Diffie-Hellman, ECC, Uses for Public Key Crypto




CS166

Chris Pollett

Sep. 19, 2012

Outline

Diffie-Hellman - Discrete Log Problem

Diffie-Hellman - Key Exchange

Diffie-Hellman

Subject to man-in-the-middle (MiM) attack

Diffie Hellman Man-in-the-Middle

DH and MiM

HW Problem

Problem 4.5 In class we showed if we encrypt `M` using RSA with the public key and then decrypt with the private key, we get the original message back. Give the analogous proof that RSA signature verification works. That is, if we encrypt with the private key and decrypt with the public key we get `M` back.

Answer:

Elliptic Curve Crypto (ECC)

What is an Elliptic Curve?

Elliptic Curve Picture

An example elliptic curve

Points on Elliptic Curve

Elliptic Curve Math

Elliptic Curve Addition

ECC Diffie-Hellman

Message ECC Diffie-Hellman

ECC Diffie-Hellman

Uses for Public Key Crypto

Non-non-repudiation

Non-repudiation

Public Key Notation