360 likes | 510 Views
Enhancing Crypto-Primitives with Techniques from Coding Theory NATO Advanced Research Workshop 6-9 Oct. 2008, Veliko Tarnovo, Bulgaria. Coded Modulation and the Arrival of Signcryption. Yuliang Zheng University of North Carolina at Charlotte yzheng@uncc.edu. Outline.
E N D
Enhancing Crypto-Primitives with Techniques from Coding Theory NATO Advanced Research Workshop6-9 Oct. 2008, Veliko Tarnovo, Bulgaria Coded Modulation and the Arrival of Signcryption Yuliang Zheng University of North Carolina at Charlotte yzheng@uncc.edu
Outline • Exposure to coded modulation • Motivations • Signcryption • Look into the future
Communications system Source Encoder Security (Authen) Security (Encryptor) Error Corr (Encoder) Modulation Channel Source Decoder Security (Authen) Security (Decryptor) Error Corr (Decoder) Demodulation
Prof. Hideki Imai’s Lab,in the late 80’s Source Encoder Security (Authen) Security (Encryptor) Error Corr (Encoder) Modulation Channel Source Decoder Security (Authen) Security (Decryptor) Error Corr (Decoder) Demodulation
Coded modulation--- one of the hottest in 80’s Source Encoder Security (Authen) Security (Encryptor) Error Correcting (encoder) + Modulation Channel Source Decoder Security (Authen) Security (Decryptor) Error Correcting (decoder) + Demodulation
Coded modulation • Combination/Co-design of • error-correcting codes • Multi-level modulation • 2 types • Trellis-coded modulation (TCM) • Gottfried Ungerboeck, • Proposed in1975; Published in IEEE Trans on IT in 1982 • Block-coded modulation (BCM) • Hideki Imai and Shuji Hirakawa • Published in IEEE Trans on IT in 1976
Goals of coded modulation • To transmit data • as fast as possible, and • as reliable (little errors) as possible • To achieve Shannon’s capacity limit:C = B log2(1+S/N) • C: channel capacity (bps) (= max. data transmission rate without error) • B: channel bandwidth (Hz) • S: power of signal (W) • N: power of noise (W)
Challenges • Modulation • Transmission rate can be increased by • Increase the number of waveforms (constellation points) for modulation • However, an enlarged waveform set will also decrease “spacing” between waveforms, resulting in larger chances of errors at receiver • Error-correcting codes • Increasing error-correcting capabilities requires appending more parity bits/symbols, whereby reducing effective transmission rate
Address the challenges • Co-design/integrate multi-level modulation and convolutional error-correcting code • Assign waveforms to code words in such a way that maximizesEuclideandistance between the waveforms that are the most likely to be confused
The end result • Increase transmission rate • while at the same time, reduce errors at receiver • KILL 2 BIRDS IN 1 STONE Error Corr (encoder) Modulation Trellis coded modulation
Musing on coded modulation • ½ dozen of my fellow PhD students working on coded modulation • Doing Imai Lab’s ritual for 5 years • weekly, long group seminars with students working on a vast array of different projects • Applicable to cryptography ? • Continue to muse after moving to Down Under
Major goals of cryptography • Authenticity • Trusted parties --- symmetric/private key authentication • Untrusted parties --- asymmetric/public key authentication (digital signature, unforgeability) • Confidentiality • Symmetric/private key encryption • Asymmetric/public key encryption • Reduce cost/overhead • Computation (over large integers) • Expansion in length (=communication overhead)
In the paper & ink world:Signature-then-Seal To achieve: authenticity(unforgeability & non-repudiation) To achieve: confidentiality
m sig In the digital world:Signature-then-Encryption • 1. Add Signature • Alice signs a message m using her secret key, i.e. creating sig on m. • 2. Do Encryption • Alice encrypts (m,sig) using AES with k. • Alice creates another data so that Bob can recover k. (Typically, Alice encrypts k using Bob’s public key). m mod exp mod exp m sig k 15/65
Signature-then-Encryption(based on Discrete Logarithm) EXP=3+2.17 encrypted using a private key cipher with k m sig gx used by the receiver to reconstruct k communication overhead
Questions on Efficiency • Can we do better than “signature followed by encryption” ? • For resource-constrained applications • Wireless mobile devices • Smart card applications • Can we learn from other disciplines such as • Communication engineering • Imai-Hirakawa block coded modulation • Ungerboeck trellis coded modulation
Co-design of digital signature and public key encryption ? ? Source Encoder Security (Authen) Security (Encryptor) Error Correcting (encoder) + Modulation Channel ? Source Decoder Security (Authen) Security (Decryptor) Error Correcting (decoder) + Demodulation
Goal: Signcryption (1996) • To achieve both • confidentiality, • authenticity • unforgeability & • non-repudiation • With a significantly smallercomp. & comm. CostCost (signcryption) << Cost (signature) + Cost (encryption)
How to co-design • Focus on discrete logarithm (DL) based schemes: • ElGamal type public key encryption • DSS/Schnorr type digital signature • Notice both use an “ephemeral public key”: gx • Let them share the same ephemeral public key ! • Hide it, as long as it can be recovered by the recipient !
Signcryption -- public & secret parameters • Public to all • p : a large prime • q : a large prime factor of p-1 • g : 0<g<p & with order q mod p • Two 1-way hash functions: • G: {0,1}*→ {0,1}L • H: {0,1}* → Zq • (E,D) : private-key encryption & decryption algorithms • Alice’s keys • : secret key • : public key • Bob’s keys • : secret key • : public key
Signcryption and Unsigncryption m (c, r, s) (c, r, s) m • Unsigncryption by Bob • Compute • k=G(T) • m=Dk(c) • Check if r = H(m, ya, yb, T) • Output m if yes, and Reject otherwise • Signcryption by Alice • x ← {1,…,q-1}at random • T = ybx mod p • r = H(m, ya, yb, T) • s = x/(r+xa) mod q • k=G(T) • c=Ek(m) • Output (c, r, s)
Cost ofSigncryption(based on Discrete Logarithm) EXP=1+1.17 encrypted using a private key cipher with k m sig communication overhead
Why 1.17 exponentiations? This can be done in a smart way, costing only 1.17 exponentiations on average ! D. Knuth, Seminumerical Algorithms, Vol. 2 of The Art of Computer Programming, 2nd edition, Addison-Wesley, Exercise 27, Pages 465 & 637.
DL Signcryption v.s. sign-then-encrypt # of multiplications (the smaller the better) |p|=|n|
DL Signcryption v.s. sign-then-encrypt comm. Overhead ((# of bits, the smaller the better)
The end result С един куршум - два заека (With one bullet - two rabbits)
Other developments • Extensions: pairing, factorization, …… • Add “bells and whistles” • Multi-recipients, proxy, blind, threshold, ring, ID based, …… • Authenticated encryption (Authencryption) • Co-design of shared key authentication and encryption
Beyond coded modulationand signcryption ? • There is no crypto equivalent of “Shannon’s capacity limit” • Good ? Or Bad ? Signcryption Source Encoder Error Correcting (encoder) + Modulation Channel Unsigncryption Source Decoder Error Correcting (decoder) + Demodulation
Много благодаря ! Thank you !