ELLIPTIC CURVE CRYPTOGRAPHY Curves Pairings Cryptography ELLIPTIC CURVES

  • Slides: 50
Download presentation
ELLIPTIC CURVE CRYPTOGRAPHY Curves, Pairings, Cryptography

ELLIPTIC CURVE CRYPTOGRAPHY Curves, Pairings, Cryptography

ELLIPTIC CURVES Ø

ELLIPTIC CURVES Ø

PART 1 SETS, GROUPS, RINGS, FIELDS

PART 1 SETS, GROUPS, RINGS, FIELDS

SETS AND GROUPS Ø

SETS AND GROUPS Ø

EXAMPLES Ø

EXAMPLES Ø

A GROUP WE LIKE TO USE Ø

A GROUP WE LIKE TO USE Ø

RINGS Ø

RINGS Ø

RINGS Ø Set of integers Z is not a group under multiplication: § §

RINGS Ø Set of integers Z is not a group under multiplication: § § § Closure: yes Id. element: yes, 1 Associativity: yes Inverse element: no However, Z is a ring (char. 0) under addition and multiplication

SETS, RINGS, FIELDS Ø

SETS, RINGS, FIELDS Ø

SOME FIELDS Ø

SOME FIELDS Ø

SOME FIELDS WE LIKE TO USE Ø

SOME FIELDS WE LIKE TO USE Ø

PART 2 BACK TO ELLIPTIC CURVES

PART 2 BACK TO ELLIPTIC CURVES

ELLIPTIC CURVES Ø

ELLIPTIC CURVES Ø

GROUP STRUCTURES Ø

GROUP STRUCTURES Ø

RECALL: GROUPS Ø Q: What is my operation on ECs?

RECALL: GROUPS Ø Q: What is my operation on ECs?

POINT ADDITION Ø

POINT ADDITION Ø

CASE 1: 3 DIFFERENT INTERSECTIONS

CASE 1: 3 DIFFERENT INTERSECTIONS

CASE 1: 3 DIFFERENT INTERSECTIONS

CASE 1: 3 DIFFERENT INTERSECTIONS

CASE 1: 3 DIFFERENT INTERSECTIONS

CASE 1: 3 DIFFERENT INTERSECTIONS

CASE 1: 3 DIFFERENT INTERSECTIONS

CASE 1: 3 DIFFERENT INTERSECTIONS

CASE 2: ADD POINT WITH TANGENT POINT

CASE 2: ADD POINT WITH TANGENT POINT

CASE 3: ADD POINTS WITH SAME X-COORD.

CASE 3: ADD POINTS WITH SAME X-COORD.

CASE 4: POINT DOUBLING

CASE 4: POINT DOUBLING

CASE 4: POINT DOUBLING

CASE 4: POINT DOUBLING

GROUPS ON ELLIPTIC CURVES Ø

GROUPS ON ELLIPTIC CURVES Ø

PART 3 BASIC ELLIPTIC CURVE CRYPTO

PART 3 BASIC ELLIPTIC CURVE CRYPTO

HARD PROBLEMS IN ECC Ø

HARD PROBLEMS IN ECC Ø

HINT: WHY THE PROBLEM IS HARD Elliptic curve over R

HINT: WHY THE PROBLEM IS HARD Elliptic curve over R

HARD PROBLEMS IN ECC Ø

HARD PROBLEMS IN ECC Ø

HARD PROBLEMS IN ECC Ø

HARD PROBLEMS IN ECC Ø

HARDNESS OF ECDLOG/ECCDH/ECDDH

HARDNESS OF ECDLOG/ECCDH/ECDDH

PART 3. 1 EC KEY EXCHANGE

PART 3. 1 EC KEY EXCHANGE

DIFFIE-HELLMAN: FINITE FIELDS ANDE CS Alice Bob Alice Bob

DIFFIE-HELLMAN: FINITE FIELDS ANDE CS Alice Bob Alice Bob

SECURITY OF DIFFIE-HELLMAN Alice Bob Alice Bob

SECURITY OF DIFFIE-HELLMAN Alice Bob Alice Bob

PART 3. 2 EC DIGITAL SIGNATURES

PART 3. 2 EC DIGITAL SIGNATURES

DIGITAL SIGNATURES (EC) DSA Setup Key Generation

DIGITAL SIGNATURES (EC) DSA Setup Key Generation

DIGITAL SIGNATURES (EC) DSA Signing Verification

DIGITAL SIGNATURES (EC) DSA Signing Verification

PART 3. 3 EC ENCRYPTION SCHEMES

PART 3. 3 EC ENCRYPTION SCHEMES

INTEGRATED ENCRYPTION SCHEME (IES) Ø Designed by Abdalla, Bellare, and Rogaway Elliptic curve version

INTEGRATED ENCRYPTION SCHEME (IES) Ø Designed by Abdalla, Bellare, and Rogaway Elliptic curve version proposed by Shoup § Relies on hardness of (EC)DDH § Ø Ingredients: § A secure Key Derivation Function (KDF) This used to be a hash function If replaced by hash, we need stronger assumptions: either that the hash function is a random oracle, or we need a different hard problem A secure (IND-CPA) symmetric encryption function § A secure (EU-CMA) MAC scheme §

PUBLIC-KEY ENCRYPTION (EC) IES Setup Key Generation

PUBLIC-KEY ENCRYPTION (EC) IES Setup Key Generation

PUBLIC-KEY ENCRYPTION (EC) IES Enc Dec

PUBLIC-KEY ENCRYPTION (EC) IES Enc Dec

PART 3. 4 FROM THEORY TO PRACTICE

PART 3. 4 FROM THEORY TO PRACTICE

FAST CURVES, FAST IMPLEMENTATIONS… Ø

FAST CURVES, FAST IMPLEMENTATIONS… Ø

PART 4 PAIRINGS

PART 4 PAIRINGS

ABSTRACT PAIRINGS Ø

ABSTRACT PAIRINGS Ø

PAIRINGS ON ELLIPTIC CURVES Ø

PAIRINGS ON ELLIPTIC CURVES Ø

THREE-PARTY KE WITH PAIRINGS Alice Bob Alice Charlie Bob

THREE-PARTY KE WITH PAIRINGS Alice Bob Alice Charlie Bob

THREE-PARTY KE WITH PAIRINGS Alice Bob Alice Bob Charlie

THREE-PARTY KE WITH PAIRINGS Alice Bob Alice Bob Charlie

MORE USES FOR PAIRINGS Ø Ø Ø Multi-party key exchange Identity-based encryption Anonymity-preserving schemes:

MORE USES FOR PAIRINGS Ø Ø Ø Multi-party key exchange Identity-based encryption Anonymity-preserving schemes: Rings signatures § Group signatures § Signatures of knowledge § … § Ø Proofs of Knowledge: Witness-indistinguishable Po. K § Non-interactive Zero-knowledge Po. K § … §