Identity Based Encryption. Terence Spies VP Engineering terence@voltage.com



Similar documents
Security - The IBE Advantage

Lightweight Security using Identity-Based Encryption Guido Appenzeller

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

Introduction to Cryptography

Lecture 25: Pairing-Based Cryptography

Strengthen RFID Tags Security Using New Data Structure

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Using Voltage Secur

A Factoring and Discrete Logarithm based Cryptosystem

Lightweight Encryption for

The Mathematics of the RSA Public-Key Cryptosystem

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves

Lecture 17: Re-encryption

Identity-Based Cryptography and Comparison with traditional Public key Encryption: A Survey

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10

Secure Communication in a Distributed System Using Identity Based Encryption

The GlobalCerts TM Secur Gateway TM

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

Identity-Based Encryption from the Weil Pairing

CRYPTOGRAPHY IN NETWORK SECURITY

Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.

A SOFTWARE COMPARISON OF RSA AND ECC

New Efficient Searchable Encryption Schemes from Bilinear Pairings

Lecture 9: Application of Cryptography

An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Efficient Unlinkable Secret Handshakes for Anonymous Communications

Secure Frequently Asked Questions

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY KRISTIN LAUTER, MICROSOFT CORPORATION

A New and Efficient Signature on Commitment Values

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Paillier Threshold Encryption Toolbox

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Business Case for Voltage Secur Mobile Edition

Ciphire Mail. Abstract

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Using etoken for Securing s Using Outlook and Outlook Express

How To Secure Mail Delivery

Experiments in Encrypted and Searchable Network Audit Logs

The Total Cost of Ownership for Voltage Identity-Based Encryption Solutions

Cryptography and Network Security Chapter 10

Voltage's Encrypted

When Data Loss Prevention Is Not Enough:

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

On the Risks of IBE. Himanshu Khurana and Jim Basney

Security in Electronic Payment Systems

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Simple Identity-Based Cryptography with Mediated RSA

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Network Security Protocols

Fully homomorphic encryption equating to cloud security: An approach

Overview of Public-Key Cryptography

Using Entrust certificates with VPN

New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings

A blind digital signature scheme using elliptic curve digital signature algorithm

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Rethinking Encryption: Eight Best Practices for Success

Understanding the Successes of Identity-Based Encryption. Agenda. Current adoption of IBE Customers of IBE Benefits and advantages of IBE

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

RSA Keys with Common Factors

MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC

Crypho Security Whitepaper

Trend Micro Encryption (TMEE) Delivering Secure . Veli-Pekka Kusmin Pre-Sales Engineer

Information Security and Cryptography

Computer Security: Principles and Practice

White paper. Why Encrypt? Securing without compromising communications

Secured Enterprise eprivacy Suite

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring

SAP Single Sign-On 2.0 Overview Presentation

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University

Transcription:

Identity Based Encryption Terence Spies VP Engineering terence@voltage.com

Voltage Security Overview Breakthrough technology for encryption and access control Based on work of Dr. Boneh at Stanford and Matt Franklin at UC Davis Unsolved mathematical problem posed by Adi Shamir in 1984 Company founded in October 2002 Solving large unmet market demand & opportunity Platform play for secure multi-channel communication Voltage SecureMail, SecureFile, SecureIM today Toolkit (with source) this spring 2

Voltage Security Delivers a Unique Solution Anytime and anywhere encryption No need to expose directories No private key roaming problems Online and offline usage On-demand security Secure ad hoc communications Easy to use Transparent to end users Easy to implement Centralized administration Dynamic group management and access control No rip & replace Strong ROI, low TCO Ease of deployment, management 3

What is IBE? Next generation public key algorithm Encryption Various novel authentication technologies Breaks through barriers associated with prior approaches Very few organizations have widely deployed solutions due to concerns over cost, convenience, interoperability, and manageability. - Ray Wagner, Gartner 4

How IBE Works From This Breakthrough How Identity Based Encryption Works The mathematical construct that makes IBE work is a special type of function that is called a Bilinear Map. A Bilinear Map is a pairing that has the special property: Pair( a X, b Y ) = Pair( b X, a Y ) For IBE the operator is multiplication of integers with points on elliptic curves. While multiplication (e.g. calculating a X) is easy, the inverse operation (finding a from X and a X) is practically impossible. The Bilinear Map that is used is a Weil Pairing or Tate Pairing. To set up the system we pick a secret s and a parameter P. Next P and s P (the product of s and P) are distributed to all users. Next we issue to each user their private key. It is the product of their Identity and the secret s. For Bob this is s ID Bob. Sender (Alice) To encrypt a message to Bob, Alice picks random r and calculates a key k: Receiver (Bob) After receiving the message, Bob can reconstruct the key k by calculating: k = Pair( r ID Bob, s P ) E k [Message] r P k = Pair( s ID Bob, r P ) We now send to Bob E k [Message], the message encrypted with k. We also send him the product r P. and decrypt the message with it. As Bob is the only person who knows his private key s ID Bob, no one else can calculate k. 5

How IBE Works Comes this Elegance IBE Public Key: info@voltage.com RSA Public Key: Public exponent=0x10001 Modulus=135066410865995223349603216278805969938881 475605667027524485143851526510604859533833940287 150571909441798207282164471551373680419703964191 743046496589274256239341020864383202110372958725 762358509643110564073501508187510676594629205563 685529475213500852879416377328533906109750544334 999811150056977236890927563 6

BF-IBE 1984: IBE suggested by Shamir. No satisfactory solution. RSA: cannot map name to pub key = (N,e). ElGamal: pub-key = g x (mod p). PKG cannot get x. 2001: Boneh-Franklin (Crypto 01) Practical IBE cryptosystem. Based on bilinear maps from algebraic geometry. Performance (1024-bit security, 1GhZ P3): Keygen time: 3 ms. CT-size: 160bits+ msg. Enc/dec time: < 40 ms. 7

How IBE Works Power of the system is in its simplicity Bank.com SecurePolicy Server Auth Server 3 Private Key for Alice@xyz.com 1 2 Bob@bank.com Encrypted Email Alice@xyz.com 8

How IBE Works Power of the system is in its simplicity Bank.com SecurePolicy 3 Server Alice encrypts email with public key: bob@bank.com User Authentication Private Key for bob@bank.com Alice Encrypted Email Bob 1 2 9

How IBE Works Mapping Identity to Key Server Hub and Spoke key server is local Partner to Partner SSL to auth params Will evolve DNS cert for params Administrative Access Customers using gateway for Archive Virus / Spam Scan Mix of gateway and desktop encryption users 10

Why are Customers Interested? Secure ad-hoc communication for the extended enterprise has become mission critical Multiple channels of communication including messaging, web services People to people, app to people, and app to app Government compliance required GLBA, HIPAA FDA 21 CFR Part 11 (Electronic Records and Signatures) Directive 95/46/EC (EU) Sarbanes-Oxley Previous products ineffective and expensive to integrate and deploy 11

Voltage Supports Both Hierarchical and Federated Trust Models Voltage Policy Server chains to traditional PKI and supports PKI for signature Hub & spoke deployment allows for robust know-yourcustomer policies & central authentication Federated deployment allows for trusted peer organizations to perform authentication of local district users 12

Voltage Integrates with an Existing PKI IBE + PKI Benefits Payback on PKI investment while gaining easier to use and deploy system Communication between trusted domains Lower cost rollout of secure system across enterprise 13

Voltage Security Platform Fits Into Your Current Architecture Integrates to your current Application(s) Messaging, IM, Documents, VoIP Enterprise Messaging Enterprise LDAP Directory Voltage SecureMail Voltage SecureFile Voltage SecureIM Voltage SecureVoice Voltage SecureDoc Data at Rest Tap Into Current Identity Structure Secure business critical data accessed via portals or applications 14

The Voltage Security Platform Voltage SecureMail Voltage SecureDoc Voltage SecureVoice Voltage SecureIM Voltage SecureFile Voltage IBE Developer ToolKit Voltage SecureContent Server Partner enabled Applications Voltage SecurePolicy Suite Key Server Enrollment Server Voltage SecurePolicy Service Key Service Enrollment Service Voltage IdentityManagement Adapter 15

Importance of Email Gartner estimates that 75% of the total knowledge exchange occurring via email contains proprietary intellectual property and must be protected as a valuable corporate asset. 3 out of 4 emails should be protected as valuable corporate assets Source: 16

The Voltage SecureMail Solution Outlook Voltage SecureMail Voltage SecureFile Voltage SecureIM Voltage SecurePolicy Suite Key Server Enrollment Server Voltage SecureVoice Voltage SecureDoc Voltage SecureContent Server Voltage IBE Developer ToolKit Voltage SecurePolicy Service Key Service Enrollment Service Voltage IdentityManagement Adaptor Outlook Web Access Outlook Express Hotmail Yahoo! Mail Lotus Notes Voltage SecureReader Eudora BlackBerry Voltage SecureMail 17

Zero Footprint Support Achieving 100% client support with no downloads! Set of configurations for ensuring comprehensive coverage of end-user environments For Consumer oriented Applications Zero Footprint Reader browser based For Enterprise applications Voltage SecureGateway 18

Plugin compared to Browser access Voltage supports both models Desktop plug-ins Pros: Native user agent Transparent to end user Cons: One-time software download Ongoing maint. & help desk Browser access Pros: 100% coverage Cons: Browser user agent Means changing end user behavior Voltage Security architecture Tight Integration With Desktop Zero Footprint On Desktop 19

Summary Breakthrough technology for secure anytime, anywhere communications Based on work of Dr. Boneh at Stanford and Matt Franklin at UC Davis Unsolved mathematical problem posed by Adi Shamir in 1984 Solving large unmet market demand opportunity Platform play Voltage SecureMail, SecureFile, SecureIM today SecureDoc, SecureVPN all forthcoming 20

A Selection of Papers on IBE Identifier Based PKC - Potential Applications I. Levy. Invited talk at the 1st Annual PKI Research Workshop 2002, 2002. Two Remarks on Public Key Cryptology R. Anderson. Invited talk at the ACM Conference on Computer and Communication Security, ACM-CCS 1997, 1997. Towards an Identity Based PKI D. Boneh. Invited talk at the 1st Annual PKI Research Workshop 2002, 2002. An Identity-Based Key-Exchange Protocol C. G. Gunther. In Proceedings of Eurocrypt 1989, Lecture Notes in Computer Science, Springer-Verlag, pp 29-37, 1989. Identity-Based Encryption: a Survey M. Gagne. RSA Laboratories Cryptobytes, Vol 6, No 1, pp 10-19, 2003. Simple Identity-based Encryption with Mediated RSA X. Ding and G. Tsudik. To appear in Proceedings of RSA Conference 2003, Cryptographer's Track, CT-RSA '03, 2003. Non-interactive Public-key Cryptosystem U. Maurer and Y. Yacobi. In Proceedings of Eurocrypt 1991, Lecture Notes in Computer Science, Vol 547, Springer-Verlag, pp 498-507, 1991. Identity-Based Encryption from the Weil Pairing D. Boneh and M. Franklin. In Proceedings of Crypto 2001, Lecture Notes in Computer Science, Vol 2139, Springer- Verlag, pp 213-229, 2001. An ID-based Cryptosystem based on the Discrete Logarithm Problem S. Tsuji and T. Itoh. IEEE Journal on Selected Areas in Communication, Vol 7, No 4, pp 467-473, 1989. Cryptosystems Based on Pairings R. Sakai, K. Ohgishi and M. Kasahara. In Proceedings of Symposium on Cryptography and Information Security, SCIS 2001, 2001. Identity Based Encryption from the Tate Pairing to Secure Email Communications M. Baldwin. Master of Engineering Thesis, University of Bristol, 2002. Towards Practical Non-interactive Public Key Cryptosystems using Non-maximal Imaginary Quadratic Orders D. Huhnlein, M. Jacobson and D. Weber. In Proceedings of 7th Workshop on Selected Areas in Cryptography, SAC 2000, Lecture Notes in Computer Science, Vol 2021, Springer-Verlag, pp 275-287, 2000. A Realization Scheme for the Identity-based Cryptosystem H. Tanaka. In Proceedings of Crypto 1987, Lecture Notes in Computer Science, Vol 293, Springer-Verlag, pp 341-349, 1987. Towards Hierarchical Identity-Based Encryption J. Horwitz and B. Lynn. In Proceedings of Eurocrypt 2002, Lecture Notes in Computer Science, Vol 2332, Springer- Verlag, pp 466-481, 2002. The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems A. Joux. In Proceedings of ANTS, Lecture Notes in Computer Science, Vol 2369, Springer-Verlag, pp 20-32, 2002. 21

22