-anusha uppaluri. ecc- a set of algorithms for key generation, encryption and decryption (public...

12
-Anusha Uppaluri

Upload: john-adams

Post on 24-Dec-2015

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: -Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor

-Anusha Uppaluri

Page 2: -Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor

ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)

ECC was introduced by Victor Miller and Neal Koblitz in 1985

Good alternative to other asymmetric cryptography algorithms Greater security for a given key size Smaller key size= more compact

implementations

Is related to discrete logarithm cryptography

Page 3: -Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor

Asymmetric cryptographic systems use functions whose inverse is difficult to

calculate. Ex: RSA-factoring very large numbers, Diffie

Helman Key exchange- discrete log problem

Page 4: -Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor

Difficulty of forward and inverse operation against key length

Page 5: -Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor

ECC’s inverse operation gets harder much faster

Page 6: -Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor

Elliptic curve is defined by the equation y2=x3+ax+b

Elliptic curve

Page 7: -Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor

Consider a very large prime number P, a square graph PxP in size.

Define an elliptic curve satisfying the above equation.

Considering the points (x,y) on the curve a group which is a subset of all the points on the graph is created.

Point multiplication is the critical operation used: calculate kP where k is an integer and P is a point on curve.

Page 8: -Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor

Discrete Logarithm Problem is the inverse of point multiplication: given points Q,P find k such that Q=kP

Pollard’s rho attack is the best possible attack on ECC

Pollard’s rho attack gets lot harder much faster with increase in key size.

Page 9: -Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor

ECC compared with RSA

Page 10: -Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor

Smaller ECC keys implies – cryptographic operations in fewer processor cycles, faster operations, less power consumed, lower memory demands

Ideal for portable devices Few cases wherein elliptical curve

discrete logarithm problem becomes vulnerable to subexponential techniques.

Page 11: -Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor

http://www.deviceforge.com/articles/AT4234154468.html

http://www.rsa.com/rsalabs/node.asp?id=2013

http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci784941,00.html

Page 12: -Anusha Uppaluri.  ECC- A set of algorithms for key generation, encryption and decryption (public key encryption technique)  ECC was introduced by Victor