CSC 774 Advanced Network Security

8
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography Slides by An Liu

description

CSC 774 Advanced Network Security. Topic 2.6 ID Based Cryptography. Slides by An Liu. Basic Idea. Use identity as the key for encryption and signature verification. No key directory needed. Trusted key generation center (KGC) Give each user a smart card when user first joins the network. - PowerPoint PPT Presentation

Transcript of CSC 774 Advanced Network Security

Page 1: CSC 774 Advanced Network Security

Computer Science

CSC 774 Advanced Network Security

Topic 2.6 ID Based Cryptography

Slides by An Liu

Page 2: CSC 774 Advanced Network Security

Computer Science

Basic Idea

• Use identity as the key for encryption and signature verification.– No key directory needed.

• Trusted key generation center (KGC)– Give each user a smart card when user first joins

the network.– Each user uses the secrete key in smart card for

decryption and signature verification.– KGC can be closed after all cards are issued.

Page 3: CSC 774 Advanced Network Security

Computer Science

Basic Idea (Cont’d)Public Key Cryptosystem

ke

Encryption

kd

c m

Deccryption

k

ke Key Generation

kd

message channel

random seed

directory

messagem c

Identity-Based Cryptosystem

ke

Encryption

kd

c m

Decryption

k

Key Generation

kd

message channel

random seed

messagem c

i

recipient’s identity

i

i

Page 4: CSC 774 Advanced Network Security

Computer Science

Basic Idea (Cont’d)Public Key Signature Scheme

kg

Signature Generation

kv

Signature Verification

k

kvKey Generation

kg

message channel

random seed

valid/invalidm

msi

msi

directory

Identity-Based Signature Scheme

kg

Signature Generation

kv

Signature Verification

k

Key Generation

kg

message channel

random seed

valid/invalid

mmsi

i

recipient’s identity

i

i

msi

Page 5: CSC 774 Advanced Network Security

Computer Science

Security

• The security of underlying cryptographic functions.

• The secrecy at KGC.

• Identity check before issuing cards to users.

• The loss, duplication and unauthorized use of cards.

Page 6: CSC 774 Advanced Network Security

Computer Science

Implementation of Signature Scheme

• KGC chooses three public parameters. The factorization of n is only known by KGC.– n=p∙q, p and q are large primes– e, which is relatively prime to φ(n)– f, which is one way function

• The secrete key corresponding identity i is g– ge = i (mod n) – KGC can compute g easily. Why?

ed ≡ 1 (mod φ(n)) id = (ge)d (mod n) = g

Page 7: CSC 774 Advanced Network Security

Computer Science

Signature Generation and Verification

• Signature generation1. Choose random number r

2. t = re (mod n)

3. s = g ∙ r f(t,m) (mod n)

4. Signature is (t, s)

1. Signature verificationse = i ∙ t f(t,m) (mod n)

se = ge ∙ r e ∙ f(t,m) (mod n)

Page 8: CSC 774 Advanced Network Security

Computer Science

Misc

• Multiplicative relationship between the identities will introduce same relationship between secret key.– Expand identity to pseudo-random string

• r cannot be reused or revealed