10 vistas

Título original: ssl ile yardımcı

Cargado por Emrah Göksülük

- Acrobat Livecycle Security Wp
- DJSA Symmetric Key Algorithm
- 27.pdf
- Pki_Xu
- Data Access Control Schemes in Cloud Computing: A Review
- Kyle_Dhillon.pdf
- r05 Racf Digital Certificate
- Implementation and Analysis of Bootstrapping Protocol Using Public Key Cryptography in Wsn
- bt88
- PGP
- Modern Cryptography
- 1.pdf
- Zz e Banking
- Key-Aggregate Cryptosystem for Scalable.docx
- Cryptography.doc
- An elliptic curve cryptography based authentication and key agreement protocol for wireless communication
- Research Paper on Cyber Security & Cryptography
- Database Encryption in Oracle 9i
- Network Security – Kerberos
- blabalab

Está en la página 1de 4

1. Cryptography The cryptography is one of information science, whose purpose is to achieve confidentiality, integrity, and availability. from an outside. Confidentiality is to protect privacy Integrity is to guarantee the data consistency through the

process for sending, receiving, compressing, or decompressing data, etc. Availability is to let any data be available even after the process for sending, receiving, compressing, or decompressing data, etc. in the case of necessity. which is the hardest part of cryptology. The cryptography has to achieve efficiency and security as well as these properties, Thus, we often use some assumptions A problem is called such as the computational difficulty to overcome this problem. adversary.

the computationally secure when it cannot be solved by the polynomial-time On the other hand, a problem is called the unconditional security when it cannot be solved by any adversary. In order to achieve properties of cryptology, the information theory was introduced in 1949. The information theory focuses on the unconditional security On the other hand, both the computational theory The most by sacrificing the efficiency.

and the number theory are introduced to achieve these properties of cryptology. They can realize the efficiency by assuming the computational security. the public key cryptosystem. be widely and practically used. In summary, the cryptology has absorbed various fields such as the information theory, the number theory, and the computational theory and has been developed. In a sense, the cryptology is, so called, the synthetic science. important invention, which uses both the computational and the number theory, was After the concept of public key cryptosystem was proposed by Diffie and Hellman in 1976, the cryptology has dramatically changed to

2. Why the cryptology has been dramatically changed by the public key cryptosystem? Before explaining the public key cryptosystem in detail, let me explain the secret key cryptosystem, which had been only a typical cryptosystem before the public key cryptosystem was proposed and has been still a key technology of cryptology together with the public key cryptosystem. encryption key is equal to a decryption key. should be kept secretly. In the secret key cryptosystem, an So, an encryption (decryption) key In

secret key and the cryptosystem itself is called the secret key cryptosystem. communicate a receiver. communicate N senders.

the secret key cryptosystem, each sender should use each different key to Therefore, a receiver has to keep N keys secretly to To make matter worse, both entities of a receiver and a How So, the secret-key

sender need to share a key secretly before starting a secure communication. can we share a key secretly through the open internet? cryptosystem has serious drawbacks of key management and agreement.

On the other hand, the public key cryptosystem resolves problems of key management and agreement in the secret key cryptosystem. cryptosystem, an encryption key is not equal to a decryption key. key can be published and, thus, is called a public key. In the public key So, an encryption In the

decryption key should be kept secretly and, thus, is called a secret key. public key cryptosystem, for N senders, 1 key is enough to decrypt. secret key without any secret communication beforehand. management and agreement. 3. Principle of public key cryptosystem Let us explain the principle of the public-key cryptosystem.

public key cryptosystem, a user can communicate with anyone by just keeping 1 Thus, the public key cryptosystem has a big advantage over the secret key cryptosystem in key

key cryptosystem consists of the computational theory and the number theory. We have seen that a public key is different from a secret key. is vulnerable. secret key can be easily solved from its corresponding public key, then the system Therefore, we have to set the problem of finding a secret key from

On the other hand, both decryption and encryption Thus, the public key cryptosystem has to Up to now, four problems have come into

practical use, the integer factorization (IF), the discrete logarithm problem over a finite field (DLP), and the elliptic curve discrete logarithm problem (ECDLP), where an elliptic curve is a non-degenerate cubic curve. in the number theory. 4. One application based on a public-key cryptosystem SSL (Secure Socket Layer) is widely used through Internet when we have to keep a transaction secret such as an electronic shopping. SSL to explain how a public key cryptosystem is used. In a typical web browser, an The form of a key indicates In the icon in the form of a key at the bottom indicates our use of SSL. Let me pick out that a server has prepared a public key on its web server beforehand. These are all difficult problems

beginning of SSL, the handshake protocol is done between a client and a server. Then, a client takes the public key through internet, encrypts a random number K by the public key, and sends a ciphertext to the server, where K will be used for data encryption later. key to obtain K. with K will start. Then, the server decrypts the ciphertext by its own secret After they Then, both a client and a server can share the key K.

succeed to share a key, the secure communication by a secret key cryptosystem A noteworthy advantage of SSL is that the client does not have to provide her/his own public key. 6. Comparison between IF, DLP, and ECDLP We have already seen the security of the public-key cryptosystem is based on something difficult problems in the number theory, which are typically IF, DLP, and ECDLP. Here let us compare between IF, DLP, and

ECDLP from the point of view of the strongest attack. The key size is determined in such a way that it assures the security against the strongest attack, while the efficiency mainly depends on the key size. sub-exponential time O(exp{(loglog p*log p) Both DLP and IF are solved in the

1/2

1/2

corresponds to a finite field with p elements Fp in DLP. ECDLP is solved only in the exhausted algorithm O(p

almost the same security level as IF or DLP with the key size of 1024 bits and, thus, ECDLP is more efficient than DLP and IF with the same security level. 7. A new primitive using a pairing and its related open problems Here we show another mathematical tool of a pairing over an elliptic curve briefly, which was introduced to cryptology in 1991. An elliptic curve over a finite field is a They are A pairing is called a finite abelian group, on which the Weil or Tate pairing is defined. pairings that satisfy bilinearity and non-degeneracy. and non-degeneracy.

cryptographic pairing if a pairing satisfies the computability as well as bilinearity The pairings connect ECDLP and DLP and have solved some Thus, problems of cryptology by using a powerful tool of bilinearity so far. attention. However, it is not easy to find an elliptic curve that has a cryptographic pairing. Theoretically, there exists a pairing with bilinearity and non-degeneracy, however, it does not necessarily satisfy the computability. In fact, it is known that the computation time of pairing is greater than the logarithm of the key size p of elliptic curve E/Fp. This is why it is not easy to find an elliptic curve with a cryptographic pairing. Up to now, only three algorithms of Miyaji-Nakabayashi-Takano (MNT), Barreto-Naehrig (BN), and Freeman have been proposed. So we need another efficient algorithm to find an elliptic curve with a cryptographic pairing. This is one of the open problems related on the cryptographic pairing. 9. Conclusion The cryptology has been widely used as a necessary technology to achieve an electronic market, an electronic government, etc. The cryptology is a synthetic We science and has dramatically changed by introducing various fields such as the information theory, the computational theory, and the number theory. fields. believe, from now on, cryptology will solve open problems by introducing various

- Acrobat Livecycle Security WpCargado porMau Tau
- DJSA Symmetric Key AlgorithmCargado porchethan
- 27.pdfCargado porInternational Journal of Scientific Research in Science, Engineering and Technology ( IJSRSET )
- Pki_XuCargado porLe Nhi
- Data Access Control Schemes in Cloud Computing: A ReviewCargado porIRJET Journal
- Kyle_Dhillon.pdfCargado porLindsey Robinson
- r05 Racf Digital CertificateCargado porryangangitano
- Implementation and Analysis of Bootstrapping Protocol Using Public Key Cryptography in WsnCargado porInternational Journal of Research in Engineering and Technology
- bt88Cargado porKrish Jaiswal
- PGPCargado porfatada1478
- Modern CryptographyCargado porAnonymous yojPLkR
- 1.pdfCargado poriaetsdiaetsd
- Zz e BankingCargado porVenkat Ram
- Key-Aggregate Cryptosystem for Scalable.docxCargado porArunKumar
- Cryptography.docCargado porgerosuarezyahoo
- An elliptic curve cryptography based authentication and key agreement protocol for wireless communicationCargado porl3giune
- Research Paper on Cyber Security & CryptographyCargado porInternational Journal of Innovative Science and Research Technology
- Database Encryption in Oracle 9iCargado porwww.jaganguys.com
- Network Security – KerberosCargado porebinVettuchirayil
- blabalabCargado porSienaert
- PGPCargado porRahul Singh
- CryptographyCargado porSandeep Negi
- ch10Cargado porcrazz1
- IRJET-Colour Based CryptographyCargado porIRJET Journal
- Jntuk mtech CSE syllabusCargado porkiranmai27
- pkcs-7Cargado portranchihuu
- SC Magazine evaluating VME2000Cargado porMeganet Corporation
- Discrete Maths 2002 Lecture 35 3 Slides PpCargado porapi-26021617
- I Tech ACT2000-NotesCargado porkamaruddinkr964
- Ccna Sec v1.1 Chap 7Cargado porBearto Bear

- passfile.txtCargado porDaniel Smk
- Cryptography slidesCargado pordeepalisharma
- Vivotek Security Hardening Guide v01Cargado poryormaiden
- Workshop Book 2018Cargado porMsik Mssi
- Comparison of PCI DSS and ISO IEC 27001 Standards Joa Eng 0116Cargado porpenumudi233
- CHFI v8 Module 15 Log Capturing and Event Correlation.pdfCargado porBob Polo
- pec.txtCargado porAshley Winchester
- Steganography ch-2Cargado porNimish Mittal
- Aujas - Company OverviewCargado porkborah
- Ethical Hacking.pdfCargado porGautham Ganesan
- WP_10BestPracticesCargado porajaycasper
- 09 Auth Session MgmtCargado porThanh Hương
- Privacy and Anonymity Techniques TodayCargado porAdrian
- List of Threats and VulnerabilitiesCargado porrizwanharun
- Final Project - Penetration TestingCargado porArif Zina
- SY0-501-demoCargado porujh
- Cybercrime and SecurityCargado porMandeep Batra
- Security MeasuresCargado porAdarsh Agarwal
- 7.Fog Computing Mitigating Insider Data Theft Attacks in the Cloud.pdfCargado porp
- Bedep TrojanCargado porgoputs6386
- Chapter 7Cargado porZuko
- Unix SecurityCargado porCharles Raj
- Audit Free CloudCargado porKishore Kumar RaviChandran
- Wp Topten Database ThreatsCargado porVladimir Carter
- COBITCargado pordahanpinus
- Criminal Justice Reference: 189568Cargado porDOJ
- Confidentiality PHI SOP01Cargado porOmbo Junior
- sap_security_tutorial.pdfCargado porraamaaswetha
- Owp Security Advanced Security 11gr 133411Cargado porDinesh Kumar
- FirewallCargado porNilesh Kshirsagar