Elliptic Curve Cryptography Celia Li Computer Science and Engineering November 10, 2005.

Slides:



Advertisements
Similar presentations
Public Key Cryptosystem
Advertisements

Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
What is Elliptic Curve Cryptography?
Elliptic curve arithmetic and applications to cryptography By Uros Abaz Supervised by Dr. Shaun Cooper and Dr. Andre Barczak.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Keeping the Smart Grid Secure.  A smart grid delivers electricity from suppliers to consumers using digital technology to monitor (and optionally control)
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Electronic Payment Systems Lecture 5: ePayment Security II
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
CPE5021 Advanced Network Security --- Advanced Cryptography: Elliptic Curve Cryptography --- Lecture 3 CPE5021 Advanced Network Security --- Advanced Cryptography:
ASYMMETRIC CIPHERS.
Cryptography and Network Security Chapter 13
Lecture 6: Public Key Cryptography
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
By Abhijith Chandrashekar and Dushyant Maheshwary.
Ipsita Sahoo 10IT61B05 School of Information Technology IIT Kharagpur October 29, 2011 E LLIPTIC C URVES IN C RYPTOGRAPHY.
Elliptic Curve Weak Class Identification for the Security of Cryptosystem Intan Muchtadi, Ahmad Muchlis and Fajar Yuliawan Algebra Research Group, Institut.
Elliptic Curve Cryptography
Lecture 10: Elliptic Curve Cryptography Wayne Patterson SYCS 653 Fall 2009.
Digital Signatures: Mathematics Zdeněk Říha. Data authentication Data integrity + data origin Digital signature Asymmetric cryptography public and private.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Application of Elliptic Curves to Cryptography
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Chapter 21 Public-Key Cryptography and Message Authentication.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Elliptical Curve Cryptography Manish Kumar Roll No - 43 CS-A, S-7 SOE, CUSAT.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Basic Elliptic Curve Cryptography 1Lt Peter Hefley 90 OSS Instructor Fall ‘06.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Lecture 11: Elliptic Curve Cryptography Wayne Patterson SYCS 653 Fall 2008.
1 Network Security Dr. Syed Ismail Shah
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Great Theoretical Ideas in Computer Science.
1 Cryptanalysis Lab Elliptic Curves. Cryptanalysis Lab Elliptic Curves 2 Outline [1] Elliptic Curves over R [2] Elliptic Curves over GF(p) [3] Properties.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Motivation Basis of modern cryptosystems
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Information Security Lab. Dept. of Computer Engineering 251/ 278 PART II Asymmetric Ciphers Key Management; Other CHAPTER 10 Key Management; Other Public.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Elliptic Curve Public Key Cryptography
Asymmetric-Key Cryptography
Network Security Design Fundamentals Lecture-13
Elliptic Curve Cryptography (ECC)
The Application of Elliptic Curves Cryptography in Embedded Systems
Practical Aspects of Modern Cryptography
Cryptology Design Fundamentals
Network Security Design Fundamentals Lecture-13
Presentation transcript:

Elliptic Curve Cryptography Celia Li Computer Science and Engineering November 10, 2005

2 Content Introduction of Elliptic Curve Theory Elliptic Curve Diffie-Helman Protocol Elliptic Curve Digital Signature Authentication ECC Security Analysis

3 What is Elliptic Curve Cryptography (ECC) ? A public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys

4 Elliptic Curve Over Real Numbers Set of Points (x, y): y 2 = x 3 + ax + b where x, y, a and b are real numbers. Includes all points (x, y) + a special point O, called the point at infinity Point O does not satisfy elliptic curve equation, but is needed for addition operation

5 Elliptic Curve Addition Adding distinct points P and Q  P=(x P, y P ), Q=(x Q, y Q ) are not negative of each other  P + Q = R where s= (y P -y Q )/ (x P -x Q ) x R = s 2 -x P -x Q y R = -y P +s (x P -x R )  s is the slope of the line through P and Q  Example: P(-2.35, -1.86), Q(-0.1, 0.836) –R(3.89, 5.62), R(3.89, -5.62) P+Q=R=(3.89, -5.62) P+Q=R

6 Elliptic Curve Addition Adding Points P and -P  Elliptic curve group includes the point at infinity O. P+(-P)=O  P+O=P  All elliptic curves have the point at infinity O P+(-P)=O

7 Elliptic Curve Addition Doubling the Point P if y P  0  P=(x P, y P ), y P  0  P+P=2P=R s= (3x P 2 +a)/ (2y P ) x R = s 2 -2x P y R = -y P +s (x P -x R )  Example: P(2, 2.65), –R(-1.11, -2.64), R(-1.11, 2.64) 2P=R=(-1.11, -2.64) P+P=2P=R

8 Elliptic Curve Addition Doubling the Point P if y P =0  P+P=2P=O  3P= 2P+P=O+P=P  4P= 3P+P=P+P=O  5P=P, 6P=O, 7P=P, etc 2P=O (1.1, 0)

9 Elliptic Curve Over Finite Field F z Major Difference between Elliptic Curve Over F z and Over Real Numbers  Elliptic curve over F z has a finite number of points  Unlike elliptic curve over real numbers, computations over F z involve no round off error  Computations are performed by modulo z

10 Set of points (x, y) satisfy y 2 = x 3 + ax + b mod z, where z is a prime number>3, a, b, x, y  F z Adding Distinct Points P and Q  P=(x p, y p ), -P=(x p, -y p mod z).  P+Q=R where s= (y P -y Q )/ (x P -x Q ) mod z x R = s 2 -x P -x Q mod z y R = -y P +s (x P -x R ) mod z Doubling the Point P if y p  0  2P=R where s= (3x P 2 +a)/ (2y P ) mod z x R = s 2 -2x P mod z y R = -y P +s (x P -x R ) mod z Elliptic Curve Over Finite Field F z

11 Conclude Elliptic Curve Theory Crucial Property of an Elliptic Curve  Define a rule for “ adding ” two points which are on the elliptic curve, to obtain a 3 rd point which is also on the elliptic curve  Include a special point O, which does not satisfy the elliptic curve equation Order of a Point  Order of a point P on the elliptic curve is the smallest integer r such that r*P=O

12 Elliptic Curve Discrete Logarithm Problem (ECDLP) Public-key cryptography systems use hard-to- solve problems as the basis of the algorithm  Prime factorization is a hard problem used by RSA ECDLP is a “hard” problem used by ECC  Given two points Q & G on elliptic curve, such that Q = d*G  Can we easily find integer d? Q is public key, d is private key Relatively easy to perform, but extremely difficult to reverse

13 Elliptic Curve Diffie-Helman Protocol Generates d Alice Computes Q Alice =d Alice *G Generates d Bob Computes Q Bob =d Bob *G Publish Curve Point Q Alice Publish Q Bob Computes P 1 =d Alice *Q Bob Computes P 2 =d Bob * Q Alice Use this computed point P 1 or P 2 as the shared secret key Message P 1 =P 2 =d Alice * d Bob * G Given a curve point G and the result of d*G, it is difficult to compute d. Q: public key d: private key G: a fixed point on elliptic curve =d Bob * (d Alice *G) =d Alice *(d Bob *G) = = shared secret key

14 Elliptic Curve Digital Signature Authentication Sends message m and her signature (r,s) r=0? Select a random number k  [1,n-1] Compute point P=k *G=(x,y) Compute r=x mod n e=SHA-1(m) Compute s=k -1 (e+d Alice *r) mod n s=0? No Yes Verify r and s are integers in the range [1, n-1] e=SHA-1(m) Compute w=s -1 mod n Compute u 1 =e*w and u 2 =r*w Point X=(x 1, y 1 )=u 1 *G+u 2 *Q Alice Signature of m is the pair (r,s) Yes No Reject Accept Alice’s signature if v=r Compute v=x 1 mod n X=O? Q Alice : public key d Alice : private key G: a point on elliptic curve n: order of point G, n*G=O (k*x)mod n=1  x=k -1 (29*35)mod78= 1

15 Security Analysis RSA Key Size Time to Break Key (MIPS Years) ECC Key Size for Equivalent Security RSA:ECC Key Size Ratio : :1 1, :1 2, :1 21, :1 ECC can offer same levels of security with small size keys comparable to RSA and other public key cryptography methods Designed for devices with limited memory, bandwidth, computational power, e.g. smartcards and PDAs

16 Reference Neal Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation 48, 1987, pp203 – 209. V. Miller, "Use of elliptic curves in cryptography", CRYPTO 85, Blake, Seroussi, Smart, "Elliptic Curves in Cryptography", Cambridge University Press, Hankerson, Menezes, Vanstone, "Guide to Elliptic Curve Cryptography", Springer- Verlag, L. Washington, "Elliptic Curves: Number Theory and Cryptography", Chapman & Hall/CRC, B.Schneier. Applied Cryptography. John Wiley and Sons, second edition, 1996 Julio Lopez and Ricardo Dahab, “ An overview of elliptic curve cryptography ”, May V. Miller, “ Uses of elliptic curves in cryptography ”, Advances in Cryptology - CRYPTO'85, LNCS 218, pp , Robert Milson, “ Introduction to Public Key Cryptography and Modular Arithmetic ” William Stallings, Cryptography and Network Security-Principles and Practice second edition, Prentice Hall publications. R. Schroppel, H. Orman, S. O ’ Malley and O. Spatscheck, “ Fast key exchange with elliptic key systems ”, Advances in Cryptography, Proc. Crypto ’ 95, LNCS 963, pp , Springer-Verlag, 1995.

17 Thank You !