Identity Based  Cryptography

1 / 15

# Identity Based  Cryptography - PowerPoint PPT Presentation

Identity Based  Cryptography. James Higdon, Sameer Sherwani CpSc 624/424. Overview. Type of encryption mechanisms Types of encryptions Basic Identity based encryption Advantages Disadvantages Applications. Encryption.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

## PowerPoint Slideshow about 'Identity Based  Cryptography' - jillian-bernard

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

Identity Based

Cryptography

James Higdon, Sameer Sherwani

CpSc 624/424

Overview
• Type of encryption mechanisms
• Types of encryptions
• Basic Identity based encryption
• Applications
Encryption

- process of transforming information(plaintext) using a cipher (algorithm) to ciphertext.

Types of cryptographic mechanisms
•  Key Authentication
• One way hash functions: MD5, SHA
• Digital signatures: Verify user: DSA
•  Key exchange
•  key distribution: Diffi-Hellman
•  Key generation
•  Block Ciphers: DES/AES; ATM, passwords
Types of keys(ciphers)
• Symmetric keys
• Identity-based asymmetric keys
•  Common public-key Algorithms
• ( RSA, Elliptic curve, Discrete logarithm based)
•  Explain difference between traditional and Identity based asymmetric keys
Identity based Encryption(IBE)

The major differences between an identity-based

system and a traditional system are

•  How to authenticate the key
•  How to distribute the key
•  How to use the key
Identity based Encryption(IBE)
• A public-key encryption system in which an arbitrary string can be used as the public key.
• Any personal information:
• Any terms and conditions, such as a time etc
• Developed by Adi Shamir in 1984
• However, the encryption schemes were not fully used or created until 2001.
How it works
• Private Keys are generated by a third party Private Key Generator (PKG)
• PKG publishes a public master key and retains the private master key
• With the correct ID, users can contact the PKG to obtain the private key
• This way, messages may be encrypted without a prior distribution of keys between individuals

Reduces the complexity of the encryption process

• No certificates needed. A recipient's public key is derived from his identity.
• No pre-enrollment required.
• Keys expire, so they don't need to be revoked. In a traditional public-key system, keys must be revoked if compromised.
• Less vulnerable to spam.
• Enables postdating of messages for future decryption.
• Enables automatic expiration, rendering messages unreadable after a certain date.