ELLIPTIC CURVE CRYPTOGRAPHY Curves Pairings Cryptography ELLIPTIC CURVES
- Slides: 50
ELLIPTIC CURVE CRYPTOGRAPHY Curves, Pairings, Cryptography
ELLIPTIC CURVES Ø
PART 1 SETS, GROUPS, RINGS, FIELDS
SETS AND GROUPS Ø
EXAMPLES Ø
A GROUP WE LIKE TO USE Ø
RINGS Ø
RINGS Ø Set of integers Z is not a group under multiplication: § § § Closure: yes Id. element: yes, 1 Associativity: yes Inverse element: no However, Z is a ring (char. 0) under addition and multiplication
SETS, RINGS, FIELDS Ø
SOME FIELDS Ø
SOME FIELDS WE LIKE TO USE Ø
PART 2 BACK TO ELLIPTIC CURVES
ELLIPTIC CURVES Ø
GROUP STRUCTURES Ø
RECALL: GROUPS Ø Q: What is my operation on ECs?
POINT ADDITION Ø
CASE 1: 3 DIFFERENT INTERSECTIONS
CASE 1: 3 DIFFERENT INTERSECTIONS
CASE 1: 3 DIFFERENT INTERSECTIONS
CASE 1: 3 DIFFERENT INTERSECTIONS
CASE 2: ADD POINT WITH TANGENT POINT
CASE 3: ADD POINTS WITH SAME X-COORD.
CASE 4: POINT DOUBLING
CASE 4: POINT DOUBLING
GROUPS ON ELLIPTIC CURVES Ø
PART 3 BASIC ELLIPTIC CURVE CRYPTO
HARD PROBLEMS IN ECC Ø
HINT: WHY THE PROBLEM IS HARD Elliptic curve over R
HARD PROBLEMS IN ECC Ø
HARD PROBLEMS IN ECC Ø
HARDNESS OF ECDLOG/ECCDH/ECDDH
PART 3. 1 EC KEY EXCHANGE
DIFFIE-HELLMAN: FINITE FIELDS ANDE CS Alice Bob Alice Bob
SECURITY OF DIFFIE-HELLMAN Alice Bob Alice Bob
PART 3. 2 EC DIGITAL SIGNATURES
DIGITAL SIGNATURES (EC) DSA Setup Key Generation
DIGITAL SIGNATURES (EC) DSA Signing Verification
PART 3. 3 EC ENCRYPTION SCHEMES
INTEGRATED ENCRYPTION SCHEME (IES) Ø Designed by Abdalla, Bellare, and Rogaway Elliptic curve version proposed by Shoup § Relies on hardness of (EC)DDH § Ø Ingredients: § A secure Key Derivation Function (KDF) This used to be a hash function If replaced by hash, we need stronger assumptions: either that the hash function is a random oracle, or we need a different hard problem A secure (IND-CPA) symmetric encryption function § A secure (EU-CMA) MAC scheme §
PUBLIC-KEY ENCRYPTION (EC) IES Setup Key Generation
PUBLIC-KEY ENCRYPTION (EC) IES Enc Dec
PART 3. 4 FROM THEORY TO PRACTICE
FAST CURVES, FAST IMPLEMENTATIONS… Ø
PART 4 PAIRINGS
ABSTRACT PAIRINGS Ø
PAIRINGS ON ELLIPTIC CURVES Ø
THREE-PARTY KE WITH PAIRINGS Alice Bob Alice Charlie Bob
THREE-PARTY KE WITH PAIRINGS Alice Bob Alice Bob Charlie
MORE USES FOR PAIRINGS Ø Ø Ø Multi-party key exchange Identity-based encryption Anonymity-preserving schemes: Rings signatures § Group signatures § Signatures of knowledge § … § Ø Proofs of Knowledge: Witness-indistinguishable Po. K § Non-interactive Zero-knowledge Po. K § … §
- Elliptic curves number theory and cryptography
- Ecc vs rsa speed
- Elliptic curve cryptography
- Ecdlp
- Ecdlp
- Elliptic curve cryptography
- Elliptic curve cryptography applications
- Elliptic curve discrete logarithm problem
- Ecpvs
- Elliptic curve diffie hellman example
- Poem and song pairings
- Elliptic genitive
- Lieberman
- Bilateral balanced occlusion
- S curve and j curve
- J curve vs s curve
- Sigmoidal vs hyperbolic curve
- Degree of curve in railway
- Pes values
- Short run phillips curve graph
- Frequency curve types
- Production possibilities curve def
- How to read a solubility curve
- Mirror that curves outward and used in convenience store
- Table g solubility curves
- The asymptote parallel to x-axis is obtained by equating
- Anteroposterior curve
- Law of gearing
- When two curves coincide the two objects have the same
- Amino acid titration curves
- Yy0u
- Chapter 1 section 3 production possibilities curves
- A supersaturated solution
- Normal curve percentages
- Classification of engineering curves
- Measuring heat energy
- Curves
- Polar curve
- Buffer region of a titration curve
- Learning curves 2003
- Drive-in diffusion
- Creating production possibilities schedules and curves
- Solubility curves calculator
- Beta lyrae light curve
- Titration curves for amino acids
- Blending curves
- Why do titration curves flatten out
- Learning curve operations management
- Steep grade sharp curves
- Titration curve for lysine
- Acid base titration curves