An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
|
|
|
- Darren Holland
- 10 years ago
- Views:
Transcription
1 An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC Laxminath Tripathy 1 Nayan Ranjan Paul 2 1Department of Information technology, Eastern Academy of Science and Technology, Bhubaneswar 2Department of Computer Science, KMBB College of Engineering and Technology, Khurda 1 [email protected] 2 [email protected] Abstract In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme provides solution of key management efficiently for dynamic access problems. However, in this paper, we propose an attack on Jeng-Wang scheme to show that Jeng-Wang scheme is insecure against our proposed attack. We show that in our proposed attack, an attacker (adversary) who is not a user in any security class in a user hierarchy attempts to derive the secret key of a security class. Key Words: Key management, Elliptic curve, Hierarchical Access control, Security, Dynamic Exterior attacks. 1. Introduction Hierarchical access control is a fundamental problem in computer and network systems. In a hierarchical access control, a user of higher security level class has the ability to access information items (such as message, data, files, etc.) of other users of lower security classes. A user hierarchy consists of a number n of disjoint security classes, say, SC 1, SC 2,...,, SC n. Let this set be SC = {SC 1, SC 2,..., SCn}. A binary partially ordered relation is defined in SC as SC i SC j, which means that the security class SC i has a security clearance higher than or equal to the security class SC j. In addition the relation, satisfies the following properties: (a) [Reflexive property] SC i SC i SC i Є SC. (b) [Anti-symmetric property] If SC i, SC j Є SC such that SC i SC j and SC j SC i, then SC i = SC j. (c) [Transitive property] If SC i, SC j, SC k Є SC such that SC i SC j and SC j SC k, then SC i SC k. If SC i SC j, we call SC i as the predecessor of SC j and SC j as the successor of SC i. If SC i SC k SC j,then SC k is an intermediate security class. In this case SC k is the predecessor of SC j and SC i is the predecessor of SC k. In a user hierarchy, the encrypted message by a successor security class is only decrypted by that successor class as well as its all predecessor security classes in that hierarchy. Akl and Taylor [1] first developed the cryptographic key assignment scheme in an arbitrary partial order set (poset) hierarchy. MacKinnon et al. [11] presented an optimal algorithm, called the canonical assignment,to reduce the value of public parameters. Harn and Lin [6] then proposed a bottom up key generating scheme,instead of using a top-down approach as in the Akl and Taylor scheme and MacKinnon et al. s scheme. In order to solve dynamic access control problems, many schemes have been proposed in the literature[10], [7], [9], [16], [3], [13], [14], [4]. Chang et al. [3] proposed a key assignment scheme based on Newton s interpolation method and one-way hash function. In their scheme, a user with higher security clearance must iteratively perform the key derivation process for deriving the secret key of a user who is not an immediate successor. Other proposed schemes [16], [14] enhance Akl and Taylor s scheme [1], and explore other possible approaches that can enable a user in a hierarchy to modify the secret key as and when necessary. Thus,a predecessor can directly and efficiently derive the secret keys of its successor(s). Kuo et al. later developed a method [9] that employs the public key to encrypt the secret key. Their scheme has a straightforward key assignment algorithm, small storage space requirement, and uses a one-way hash function. In 2006, Jeng-Wang proposed an efficient key management and derivation scheme based on the elliptic curve cryptosystem. An attractive advantage of their scheme is that it solves dynamic key management efficiently and flexibly. However, we show that their scheme is vulnerable to dynamic exterior attack. In this paper, we propose our dynamic exterior attack on Jeng-Wang scheme to show that their scheme 50
2 is vulnerable under the proposed attack. The rest of this paper is sketched as follows. In Section 2, we review some mathematical backgrounds which are useful to review Jeng-Wang scheme. We then give briefly an overview of Jeng-Wang scheme [4] in Section 3. In Section 4, we describe our proposed dynamic exterior attack on Jeng-Wang scheme [4]. Finally, we conclude the paper in Section Mathematical backgrounds In this section, we discuss the elliptic curve and its properties. We then discuss the rules for adding points on elliptic curve and the elliptic curve discrete logarithm problem. We, finally, discuss the properties of a oneway hash function. 2.1 Elliptic Curve over Finite Field Let and, where 0,1,., 1 and 3 be a prime, such that A non-singular elliptic curve over the finite field is the set, of solutions, to the congruence:, where and are constants such that , together with a special point called the point at infinity or zero point. The condition is the necessary and sufficient to ensure that the equation 0 has a non-singular solution [12]. If , then the corresponding elliptic curve is called a singular elliptic curve. If, and, be points in,, then implies that and. Also,, for all,. Moreover, an elliptic curve, over has roughly points on it. More precisely, a well-known theorem due to Hasse asserts that the number of points on,, which is denoted by #, satisfies the following inequality [15]: p 1 2 p #E p 1 2 p. In addition,, forms an abelian group or commutative group under addition modulo operation Addition of Points on Elliptic Curve over Finite Field We take an elliptic curve over a finite filed as, :, where and. The field size is considered as a large prime. We take as the base point on, whose order is, that is,. The elliptic curve addition differs from the general addition [8]. Let, and, be two points on elliptic curve, with, then, is computed as follows:,,, In elliptic curve cryptography, multiplication is defined as repeated additions. For example, if,, then 6 is computed as Discrete Logarithm Problem The discrete logarithm problem (DLP) is as follows: given an element in a finite group whose order is, that is, and another element, find an integer such that. It is relatively easy to calculate discrete exponentiation given,, but it is computationally infeasible to determine given,, when is large. 2.3 Elliptic Curve Discrete Logarithm Problem Let, be an elliptic curve modulo a prime. Given two points, and,, for some positive integer. represents the point on elliptic curve, is added to itself times. The elliptic curve discrete logarithm problem (ECDLP) is to determine given and. It is relatively easy to calculate given and, but it is computationally infeasible to determine given and, when the prime is large. 2.4 One-way Hash Function A one-way hash function : 0,1 0,1 takes an arbitrary-length input 0,1, and produces a fixedlength (say, -bits) output 0,1, called the message digest. The hash function is the fingerprint of a file, a message, or other data blocks, and has the following attributes [15]. 1. can be applied to a data block of all sizes. 51
3 2. For any given variable, is easy to operate, enabling easy implementation in software and hardware. 3. The output length of is fixed. 4. Deriving from the given value and the given hash function. is computationally infeasible. 5. For any given variable, finding any so that is computationally infeasible. 6. Finding a pair of inputs,,,, so that is computationally infeasible. Example- Figure-1 shown SC 1 determines its own secret key K 1, and its secret parameter n 1, and then generates its public parameter P 1 = n 1 G. Then it sends its pair of points kg, (K 1,n 1 ) + kp ca } to CA. The other classes in the hierarchy do the same job. While CA derives all the secret keys and secret parameters, he constructs the corresponding polynomials for each class and then makes them public. The polynomials are generated as follows: 3 Overview 3.1 Key generation algorithm Step 1. Suppose there are m, m Є N, security classes in a user hierarchy over the partial-order relation( ). CA determines an elliptic group Ep(a,b) as y 2 = x 3 + ax + b (mod p), where p is a large prime number, and the coefficients satisfy 4a b 2 0 (mod p). Then CA selects a base point G = (x,y) from E p (a,b) whose order is a very large value n such that ng = O. CA makes Ep(a,b), G and the value n public. Step 2. CA selects an algorithm à :( x, y) v, for representing a point on E p (a,b) as a real number v.ca makes à public. CA chooses a secret parameter n ca and makes P ca public, where P ca = n ca G. Step 3. For security class SC i,1 i m, it chooses its own secret key K i, 1 K i p -1, and a secret parameter ni, ni < n, firstly. It makes Pi public, where Pi = nig. Then it encrypts the point (K i,n i ) by adding kp ca to it and sends the pair of points {kg, (K i,n i ) + kp ca } to CA, where k is a positive integer selected randomly. Step 4. For each pair of points {kg, (K i,n i ) + kp ca },1 i m, CA multiples the first point by his secret parameter nca and subtracts the result from the second point to derive (K i,n i ). (K i ; n i ) + kpc a - nc a (kg)= (K i, n i )+ k(nc a G) nc a (kg)= (K i, n i ) Step 5. For security class SC i, 1 i m, CA constructs a polynomial H i (x) for him. H i (x)= x A n P K for all C i <C t Figure-1 H 1 (x)=nil, which means no other class has access to SC 1. H 2 (x)=(x- Ã(n 2 P 1 )+k 2. H 3 (x)=(x- Ã(n 3 P 1 )+k 3. H 4 (x)=(x- Ã(n 4 P 2 ))(x- Ã(n 4 P 1 ))+k 4 H 5 (x)=(x- Ã(n 5 P 2 ))(x- Ã(n 5 P 3 ))(x- Ã(n 5 P 1 ))+k 5. H 6 (x)=(x- Ã(n 6 P 3 ))(x- Ã(n 6 P 1 ))+k Key Derivation Algorithm- Assume user u i in the security class SC i wants to access the encrypted data held by user u j in one of his successor classes SC j, u i can derive the secret key K j of u j by the following steps: Step 1. Get the public parameters H j (x) and P j of u j. Step 2. Compute H j (à (n i P j ) and then K j can be obtained. Now suppose a user in SC 1 wants to derive the secret key K 4. Using his own secret parameter n 1 along with the public parameters H 4 (x) and P 4, he can derive the secret key K 4 by computing H 4 (à (n 1 P 4 )shown below. H 4 (à (n 1 P 4 ))=( à (n 1 P 4 - Ã(n 4 P 2 ))( à (n 1 P 4 - Ã(n 4 P 1 ))+k 4. =( à (n 1 P 4 - Ã(n 4 P 2 ))( Ã(n 1 n 4 G)- Ã(n 4 n 1 G))+k 4 =k Inserting new security class- 52
4 If a new security class SC a is inserted in to hierarchy such that SC i SC a SC j..ca will do following process to update the partial relationship to manage the accessing priority when SC a joins the hierarchy. Step-1 For security class SC a, it chooses its own secrete key K a,1 K a p-1,and a secrete parameter n a, n<n. It makes Pa public, where P a =n a G. Then it encrypts the point (K a,n a ) by adding KP ca to it and sends the pair of points {KG,(K a, n a )+KP ca )} to CA, where K is a positive integer selected randomly. Step-2 For pair of points {KG,(K a,n a )+KP ca )}, CA multiplies the first point by his secrete parameter n ca and subtracts the result from the second point to derive (K a,n a ) For pair of points {KG,(K 7,n 7 )+KP ca )}, CA multiplies the first point by his secrete parameter n ca and subtracts the result from the second point to derive (K 7,n 7 ) (K 7,n 7 )+KP ca -n ca KG=(k 7,n 7 ) + K(n ca G)- n ca (KG)=(K 7,n 7 ) Step-3 For security class SC 7,,CA constructs a polynomial H 7 (x) for him H 7 (x)= (x- Ã(n 7 P 1 ))+k 7. Step-4 Determine the public polynomial H 6 (x) by following equation H 6 (x)=(x- Ã(n 6 P 3 ))(x- Ã(n 6 P 1 ))(x- Ã(n 6 P 7 ))+k 6 (K a,n a )+KP ca -n ca KG=(k a,n a ) + K(n ca G)-n ca (KG)=(K a,n a ) Step-3 For security class SCa,,CA constructs a polynomial Ha(x) for him Ha(x)= x à n P ka for all j satisfying SCa<SCj and j a. Step-4 Determine the public polynomial Hi (x) by following equation Hi (x)= x à n P x à n P Where t is performed identical to eq-1 and for each SCj such that SCi SCa. Example- It assumes that a new security class SC 7 is inserted into the user hierarchy such that SC 6 SC 7 SC 1 in Fig.2. Afterward the information K 7,n 7,P 7,H 7 (x),h 6 (x) will generate the information by using following steps. Step-1. For security class SC 7, it chooses its own secrete key K 7,1 K 7 p-1,and a secrete parameter n 7, n 7 <n. It makes P 7 public, where P 7 =n 7 G. Then it encrypts the point (K 7,n 7 ) by adding KP ca to it and sends the pair of points {KG,(K 7, n 7 )+KP ca )} to CA, where K is a positive integer selected randomly. Step-2 Figure Deleting existing security class phases- Suppose that a security class SC a is to be removed from a user hierarchy such that the relationship SC i SC a SC j breaks up. Figure-3 Suppose there is an existing security class SC a and let it is to be removed from a user hierarchy, such that the relationship SC i SCa SC j breaks up then the corresponding key Ka and parameter na,pa are deleted. 53
5 The public polynomial Hi(x) for SCi will also be changed as follows- (x)= (. Example- It assumes that the existing security class SC 3 is removed from hierarchy as shown in figure-3. So the corresponding key K 3 and the parameter P 3,n 3 are deleted. The public polynomial H 5 (x) will be changed to H 5 (x) and H 6 (x) will be H 6 (6) H 5 (x)=(x- Ã(n 5 P 1 ))(x- Ã(n 5 P 2 ))+K 5. Figure-4 H 6 (x)=(x- Ã(n 6 P 1 ))+K 6 4. On the security of Jeng-Wang Scheme- However, the WWC-scheme still cannot resist another case of the exterior attack which is not discussed in [14]. Before we introducing this novel exterior attack, we must review the result of product by the following theorem: Theorem 1[2]: The product can be expanded as follows. 1, Where,, For instance, 1,, 4.1 Dynamic Exterior Attack When an illegal user wishes to access the security key of through the related public information when a new class joins the hierarchy. Consider the example as shown in the figure- 4.the public polynomial of is formed before joins the hierarchy. After joins the hierarchy the public polynomial are formed. and As and are public information, so any one can obtain that information. Therefore anyone can discover the secrete key from public information by the following equations. (1) (2) Therefore from equation-1 and equation-2 we can find out the coefficient of in is - and the coefficient of in is respectively. Therefore we can recover the information by subtracting coefficient of from the coefficient of. Then by putting in equation-2, we will find out the secrete key. Hence this proposed scheme is insecure when a new security class joins the hierarchy. 4.2 On the security of removing existing security class- Consider the example as shown in the figure-1, when the existing security class is removed from user hierarchy, the public polynomial of becomes and of becomes, whose equations are given below. (3) (4) 54
6 (5) (6) As all above information are public so anyone can get these information.by dynamic exterior attack, the attacker can easily obtain.where is the coefficient of in equation-4 and is the coefficient of in equation-3 respectively. Similarly the attacker can also obtain where and is the coefficient of in equation-5.thetefore it is feasible for the attacker to obtain the secrete key and with knowing the value and respectively. Hence the proposed scheme is insecure when an existing security class is removed from the hierarchy. 5 Conclusion In this paper we have shown that an illegal user can find out the secrete key when a new class joins or an existing security class is removed from the hierarchy in jengwang scheme. References [1] S. G. Akl and P. D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems (TOCS), 1(3): , [2]Bruce Schneier Applied Cryptography Second edition Wiley publication [3] C. C. Chang, I. C. Lin, H. M. Tsai, and H. H.Wang. A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies. In Proceedings of 18th International Conference on Advanced Information Networking and Applications (AINA 04), volume 2, pages , [7] F. G. Jeng and C. M. Wang. An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. Journal of Systems and Software, 79(8): , [8] N. Koblitz. Elliptic Curves Cryptosystems. Mathematics of computation, 48: , [9] F. H. Kuo, V. R. L. Shen, T. S. Chen, and F. Lai. Cryptographic key assignment scheme for dynamic access control in a user hierarchy. Computers and Digital Techniques, IEE Proceedings, 146(5): , [10] C. H. Lin. Dynamic key management schemes for access control in a hierarchy. Computer Communications, 20(15): , [11] S.J. Mackinnon, P.D. Taylor, H. Meijer, and S.G. Akl. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy. IEEE Transactions on Computers, 34(9): , [12] R.W. D. Nickalls. A new approach to solving the cubic: Cardan s solution revealed. The Mathematical Gazette, 77(480): , [13] V. L. R. Shen and T. S. Chen. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers & Security, 21(2): , [14] V. L. R. Shen, T. S. Chen, and F. Lai. Novel cryptographic key assignment scheme for dynamic access control in a hierarchy. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E80- A(10): , [15] W. Stallings. Cryptography and Network Security: Principles and Practices. Prentice Hall, 3rd edition, [16] H. M. Tsai and C. C. Chang. A cryptographic implementation for dynamic access control in a user hierarchy. Computers & Security, 14(2): , [4] Y. F. Chung, H. H. Lee, F. Lai, and T. S. Chen. Access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences, 178(1): , [5] H. Cohen. A course in computational algebraic number theory. Springer-Verlag, [6] L. Harn and H. Y. Lin. A cryptographic key generation scheme for multilevel data security. Computers & Security, 9(6): ,
Elliptic Curve Cryptography
Elliptic Curve Cryptography Elaine Brow, December 2010 Math 189A: Algebraic Geometry 1. Introduction to Public Key Cryptography To understand the motivation for elliptic curve cryptography, we must first
Cryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
A SOFTWARE COMPARISON OF RSA AND ECC
International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138
Implementation of Elliptic Curve Digital Signature Algorithm
Implementation of Elliptic Curve Digital Signature Algorithm Aqeel Khalique Kuldip Singh Sandeep Sood Department of Electronics & Computer Engineering, Indian Institute of Technology Roorkee Roorkee, India
Notes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay
Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Modern/Public-key cryptography started in 1976 with the publication of the following paper. W. Diffie
Cryptography and Network Security
Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared
Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Encryption/Decryption using Public Key Cryptography Network Security Chapter 2 Basics 2.2 Public Key Cryptography
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
A New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
ECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
Elements of Applied Cryptography Public key encryption
Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
with Embedding Degree 10 University of California, Berkeley, USA ANTS-VII, 2006 Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3 Outline 1 Introduction
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and
Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Study of algorithms for factoring integers and computing discrete logarithms
Study of algorithms for factoring integers and computing discrete logarithms First Indo-French Workshop on Cryptography and Related Topics (IFW 2007) June 11 13, 2007 Paris, France Dr. Abhijit Das Department
Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella
Signature Schemes CSG 252 Fall 2006 Riccardo Pucella Signatures Signatures in real life have a number of properties They specify the person responsible for a document E.g. that it has been produced by
JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson
JUST THE MATHS UNIT NUMBER 1.8 ALGEBRA 8 (Polynomials) by A.J.Hobson 1.8.1 The factor theorem 1.8.2 Application to quadratic and cubic expressions 1.8.3 Cubic equations 1.8.4 Long division of polynomials
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Lecture 13 - Basic Number Theory.
Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted
CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631
Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.
Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms
Principles of Public Key Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter : Security on Network and Transport
Discrete Mathematics, Chapter 4: Number Theory and Cryptography
Discrete Mathematics, Chapter 4: Number Theory and Cryptography Richard Mayr University of Edinburgh, UK Richard Mayr (University of Edinburgh, UK) Discrete Mathematics. Chapter 4 1 / 35 Outline 1 Divisibility
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Public Key Cryptography. Performance Comparison and Benchmarking
Public Key Cryptography Performance Comparison and Benchmarking Tanja Lange Department of Mathematics Technical University of Denmark [email protected] 28.08.2006 Tanja Lange Benchmarking p. 1 What
Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing
322 The International Arab Journal of Information Technology, Vol. 11, No. 4, July 2014 Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing
MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction
MATH 168: FINAL PROJECT Troels Eriksen 1 Introduction In the later years cryptosystems using elliptic curves have shown up and are claimed to be just as secure as a system like RSA with much smaller key
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
SFWR ENG 4C03 - Computer Networks & Computer Security
KEY MANAGEMENT SFWR ENG 4C03 - Computer Networks & Computer Security Researcher: Jayesh Patel Student No. 9909040 Revised: April 4, 2005 Introduction Key management deals with the secure generation, distribution,
CIS 5371 Cryptography. 8. Encryption --
CIS 5371 Cryptography p y 8. Encryption -- Asymmetric Techniques Textbook encryption algorithms In this chapter, security (confidentiality) is considered in the following sense: All-or-nothing secrecy.
A new probabilistic public key algorithm based on elliptic logarithms
A new probabilistic public key algorithm based on elliptic logarithms Afonso Comba de Araujo Neto, Raul Fernando Weber 1 Instituto de Informática Universidade Federal do Rio Grande do Sul (UFRGS) Caixa
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science [email protected] Abstract Self-Certified
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Public Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
Implementing Network Security Protocols
Implementing Network Security Protocols based on Elliptic Curve Cryptography M. Aydos, E. Savaş, and Ç. K. Koç Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331, USA {aydos,savas,koc}@ece.orst.edu
One-Way Encryption and Message Authentication
One-Way Encryption and Message Authentication Cryptographic Hash Functions Johannes Mittmann [email protected] Zentrum Mathematik Technische Universität München (TUM) 3 rd Joint Advanced Student School
Integer Factorization using the Quadratic Sieve
Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 [email protected] March 16, 2011 Abstract We give
An Approach to Shorten Digital Signature Length
Computer Science Journal of Moldova, vol.14, no.342, 2006 An Approach to Shorten Digital Signature Length Nikolay A. Moldovyan Abstract A new method is proposed to design short signature schemes based
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
A novel deniable authentication protocol using generalized ElGamal signature scheme
Information Sciences 177 (2007) 1376 1381 www.elsevier.com/locate/ins A novel deniable authentication protocol using generalized ElGamal signature scheme Wei-Bin Lee a, Chia-Chun Wu a, Woei-Jiunn Tsaur
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
Public Key (asymmetric) Cryptography
Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: [email protected]) Course of Network Security,
An Overview of Integer Factoring Algorithms. The Problem
An Overview of Integer Factoring Algorithms Manindra Agrawal IITK / NUS The Problem Given an integer n, find all its prime divisors as efficiently as possible. 1 A Difficult Problem No efficient algorithm
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information
The : Keeping Eve The Eavesdropper Away From Your Credit Card Information Department of Mathematics North Dakota State University 16 September 2010 Science Cafe Introduction Disclaimer: is not an internet
Lecture 6 - Cryptography
Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
Digital Signatures. Meka N.L.Sneha. Indiana State University. [email protected]. October 2015
Digital Signatures Meka N.L.Sneha Indiana State University [email protected] October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
Cryptography and Network Security Chapter 9
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,
Applications of Fermat s Little Theorem and Congruences
Applications of Fermat s Little Theorem and Congruences Definition: Let m be a positive integer. Then integers a and b are congruent modulo m, denoted by a b mod m, if m (a b). Example: 3 1 mod 2, 6 4
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
LUC: A New Public Key System
LUC: A New Public Key System Peter J. Smith a and Michael J. J. Lennon b a LUC Partners, Auckland UniServices Ltd, The University of Auckland, Private Bag 92019, Auckland, New Zealand. b Department of
COMMUTATIVITY DEGREES OF WREATH PRODUCTS OF FINITE ABELIAN GROUPS
COMMUTATIVITY DEGREES OF WREATH PRODUCTS OF FINITE ABELIAN GROUPS IGOR V. EROVENKO AND B. SURY ABSTRACT. We compute commutativity degrees of wreath products A B of finite abelian groups A and B. When B
Short Programs for functions on Curves
Short Programs for functions on Curves Victor S. Miller Exploratory Computer Science IBM, Thomas J. Watson Research Center Yorktown Heights, NY 10598 May 6, 1986 Abstract The problem of deducing a function
Public Key Cryptography: RSA and Lots of Number Theory
Public Key Cryptography: RSA and Lots of Number Theory Public vs. Private-Key Cryptography We have just discussed traditional symmetric cryptography: Uses a single key shared between sender and receiver
Digital Signature Standard (DSS)
FIPS PUB 186-4 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory National Institute
QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University
QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM
NABI ET AL: IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 28 IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM Mohammad Noor
SEC 2: Recommended Elliptic Curve Domain Parameters
STANDARDS FOR EFFICIENT CRYPTOGRAPHY SEC 2: Recommended Elliptic Curve Domain Parameters Certicom Research Contact: [email protected] September 20, 2000 Version 1.0 c 2000 Certicom Corp. License
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis
Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis by Susana Sin A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings
Theoretical and Applied Informatics ISSN 896 5334 Vol.24 (202), no. 2 pp. 09 8 DOI: 0.2478/v079-02-0009-0 An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings
Elliptic Curve Cryptography Methods Debbie Roser Math\CS 4890
Elliptic Curve Cryptography Methods Debbie Roser Math\CS 4890 Why are Elliptic Curves used in Cryptography? The answer to this question is the following: 1) Elliptic Curves provide security equivalent
A Survey of the Elliptic Curve Integrated Encryption Scheme
JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME, ISSUE, AUGUST 010 A Survey of the Elliptic Curve Integrated Encryption Scheme 7 V. Gayoso Martínez, L. Hernández Encinas, and C. Sánchez Ávila Abstract
A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC
International Journal of Network Security, Vol.18, No.2, PP.217-223, Mar. 2016 217 A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC Dianli Guo and Fengtong
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY
FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY LINDSEY R. BOSKO I would like to acknowledge the assistance of Dr. Michael Singer. His guidance and feedback were instrumental in completing this
Data Security in Cloud Computing using Elliptical Curve Cryptography
Data Security in Cloud Computing using Elliptical Curve Cryptography Mr. Pragnesh G. Patel #1, Mr. S.M.Shah *2 # M.E.C.S.E, Government Engineering College Sector-28, Gandhinagar, Gujarat, India 1 [email protected]
Security and Authentication Primer
Security and Authentication Primer Manfred Jantscher and Peter H. Cole Auto-ID Labs White Paper WP-HARDWARE-025 Mr. Manfred Jantscher Visiting Master Student, School of Electrical and Electronics Engineering,
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
