Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
|
|
|
- Shanna Fox
- 10 years ago
- Views:
Transcription
1 with Embedding Degree 10 University of California, Berkeley, USA ANTS-VII, 2006
2 Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3
3 Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3
4 Let E be an elliptic curve defined over a finite field F q. For any integer r the Weil pairing e r is a bilinear map sending pairs of points with order r to r-th roots of unity in F q : e r : E[r] E[r] µ r. These pairings can been used in many cryptographic constructions, including: one-round, 3-way key agreement (Joux); short signature schemes (Boneh, Lynn, Shacham); identity-based encryption (Boneh, Franklin); and many others.
5 Making Pairings Practical For pairing-based cryptosystems to be practical and secure, we require: the discrete logarithm in the order-r subgroup of E(F q ) to be computationally infeasible; the discrete logarithm in µ r to be computationally infeasible; the pairing to be easily computable (i.e. µ r lies in a low-degree extension of F q ). To optimize applications, we want to choose a curve E so that the two discrete log problems are of about equal difficulty.
6 Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3
7 Embedding Degrees Let E be an elliptic curve over F q with #E(F q ) = r. Let k be the smallest integer such that µ r F q k (i.e. r q k 1). Bal., Kob.: E[r] E(F q k ), so the Weil pairing embeds E(F q ) into F. q k k is the embedding degree of E (with respect to r). Note: k is the order of q in (Z/rZ). For random curves, k r q.
8 The Problem The problem: find primes q and elliptic curves E/F q of prime order r with small embedding degree (k 30). Want to be able to control the number of bits of q to construct curves for various applications. Could also look for curves E with nearly prime order #E(F q ) = large prime r small cofactor. Requirement that E(F q ) has prime order is what makes the problem difficult. Cocks, Pinch: Constructed E with arbitrary embedding degree k, but largest prime factor of #E(F q ) q.
9 Previous Results Menezes, Okamoto, Vanstone, 1993 (MOV): Showed that supersingular elliptic curves always have embedding degree k 6. Miyaji, Nakabayashi, Takano, 2001 (MNT): Gave complete characterization of ordinary elliptic curves of prime order with embedding degree k = 3, 4, 6. Barreto, Naehrig, 2005: Constructed a family of elliptic curves of prime order and embedding degree 12.
10 The Main Result D.F., 2006: Constructed elliptic curves of prime order with embedding degree 10. Solves open problem posed by Boneh, Lynn, Shacham, 2001.
11 Outline The CM Method: The Basic Construction The CM Method: Generating Families of Curves 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3
12 The CM Method: The Basic Construction The CM Method: Generating Families of Curves The CM Method of Curve Construction Main tool: Complex Multiplication method of curve construction (Atkin, Morain). For given D > 0, constructs elliptic curve with CM by Q( D). Constructs curves with specified number of points. Running time roughly O(D). How it works: Fix D, k. Look for t, n, q (representing trace, number of points, and size of field) satisfying 1 q, n prime; 2 n = q + 1 t (formula for number of points); 3 n divides q k 1 (embedding degree k); 4 Dy 2 = 4q t 2 for some integer y. For such t, n, q, if D is not too large ( 10 9 ) we can construct an elliptic curve E over F q with n points and embedding degree k.
13 Outline The CM Method: The Basic Construction The CM Method: Generating Families of Curves 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3
14 Observations about the CM Method The CM Method: The Basic Construction The CM Method: Generating Families of Curves Barreto, Lynn, Scott: The embedding degree condition n q k 1 can be replaced with n Φ k (t 1), where Φ k is the k-th cyclotomic polynomial. k smallest such that n q k 1 implies n Φ k (q). q + 1 t = n implies q = t 1 (mod n). Barreto, Naehrig: Parametrize t, n, q as polynomials: t(x), n(x), q(x). Construct curves by finding integer solutions to Dy 2 = 4q(x) t(x) 2 = 4n(x) (t(x) 2) 2.
15 Extending the CM Method The CM Method: The Basic Construction The CM Method: Generating Families of Curves Combine these observations to get an algorithm for generating families of pairing-friendly curves: 1 Fix D, k, and choose a polynomial t(x). 2 Choose n(x) an irreducible factor of Φ k (t(x) 1). 3 Find integer solutions (x, y) to Dy 2 = 4n(x) (t(x) 2) 2. 4 If q(x), n(x) are both prime, construct elliptic curve over F q(x) with n(x) points. Step 3 is the difficult part: if f (x) = 4n(x) (t(x) 2) 2 has degree 3, then Dy 2 = f (x) (usually) has only a finite number of integer solutions! (Siegel s Theorem)
16 Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3
17 Embedding Degree 10: The Key Observation Goal: Choose t(x), choose n(x) an irreducible factor of Φ 10 (t(x) 1), such that 4n(x) (t(x) 2) 2 is quadratic. Φ 10 (x) = x 4 x 3 + x 2 x + 1 degree 4. All irred. factors of Φ 10 (t(x) 1) must have 4 degree. Key observation: Need to choose n(x), t(x) such that the leading terms of 4n and t 2 cancel out. Smallest possible case: deg n = 4, deg t = 2. Galbraith, McKee, Valença: Characterized quadratic t(x) such that Φ 10 (t(x) 1) factors into two quartics. One of these t(x) gives the desired cancellation!
18 Choice of Parameters Choose t, n, q as follows: t(x) = 10x 2 + 5x + 3 n(x) = 25x x x 2 + 5x + 1 q(x) = 25x x x x + 3 Then n(x) divides Φ 10 (t(x) 1), and f (x) = 4n(x) (t(x) 2) 2 = 15x x + 3.
19 Constructing the Curves To find curves: set D = 15D, u = 15x + 5, complete the square in Dy 2 = 15x x + 3 to get u 2 D y 2 = 20. Find integer solutions (u, y) to this Pell-like equation. (Use LMM algorithm.) Let x = (u 5)/15. If q(x) and n(x) are prime, there exists an elliptic curve with embedding degree 10! If no solutions of appropriate size, or q(x) or n(x) not prime, increase D and try again.
20 Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3
21 General Results (Thanks to Mike Scott) Searched for curves with D < , q between 148 and 512 bits. Crypto applications: want q bits (discrete log in E(F q ) about as difficult as discrete log in F q 10). Found 23 curves of prime order with embedding degree 10. Found 101 curves of nearly prime order (large prime small cofactor < 2 16 ) and embedding degree 10. Ability to handle larger D in CM Method would allow us to find more curves.
22 Example: A 234-bit Curve (Computed by Mike Scott) Set D = Compute solution (x, y) to Dy 2 = 15x x + 3. Use this value of x to compute t = n = q = Use CM method to compute curve equation over F q : (Given t, n, q, curve equation took about a week to compute.) y 2 = x 3 3x This curve has n points and embedding degree 10!
23 Appendix References Selected References I P.S.L.M. Barreto, M. Lynn, M. Scott, Constructing elliptic curves with prescribed embedding degrees, SCN P.S.L.M. Barreto, M. Naehrig, Pairing-friendly elliptic curves of prime order, SAC I. Blake, G. Seroussi, N. Smart, Elliptic Curves in Cryptography and Advances in Elliptic Curve Cryptography, LMS Lecture Notes, 1999 & S. Galbraith, J. McKee, P. Valença, Ordinary abelian varieties having small embedding degree, Proc. WS Math. Problems and Techniques in Crypto., 2005.
24 Appendix References Selected References II A. Menezes, T. Okamoto, S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Info. Theory, A Miyaji, M. Nakabayashi, S. Takano, Reducing elliptic curve logarithms to logarithms in a finite field, IEICE Trans. Fundamaentals, F. Morain, Building cyclic elliptic curves modulo large primes, EUROCRYPT 1991.
Constructing Elliptic Curves with Prescribed Embedding Degrees
Constructing Elliptic Curves with Prescribed Embedding Degrees Paulo S. L. M. Barreto 1, Ben Lynn 2, and Michael Scott 3 1 Laboratório de Arquitetura e Redes de Computadores (LARC), Escola Politécnica,
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
A One Round Protocol for Tripartite
A One Round Protocol for Tripartite Diffie Hellman Antoine Joux SCSSI, 18, rue du Dr. Zamenhoff F-92131 Issy-les-Mx Cedex, France [email protected] Abstract. In this paper, we propose a three participants
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto Naehrig Curves
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto Naehrig Curves Jean-Luc Beuchat 1, Jorge E. González-Díaz 2, Shigeo Mitsunari 3, Eiji Okamoto 1, Francisco Rodríguez-Henríquez
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science [email protected] Abstract Self-Certified
Implementation of Elliptic Curve Digital Signature Algorithm
Implementation of Elliptic Curve Digital Signature Algorithm Aqeel Khalique Kuldip Singh Sandeep Sood Department of Electronics & Computer Engineering, Indian Institute of Technology Roorkee Roorkee, India
Identity-Based Encryption from the Weil Pairing
Appears in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages
EMBEDDING DEGREE OF HYPERELLIPTIC CURVES WITH COMPLEX MULTIPLICATION
EMBEDDING DEGREE OF HYPERELLIPTIC CURVES WITH COMPLEX MULTIPLICATION CHRISTIAN ROBENHAGEN RAVNSHØJ Abstract. Consider the Jacobian of a genus two curve defined over a finite field and with complex multiplication.
Faster Pairing Computation
Faster Pairing Computation Christophe Arène 1, Tanja Lange 2, Michael Naehrig 2, and Christophe Ritzenthaler 1 1 Institut de mathématiques de Luminy Université de la Méditerranée 163 Avenue de Luminy Case
Lecture 25: Pairing-Based Cryptography
6.897 Special Topics in Cryptography Instructors: Ran Canetti and Ron Rivest May 5, 2004 Lecture 25: Pairing-Based Cryptography Scribe: Ben Adida 1 Introduction The field of Pairing-Based Cryptography
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC Laxminath Tripathy 1 Nayan Ranjan Paul 2 1Department of Information technology, Eastern Academy of Science and
Elements of Applied Cryptography Public key encryption
Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let
AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
A new probabilistic public key algorithm based on elliptic logarithms
A new probabilistic public key algorithm based on elliptic logarithms Afonso Comba de Araujo Neto, Raul Fernando Weber 1 Instituto de Informática Universidade Federal do Rio Grande do Sul (UFRGS) Caixa
An Overview of Integer Factoring Algorithms. The Problem
An Overview of Integer Factoring Algorithms Manindra Agrawal IITK / NUS The Problem Given an integer n, find all its prime divisors as efficiently as possible. 1 A Difficult Problem No efficient algorithm
How To Prove The Dirichlet Unit Theorem
Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if
Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and
Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study
minimal polyonomial Example
Minimal Polynomials Definition Let α be an element in GF(p e ). We call the monic polynomial of smallest degree which has coefficients in GF(p) and α as a root, the minimal polyonomial of α. Example: We
Elliptic Curve Cryptography
Elliptic Curve Cryptography Elaine Brow, December 2010 Math 189A: Algebraic Geometry 1. Introduction to Public Key Cryptography To understand the motivation for elliptic curve cryptography, we must first
Efficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
Ideal Class Group and Units
Chapter 4 Ideal Class Group and Units We are now interested in understanding two aspects of ring of integers of number fields: how principal they are (that is, what is the proportion of principal ideals
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood One significant impediment to the widespread adoption of public-key cryptography is its dependence on a public-key infrastructure
THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY KRISTIN LAUTER, MICROSOFT CORPORATION
T OPICS IN WIRELESS SECURITY THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY KRISTIN LAUTER, MICROSOFT CORPORATION Q 2 = R 1 Q 2 R 1 R 1 As the wireless industry explodes, it faces
A SOFTWARE COMPARISON OF RSA AND ECC
International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138
CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY
January 10, 2010 CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY The set of polynomials over a field F is a ring, whose structure shares with the ring of integers many characteristics.
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Square root computation over even extension fields
Square root computation over even extension fields 1 Gora Adj 1 and Francisco Rodríguez-Henríquez 1 ISFA, Université Claude Bernard Lyon 1, France Computer Science Department, CINVESTAV-IPN, México Abstract
Implementation and Adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication
Implementation and Adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication Stefan Kaufmann IT-Designers Gruppe STZ-Softwaretechnik Im Entennest 2 73730 Esslingen [email protected]
Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University
Implementation and Comparison of Various Digital Signature Algorithms -Nazia Sarang Boise State University What is a Digital Signature? A digital signature is used as a tool to authenticate the information
An Approach to Shorten Digital Signature Length
Computer Science Journal of Moldova, vol.14, no.342, 2006 An Approach to Shorten Digital Signature Length Nikolay A. Moldovyan Abstract A new method is proposed to design short signature schemes based
ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION
ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION Aldrin W. Wanambisi 1* School of Pure and Applied Science, Mount Kenya University, P.O box 553-50100, Kakamega, Kenya. Shem Aywa 2 Department of Mathematics,
AN END-TO-END IDENTITY-BASED EMAIL ENCRYPTION SCHEME
AN END-TO-END IDENTITY-BASED EMAIL ENCRYPTION SCHEME by Fiona Yan Lee A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science Boise State University
MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction
MATH 168: FINAL PROJECT Troels Eriksen 1 Introduction In the later years cryptosystems using elliptic curves have shown up and are claimed to be just as secure as a system like RSA with much smaller key
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)
NIST Special Publication 800-56A Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) Elaine Barker, Don Johnson, and Miles Smid C O M P U T E R S E C
Study of algorithms for factoring integers and computing discrete logarithms
Study of algorithms for factoring integers and computing discrete logarithms First Indo-French Workshop on Cryptography and Related Topics (IFW 2007) June 11 13, 2007 Paris, France Dr. Abhijit Das Department
A blind digital signature scheme using elliptic curve digital signature algorithm
A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department
A New and Efficient Signature on Commitment Values
International Journal of Network Security, Vol.7, No., PP.0 06, July 2008 0 A New and Efficient Signature on Commitment Values Fangguo Zhang,3, Xiaofeng Chen 2,3, Yi Mu 4, and Willy Susilo 4 (Corresponding
Lecture 13 - Basic Number Theory.
Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted
Notes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
A New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
7. Some irreducible polynomials
7. Some irreducible polynomials 7.1 Irreducibles over a finite field 7.2 Worked examples Linear factors x α of a polynomial P (x) with coefficients in a field k correspond precisely to roots α k [1] of
Cryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28
Arithmetic algorithms for cryptology 5 October 2015, Paris Sieves Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Sieves 0 / 28 Starting point Notations q prime g a generator of (F q ) X a (secret) integer
New Efficient Searchable Encryption Schemes from Bilinear Pairings
International Journal of Network Security, Vol.10, No.1, PP.25 31, Jan. 2010 25 New Efficient Searchable Encryption Schemes from Bilinear Pairings Chunxiang Gu and Yuefei Zhu (Corresponding author: Chunxiang
Implementing Network Security Protocols
Implementing Network Security Protocols based on Elliptic Curve Cryptography M. Aydos, E. Savaş, and Ç. K. Koç Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331, USA {aydos,savas,koc}@ece.orst.edu
Experiments in Encrypted and Searchable Network Audit Logs
Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Cisco Systems India Pvt. Ltd Nitte Meenakshi Institute of Technology Email: [email protected] Sashank Dara Cisco Systems
ECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
Efficient Software Implementation of Public-Key Cryptography on Sensor Networks Using the MSP430X Microcontroller
Journal of Cryptographic Engineering manuscript No. (will be inserted by the editor) Efficient Software Implementation of Public-Key Cryptography on Sensor Networks Using the MSP430X Microcontroller Conrado
CIS 5371 Cryptography. 8. Encryption --
CIS 5371 Cryptography p y 8. Encryption -- Asymmetric Techniques Textbook encryption algorithms In this chapter, security (confidentiality) is considered in the following sense: All-or-nothing secrecy.
Identity Based Encryption. Terence Spies VP Engineering [email protected]
Identity Based Encryption Terence Spies VP Engineering [email protected] Voltage Security Overview Breakthrough technology for encryption and access control Based on work of Dr. Boneh at Stanford and
Discrete Mathematics, Chapter 4: Number Theory and Cryptography
Discrete Mathematics, Chapter 4: Number Theory and Cryptography Richard Mayr University of Edinburgh, UK Richard Mayr (University of Edinburgh, UK) Discrete Mathematics. Chapter 4 1 / 35 Outline 1 Divisibility
Short Programs for functions on Curves
Short Programs for functions on Curves Victor S. Miller Exploratory Computer Science IBM, Thomas J. Watson Research Center Yorktown Heights, NY 10598 May 6, 1986 Abstract The problem of deducing a function
Lecture 17: Re-encryption
600.641 Special Topics in Theoretical Cryptography April 2, 2007 Instructor: Susan Hohenberger Lecture 17: Re-encryption Scribe: Zachary Scott Today s lecture was given by Matt Green. 1 Motivation Proxy
Groups in Cryptography
Groups in Cryptography Çetin Kaya Koç http://cs.ucsb.edu/~koc/cs178 [email protected] Koç (http://cs.ucsb.edu/~koc) ucsb cs 178 intro to crypto winter 2013 1 / 13 Groups in Cryptography A set S and a binary
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay
Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Modern/Public-key cryptography started in 1976 with the publication of the following paper. W. Diffie
Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing
Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing S.Hemalatha, Dr.R.Manickachezian Ph.D Research Scholar, Department of Computer Science, N.G.M College, Pollachi,
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Cryptography and Network Security
Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS DANIEL RABAYEV AND JACK SONN Abstract. Let f(x) be a monic polynomial in Z[x] with no rational roots but with roots in Q p for
Factorization Algorithms for Polynomials over Finite Fields
Degree Project Factorization Algorithms for Polynomials over Finite Fields Sajid Hanif, Muhammad Imran 2011-05-03 Subject: Mathematics Level: Master Course code: 4MA11E Abstract Integer factorization is
Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2)
Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2) Kevin Broughan University of Waikato, Hamilton, New Zealand May 13, 2010 Remainder and Factor Theorem 15 Definition of factor If f (x)
Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella
Signature Schemes CSG 252 Fall 2006 Riccardo Pucella Signatures Signatures in real life have a number of properties They specify the person responsible for a document E.g. that it has been produced by
Factorization Methods: Very Quick Overview
Factorization Methods: Very Quick Overview Yuval Filmus October 17, 2012 1 Introduction In this lecture we introduce modern factorization methods. We will assume several facts from analytic number theory.
How To Ensure Data Integrity In Clouds
Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,
M-Pin: A Multi-Factor Zero Knowledge Authentication Protocol
M-Pin: A Multi-Factor Zero Knowledge Authentication Protocol Michael Scott Chief Cryptographer Certivox Labs [email protected] Abstract. Here we introduce the M-Pin client-server protocol, which
RSA Question 2. Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true?
RSA Question 2 Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true? Bob chooses a random e (1 < e < Φ Bob ) such that gcd(e,φ Bob )=1. Then, d = e -1
Digital Signature. Raj Jain. Washington University in St. Louis
Digital Signature Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
SEC 2: Recommended Elliptic Curve Domain Parameters
STANDARDS FOR EFFICIENT CRYPTOGRAPHY SEC 2: Recommended Elliptic Curve Domain Parameters Certicom Research Contact: [email protected] September 20, 2000 Version 1.0 c 2000 Certicom Corp. License
An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings
Theoretical and Applied Informatics ISSN 896 5334 Vol.24 (202), no. 2 pp. 09 8 DOI: 0.2478/v079-02-0009-0 An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings
Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Encryption/Decryption using Public Key Cryptography Network Security Chapter 2 Basics 2.2 Public Key Cryptography
Introduction to Finite Fields (cont.)
Chapter 6 Introduction to Finite Fields (cont.) 6.1 Recall Theorem. Z m is a field m is a prime number. Theorem (Subfield Isomorphic to Z p ). Every finite field has the order of a power of a prime number
LUC: A New Public Key System
LUC: A New Public Key System Peter J. Smith a and Michael J. J. Lennon b a LUC Partners, Auckland UniServices Ltd, The University of Auckland, Private Bag 92019, Auckland, New Zealand. b Department of
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings Ernie Brickell Intel Corporation [email protected] Liqun Chen HP Laboratories [email protected] March
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings Fangguo Zhang 1, Reihaneh Safavi-Naini 1 and Chih-Yin Lin 2 1 School of Information Technology and Computer
FACTORING. n = 2 25 + 1. fall in the arithmetic sequence
FACTORING The claim that factorization is harder than primality testing (or primality certification) is not currently substantiated rigorously. As some sort of backward evidence that factoring is hard,
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM
NABI ET AL: IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 28 IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM Mohammad Noor
