SlideShare a Scribd company logo
8
Most read
Threshold
Cryptography
NAME : MOHIBULLAH SAIL
SECTION : A
SUBJECT : INFORMATION SECURITY
ROLL NO : SU-015-01-002-123
Agenda
 Introduction
 Applications
 Limitations
 Solutions
 References
Introduction[1]
 In cryptography, a cryptosystem is called a threshold cryptosystem.
 If in order to decrypt an encrypted message or to sign a message
 several parties must cooperate in the decryption
 The message is encrypted using a public key and the corresponding
 private key is shared among the participating parties
 Threshold versions of encryption can be built for many asymmetric
cryptographic schemes
Applications[2]
 Only organizations with very valuable secrets, such as certificate authorities militaries
 Governments would make use of the technology
 In October 2012 after a number of large public website password cipher text
 cooperation RSA Security announced that it would be releasing software that makes
 the technology available to the general public.
 Threshold cryptography is a secret sharing technique that finds applications in many fields
including cloud computing (remote servers on internet to store ,manage and process data)
 Authentication and sensor networks, digital
 signatures, and electronic voting
Limitations[3]
 The dark side of threshold cryptography has never been addressed seriously
 We investigate some possible abuses of threshold cryptography
 which result from users not possessing the entire private key due to threshold splitting
 Examples:
 1: subliminal channels in strong (randomized) signature schemes.
 2: Employing authentication for encryption.
 3:kleptography exploiting etc.
Challenges[4]
 Challenge–response authentication
 One party generate a question and another party is responsible to give valid answer to be
authenticated.
 The simplest example of a challenge–response protocol is password authentication
 Challenge is asking for the password and the valid response is the correct password
 For communications security methods are unavailable, the U.S military uses the AKAC1553
 TRIAD numeral cipher to authenticate and encrypt some communications
 TRIAD includes a list of three-letter challenge codes, which the verifier is supposed to choose
randomly from, and random three-letter responses to them. For added security
 Codes is only valid for a particular time period which is ordinarily 24 hours
Solutions[5]
 In the threshold setting, we would like to implement, via efficient protocols, the most secure
cryptosystems and signature schemes.
 We would also like to make our protocols secure in the strongest possible model of faults.
 The size of the threshold: The servers can be corrupted by the adversary without any harm to the
service (e.g. signature or decryption) that these servers implement
 Model of communication : How realistic are the requirements we place on it? Do we require
synchronous or partially synchronous communication, authenticated broadcast and secure links
between servers?
References
1 :https://en.wikipedia.org/wiki/Threshold_cryptosystem
2 :https://en.wikipedia.org/wiki/Threshold_cryptosystem
:https://www.tandfonline.com/doi/abs/10.1080/19393555.2016.1251996
3 : https://link.springer.com/chapter/10.1007/3-540-36504-4_15
4 : https://en.wikipedia.org/wiki/Challenge%E2%80%93response_authentication
5 : http://groups.csail.mit.edu/cis/cis-threshold.html
THANK YOU
Mohibullah.sail@gmail.com

More Related Content

PPTX
Idea(international data encryption algorithm)
PPTX
Cryptography
PPTX
Cryptography and Network Security
PPT
Chapter 3: Block Ciphers and the Data Encryption Standard
PDF
Information Security Cryptography ( L02- Types Cryptography)
PPTX
Cryptography
PPTX
Elliptic Curve Cryptography
Idea(international data encryption algorithm)
Cryptography
Cryptography and Network Security
Chapter 3: Block Ciphers and the Data Encryption Standard
Information Security Cryptography ( L02- Types Cryptography)
Cryptography
Elliptic Curve Cryptography

What's hot (20)

PDF
Ch 5: Port Scanning
PPTX
Symmetric and asymmetric key
PPT
Digital Signature Standard
PPT
DES (Data Encryption Standard) pressentation
PPT
Cryptography and Message Authentication NS3
PDF
Asymmetric Cryptography
PPTX
Cryptography
PPTX
Cryptography and network security Nit701
PPTX
Cryptography
PPTX
Packet capture in network security
PPT
PPT
Message authentication and hash function
PPTX
cryptography
PDF
Elliptic Curve Cryptography Message Exchange
PPT
Public Key Cryptography and RSA algorithm
PPTX
Hash Function
PPTX
Advanced cryptography and implementation
PPTX
Network security and cryptography
Ch 5: Port Scanning
Symmetric and asymmetric key
Digital Signature Standard
DES (Data Encryption Standard) pressentation
Cryptography and Message Authentication NS3
Asymmetric Cryptography
Cryptography
Cryptography and network security Nit701
Cryptography
Packet capture in network security
Message authentication and hash function
cryptography
Elliptic Curve Cryptography Message Exchange
Public Key Cryptography and RSA algorithm
Hash Function
Advanced cryptography and implementation
Network security and cryptography
Ad

Similar to Threshold cryptography (20)

PPT
KeyManagement and distribution in informa.ppt
PDF
Module 2.Cryptography and Cryptanalysis
PPT
authentication u5.ppt
PPT
Cyber security Unit 3 Cryptography and Network security
PDF
Survey of universal authentication protocol for mobile communication
PPTX
PPTX
Network security
PPT
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
PPTX
Efficient authentication for mobile and pervasive computing
PPTX
Efficient authentication for mobile and pervasive computing
PDF
Em24873876
PDF
Cryptographic Algorithms For Secure Data Communication
PDF
Information security
PPTX
Network Security and Cryptography
PPT
NSC_Unit-III_final.ppt
PPTX
IT235 POC - Unit I priciples of cryptography
PPTX
Basic Cryptography unit 4 CSS
KeyManagement and distribution in informa.ppt
Module 2.Cryptography and Cryptanalysis
authentication u5.ppt
Cyber security Unit 3 Cryptography and Network security
Survey of universal authentication protocol for mobile communication
Network security
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
Em24873876
Cryptographic Algorithms For Secure Data Communication
Information security
Network Security and Cryptography
NSC_Unit-III_final.ppt
IT235 POC - Unit I priciples of cryptography
Basic Cryptography unit 4 CSS
Ad

More from Mohibullah Saail (9)

PPTX
professional Issues in COmputer science and Engineering
PPTX
Brain computer interface
PPTX
Applications security and Artificial Intelligence
PPTX
Access control
PPTX
Database Security Login
PPTX
Tunneling vpn security and implementation
PPTX
Secure hash function
PPTX
IP Security and its Components
PPTX
Security login
professional Issues in COmputer science and Engineering
Brain computer interface
Applications security and Artificial Intelligence
Access control
Database Security Login
Tunneling vpn security and implementation
Secure hash function
IP Security and its Components
Security login

Recently uploaded (20)

PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Current and future trends in Computer Vision.pptx
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
UNIT - 3 Total quality Management .pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPT
Occupational Health and Safety Management System
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
Soil Improvement Techniques Note - Rabbi
PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PPT
Total quality management ppt for engineering students
PDF
PPT on Performance Review to get promotions
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Current and future trends in Computer Vision.pptx
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
UNIT - 3 Total quality Management .pptx
R24 SURVEYING LAB MANUAL for civil enggi
Categorization of Factors Affecting Classification Algorithms Selection
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Occupational Health and Safety Management System
III.4.1.2_The_Space_Environment.p pdffdf
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
Safety Seminar civil to be ensured for safe working.
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Soil Improvement Techniques Note - Rabbi
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
Total quality management ppt for engineering students
PPT on Performance Review to get promotions

Threshold cryptography

  • 1. Threshold Cryptography NAME : MOHIBULLAH SAIL SECTION : A SUBJECT : INFORMATION SECURITY ROLL NO : SU-015-01-002-123
  • 2. Agenda  Introduction  Applications  Limitations  Solutions  References
  • 3. Introduction[1]  In cryptography, a cryptosystem is called a threshold cryptosystem.  If in order to decrypt an encrypted message or to sign a message  several parties must cooperate in the decryption  The message is encrypted using a public key and the corresponding  private key is shared among the participating parties  Threshold versions of encryption can be built for many asymmetric cryptographic schemes
  • 4. Applications[2]  Only organizations with very valuable secrets, such as certificate authorities militaries  Governments would make use of the technology  In October 2012 after a number of large public website password cipher text  cooperation RSA Security announced that it would be releasing software that makes  the technology available to the general public.  Threshold cryptography is a secret sharing technique that finds applications in many fields including cloud computing (remote servers on internet to store ,manage and process data)  Authentication and sensor networks, digital  signatures, and electronic voting
  • 5. Limitations[3]  The dark side of threshold cryptography has never been addressed seriously  We investigate some possible abuses of threshold cryptography  which result from users not possessing the entire private key due to threshold splitting  Examples:  1: subliminal channels in strong (randomized) signature schemes.  2: Employing authentication for encryption.  3:kleptography exploiting etc.
  • 6. Challenges[4]  Challenge–response authentication  One party generate a question and another party is responsible to give valid answer to be authenticated.  The simplest example of a challenge–response protocol is password authentication  Challenge is asking for the password and the valid response is the correct password  For communications security methods are unavailable, the U.S military uses the AKAC1553  TRIAD numeral cipher to authenticate and encrypt some communications  TRIAD includes a list of three-letter challenge codes, which the verifier is supposed to choose randomly from, and random three-letter responses to them. For added security  Codes is only valid for a particular time period which is ordinarily 24 hours
  • 7. Solutions[5]  In the threshold setting, we would like to implement, via efficient protocols, the most secure cryptosystems and signature schemes.  We would also like to make our protocols secure in the strongest possible model of faults.  The size of the threshold: The servers can be corrupted by the adversary without any harm to the service (e.g. signature or decryption) that these servers implement  Model of communication : How realistic are the requirements we place on it? Do we require synchronous or partially synchronous communication, authenticated broadcast and secure links between servers?
  • 8. References 1 :https://en.wikipedia.org/wiki/Threshold_cryptosystem 2 :https://en.wikipedia.org/wiki/Threshold_cryptosystem :https://www.tandfonline.com/doi/abs/10.1080/19393555.2016.1251996 3 : https://link.springer.com/chapter/10.1007/3-540-36504-4_15 4 : https://en.wikipedia.org/wiki/Challenge%E2%80%93response_authentication 5 : http://groups.csail.mit.edu/cis/cis-threshold.html