The Pairing Based Cryptography and IBE Standards Effort.

Slides:



Advertisements
Similar presentations
Architectural issues for network-layer identifiers Stefan Savage Dept of Computer Science & Engineering UC San Diego.
Advertisements

PAR for P Title: Standard for Pairing based Cryptographic Techniques June 4, 2005 PAR for IEEE P
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
CS 206 Introduction to Computer Science II 03 / 27 / 2009 Instructor: Michael Eckmann.
Cryptography and Network Security Chapter 3
Session Announcement Protocol Colin Perkins University College London.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 5 Network Security Protocols in Practice Part I
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
INTEGRATING NETWORK CRYPTOGRAPHY INTO THE OPERATING SYSTEM BY ANTHONY GABRIELSON HAIM LEVKOWITZ Mohammed Alali | CS – Dr. RothsteinSummer 2013.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Principles of Information Security, 2nd edition1 Cryptography.
Cryptography for Backup Navigation
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
A One Round Protocol for Tripartite Diffie Hellman By Dane Vanden Berg.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
1 The Future of Cryptography Salil Vadhan Harvard University.
GLAST LAT Project Analysis Meeting March 22, 2004 E. do Couto e Silva 1/8 LAT Instrument Test Analysis Eduardo do Couto e Silva March 23, 2004.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CS470, A.SelcukIntroduction1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
Feb 19, 2002Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Introduction. Contents  Network Management Overview Sample Scenario where NM is Applied 5 Management Functions Importance to Business Processes  Network.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
CIS 5371 Cryptography Introduction.
An Efficient Identity-based Cryptosystem for
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Introduction to Secure Messaging Issues Russ Chung, American Eagle Group The Open Group Messaging Forum July 24, 2003.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
1 Project: Scheduling Algorithms Lubomir Bic. 2 Project Description.
Doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 1 TGe Requirements Version r2 8 June 2000.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
Class 5 Channels and Preview CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Feb 17, 2003Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Национальная процедура одобрения и регистрации проектов (программ) международной технической помощи (исключая представление информации об организации и.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Doc.: IEEE /0690r0 Submission Andrew Myers, BT Slide 1 July GPP SA3 Interworking Security Issues II Andrew Myers British Telecommunications.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Introduction to Chronic Disease Epidemiology Supplemental Curriculum for Health Department Associates Supported by NACCD.
RSA Data Security, Inc. PKCS #13: Elliptic Curve Cryptography Standard Burt Kaliski RSA Laboratories PKCS Workshop October 7, 1998.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
S/MIME IBE Submissions Terence Spies Voltage Security.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Modeling security 1. Models - encryption r Alice and Bob have the same key k r Alice and Bob exchange encrypted messages r Eve wants to get the plaintext.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Chapter 5 Network Security Protocols in Practice Part I
COEN 350 Network Security Introduction.
Security in Network Communications
Presentation transcript:

The Pairing Based Cryptography and IBE Standards Effort

2 Agenda for Today 9:00Introduction 9:15IEEE Standards Process (William Whyte, IEEE 1363) 10:00Pairing Based Cryptography (Hovav Shacham, Stanford University) 10:40IBE Algorithms (Michael Scott, Dublin City University) 11:20PAR Proposal and Discussion 12:00Other 1363 Working Group Proposals 12:30Lunch

3 Why do we want an PBC/IBE Standard? Prevent incompatible implementations Don’t want to repeat S/MIME vs. PGP vs. other To get the design right and prevent mistakes Peer review on algorithms, implementations, parameter selection Establish credibility for PBC/IBE Everyone in this room knows that it is real, many people outside this room don’t

4 Standards Philosophy Model after past IEEE cryptographic standards Standardize algorithms, but not protocols e.g. formats for IBE encrypted would be part of a different standard Don’t block future standards based on PBC Allow for amendments that build on parts of this standard Separate IBE and PBC layers Limit scope to keep the task manageable Goal is to have a standard relatively soon Focus on one set of algorithms, split off other types of algorithms into separate standards

5 Proposed Structure of an PBC/IBE Standard Pairing Based Crypto Layer and Algorithm Layers Identity-Based Encryption Definitions of algorithms Pairing Based Cryptography e.g. pairing, algorithms to compute pairings, curve types, curve parameters IBE based Protocols e.g. IBE , key request etc. Future PBC based Algorithm II Future PBC based Algorithm I References back to PBC description

6 Agenda for Today 9:00Introduction 9:15IEEE Standards Process (William Whyte, IEEE 1363) 10:00Pairing Based Cryptography (Hovav Shacham, Stanford University) 10:40IBE Algorithms (Michael Scott, Dublin City University) 11:20PAR Proposal and Discussion 12:00Other 1363 Working Group Proposals 12:30Lunch