal: secure PRG ⇒ semantically secure stream cipher.
Key Management Network Systems Security Mort Anvari.
Dan Boneh Basic key exchange Trusted 3 rd parties Online Cryptography Course Dan Boneh.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
Dan Boneh Collision resistance The Merkle-Damgard Paradigm Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
Dan Boneh Odds and ends Deterministic Encryption Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations Constructions Online Cryptography Course Dan Boneh Goal: construct chosen-ciphertext secure.
Dan Boneh Authenticated Encryption CBC paddings attacks Online Cryptography Course Dan Boneh.
CRYPTOGRAPHY AND THE DIFFIE–HELLMAN KEY EXCHANGE Presentation by CDT Ashcraft.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
Lesson 2-18 AP Computer Science Principles
Boneh-Franklin Identity Based Encryption Scheme
Group theory exercise.
Diffie-Hellman Secure Key Exchange 1976.
Exercise 1: Let’s Communicate - Decrypt The message
Presentation transcript:

Dan Boneh Basic key exchange Merkle Puzzles Online Cryptography Course Dan Boneh

Dan Boneh Key exchange without an online TTP? Bob Alice Goal: Alice and Bob want shared key, unknown to eavesdropper For now: security against eavesdropping only (no tampering) eavesdropper ?? Can this be done using generic symmetric crypto?

Dan Boneh Merkle Puzzles (1974) Answer: yes, but very inefficient Main tool: puzzles Problems that can be solved with some effort Example: E(k,m) a symmetric cipher with k ∈ {0,1} 128 – puzzle(P) = E(P, “message”) where P = 0 96 ll b 1 … b 32 – Goal: find P by trying all 2 32 possibilities

Dan Boneh Merkle puzzles Alice: prepare 2 32 puzzles For i=1, …, 2 32 choose random P i ∈ {0,1} 32 and x i, k i ∈ {0,1} 128 setpuzzle i E( 0 96 ll P i, “Puzzle # x i ” ll k i ) Send puzzle 1, …, puzzle 2 32 to Bob Bob: choose a random puzzle j and solve it. Obtain ( x j, k j ). Send x j to Alice Alice: lookup puzzle with number x j. Use k j as shared secret

Dan Boneh In a figure Alice’s work: O(n)(prepare n puzzles) Bob’s work: O(n) (solve one puzzle) Eavesdropper’s work: O( n 2 ) Bob Alice puzzle 1, …, puzzle n xjxj kjkj kjkj (e.g time)

Dan Boneh Impossibility Result Can we achieve a better gap using a general symmetric cipher? Answer: unknown But: roughly speaking, quadratic gap is best possible if we treat cipher as a black box oracle [IR’89, BM’09]

Dan Boneh End of Segment