1 / 8

Key-Evolving Encryption: Enhancing Security Through Time at Skamania Lodge

This document discusses key-evolving encryption, focusing on its resilience against intrusions and maintaining secure messaging between two parties, Alice and Bob. It emphasizes the significance of forward security, where past messages remain secure even if current private keys are exposed. The presentation occurred at Skamania Lodge in June 2003 and illustrates how updated keys for each time period can protect communications from simultaneous exposure risks. Relevant references highlight the foundational works in encryption, including research by Dodis, Franklin, and others, underscoring the evolution of secure cryptographic methods.

shira
Télécharger la présentation

Key-Evolving Encryption: Enhancing Security Through Time at Skamania Lodge

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Intrusion Resilient Encryption Matt Franklin U. C. Davis Skamania Lodge June 2003

  2. Key-Evolving Encryption current private key public key message ciphertext Alice Bob time message Skamania Lodge June 2003

  3. Forward Security Time t-1 t t+1 t+2 … Private key Dt-1 Dt Dt+1 Dt+2 ... Private key exposed Past Secure Present/Future Insecure Skamania Lodge June 2003

  4. Key-Evolving with Help updated key for next time period or Bob extra info Bob’sBase refreshed key for current time period Skamania Lodge June 2003

  5. Intrusion Resilient Encryption time period update update update refreshes Skamania Lodge June 2003

  6. Non-Simultaneous Exposure of Secrets Past Secure Future Secure Present insecure Skamania Lodge June 2003

  7. Simultaneous Exposure of Secrets Past Secure Future Insecure Present insecure Skamania Lodge June 2003

  8. References • Intrusion-Resilient Encryption Dodis-Franklin-Katz-Miyaji-Yung (RSA 2003) • Forward Secure Encryption Canetti-Halevi-Katz (Eurocrypt 2003) • Identity-Based Encryption Boneh-Franklin 2001, Gentry-Silverberg 2001 Skamania Lodge June 2003

More Related