Modern Cryptography —Secure Key Establishment CIS Honours Minor Thesis Presentation by Ang Yang 110061059 [email protected] Supervisor: Dr Kim-Kwang Raymond Choo Information Assurance Research Group School of Information Technology and Mathematical Science University of South Australia Presentation Outline • • • • • • • • • • • Introduction Research Questions, Aims and Field of Thesis Background Materials Research Methodology Literature Review Content of Minor Thesis Contributions Draft Thesis Table of Contents Conclusion Acknowledge References 1 Introduction Key establishment (Key exchange protocol) is to keep the security of message which will transfer in unsecure public channel. In 1970, the asymmetric key theory based on computing number theory improving modern cryptography. Adversary wants to break the cryptographic protocol for getting the private key depending on developments of hardware and mathematics via special method such as undetected dictionary attack. To design the security and efficient key exchange protocol is very significant. This minor thesis is focus on analyzing effective and secure key exchange protocol using elliptic curve cryptography (ECC). 2 Research Questions, Aims and Field of Thesis Research Aims: 1.To analyze published protocols in the literature, including protocols that carry heuristic security arguments and protocols that carry proofs of security. 2.To design new provably secure key establishment protocols, which need to be as efficient in performance as the existing protocols. Research Questions: How we design and prove secure key exchange protocols? Field of Thesis: Cryptography Protocol. 3 Background Materials 1. Number Theory for Computing 2. Cryptography Background Materials 4 Background Material • 3 Oracle Random Model 1. BP model using to authentication key exchange protocol proof (Bellare and Rogaway 1995). Send Reveal Corrupt Test 2. Abdalla RoR model using to prove Gateway-based Password based Authentication Key Exchange protocol (Abdalla et al. 2005). Execute Send Test TestPair 5 Literature Review 1. Mathematics and cryptography literature - Modern cryptography develops based on mathematics theory which is the number theory for computing (Yan 2000, Katz & Lindell 2008). - ID-based assumption is a strong assumption related to Elliptic Curve Cryptography (ECC) theory (Yan 2011). - ECC is based on elliptic discrete logarithm problem (ECDLP) and much more effective than RSA which based on integer factorization problem (Yan 2011, Katz & Lindell 2008). length of key ECC Security level RSA Same 256 3072 Same 348 7680 Same 512 15360 6 Background Materials 1.1 Number theory of computing associated with ( x mod n = a equal to x ≡ a mod n) operation (Yan 2000) x mod n : stand for remainder operation. e.g. 7 mod 2 = 1 9 mod 4 = 1 14 mod 3 =2 7 ≡ 2 mod 1, 9 ≡ 4 mod 1, 14 ≡ 2 mod 3 2. There are myriad number results equal ( x ≡ a mod n) operation (Yan 2000) e.g. Because : 9 mod 2 = 1 7 mod 2 = 1 5 mod 2 = 1 3 mod 2 =1 So … ≡ 9 ≡ 7 ≡ 5 ≡ 3 ≡ 2mod 1 7 Background Materials 1.2 Modern Cryptography process: sk: private key for decryption pk: public key for encryption Dec () Enc () Plaintext Plaintext Ciphertext pkB Client A skB Client B 8 Background Materials 1.3 Elliptic Curve Cryptography theory (Yan, 2011): Elliptic curve function G():y2=x3+ax+b 1. ECC theory : P+Q+R’=O pk1=[sk1]G = (x1,y1) pk2=[sk2]G = (x2, y2) Session key: sk1 pk2 = sk2 pk1 2. ECDLP assumption: sk private key is hard to calculate from pk in polynomial time 9 Literature Review 2. SM2 Algorithm key exchange protocol - In 2010, Chinese state cryptography administration publish the new cryptography algorithm and protocol, named SM2 depending on ID-based, to instead of RSA . - In 2011, Xu and Feng attacked SM2 protocol and presented in conferences . 3. Gateway-based password based authentication key exchange protocol (GPAKE) - In 2005, Abdalla published gateway-based password based authentication key exchange protocol (GPAKE). - In 2006, Byun attacked this protocol via undetected dictionary attack and improved it. - In 2008, Abdalla improved GPAKE protocol and proof security. - In 2011 and 2012, Wei designed the RSA and Diffie-Hellman GPAKE protocol, they proofed it via oracle random model. 10 Research Methodology • 1 Critical Analysis of Published Protocols Comparing and analyzing the protocols . • 2 Design Protocols The algorithm or protocol design based on Computing number theory to keep the veracity of key exchange protocol. • 3 Mathematical Proofs Proof the security in current oracle random model such as BP95 model and Abdalla RoR model via mathematical probability theory. 11 Content of Minor Thesis • SM2 protocol proving and comments on attacking • Enhance SM2 protocol • GPAKE protocol using SM2 algorithm • An ID-based GPAKE protocol 12 Research Content SM2 Protocol ‘s mistake of attacking , proving and enhanced 1. . 13 Contributions 1. 2. Comment on Xu and Feng’s (2011) attacking mistakes. Proving security of SM2 protocol in BP model. SK: private key PK: public key OAB:session key’s private information that 14 Research Content 2. A provably Enhanced SM2 Protocol . 15 Contributions 1. Enhanced SM2 Protocol ‘s security proving via BP model. 2. Enhanced the SM2 protocol more effective and proving the security. Comparison: a: addition, p:pairing, e: exponentiation, h: hash operation Protocol Computing Assumption SM2 10p+4e+6a+8h ECDLP Ours 8P+2e+8h ECDLP 16 Research Content 2. A provably GPAKE Protocol using SM2 algorithm. Research Content 3. A provably ID-based GPAKE Protocol using ECC. Contributions 1. First GPAKE protocol using SM2 algorithm which can be widely used in China about cloud network, mobile network. 2. First ID-Based GPAKE protocol using ECC which is more effective than RSA GPAKE protocol. 3. These two protocols can own strong anonymity and password security which is about the client’s privacy information security. 4. These two protocols can against online dictionary attack and undetected off-line dictionary attack. 5. These two protocols are proved security via Abdalla ROR model. 19 Draft Thesis Table of Contents 20 Conclusion: • • • • • Key establishment is significant. Literature review. Contents of minor thesis. Contributions of different protocols. Draft of minor thesis 21 Acknowledge • • • • • Dr. Raymond Choo Dr. Gaye Deegan Dr. Lin Liu Dr. Jan Stanek Dr. Stewart Von Itzstein 22 Thank You 23 Question? 24 References • • • • • • • • • • • Abdalla, M., et al. 2005. A simple threshold authenticated key exchange from short secrets. Advances in Cryptology-Asiacrypt 2005, Springer: 566-584. Abdalla, M., et al. 2008. Anonymous and transparent gateway-based password-authenticated key exchange. Cryptology and Network Security, Springer: 133-148. Bellare, M. and Rogaway, P. 1995: ‘Provably Secure Session Key Distribution: The Three Party Case’, ACM STOC 1995: 57–66 Byun, J. W., et al. 2006. ”Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol.” Communications Letters, IEEE 10(9): 683-685. Chinese Government State Cryptography Administration: ‘Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves, Part 3: Key Exchange Protocol’, 2010 (http://www.oscca.gov.cn/UpFile/2010122214822692.pdf, in Chinese) Katz, J. and Lindell Y. 2008 :’Introduction to modern cryptography’ Chapman & Hall/CRC Wei, F., et al. 2011. Gateway-oriented password-authenticated key exchange protocol with stronger security. Provable Security, Springer: 366-379. Wei, F., et al. 2012. ”Gateway-oriented password-authenticated key exchange protocol in the standard model.” Journal of Systems and Software 85(3): 760-768. Xu, J. and D. Feng 2011: ’Comments on the SM2 key exchange protocol’. CANS 2011, LNCS 7092: 160–171 Yan, S. Y. 2011 : ‘Elliptic Curve’, Dalian Polytechnic University (in Chinese). Yan, S. Y. 2000 : ‘Number theory for computing’, Springer 25
© Copyright 2026 Paperzz