Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio

Information Security Awareness Group
Information Security Awareness GroupInformation Security Awareness Group
Elliptic Curve
Cryptography
Shane Almeida
Saqib Awan
Dan Palacio
Outline
Background
Performance
Application
Elliptic Curve Cryptography
Relatively new approach to asymmetric
cryptography
Independently proposed by Neal Koblitz
and Victor Miller in 1985
Asymmetric Cryptosystems
Two mathematically related keys



Public key for encryption
Private key for decryption

Private key can not be easily deduced
from the public key


Security depends on a mathematical function
whose inverse is difficult to calculate
Asymmetric Approaches
RSA


Integer multiplication and factorization

Diffie-Hellamn


Discrete exponentiation and logarithm

Elliptic Curve Cryptography


Point multiplication and discrete logarithm
Elliptic Curves
Elliptic curves are not
ellipses (the name
comes from elliptic
integrals)
Circle


x2 + y2 = r2

Ellipsis


a·x2 + b·y2 = c

Elliptic curve


y2 = x3 + a·x + b
Elliptic Curves Over Real Numbers
An elliptic curve over reals is the set of points
(x,y) which satisfy the equation y2 = x3 + a·x + b,
where x, y, a, and b are real numbers
If 4·a3 + 27·b2 is not 0 (i.e. x3 + a·x + b contains no
repeated factors), then the elliptic curve can be
used to form a group
An elliptic curve group consists of the points on
the curve and a special point O
Elliptic curves are additive groups


Addition can be defined geometrically or algebraically
Adding Points P and Q
Draw a line that intersects
distinct points P and Q


The line will intersect a
third point -R

Draw a vertical line
through point -R


The line will intersect a
fourth point R

Point R is defined as the
summation of points P
and Q


R=P+Q
Adding Points P and -P
Draw a line that
intersects points P
and -P


The line will not
intersect a third point

For this reason,
elliptic curves include
O, a point at infinity



P + (-P) = O
O is the additive
identity
Doubling the Point P
Draw a line tangent to
point P


The line will intersect a
second point -R

Draw a vertical line
through point -R


The line will intersect a
third point R

Point R is defined as the
summation of point P with
itself


R = 2·P
Doubling the Point P if yP = 0
Draw a line tangent to
point P


If yP = 0, the line will
not intersect a second
point

2·P = O when yP = 0




3·P = P (2·P + P)
4·P = O (2·P + 2·P)
5·P = P (2·P + 2·P + P)
Algebraic Approach
Point Addition





R=P+Q
s = (yP – yQ) / (xP – xQ)
xR = s2 – xP – xQ
yR = -yP + s(xP – xR)

Point Doubling





R = 2·P
s = (3·xP2 + a) / (2·yP)
xR = s2 – 2·xP
yR = -yP + s(xP – xR)
Cryptography with Elliptic Curves
Calculations with real numbers are slow
and rounding causes inaccuracy
Speed and accuracy are important for
cryptography
Use elliptic curve groups over the finite
field Fp *
Elliptic curves are formed by choosing a
and b within the field Fp


y2 mod p = x3 + a·x + b mod p

* can also use F2m, but I’m skipping it
Cryptography with Elliptic Curves
Because it’s a finite field, a finite number
of points make up the curve



This means there is no true curve anymore
But also no more rounding

Geometric definitions of addition and
doubling don’t work on these curves
Algebraic definitions still hold
The Discrete Logarithm
Problem
The discrete logarithm problem for ECC is
the inverse of point multiplication
Point multiplication is simply calculating
Q=kP, where k is an integer and P is a
point on the curve
Elliptic Curve Discrete Logarithm
Given points P and Q, find a number k
such that k·P = Q





P is the base point on a specific, published
curve
Q is the public key
k is the private key (very large prime number)

With doubling, we can go from P to 2·P
With addition, we can go from 2·P to 3·P
The Discrete Logarithm
Problem
Determining the point k·P in this way is
referred to as the scalar multiplication of a
point
Scalar multiplication is intractable



Elliptic Curve Discrete Logarithm Problem
k is the discrete logarithm of Q to the base P

Brute force attacks range up to 3x10 57
operations by a stepping process


Applies to NIST-defined P192 curve
Attacking ECC
ECC is not susceptible to index-calculus attacks


Index-calculus relies on group properties that ECC
groups do not have

Brute force does not fair well either as shown
Best possible way is a ‘collision attack’ known as
Pollard’s rho attack


As field size increases, the attack becomes harder at
an exponential rate
Security Performance
Implementation allows for a significant
reduction in key size




ECC key of 163 bits is equivalent to RSA key
of 1024 bits
ECC key of 256 bits is equivalent to RSA key
of 3072 bits

ECC’s main advantage: as key length
increases, so does the difficulty of the
inversion process
Performance Analysis - Speed
ECC performance is dependent on field
operations
Arithmetic involved in ECC






Algorithmic Level (addition and subtraction
chains)
Curve Arithmetic Level (selection of
coordinate representation)
Field Arithmetic Level (basis selection,
multiplier and inverter structures)
Performance Analysis - Speed
How can ECC performance increase?


Increase efficiency of finite field mathematics
The performance of ECC relies heavily on the
speed of the computations in the finite field





Use particular finite fields and elliptic curves
where applicable
Implementing the right field representation
Representations
Types of representations for elements in a
finite field


Normal Basis
Takes the form {1, α, α2,…, αn-1}
Type I and Type II representations optimized for N



Polynomial Basis
Takes the form {α, α2, α2^2,…, α2^(n-1)}

α is a root of an irreducible polynomial f(x)
that has a degree N in a field
Which is better?
PB does inversion 10% faster
NB does scalar multiplication 12% faster
Both perform basic addition and subtraction
efficiently
Performance depends on implementation




Ex. ElGamel protocol - encryption using EC runs 22%
faster when combined with NB rather than PB
Using other protocols may show different results as
well

Performance is also related to hardware design
Performance Comparison

Key sizes for EC using PB are 155 and 183
respectively
Key sizes for EC using NB are 155 and 173
respectively
Implementing Efficient
ECC For
Smart Cards
(ECDSA)
Presented By: Saqib Awan
Elliptic Curve Cryptosystems (ECC)
Merits:




A 160 bit ECC has roughly the same security
as 1024 bit RSA.
Limited memory and computational power.

Purpose:




Algorithms to achieve optimized
implementation of the ECDSA over the field
GF(p) on smart cards.
Algorithms for modular reduction, modular
inversion and scalar multiplication.
Discrete Logarithm Problem
Based on the difficulty of elliptic curve discrete
logarithm problem (DLP).
DLP applies to mathematical structures called
groups.
For higher security the rate of increase key size
is much slower for RSA key sizes.
Faster implementation using less bandwidth and
power- crucial for smart cards.
IEEE Std 1363-2000, WAP (Wireless
Application Protocol), ANSI X9.62, ANSI X9.63
and ISO CD 14888-3) employs ECC.
Elliptic curve over a Galois field
with p elements
E : y2 = x3 + ax + b (mod p)
Addition and doubling of points are the group
operations along with the identity element.
Definition ECDLP:


Given the prime modulus p, the curve constants a
and b and two points P and Q, find a scalar k such
that Q = kP

Efficient Field Arithmetic in crypto coprocessor.
Effect of coordinate systems on speed of the
scalar multiplication operations.
Smart Card Hardware
Motorola M-Smart JupiterTM smart card based on Java
CardTM 2.1 technology and an ARM processor with a
word size of 32 bits, 64KB of ROM,32KB of EEPROM,
3KB RAM and a modular arithmetic coprocessor (crypto
coprocessor).
ECDSA Signature Generation
Signature generation for message M:
private key d, hash value h=Hash(M),
order l of base point P.
ECDSA Signature Verification
Signature verification for message M,
signature (r,s), hash h: base point P,
public key Q=dP, order l of base point P
Modular arithmetic of GF(p)
Modular Addition and Subtraction.
Modular Reduction (multiplication) algorithms:






Barrett reduction.
Montgomery reduction.
NIST primes by Brown et al., very fast (6% and 33%)
but specialized reduction algorithm.
Pseudo-Mersenne prime.

Modular Inversion (Division)




Binary extended GCD (BEGCD) algorithm
Extended Euclidean algorithm (EEA)
Exponentiation method (Fermat’s little theorem)
Scalar multiplication
Basic crypto operation of an ECC.
Series of point addition and doubling.
Binary method due to no pre-computation
phase .
Faster processing when using signed
representation of the scalar value.
Point coordinates and Scalar
Multiplication
Addition and Doubling









Affine - a point is represented as (xA, yA).
Projective - (X, Y,Z) where xA = XZ−1 and yA = Y
Z−1.
Jacobian, Modified Jacobian and Chudnovsky
Jacobian.
Issue of Temporary variables required by
each algorithm.
Mixed coordinate multiplication.
Background References
Elliptic Curve Cryptography at the Wikipedia



http://en.wikipedia.org/wiki/Elliptic_curve_cryptography
http://en.wikipedia.org/wiki/Elliptic_curves

Elliptic curve cryptography FAQ by George Barwood


http://www.cryptoman.com/elliptic.htm

Elliptic Curve Cryptography according to Steven
Galbraith


http://www.isg.rhul.ac.uk/~sdg/ecc.html

An Elliptic Curve Cryptography (ECC) Primer by certicom


http://www.deviceforge.com/articles/AT4234154468.html

Online Elliptic Curve Cryptography Tutorial by certicom


http://www.certicom.com/index.php?action=ecc_tutorial,home
Performance References
Bednara, M. et. al. “Tradeoff Analysis of
FPGA Based Elliptic Curve Cryptography.”
Circuits and Systems, 29 May 2002.
Qizhi, Qui “Research on Elliptic Curve
Cryptography.” Computer Supported
Cooperative Work in Design. 26 May 2004
Application References
Implementing an efficient elliptic curve cryptosystem over GF(p) on
a smart card, Yvonne Hitchcock, Edward Dawson, Andrew Clark,
Paul Montague, October 2002.
THE ELLIPTIC CURVE CRYPTOSYSTEM FOR SMART CARDS, A
Certicom White Paper, Published: May 1998
1 von 37

Recomendados

Elliptical curve cryptography von
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptographyBarani Tharan
3.7K views88 Folien
Elliptic Curve Cryptography von
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyKelly Bresnahan
8.3K views102 Folien
Elliptic curve cryptography von
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptographyCysinfo Cyber Security Community
17.6K views22 Folien
CRYPTOGRAPHY AND NETWORK SECURITY von
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
5.9K views135 Folien
Elliptic Curve Cryptography: Arithmetic behind von
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindAyan Sengupta
3.8K views42 Folien
Rsa cryptosystem von
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystemAbhishek Gautam
4.2K views37 Folien

Más contenido relacionado

Was ist angesagt?

Cryptography von
CryptographyCryptography
Cryptographygueste4c97e
12.9K views17 Folien
RSA ALGORITHM von
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHMShashank Shetty
51.2K views28 Folien
cryptography Application of linear algebra von
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra Sami Ullah
7.8K views20 Folien
Cryptography von
CryptographyCryptography
CryptographyKARNAN L S
1.4K views21 Folien
1524 elliptic curve cryptography von
1524 elliptic curve cryptography1524 elliptic curve cryptography
1524 elliptic curve cryptographyDr Fereidoun Dejahang
1.1K views76 Folien

Was ist angesagt?(20)

Cryptography von gueste4c97e
CryptographyCryptography
Cryptography
gueste4c97e12.9K views
cryptography Application of linear algebra von Sami Ullah
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra
Sami Ullah7.8K views
Cryptography von KARNAN L S
CryptographyCryptography
Cryptography
KARNAN L S1.4K views
Number Theory In Cryptography von Aadya Vatsa
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
Aadya Vatsa3.1K views
El Gamal Cryptosystem von Adri Jovin
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
Adri Jovin612 views
Asymmetric Cryptography.pptx von diaa46
Asymmetric Cryptography.pptxAsymmetric Cryptography.pptx
Asymmetric Cryptography.pptx
diaa46103 views
Classical encryption techniques von Janani S
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Janani S471 views
Rsa Crptosystem von Amlan Patel
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
Amlan Patel3.3K views
A Brief History of Cryptography von guest9006ab
A Brief History of CryptographyA Brief History of Cryptography
A Brief History of Cryptography
guest9006ab11.4K views

Destacado

Elliptic Curves and Elliptic Curve Cryptography von
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyMd. Al-Amin Khandaker Nipu
2.5K views41 Folien
ECC vs RSA: Battle of the Crypto-Ninjas von
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasJames McGivern
15.2K views119 Folien
Elliptic Curve Cryptography and Zero Knowledge Proof von
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofArunanand Ta
6K views58 Folien
Fermat's last theorem proof by andrew wiles von
Fermat's last theorem   proof by andrew wilesFermat's last theorem   proof by andrew wiles
Fermat's last theorem proof by andrew wilesMichael Christian Baysauli
5.2K views109 Folien
Proof of fermat's little theorem von
Proof of fermat's little theoremProof of fermat's little theorem
Proof of fermat's little theoremChukwunonso Arinze
679 views8 Folien
Ecc2 von
Ecc2Ecc2
Ecc2manikandan varadharaju
1.2K views33 Folien

Destacado(20)

ECC vs RSA: Battle of the Crypto-Ninjas von James McGivern
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-Ninjas
James McGivern15.2K views
Elliptic Curve Cryptography and Zero Knowledge Proof von Arunanand Ta
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
Arunanand Ta6K views
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC) von Entrust Datacard
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Entrust Datacard1.5K views
Introduction to Elliptic Curve Cryptography von David Evans
Introduction to Elliptic Curve CryptographyIntroduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve Cryptography
David Evans2.5K views
Elliptic Curve Cryptography for those who are afraid of maths von Martijn Grooten
Elliptic Curve Cryptography for those who are afraid of mathsElliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of maths
Martijn Grooten2.7K views
Palm Vein Technology von Manav Mittal
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Manav Mittal7.4K views
Ch01 von n C
Ch01Ch01
Ch01
n C1.9K views
palm vein technology and its applications von Akhil Kumar
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
Akhil Kumar20.2K views
block ciphers von Asad Ali
block ciphersblock ciphers
block ciphers
Asad Ali23.9K views
Steganography presentation von Ashwin Prasad
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad28.5K views

Similar a Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio

Low Power FPGA Based Elliptical Curve Cryptography von
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
385 views4 Folien
Low Power FPGA Based Elliptical Curve Cryptography von
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
166 views4 Folien
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS von
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
639 views16 Folien
Presentation on Cryptography_Based on IEEE_Paper von
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
345 views13 Folien
Assignment 2 (1) (1).docx von
Assignment 2 (1) (1).docxAssignment 2 (1) (1).docx
Assignment 2 (1) (1).docxpinstechwork
4 views4 Folien
IJCER (www.ijceronline.com) International Journal of computational Engineerin... von
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
354 views9 Folien

Similar a Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio(20)

Low Power FPGA Based Elliptical Curve Cryptography von IOSR Journals
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
IOSR Journals385 views
Low Power FPGA Based Elliptical Curve Cryptography von IOSR Journals
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
IOSR Journals166 views
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS von csandit
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
csandit639 views
Presentation on Cryptography_Based on IEEE_Paper von Nithin Cv
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
Nithin Cv345 views
IJCER (www.ijceronline.com) International Journal of computational Engineerin... von ijceronline
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline354 views
Waveform_codingUNIT-II_DC_-PPT.pptx von KIRUTHIKAAR2
Waveform_codingUNIT-II_DC_-PPT.pptxWaveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptx
KIRUTHIKAAR23 views
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu... von Editor IJCATR
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Editor IJCATR381 views
Design and Implementation of Variable Radius Sphere Decoding Algorithm von csandit
Design and Implementation of Variable Radius Sphere Decoding AlgorithmDesign and Implementation of Variable Radius Sphere Decoding Algorithm
Design and Implementation of Variable Radius Sphere Decoding Algorithm
csandit255 views
Waveform_codingUNIT-II_DC_-PPT.pptx von KIRUTHIKAAR2
Waveform_codingUNIT-II_DC_-PPT.pptxWaveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptx
KIRUTHIKAAR23 views
Ecc cipher processor based on knapsack algorithm von Alexander Decker
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
Alexander Decker377 views
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T... von ijceronline
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
ijceronline357 views
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T... von ijceronline
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
ijceronline338 views
Ijarcet vol-2-issue-7-2323-2327 von Editor IJARCET
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
Editor IJARCET268 views
Ijarcet vol-2-issue-7-2323-2327 von Editor IJARCET
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
Editor IJARCET235 views
Reed solomon Encoder and Decoder von Ameer H Ali
Reed solomon Encoder and DecoderReed solomon Encoder and Decoder
Reed solomon Encoder and Decoder
Ameer H Ali385 views
Paillier Cryptosystem von Dejan Radic
Paillier CryptosystemPaillier Cryptosystem
Paillier Cryptosystem
Dejan Radic117 views
Elliptic curve scalar multiplier using karatsuba von IAEME Publication
Elliptic curve scalar multiplier using karatsubaElliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsuba
IAEME Publication365 views
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a... von IOSR Journals
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
IOSR Journals582 views

Más de Information Security Awareness Group

Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian... von
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Information Security Awareness Group
1.3K views14 Folien
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... von
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
1K views21 Folien
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S... von
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Information Security Awareness Group
730 views51 Folien
IBM Security Strategy Intelligence, von
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,Information Security Awareness Group
2.3K views26 Folien
Addressing Big Data Security Challenges: The Right Tools for Smart Protection... von
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Information Security Awareness Group
826 views7 Folien
Big data analysis concepts and references by Cloud Security Alliance von
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceInformation Security Awareness Group
761 views11 Folien

Más de Information Security Awareness Group(20)

Último

Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... von
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...ShapeBlue
173 views15 Folien
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... von
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...ShapeBlue
159 views25 Folien
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... von
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
90 views52 Folien
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
263 views23 Folien
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool von
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPoolShapeBlue
123 views10 Folien
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... von
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...ShapeBlue
132 views13 Folien

Último(20)

Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... von ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue173 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... von ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue159 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... von The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue263 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool von ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue123 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... von ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue132 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue von ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue222 views
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue von ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue218 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs von Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash158 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... von ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue126 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... von James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson160 views
State of the Union - Rohit Yadav - Apache CloudStack von ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue297 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... von ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue139 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc170 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... von ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue180 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue von ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue147 views
The Power of Heat Decarbonisation Plans in the Built Environment von IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE79 views

Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio

  • 3. Elliptic Curve Cryptography Relatively new approach to asymmetric cryptography Independently proposed by Neal Koblitz and Victor Miller in 1985
  • 4. Asymmetric Cryptosystems Two mathematically related keys   Public key for encryption Private key for decryption Private key can not be easily deduced from the public key  Security depends on a mathematical function whose inverse is difficult to calculate
  • 5. Asymmetric Approaches RSA  Integer multiplication and factorization Diffie-Hellamn  Discrete exponentiation and logarithm Elliptic Curve Cryptography  Point multiplication and discrete logarithm
  • 6. Elliptic Curves Elliptic curves are not ellipses (the name comes from elliptic integrals) Circle  x2 + y2 = r2 Ellipsis  a·x2 + b·y2 = c Elliptic curve  y2 = x3 + a·x + b
  • 7. Elliptic Curves Over Real Numbers An elliptic curve over reals is the set of points (x,y) which satisfy the equation y2 = x3 + a·x + b, where x, y, a, and b are real numbers If 4·a3 + 27·b2 is not 0 (i.e. x3 + a·x + b contains no repeated factors), then the elliptic curve can be used to form a group An elliptic curve group consists of the points on the curve and a special point O Elliptic curves are additive groups  Addition can be defined geometrically or algebraically
  • 8. Adding Points P and Q Draw a line that intersects distinct points P and Q  The line will intersect a third point -R Draw a vertical line through point -R  The line will intersect a fourth point R Point R is defined as the summation of points P and Q  R=P+Q
  • 9. Adding Points P and -P Draw a line that intersects points P and -P  The line will not intersect a third point For this reason, elliptic curves include O, a point at infinity   P + (-P) = O O is the additive identity
  • 10. Doubling the Point P Draw a line tangent to point P  The line will intersect a second point -R Draw a vertical line through point -R  The line will intersect a third point R Point R is defined as the summation of point P with itself  R = 2·P
  • 11. Doubling the Point P if yP = 0 Draw a line tangent to point P  If yP = 0, the line will not intersect a second point 2·P = O when yP = 0    3·P = P (2·P + P) 4·P = O (2·P + 2·P) 5·P = P (2·P + 2·P + P)
  • 12. Algebraic Approach Point Addition     R=P+Q s = (yP – yQ) / (xP – xQ) xR = s2 – xP – xQ yR = -yP + s(xP – xR) Point Doubling     R = 2·P s = (3·xP2 + a) / (2·yP) xR = s2 – 2·xP yR = -yP + s(xP – xR)
  • 13. Cryptography with Elliptic Curves Calculations with real numbers are slow and rounding causes inaccuracy Speed and accuracy are important for cryptography Use elliptic curve groups over the finite field Fp * Elliptic curves are formed by choosing a and b within the field Fp  y2 mod p = x3 + a·x + b mod p * can also use F2m, but I’m skipping it
  • 14. Cryptography with Elliptic Curves Because it’s a finite field, a finite number of points make up the curve   This means there is no true curve anymore But also no more rounding Geometric definitions of addition and doubling don’t work on these curves Algebraic definitions still hold
  • 15. The Discrete Logarithm Problem The discrete logarithm problem for ECC is the inverse of point multiplication Point multiplication is simply calculating Q=kP, where k is an integer and P is a point on the curve
  • 16. Elliptic Curve Discrete Logarithm Given points P and Q, find a number k such that k·P = Q    P is the base point on a specific, published curve Q is the public key k is the private key (very large prime number) With doubling, we can go from P to 2·P With addition, we can go from 2·P to 3·P
  • 17. The Discrete Logarithm Problem Determining the point k·P in this way is referred to as the scalar multiplication of a point Scalar multiplication is intractable   Elliptic Curve Discrete Logarithm Problem k is the discrete logarithm of Q to the base P Brute force attacks range up to 3x10 57 operations by a stepping process  Applies to NIST-defined P192 curve
  • 18. Attacking ECC ECC is not susceptible to index-calculus attacks  Index-calculus relies on group properties that ECC groups do not have Brute force does not fair well either as shown Best possible way is a ‘collision attack’ known as Pollard’s rho attack  As field size increases, the attack becomes harder at an exponential rate
  • 19. Security Performance Implementation allows for a significant reduction in key size   ECC key of 163 bits is equivalent to RSA key of 1024 bits ECC key of 256 bits is equivalent to RSA key of 3072 bits ECC’s main advantage: as key length increases, so does the difficulty of the inversion process
  • 20. Performance Analysis - Speed ECC performance is dependent on field operations Arithmetic involved in ECC    Algorithmic Level (addition and subtraction chains) Curve Arithmetic Level (selection of coordinate representation) Field Arithmetic Level (basis selection, multiplier and inverter structures)
  • 21. Performance Analysis - Speed How can ECC performance increase?  Increase efficiency of finite field mathematics The performance of ECC relies heavily on the speed of the computations in the finite field   Use particular finite fields and elliptic curves where applicable Implementing the right field representation
  • 22. Representations Types of representations for elements in a finite field  Normal Basis Takes the form {1, α, α2,…, αn-1} Type I and Type II representations optimized for N  Polynomial Basis Takes the form {α, α2, α2^2,…, α2^(n-1)} α is a root of an irreducible polynomial f(x) that has a degree N in a field
  • 23. Which is better? PB does inversion 10% faster NB does scalar multiplication 12% faster Both perform basic addition and subtraction efficiently Performance depends on implementation   Ex. ElGamel protocol - encryption using EC runs 22% faster when combined with NB rather than PB Using other protocols may show different results as well Performance is also related to hardware design
  • 24. Performance Comparison Key sizes for EC using PB are 155 and 183 respectively Key sizes for EC using NB are 155 and 173 respectively
  • 25. Implementing Efficient ECC For Smart Cards (ECDSA) Presented By: Saqib Awan
  • 26. Elliptic Curve Cryptosystems (ECC) Merits:   A 160 bit ECC has roughly the same security as 1024 bit RSA. Limited memory and computational power. Purpose:   Algorithms to achieve optimized implementation of the ECDSA over the field GF(p) on smart cards. Algorithms for modular reduction, modular inversion and scalar multiplication.
  • 27. Discrete Logarithm Problem Based on the difficulty of elliptic curve discrete logarithm problem (DLP). DLP applies to mathematical structures called groups. For higher security the rate of increase key size is much slower for RSA key sizes. Faster implementation using less bandwidth and power- crucial for smart cards. IEEE Std 1363-2000, WAP (Wireless Application Protocol), ANSI X9.62, ANSI X9.63 and ISO CD 14888-3) employs ECC.
  • 28. Elliptic curve over a Galois field with p elements E : y2 = x3 + ax + b (mod p) Addition and doubling of points are the group operations along with the identity element. Definition ECDLP:  Given the prime modulus p, the curve constants a and b and two points P and Q, find a scalar k such that Q = kP Efficient Field Arithmetic in crypto coprocessor. Effect of coordinate systems on speed of the scalar multiplication operations.
  • 29. Smart Card Hardware Motorola M-Smart JupiterTM smart card based on Java CardTM 2.1 technology and an ARM processor with a word size of 32 bits, 64KB of ROM,32KB of EEPROM, 3KB RAM and a modular arithmetic coprocessor (crypto coprocessor).
  • 30. ECDSA Signature Generation Signature generation for message M: private key d, hash value h=Hash(M), order l of base point P.
  • 31. ECDSA Signature Verification Signature verification for message M, signature (r,s), hash h: base point P, public key Q=dP, order l of base point P
  • 32. Modular arithmetic of GF(p) Modular Addition and Subtraction. Modular Reduction (multiplication) algorithms:     Barrett reduction. Montgomery reduction. NIST primes by Brown et al., very fast (6% and 33%) but specialized reduction algorithm. Pseudo-Mersenne prime. Modular Inversion (Division)    Binary extended GCD (BEGCD) algorithm Extended Euclidean algorithm (EEA) Exponentiation method (Fermat’s little theorem)
  • 33. Scalar multiplication Basic crypto operation of an ECC. Series of point addition and doubling. Binary method due to no pre-computation phase . Faster processing when using signed representation of the scalar value.
  • 34. Point coordinates and Scalar Multiplication Addition and Doubling      Affine - a point is represented as (xA, yA). Projective - (X, Y,Z) where xA = XZ−1 and yA = Y Z−1. Jacobian, Modified Jacobian and Chudnovsky Jacobian. Issue of Temporary variables required by each algorithm. Mixed coordinate multiplication.
  • 35. Background References Elliptic Curve Cryptography at the Wikipedia   http://en.wikipedia.org/wiki/Elliptic_curve_cryptography http://en.wikipedia.org/wiki/Elliptic_curves Elliptic curve cryptography FAQ by George Barwood  http://www.cryptoman.com/elliptic.htm Elliptic Curve Cryptography according to Steven Galbraith  http://www.isg.rhul.ac.uk/~sdg/ecc.html An Elliptic Curve Cryptography (ECC) Primer by certicom  http://www.deviceforge.com/articles/AT4234154468.html Online Elliptic Curve Cryptography Tutorial by certicom  http://www.certicom.com/index.php?action=ecc_tutorial,home
  • 36. Performance References Bednara, M. et. al. “Tradeoff Analysis of FPGA Based Elliptic Curve Cryptography.” Circuits and Systems, 29 May 2002. Qizhi, Qui “Research on Elliptic Curve Cryptography.” Computer Supported Cooperative Work in Design. 26 May 2004
  • 37. Application References Implementing an efficient elliptic curve cryptosystem over GF(p) on a smart card, Yvonne Hitchcock, Edward Dawson, Andrew Clark, Paul Montague, October 2002. THE ELLIPTIC CURVE CRYPTOSYSTEM FOR SMART CARDS, A Certicom White Paper, Published: May 1998

Hinweis der Redaktion

  1. Graph from An intro to Elliptical Curve Cryptography at http://www.deviceforge.com/articles/AT4234154468.html, which is a reproduction of An Elliptic Curve Cryptography (ECC) Primer by Certicom.
  2. Shane added the points to this graph.
  3. Shane added the points to this graph.
  4. Shane added the points to this graph.
  5. Shane added the points to this graph.