6
Most read
8
Most read
9
Most read
Securing Emails using Secret
Sharing
Securing Emails using Secret Sharing
Have you ever sent your
confidential information
such as passport and
SSN over email?
Motivation
• Most people have done it
• Email servers have confidential information about most people
Shamir Secret Sharing MUA
• Secret: Any information that a user wishes to encrypt
• Share: The resultant k pieces of information generated from the
secret, which will not yield any useful information on the secret until
all shares are combined.
Application
• Secure: Perfect information-theoretic security
• Extensible: No share is significantly larger than the original secret
• Fast: Computational overhead for generating shares and
reconstructing secrets is linear based on the number of shares
generated and length of the secret.
System Architecture
• Each piece P represents a different
email address to which a single
share is sent.
• Share generation happens on the
sending end.
• Secret reconstruction happens at
the receiving end.
Why use this?
• People should have the option to use completely secure email
systems
• Connection between user and email provider is typically
encrypted and secure, but from then on there is no guarantee.
• Using a web browser to interact with email is inherently insecure
• Widely used public key encryption schemes are useless if an
intruder obtains the private key
Example Share Generation
• S = 1234
• 𝑘 = 3
• 𝑟1 = 166
• 𝑟2 = 9
• 𝑎 = 𝑘
• 𝑎 = 𝑆, 𝑟1, 𝑟2 𝑘 = 3
• 𝑝 = 1631
• 𝑓 𝑥 = 𝑖=0
𝑘
𝑎𝑖 ∗ 𝑥 𝑖 mod p
• 𝑆ℎ𝑎𝑟𝑒𝑠 = {𝑓 1 , 𝑓 2 , 𝑓 3 }
Example Secret Reconstruction
x y
1 1494
2 329
3 965
• 𝑓 𝑥 𝑚𝑜𝑑 𝑝 = 𝑗=0
𝑘
𝑦𝑗 ∗ 𝑙𝑗(𝑥)
• 𝑙𝑗 𝑥 = 0≤𝑚≤𝑘
𝑚≠𝑗
𝑥−𝑥 𝑚
𝑥 𝑗−𝑥 𝑚
• 𝑓 0 = 𝑆
∴ 𝑆 = 1234
Next Steps
• Collect data and write a research paper
• Convert the program into an Android app

More Related Content

PPT
Diffiehellman
PPT
Elliptical curve cryptography
PDF
Cyber Security
PPT
Legal, Ethical and professional issues in Information Security
PPTX
MD5 ALGORITHM.pptx
PDF
Cloud security
PPTX
Cryptography and network security
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
Diffiehellman
Elliptical curve cryptography
Cyber Security
Legal, Ethical and professional issues in Information Security
MD5 ALGORITHM.pptx
Cloud security
Cryptography and network security
Attribute Based Encryption with Privacy Preserving In Clouds

What's hot (20)

PDF
Privacy preserving machine learning
PPTX
Discrete Logarithm Algorithm.pptx
PPT
Message Authentication
PPT
Diffie-hellman algorithm
PDF
Python NumPy Tutorial | NumPy Array | Edureka
PPTX
Idea(international data encryption algorithm)
PPTX
Classification techniques in data mining
PPTX
Diffie Hellman Key Exchange
PPTX
Chapter- I introduction
PPTX
Elliptic Curve Cryptography
PPTX
Brute force-attack presentation
PPTX
Mobile Forensics and Cybersecurity
PDF
Blind Signature Scheme
PPT
Public Key Cryptography and RSA algorithm
PPT
computer misuse n criminal law
PDF
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
PDF
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
PDF
Database Firewall with Snort
PDF
CanSecWest 2017 - Port(al) to the iOS Core
Privacy preserving machine learning
Discrete Logarithm Algorithm.pptx
Message Authentication
Diffie-hellman algorithm
Python NumPy Tutorial | NumPy Array | Edureka
Idea(international data encryption algorithm)
Classification techniques in data mining
Diffie Hellman Key Exchange
Chapter- I introduction
Elliptic Curve Cryptography
Brute force-attack presentation
Mobile Forensics and Cybersecurity
Blind Signature Scheme
Public Key Cryptography and RSA algorithm
computer misuse n criminal law
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
Database Firewall with Snort
CanSecWest 2017 - Port(al) to the iOS Core
Ad

Viewers also liked (13)

PDF
Secret Sharing Cs416
PDF
How to Share a Secret
PPT
Secret sharing schemes
PPTX
secret sharing schemes
PPTX
Image secret sharing using Shamir's Algorithm
PPT
Image secret sharing using Shamir's scheme with Steganography
PPT
Folklore: Introduction and Terms
PPT
Folklore Notes
 
PPTX
Visual Cryptography
PDF
Steganography using visual cryptography
PPTX
Cryptography
PPTX
INFORMATION SECURITY SYSTEM
PPTX
Cryptography.ppt
Secret Sharing Cs416
How to Share a Secret
Secret sharing schemes
secret sharing schemes
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's scheme with Steganography
Folklore: Introduction and Terms
Folklore Notes
 
Visual Cryptography
Steganography using visual cryptography
Cryptography
INFORMATION SECURITY SYSTEM
Cryptography.ppt
Ad

Similar to Shamir Secret Sharing Presentation (20)

PPTX
Cryptography
DOC
Networksecurity1 1
PDF
Advance Cipher Technique to Secure Email Contents
ODP
Network Security Topic 4 cryptography2
PDF
Email Encryption using Tri-Cryptosystem Based on Android
PPT
Crypt
PPT
Network Security and Cryptography
PDF
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
PPTX
Cyptography and network security unit 3-1
PPT
What is Encryption
PPTX
Security Fundamentals Security Issues Earlier
PPT
Cryptography al-hamadi111
PPTX
Introduction to Cryptography
PDF
Digital Certified Mail
PPTX
Cryptography and Network Security Principles.pptx
PPT
Cryptography - An Overview
PDF
Email security presentation
PPTX
Cryptography Introduction
PPT
chap15 cryptography and network security.ppt
PPTX
Cryptography
Cryptography
Networksecurity1 1
Advance Cipher Technique to Secure Email Contents
Network Security Topic 4 cryptography2
Email Encryption using Tri-Cryptosystem Based on Android
Crypt
Network Security and Cryptography
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
Cyptography and network security unit 3-1
What is Encryption
Security Fundamentals Security Issues Earlier
Cryptography al-hamadi111
Introduction to Cryptography
Digital Certified Mail
Cryptography and Network Security Principles.pptx
Cryptography - An Overview
Email security presentation
Cryptography Introduction
chap15 cryptography and network security.ppt
Cryptography

Shamir Secret Sharing Presentation

  • 1. Securing Emails using Secret Sharing
  • 2. Securing Emails using Secret Sharing Have you ever sent your confidential information such as passport and SSN over email?
  • 3. Motivation • Most people have done it • Email servers have confidential information about most people
  • 4. Shamir Secret Sharing MUA • Secret: Any information that a user wishes to encrypt • Share: The resultant k pieces of information generated from the secret, which will not yield any useful information on the secret until all shares are combined.
  • 5. Application • Secure: Perfect information-theoretic security • Extensible: No share is significantly larger than the original secret • Fast: Computational overhead for generating shares and reconstructing secrets is linear based on the number of shares generated and length of the secret.
  • 6. System Architecture • Each piece P represents a different email address to which a single share is sent. • Share generation happens on the sending end. • Secret reconstruction happens at the receiving end.
  • 7. Why use this? • People should have the option to use completely secure email systems • Connection between user and email provider is typically encrypted and secure, but from then on there is no guarantee. • Using a web browser to interact with email is inherently insecure • Widely used public key encryption schemes are useless if an intruder obtains the private key
  • 8. Example Share Generation • S = 1234 • 𝑘 = 3 • 𝑟1 = 166 • 𝑟2 = 9 • 𝑎 = 𝑘 • 𝑎 = 𝑆, 𝑟1, 𝑟2 𝑘 = 3 • 𝑝 = 1631 • 𝑓 𝑥 = 𝑖=0 𝑘 𝑎𝑖 ∗ 𝑥 𝑖 mod p • 𝑆ℎ𝑎𝑟𝑒𝑠 = {𝑓 1 , 𝑓 2 , 𝑓 3 }
  • 9. Example Secret Reconstruction x y 1 1494 2 329 3 965 • 𝑓 𝑥 𝑚𝑜𝑑 𝑝 = 𝑗=0 𝑘 𝑦𝑗 ∗ 𝑙𝑗(𝑥) • 𝑙𝑗 𝑥 = 0≤𝑚≤𝑘 𝑚≠𝑗 𝑥−𝑥 𝑚 𝑥 𝑗−𝑥 𝑚 • 𝑓 0 = 𝑆 ∴ 𝑆 = 1234
  • 10. Next Steps • Collect data and write a research paper • Convert the program into an Android app