how to textbook key exchange manipulate curve standards
play

How to Textbook key exchange manipulate curve standards: - PowerPoint PPT Presentation

How to Textbook key exchange manipulate curve standards: using standard point P a white paper for the black hat on a standard elliptic curve E : Alices Bobs Daniel J. Bernstein secret key a secret key b Tung


  1. � � � � � How to Textbook key exchange manipulate curve standards: using standard point P a white paper for the black hat on a standard elliptic curve E : Alice’s Bob’s Daniel J. Bernstein secret key a secret key b Tung Chou Chitchanok Chuengsatiansup Andreas H¨ ulsing Alice’s Bob’s public key public key Eran Lambooij aP bP ▲ Tanja Lange � rrrrrrr ▲ ▲ ▲ ▲ ▲ ▲ Ruben Niederhagen { Alice ; Bob } ’s = { Bob ; Alice } ’s Christine van Vredendaal shared secret shared secret abP baP bada55.cr.yp.to

  2. � � � � � How to Textbook key exchange manipulate curve standards: using standard point P a white paper for the black hat on a standard elliptic curve E : Alice’s Bob’s Daniel J. Bernstein secret key a secret key b Tung Chou Chitchanok Chuengsatiansup Andreas H¨ ulsing Alice’s Bob’s public key public key Eran Lambooij aP bP ▲ Tanja Lange � rrrrrrr ▲ ▲ ▲ ▲ ▲ ▲ Ruben Niederhagen { Alice ; Bob } ’s = { Bob ; Alice } ’s Christine van Vredendaal shared secret shared secret abP baP bada55.cr.yp.to Security depends on choice of E .

  3. � � � � � � � to Textbook key exchange Our manipulate curve standards: using standard point P white paper for the black hat on a standard elliptic curve E : Alice’s Bob’s Alice’s J. Bernstein secret key a secret key b secret Chou Chitchanok Chuengsatiansup Andreas H¨ ulsing Alice’s Bob’s Alice’s public key public key public Lambooij aP bP aP ▲ Lange � rrrrrrr ▲ ▲ ▲ ▲ ▲ ▲ Niederhagen { Alice ; Bob } ’s = { Bob ; Alice } ’s { Alice ; Bob Christine van Vredendaal shared secret shared secret shared abP baP abP bada55.cr.yp.to Security depends on choice of E .

  4. � � � � � � � � Textbook key exchange Our partner choice of curve standards: using standard point P r the black hat on a standard elliptic curve E : Alice’s Bob’s Alice’s Bernstein secret key a secret key b secret key a Chuengsatiansup Alice’s Bob’s Alice’s public key public key public key aP bP aP ▲ ▲ � rrrrrrr ▲ ▲ ▲ ▲ ▲ � rrrrr ▲ ▲ ▲ ▲ ▲ Niederhagen { Alice ; Bob } ’s = { Bob ; Alice } ’s { Alice ; Bob } ’s redendaal = shared secret shared secret shared secret abP baP abP bada55.cr.yp.to Security depends on choice of E .

  5. � � � � � � � � � � � Textbook key exchange Our partner Jerry’s choice of E; P rds: using standard point P black hat on a standard elliptic curve E : Alice’s Bob’s Alice’s Bob’s secret key a secret key b secret key a secret k Chuengsatiansup Alice’s Bob’s Alice’s Bob’s public key public key public key public aP bP aP bP ▲ ▲ � rrrrrrr ▲ � rrrrrrr ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ { Alice ; Bob } ’s = { Bob ; Alice } ’s { Alice ; Bob } ’s = { Bob ; Alice shared secret shared secret shared secret shared sec abP baP abP baP Security depends on choice of E .

  6. � � � � � � � � � � � � Textbook key exchange Our partner Jerry’s choice of E; P using standard point P on a standard elliptic curve E : Alice’s Bob’s Alice’s Bob’s secret key a secret key b secret key a secret key b Alice’s Bob’s Alice’s Bob’s public key public key public key public key aP bP aP bP ▲ ▲ � rrrrrrr ▲ � rrrrrrr ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ { Alice ; Bob } ’s = { Bob ; Alice } ’s { Alice ; Bob } ’s = { Bob ; Alice } ’s shared secret shared secret shared secret shared secret abP baP abP baP Security depends on choice of E .

  7. � � � � � � � � � � � � Textbook key exchange Our partner Jerry’s choice of E; P using standard point P on a standard elliptic curve E : Alice’s Bob’s Alice’s Bob’s secret key a secret key b secret key a secret key b Alice’s Bob’s Alice’s Bob’s public key public key public key public key aP bP aP bP ▲ ▲ � rrrrrrr ▲ � rrrrrrr ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ { Alice ; Bob } ’s = { Bob ; Alice } ’s { Alice ; Bob } ’s = { Bob ; Alice } ’s shared secret shared secret shared secret shared secret abP baP abP baP Security depends on choice of E . Can we exploit this picture?

  8. � � � � � � � � � � � ok key exchange Our partner Jerry’s Exploitabilit choice of E; P standard point P public criteria standard elliptic curve E : Alice’s Bob’s Alice’s Bob’s secret key a secret key b secret key a secret key b Alice’s Bob’s Alice’s Bob’s public key public key public key public key aP bP aP bP ▲ ▲ � rrrrrrr ▲ � rrrrrrr ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ; Bob } ’s = { Bob ; Alice } ’s { Alice ; Bob } ’s = { Bob ; Alice } ’s red secret shared secret shared secret shared secret bP baP abP baP Security depends on choice of E . Can we exploit this picture?

  9. � � � � � � � � � � exchange Our partner Jerry’s Exploitability depends choice of E; P oint P public criteria for accepting elliptic curve E : Bob’s Alice’s Bob’s secret key b secret key a secret key b Bob’s Alice’s Bob’s public key public key public key bP aP bP ▲ rrrr � rrrrrrr ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ ▲ = { Bob ; Alice } ’s { Alice ; Bob } ’s = { Bob ; Alice } ’s shared secret shared secret shared secret baP abP baP ends on choice of E . Can we exploit this picture?

  10. � � � � � � � � Our partner Jerry’s Exploitability depends on choice of E; P public criteria for accepting E curve E : Bob’s Alice’s Bob’s key b secret key a secret key b Bob’s Alice’s Bob’s public key public key public key P aP bP ▲ � rrrrrrr ▲ ▲ ▲ ▲ ▲ ▲ Alice } ’s { Alice ; Bob } ’s = { Bob ; Alice } ’s secret shared secret shared secret aP abP baP choice of E . Can we exploit this picture?

  11. � � � � � � � Our partner Jerry’s Exploitability depends on choice of E; P public criteria for accepting E; P . Alice’s Bob’s secret key a secret key b Alice’s Bob’s public key public key aP bP ▲ � rrrrrrr ▲ ▲ ▲ ▲ ▲ ▲ { Alice ; Bob } ’s = { Bob ; Alice } ’s shared secret shared secret abP baP Can we exploit this picture?

  12. � � � � � � � Our partner Jerry’s Exploitability depends on choice of E; P public criteria for accepting E; P . Extensive ECC literature: Alice’s Bob’s Pollard rho breaks small E , secret key a secret key b Pohlig–Hellman breaks most E , MOV/FR breaks some E , SmartASS breaks some E , etc. Alice’s Bob’s public key public key Assume that public will accept aP bP ▲ � rrrrrrr ▲ ▲ ▲ any E not publicly broken. ▲ ▲ ▲ { Alice ; Bob } ’s = { Bob ; Alice } ’s shared secret shared secret abP baP Can we exploit this picture?

  13. � � � � � � � Our partner Jerry’s Exploitability depends on choice of E; P public criteria for accepting E; P . Extensive ECC literature: Alice’s Bob’s Pollard rho breaks small E , secret key a secret key b Pohlig–Hellman breaks most E , MOV/FR breaks some E , SmartASS breaks some E , etc. Alice’s Bob’s public key public key Assume that public will accept aP bP ▲ � rrrrrrr ▲ ▲ ▲ any E not publicly broken. ▲ ▲ ▲ { Alice ; Bob } ’s = { Bob ; Alice } ’s Assume that we’ve figured out shared secret shared secret how to break another curve E . abP baP Can we exploit this picture?

  14. � � � � � � � Our partner Jerry’s Exploitability depends on choice of E; P public criteria for accepting E; P . Extensive ECC literature: Alice’s Bob’s Pollard rho breaks small E , secret key a secret key b Pohlig–Hellman breaks most E , MOV/FR breaks some E , SmartASS breaks some E , etc. Alice’s Bob’s public key public key Assume that public will accept aP bP ▲ � rrrrrrr ▲ ▲ ▲ any E not publicly broken. ▲ ▲ ▲ { Alice ; Bob } ’s = { Bob ; Alice } ’s Assume that we’ve figured out shared secret shared secret how to break another curve E . abP baP Jerry standardizes this curve. Can we exploit this picture? Alice and Bob use it.

  15. � � � � � � Our partner Jerry’s Exploitability depends on Is first assumption choice of E; P public criteria for accepting E; P . Would the Extensive ECC literature: any curve Alice’s Bob’s Pollard rho breaks small E , that survives secret key a secret key b Pohlig–Hellman breaks most E , MOV/FR breaks some E , SmartASS breaks some E , etc. Alice’s Bob’s public key public key Assume that public will accept aP bP ▲ � rrrrrrr ▲ ▲ ▲ any E not publicly broken. ▲ ▲ ▲ ; Bob } ’s = { Bob ; Alice } ’s Assume that we’ve figured out red secret shared secret how to break another curve E . bP baP Jerry standardizes this curve. e exploit this picture? Alice and Bob use it.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend