6.857 Computer and Network Security Lecture 17 Today: CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits) IBE (identity-based encryption) 3-way key agreement 1
6.857 Computer and Network Security Lecture 17
Today:
CDH, DDH, gap groups Bilinear maps (DDH easy) Digital signatures (160 bits) IBE (identity-based encryption) 3-way key agreement
1
- -i. — —, - — — 4- — -
__________
L..j9,a
H Z!-& ;fc
r PthKhcIsA :- tn£—- ‘r. --j-t
‘ -•
!—--t
- - I - ;-- + —
(Noc #Lt CtM ics’j ) DDhI e.y)
.ih a;$.c,. n. 4rfceW, ,e%çtr DtM (“easy)
0a CU\-I (“k” 6t*
-- t-- -
— Can ant CDflLtfl4Lf a 3G
4p40WS -
I r II —
-f-- — -t -j- - -
-‘ r + 2 - - -, - —
i -I4 I —
-
- r r-
t — rj-- t——- -t----
i. I{L1fr1.r+ --
—- i - (.1
L__ —-— —— [ 4 4
:—t-’-—t -it—Tr tr-
- I-L--tI’+4 4
-
. -—-+I
4: -
- I I1.L---.--I :J- I
-1u41j -- -
2
nS-‘
N.—
tx-ta—
(NJ(1
‘S
s.D$
__
_
y‘I
C
—I
2cJ
‘3.4i0.
-D
u)0)
‘C
IFE
‘.4
:3—e
3
oric.
L1t3
£ tQt ,en.r&r01
* )( icnp ofpnseeonkr t’
______
[we. US lf.ydk4confor ti roups]
- 4ndi4,crt exth a (6;hneor mmp
5uc1 4t
___
*
_
r
/
0 0 •
They k4tt- an enormous é. appI...tcfrbns.
We & ;,%ã ; eff
M4pS.
te,’6• Thflann#ec Q1D44M
41 p
44hw
sea
(ct
e =C °
qlso cJJecl LI?aLri $i&Thns
4
H•.“
iL
i.’
fl_
1•
I-
c-s.
.*
.H
’3
=.
-‘
.-
VI
I.
-._cJ
fl.
-f
1
-‘
h’”
a”’
-
—to
H-o
3:—..
..
--
-C)
4‘
-_;
-.‘
-
÷E
‘.!)--
-‘-‘
r-t
‘.9e
HS
--‘
,_•i_
_I
.-
H.—
‘-°
,,
-.
cc)P
6—
-C
-.
&-,
--
--
‘C
-,
qj.-:
.-
..-,
4—
•
H••
-j
‘
;.L
ac.
-.
I
——
——
.--
5
‘S.S
=V
it—.
—a.
4.
4?
‘Sa
•-t
‘—
:.
,W.
qi’.
S
0-iir
RIC
U’.
66
-p
-
r’6’
-Z•
7’1
-g
u’*
--rn
se
I’-C
4-0
-3
-6x
E*
.-,w*
Itra4
(t*
0ca
4I4r°--
•Si
ii.-.
‘44
•a
-‘
-t6
4’:
42
’-!
_r
0I)
C,f.
Ccc
--
..•r
dt
—‘
-
•)
I•
4
.4
.-
•-.-—
•1•
—.•--—
—.—
—-•.-
•••
6
—-.. .— .‘... ..--. —.... - aS... ô.’.., - - ....-I. ..I_ Id
____________ __
- —
- LI.G- - - - - - - - -
14 Di-. — —---
-
-
14
__
4-
-
6 -
-. mesu,s4t,
4-4-1--,---
-
Q(x9.
R W’ey: {(j,,& - --
fI. LL-L*1-“
r ,
- Let vn:H(M”V r
*Outpu+ rrç(M’ = m” LI- - -
‘t€ni- .
“ SS±4s e() .Lt(y1m) s.ftm;H(M,t L- L -
-:CAStS -±.
1DJIJ 4,t4nt --
hruj4*4ek9 npicsstt4LLJn6’
s;,, zz,
Y çj H —4—t---H—---’- H-----—-
-
7
r—
-—1-t—r-----
-c—.
a14—i————‘-+‘—Ii
I--—
—__I_—
I——_—-——
III
44--—--—----t——-4—fr-——-r-4--_-_-_,*
—
IFrLLrJ
HFEJz(‘‘
bU);--IL—4--4_-4Lt
LI 1j_t-,_
-
H4t_trqJ._‘i-—
ttfl:
U
HJJ
r
8
ri—
1
1---
-+-
t—.±
.1
.
r-
4],
1-
.4..,
1’I
.
..
-H
I-
-
‘I 3
•
.
-U
@fi
®?
rn.
9,
•q
3Zm
f,
0.
—..
s_-s
-$S
tft
it
3-S
——
b
—‘?
-n•‘
•;
:t.
__
fl%
__
•.
•,—z•
—3
%‘‘
-n4%
—----
,
I:2
.4
ft
—I I
r.
•0
‘S
e
-2 I
4!
9
1rn i’
.
!‘
-i------
4’
:4
.
H!’
.-
£
H4
r’%
LL
L-
‘—
-,
-L
--—
-__J
!t
rP
Htr.E
¶!.
c-
çp
,if
:C
D&‘
:4’
SI
crn
ag
3’3
z-r
3-—
----
o‘-
D-
‘-
zL
3-S
”6c7
(1
*-
C’
-f-
(bL
‘—
“.
--F
a-
--
.V
’3
-I
t’
.._
Sft
mZi
(t
a
;*
--tg
“
n—4--
[-
-‘e--
Fr
a-
‘—-.
....
..—
—-
--—
4;
:I
‘
-
-—
;,
mm
-
.-r-t--i-*
-*Z
-t
-%
.-a
•T
4_I
i‘-
a’‘—
1”
‘—
‘-
-a
7j
-
‘%
t9
4--b
--
r-
A)I
-0
,
: HL*
*J*
Zt
-4 I I
r i I ii I 5 jr
I
4 I I
10
n I’t -
t
1c
(1
r‘—
‘H
30
%_
%._
L)
‘3
‘I ‘A -o
‘I’ ‘U V C ci-)
C •1 -C C
e— en
3.:
3
-e
g3
ii
at
JC 0
“W
nVN
p-o
GN
GN
3-)
-
‘it
C
7Th-
iIC
U U ‘3’C
D
F 0\
(Y’
I—
t r -4 I C.. 0
CN “C
‘I
, OH
I1
C,
_—
I,II
1-9 tic
3! <rf
‘5
’-’-
T
7
I)
(-9 5 K.
-t
11
MIT OpenCourseWarehttp://ocw.mit.edu
6.857 Network and Computer SecuritySpring 2014
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.