Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today:...

12
6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits) IBE (identity-based encryption) 3-way key agreement 1

Transcript of Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today:...

Page 1: Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits)

6.857 Computer and Network Security Lecture 17

Today:

CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits) IBE (identity-based encryption) 3-way key agreement

1

Page 2: Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits)

- -i. — —, - — — 4- — -

__________

L..j9,a

H Z!-& ;fc

r PthKhcIsA :- tn£—- ‘r. --j-t

‘ -•

!—--t

- - I - ;-- + —

(Noc #Lt CtM ics’j ) DDhI e.y)

.ih a;$.c,. n. 4rfceW, ,e%çtr DtM (“easy)

0a CU\-I (“k” 6t*

-- t-- -

— Can ant CDflLtfl4Lf a 3G

4p40WS -

I r II —

-f-- — -t -j- - -

-‘ r + 2 - - -, - —

i -I4 I —

-

- r r-

t — rj-- t——- -t----

i. I{L1fr1.r+ --

—- i - (.1

L__ —-— —— [ 4 4

:—t-’-—t -it—Tr tr-

- I-L--tI’+4 4

-

. -—-+I

4: -

- I I1.L---.--I :J- I

-1u41j -- -

2

Page 3: Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits)

nS-‘

N.—

tx-ta—

(NJ(1

‘S

s.D$

__

_

y‘I

C

—I

2cJ

‘3.4i0.

-D

u)0)

‘C

IFE

‘.4

:3—e

3

Page 4: Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits)

oric.

L1t3

£ tQt ,en.r&r01

* )( icnp ofpnseeonkr t’

______

[we. US lf.ydk4confor ti roups]

- 4ndi4,crt exth a (6;hneor mmp

5uc1 4t

___

*

_

r

/

0 0 •

They k4tt- an enormous é. appI...tcfrbns.

We & ;,%ã ; eff

M4pS.

te,’6• Thflann#ec Q1D44M

41 p

44hw

sea

(ct

e =C °

qlso cJJecl LI?aLri $i&Thns

4

Page 5: Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits)

H•.“

iL

i.’

fl_

1•

I-

c-s.

.*

.H

’3

=.

-‘

.-

VI

I.

-._cJ

fl.

-f

1

-‘

h’”

a”’

-

—to

H-o

3:—..

..

--

-C)

4‘

-_;

-.‘

-

÷E

‘.!)--

-‘-‘

r-t

‘.9e

HS

--‘

,_•i_

_I

.-

H.—

‘-°

,,

-.

cc)P

6—

-C

-.

&-,

--

--

‘C

-,

qj.-:

.-

..-,

4—

H••

-j

;.L

ac.

-.

I

——

——

.--

5

Page 6: Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits)

‘S.S

=V

it—.

—a.

4.

4?

‘Sa

•-t

‘—

:.

,W.

qi’.

S

0-iir

RIC

U’.

66

-p

-

r’6’

-Z•

7’1

-g

u’*

--rn

se

I’-C

4-0

-3

-6x

E*

.-,w*

Itra4

(t*

0ca

4I4r°--

•Si

ii.-.

‘44

•a

-‘

-t6

4’:

42

’-!

_r

0I)

C,f.

Ccc

--

..•r

dt

—‘

-

•)

I•

4

.4

.-

•-.-—

•1•

—.•--—

—.—

—-•.-

•••

6

Page 7: Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits)

—-.. .— .‘... ..--. —.... - aS... ô.’.., - - ....-I. ..I_ Id

____________ __

- —

- LI.G- - - - - - - - -

14 Di-. — —---

-

-

14

__

4-

-

6 -

-. mesu,s4t,

4-4-1--,---

-

Q(x9.

R W’ey: {(j,,& - --

fI. LL-L*1-“

r ,

- Let vn:H(M”V r

*Outpu+ rrç(M’ = m” LI- - -

‘t€ni- .

“ SS±4s e() .Lt(y1m) s.ftm;H(M,t L- L -

-:CAStS -±.

1DJIJ 4,t4nt --

hruj4*4ek9 npicsstt4LLJn6’

s;,, zz,

Y çj H —4—t---H—---’- H-----—-

-

7

Page 8: Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits)

r—

-—1-t—r-----

-c—.

a14—i————‘-+‘—Ii

I--—

—__I_—

I——_—-——

III

44--—--—----t——-4—fr-——-r-4--_-_-_,*

IFrLLrJ

HFEJz(‘‘

bU);--IL—4--4_-4Lt

LI 1j_t-,_

-

H4t_trqJ._‘i-—

ttfl:

U

HJJ

r

8

Page 9: Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits)

ri—

1

1---

-+-

t—.±

.1

.

r-

4],

1-

.4..,

1’I

.

..

-H

I-

-

‘I 3

.

-U

@fi

®?

rn.

9,

•q

3Zm

f,

0.

—..

s_-s

-$S

tft

it

3-S

——

b

—‘?

-n•‘

•;

:t.

__

fl%

__

•.

•,—z•

—3

%‘‘

-n4%

—----

,

I:2

.4

ft

—I I

r.

•0

‘S

e

-2 I

4!

9

Page 10: Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits)

1rn i’

.

!‘

-i------

4’

:4

.

H!’

.-

£

H4

r’%

LL

L-

‘—

-,

-L

--—

-__J

!t

rP

Htr.E

¶!.

c-

çp

,if

:C

D&‘

:4’

SI

crn

ag

3’3

z-r

3-—

----

o‘-

D-

‘-

zL

3-S

”6c7

(1

*-

C’

-f-

(bL

‘—

“.

--F

a-

--

.V

’3

-I

t’

.._

Sft

mZi

(t

a

;*

--tg

n—4--

[-

-‘e--

Fr

a-

‘—-.

....

..—

—-

--—

4;

:I

-

-—

;,

mm

-

.-r-t--i-*

-*Z

-t

-%

.-a

•T

4_I

i‘-

a’‘—

1”

‘—

‘-

-a

7j

-

‘%

t9

4--b

--

r-

A)I

-0

,

: HL*

*J*

Zt

-4 I I

r i I ii I 5 jr

I

4 I I

10

Page 11: Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits)

n I’t -

t

1c

(1

r‘—

‘H

30

%_

%._

L)

‘3

‘I ‘A -o

‘I’ ‘U V C ci-)

C •1 -C C

e— en

3.:

3

-e

g3

ii

at

JC 0

“W

nVN

p-o

GN

GN

3-)

-

‘it

C

7Th-

iIC

U U ‘3’C

D

F 0\

(Y’

I—

t r -4 I C.. 0

CN “C

‘I

, OH

I1

C,

_—

I,II

1-9 tic

3! <rf

‘5

’-’-

T

7

I)

(-9 5 K.

-t

11

Page 12: Network and Computer Security, Lecture 17 · 6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits)

MIT OpenCourseWarehttp://ocw.mit.edu

6.857 Network and Computer SecuritySpring 2014

For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.