Signcryption --- The Road to an International Standard
Yuliang Zheng
University of North Carolina at Charlotte yzheng@uncc.edu July 31, 2013
Signcryption --- The Road to an International Standard Yuliang - - PowerPoint PPT Presentation
Signcryption --- The Road to an International Standard Yuliang Zheng University of North Carolina at Charlotte yzheng@uncc.edu July 31, 2013 Objectives of Cyber Security Confiden Integrity -tiality Availability 1 Goals of Cryptography:
Signcryption --- The Road to an International Standard
Yuliang Zheng
University of North Carolina at Charlotte yzheng@uncc.edu July 31, 2013
Objectives of Cyber Security
Integrity Availability Confiden
Goals of Cryptography: C + I
– Symmetric/private key encryption – Asymmetric/public key encryption
– Trusted parties --- symmetric/private key authentication – Untrusted parties --- asymmetric/public key authentication (digital signature, unforgeability)
– Less computation (over large integers) – Smaller expansion in length (= less communication overhead) – Especially important for smartphones & portable devices w/ limited battery life
Integrity Availability Confiden
In the Paper & Ink World: Signature followed by Seal
To achieve: authenticity (unforgeability & non-repudiation) To achieve: confidentiality
3– Alice the sender signs a message m using her secret key, i.e. creating sig on m.
– Alice encrypts (m,sig) using AES with a random key k. – Alice encrypts k using Bob’s public key.
4In the Digital World: Digital Signature followed by Encryption
4/65m sig m sig k m
mod exp mod exp
Public Key Encryption
E
Plain Text Cipher Text Cipher Text
D
Plain Text
Alice Bob
Secret Key (for decryption)
Open Network
Bob’s Public Key (for encryption)
Public Key Directory
5Public Key Digital Signature
S Message V Message
H 256 bitsBob
Secret Signing Key +
HCathy
Signature Accept if satisfied 1-way hash Signature Public Key signature generation algorithm
256 bitssignature verification algorithm
Open Network
Bob’s Public Verification Key
Public Key Directory
6Public Key Encryption
– RSA encryption – Rabin
– Diffie-Hellman – ElGamal encryption – Elliptic curve versions
– NTRU encryption
Digital Signature
– RSA signature
– ElGamal signature – DSA (US standard) – Schnorr – Elliptic curve versions
– NTRU signature
Notable Public Key Techniques
7Signature-then-Encryption
(based on Discrete Logarithm)
encrypted using a private key cipher with k used by the receiver to reconstruct k
m sig gx
communication overhead EXP=3+2.17
8Cost of Signature-then-Encryption
Cost Schemes Comp Cost (No. of exp) Comm Overhead (bits) RSA based sig-then-enc 2 + 2 |na| + |nb| DL based Schnorr sig + ElGamal enc 3 + 2.17 (3 + 3) |hash| + |q| + |p|
Both techniques require very high overhead! (your smartphone's battery runs out fast!)
9Improving Efficiency
encryption” ?
– For resource-constrained applications
– Coded modulation in communications (= error correcting codes + modulation)
Error Corr (Encoder) Modulation Error Corr (Decoder) Security (Authen) Security
(Decryptor)
Security (Authen) Security
(Encryptor)
Source Decoder Source Encoder
Communications System
Demodulation
Channel
11Coded Modulation
Coded Modulation (encoder) Coded Modulation (decoder) Security (Authen) Security
(Decryptor)
Security (Authen) Security
(Encryptor)
Source Decoder Source Encoder
Channel
Co-Design of Digital Signature and Public Key Encryption ?
? ?
Security (Authen) Security
(Decryptor)
Security (Authen) Security
(Encryptor)
Source Decoder Source Encoder
Channel
Coded Modulation (encoder) Coded Modulation (decoder)
13Goal: Signcryption (1996 @ Monash)
– confidentiality – authenticity
Cost (signcryption) << Cost (signature) + Cost (encryption)
14– p : a large prime – q : a large prime factor of p-1 – g : 0<g<p & with
– Two 1-way hash functions:
– (E,D) : private-key encryption & decryption algorithms, with 256-bit keys
– Private key: 𝒚𝒃 ∈𝑺 𝒂𝒓 – Public key: 𝒛𝒃 = 𝒉𝒚𝒃 𝐧𝐩𝐞 𝒒
Signcryption -- Public & Private Parameters
– Private key: 𝒚𝒄 ∈𝑺 𝒂𝒓 – Public key: 𝒛𝒄 = 𝒉𝒚𝒄 𝐧𝐩𝐞 𝒒
15then start over again
𝒚 𝒔+𝒚𝒃 𝐧𝐩𝐞 𝒓
Signcryption by Alice: 𝒏 ⟹ (𝒅, 𝒔, 𝒕) Unsigncryption by Bob: (𝒅, 𝒔, 𝒕) ⟹ 𝒏
𝑼 = 𝒛𝒃 ∙ 𝒉𝒔 𝒕∙𝒚𝒄 𝐧𝐩𝐞 𝒒
indicate ERROR
Signcryption Algorithm
16Signcryption: Savings in Computation
1000 2000 3000 4000 5000 6000 7000 8000 1024 2048 4096 8190
RSA sign-enc Schnorr + ELGamal DL Signcryption
|p|=|n| Computational Cost (# of multiplications, the smaller the better)
17Signcryption: Savings in Communication
Communication Overhead (# of bits, the smaller the better) 5000 10000 15000 20000 25000 1024 2048 4096 8190
RSA sign-enc Schnorr + ElGamal DL Signcryption
18Signcryption as a “Magic” Envelope
The End Result
Kill two birds with one stone
20Security Model & Proofs
Joonsang Baek & Ron Steinfeld
– 1st security model – 1st mathematical proofs
21Joonsang Ron
Applications of Signcryption
then-encrypting”
– Smartphones & other battery powered devices
Further Developments
– Multi-recipients, proxy, blind, threshold, ring, ID based, certificateless, ……
– Co-design of shared key authentication and encryption
Typical Cycle of Research
Find problem Secure funds Solve problem Publish papers
24Add Commercialization
Find problem Secure funds Solve problem Publish papers Start-up company Apply for patents Standardize (Int'l / Nat.)
25Commercialization of Signcryption
Start-up company Apply for patents Standardize
26– Applied in 1996 – Received both in Australia and USA
Signcryption Patents
Transfer of Patent Rights
– Sold to
– Established by ex-Microsoft executive Nathan Myhrvold – One of the top 5 patent holders in the US
28Signcryption Standards
Standardization Organization --- started to look into establishing uniform standard for various signcryption techniques
– Accepted invitation to help the standard
Start-up company Apply for patents Standardize
29ISO Standardization Process
“Information technology— Security techniques—Signcryption”
– JTC1, SC 27, WG 2 – 2006, proposal to standardize signcryption – Proposal approved in Spring 2008 – Project #29150 started at ISO Kyoto meeting, April 2008 – Completed at the end of 2011 (after 4 years work)
30– 1 country 1 vote
not adequate
– Need to be transformed into robust techniques for real-world use
twice a year
discussions/telemeetings
ISO Process
31Personal experience
– Time commitments – Funding for travelling to meetings – Skills to work with delegates from various countries – Understanding important non-technical aspects
– Help industrial experts include best-of-breed crypto techniques into int'l standards – Turn "textbook" algorithms into industrial standards – Identify problems of practical importance which tend to be ignored in academic research
– Urge you to consider participation
32signcryption.org
34techniques
– Funds, key persons, time
– Too theoretical (no use in 10 years), minor improvement, strong dependency on other patents, no funds – We all stand on others' shoulders! --- Not patenting is equally honorable!
What Should/Can be Commercialized
http://www.victorialouiserabin.com/ 35