CSC 774 Advanced Network Security
-
Upload
hannelore-evan -
Category
Documents
-
view
29 -
download
1
description
Transcript of CSC 774 Advanced Network Security
Computer Science
CSC 774 Advanced Network Security
Topic 2.6 ID Based Cryptography
Slides by An Liu
Computer Science
Basic Idea
• Use identity as the key for encryption and signature verification.– No key directory needed.
• Trusted key generation center (KGC)– Give each user a smart card when user first joins
the network.– Each user uses the secrete key in smart card for
decryption and signature verification.– KGC can be closed after all cards are issued.
Computer Science
Basic Idea (Cont’d)Public Key Cryptosystem
ke
Encryption
kd
c m
Deccryption
k
ke Key Generation
kd
message channel
random seed
directory
messagem c
Identity-Based Cryptosystem
ke
Encryption
kd
c m
Decryption
k
Key Generation
kd
message channel
random seed
messagem c
i
recipient’s identity
i
i
Computer Science
Basic Idea (Cont’d)Public Key Signature Scheme
kg
Signature Generation
kv
Signature Verification
k
kvKey Generation
kg
message channel
random seed
valid/invalidm
msi
msi
directory
Identity-Based Signature Scheme
kg
Signature Generation
kv
Signature Verification
k
Key Generation
kg
message channel
random seed
valid/invalid
mmsi
i
recipient’s identity
i
i
msi
Computer Science
Security
• The security of underlying cryptographic functions.
• The secrecy at KGC.
• Identity check before issuing cards to users.
• The loss, duplication and unauthorized use of cards.
Computer Science
Implementation of Signature Scheme
• KGC chooses three public parameters. The factorization of n is only known by KGC.– n=p∙q, p and q are large primes– e, which is relatively prime to φ(n)– f, which is one way function
• The secrete key corresponding identity i is g– ge = i (mod n) – KGC can compute g easily. Why?
ed ≡ 1 (mod φ(n)) id = (ge)d (mod n) = g
Computer Science
Signature Generation and Verification
• Signature generation1. Choose random number r
2. t = re (mod n)
3. s = g ∙ r f(t,m) (mod n)
4. Signature is (t, s)
1. Signature verificationse = i ∙ t f(t,m) (mod n)
se = ge ∙ r e ∙ f(t,m) (mod n)
Computer Science
Misc
• Multiplicative relationship between the identities will introduce same relationship between secret key.– Expand identity to pseudo-random string
• r cannot be reused or revealed