Elliptic Curve Cryptography

Similar documents
Introduction to Elliptic Curve Cryptography. Anupam Datta

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL

The Elliptic Curve in https

Other Public-Key Cryptosystems

Polynomial Interpolation in the Elliptic Curve Cryptosystem

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

CPSC 467: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security

Elliptic Curves: Theory and Application

Digital Signatures. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay

Elliptic Curve Cryptography

Elliptic Curve Cryptography with Derive

Lecture Notes, Week 6

Public-key Cryptography and elliptic curves

CPSC 467b: Cryptography and Computer Security

Notes for Lecture 17

Elliptic Curve Cryptosystems

International Electronic Journal of Pure and Applied Mathematics IEJPAM, Volume 9, No. 1 (2015)

Chapter 8 Public-key Cryptography and Digital Signatures

Discrete Logarithm Problem

Public Key Cryptography

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms

Crypto math II. Alin Tomescu May 27, Abstract A quick overview on group theory from Ron Rivest s course in Spring 2015.

Introduction to Cryptography. Lecture 8

Other Public-Key Cryptosystems

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Lecture 28: Public-key Cryptography. Public-key Cryptography

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

Network Security Technology Spring, 2018 Tutorial 3, Week 4 (March 23) Due Date: March 30

8 Elliptic Curve Cryptography

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

Practice Assignment 2 Discussion 24/02/ /02/2018

Elliptic Curves. Giulia Mauri. Politecnico di Milano website:

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

APPLICATION OF ELLIPTIC CURVES IN CRYPTOGRAPHY-A REVIEW

Public-key Cryptography and elliptic curves

Public-key cryptography and the Discrete-Logarithm Problem. Tanja Lange Technische Universiteit Eindhoven. with some slides by Daniel J.

Public-Key Cryptosystems CHAPTER 4

Introduction to Elliptic Curve Cryptography

Elliptic Curve Cryptography

9 Knapsack Cryptography

Overview. Public Key Algorithms II

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

One can use elliptic curves to factor integers, although probably not RSA moduli.

CPSC 467: Cryptography and Computer Security

An Application of Discrete Algorithms in Asymmetric Cryptography

Lecture 1: Introduction to Public key cryptography

Fundamentals of Modern Cryptography

Congruent number elliptic curves of high rank

Elliptic curves: Theory and Applications. Day 4: The discrete logarithm problem.

An Introduction to Elliptic Curve Cryptography

Asymmetric Encryption

Ti Secured communications

Elliptic curve cryptography. Matthew England MSc Applied Mathematical Sciences Heriot-Watt University

Math/Mthe 418/818. Review Questions

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Lecture 7: ElGamal and Discrete Logarithms

CRYPTOGRAPHY AND NUMBER THEORY

APA: Estep, Samuel (2018) "Elliptic Curves" The Kabod 4( 2 (2018)), Article 1. Retrieved from vol4/iss2/1

Introduction to Cybersecurity Cryptography (Part 4)

MATH 158 FINAL EXAM 20 DECEMBER 2016

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

Cryptography and Security Final Exam

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Applied Cryptography and Computer Security CSE 664 Spring 2018

KEY EXCHANGE IN ELLIPTIC CURVE CRYPTOGRAPHY BASED ON THE DECOMPOSITION PROBLEM

Cryptography and Security Midterm Exam

SEMINAR SECURITY - REPORT ELLIPTIC CURVE CRYPTOGRAPHY

Introduction to Modern Cryptography. Lecture RSA Public Key CryptoSystem 2. One way Trapdoor Functions

Overview. Background / Context. CSC 580 Cryptography and Computer Security. March 21, 2017

Introduction to Cybersecurity Cryptography (Part 4)

NTRU Cryptosystem and Its Analysis

Elliptic Curve Computations (1) View the graph and an elliptic curve Graph the elliptic curve y 2 = x 3 x over the real number field R.

Points of High Order on Elliptic Curves ECDSA

Topics in Cryptography. Lecture 5: Basic Number Theory

Elliptic Curves Cryptography and factorization. Part VIII. Elliptic curves cryptography and factorization. Historical Remarks.

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Definition of a finite group

My brief introduction to cryptography

Lecture 17 - Diffie-Hellman key exchange, pairing, Identity-Based Encryption and Forward Security

Attacks on Elliptic Curve Cryptography Discrete Logarithm Problem (EC-DLP)

Arithmétique et Cryptographie Asymétrique

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

A New Key Exchange Protocol Based on DLP and FP in Centralizer Near-Ring

Lecture V : Public Key Cryptography

Lecture 11: Key Agreement

RSA. Ramki Thurimella

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 30 October 2018

Introduction to Modern Cryptography. Benny Chor

Cryptography IV: Asymmetric Ciphers

Discrete logarithm and related schemes

Elliptic Curve Cryptography

RSA RSA public key cryptosystem

Elliptic Curve Crytography: A Computational Science Model

Question: Total Points: Score:

Lecture 4 Chiu Yuen Koo Nikolai Yakovenko. 1 Summary. 2 Hybrid Encryption. CMSC 858K Advanced Topics in Cryptography February 5, 2004

Transcription:

AIMS-VOLKSWAGEN STIFTUNG WORKSHOP ON INTRODUCTION TO COMPUTER ALGEBRA AND APPLICATIONS Douala, Cameroon, October 12, 2017 Elliptic Curve Cryptography presented by : BANSIMBA Gilda Rech BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 1 / 21

Goal The goal of this talk is to present the Elliptic Curve Cryptography over a finite field of characteristic greater than 3 BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 2 / 21

content The presentation is organized as follows: I-Introduction II- Overview on Cryptography III- Discrete Logarithm and Cryptography on elliptic curves IV-Conclusion BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 3 / 21

I-Introduction cryptography: science of secret RSA mostly used public key cryptosystem increasing of key sizes ECC easy implementation on low power environment BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 4 / 21

II-Overview on Cryptography Symmetric Cryptography Figure: Symmetric Encryption BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 5 / 21

Examples: Cesar encryption Vigenere encryption AES, DES, 3DES,... Advantages: fast encryption and decryption operations Inconvenience: key Distribution and management to remediate to this lattest issue, we have BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 6 / 21

Asymmetric Cryptography Figure: Asymmetric encryption BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 7 / 21

Examples Merkle Hellman RSA El Gamal Advantages: Multi usage (key-exchange protocols, digital signatures,...) Inconvenience: slow encryption and decryption operations Elliptic Curve Cryptography is an example of this type of Asymmetric cryptography. BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 8 / 21

III-Descrete Logarithm and elliptic curves Let G be a cyclic group over a finite field K and g a generator which order is n. In this case: G =< g >= {g k such that k n for all k N} if the group law is multiplicative or G =< g >= {k g such that k n for all k N} if the group law is additive. Let β be a point of G. g x = β mod n gx = β mod n (1) BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 9 / 21

Elliptic Curves non-singular algebraic curve (with no double points, neither a cusp) over a field K given by the Weierstrass equation form: (E) : y 2 + a 1 xy + a 3 y = x 3 + a 2 x 2 + a 4 x + a 6, with a i K (2) to which is added the O that we call point at infinity. BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 10 / 21

Depending on the characteristic of the field on which it is defined, its equation may be given under most simplified forms: y 2 + cy = x 3 + ax + b or y 2 + xy = x 3 + ax 2 + b if carac(k) = 2 y 2 = x 3 + ax 2 + bx + c if carac(k) = 3 y 2 = x 3 + bx + c if carac(k) > 3 (3) BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 11 / 21

Consider the case where the characteristic of K is > 3 (the case we study here), according to (2) we therefore have the equation (E) : y 2 = x 3 + ax + b (4) The discriminant is defined by δ = 16(4a 3 + 27b 2 ). This latter determines the nature of the curve. BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 12 / 21

Example y 2 = x 3 36x : δ > 0 y 2 = x 3 + 36 : δ < 0 y 2 = x 3 : δ = 0 Figure: 3 Example of Curves BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 13 / 21

By setting h(x, y) = y 2 x 3 ax b.we define the algebraic affine variety by v = {(x, y) K K / h(x, y) = 0 } (5) We then have its projective form: h(x, Y, Z) = ZY 2 X 3 Z 2 ax Z 3 b (6) BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 14 / 21

Let be P = (x P, y P ), Q = (x Q, y Q ) and R = (x R, y R ) 3 points of the curve. consider R = (x R, y R ) as the 3 rd point of intersection of the straight line passing through P and Q with the curve. if P Q { = x P+Q = x R = α 2 x P x Q = ( y P y Q x P x Q ) 2 x P x Q y P+Q = y R = y P + α(x P x R ) (7) if P = Q x P+P = x 2P = x R = α 2 2x P = ( 3x2 P +a 2y = P ) 2 2x P y P+P = y P + α(x P x 2P ) = y P + 3x2 P +a 2y P (x P x 2P ) (8) By the same way the point np is defined as np = P + P +... + P }{{} n times (9) BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 15 / 21

Example:(E) : y 2 = x 3 36x, P = ( 3, 9) and Q = ( 2, 8) With respect to the above formulas, we get P + Q = (6, 0) et 2P = ( 25 4, 35 8 ) Figure: representation of the points BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 16 / 21

group Structure: Associativity: Figure: associativity, we show that (P+Q)+R=P+(Q+R) Neutral element: O. O+P=P+O=P symmetrical element: P = (x 1, y 1 ) and the point P = (x 1, y 1 ) are symmetrical Commutativity: P + Q=Q + P Thus (E(a, b, K), +) forms an Abelian group in which one can carry out cryptographic operations. BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 17 / 21

ECDH (Elliptic Curve Diffie-Hellman): Alice and Bob E(a, b, K) P = (x P, y P ) of order n Alice : (k A, Q A ), with k A [1, n 1], Q A = k A P Bob : (k B, Q B ), with k B [1, n 1], Q B = k B P common key: k A Q B = k B Q A Alice sends the message m E(a, b, K) Encryption: m = m + k A Q B Decryption: m k B Q A BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 18 / 21

Implementation : Bob and Alice both choose the elliptic curve (E) : y 2 = x 3 4 the point P = (2, 2) of order 241 Bob : k K = 121 (his secrete key) and computes y K = k K P = 121(2, 2) = (115, 48) mod 241 à Alice. Alice: k A = 203 (her secrete key), her public key y A = k A P = 203(2, 2) = (130, 203) then sends it to Bob. Their common key is : k K y A = k A y K = 121(130, 203) = 203(115, 48) = (161, 169) Let be the message x = (2, 2) to deliver to Alice. To encrypt, Bob computes x = x + k K y A = (2, 2) + 121(130, 203) mod 241 = then sends it to Alice. To decrypt, Alice computes y = x k A y K then finds the initial message. BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 19 / 21

Conclusion The set of points of an elliptic curve together with the point at infinity provided with the additive law forms an abelian group,and thus we can make cryptography on the cyclic subgroups associated with theses groups.this cryptography has the particularity of a significant security with advantage of small key sizes compared to RSA thanks to the difficulty of computation of the discrete logarithm on those points that is far more difficult than the same computations over subgroups of R, Q, Z p. BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 20 / 21

Thank you for your kind attention BANSIMBA Gilda Rech Elliptic () Curve Cryptographie October 12, 2017 21 / 21