SlideShare a Scribd company logo
1 of 16
IMPLEMENTATION OF PAILLIER
ELGAMAL CRYPTOSYSTEM
GAUTHAM SK Dr. ANJAN K KOUNDINYA
MTech S3 Associate Professor
Dept. of CSE, BMSIT&M Dept. of CSE, BMSIT&M
USN:1BY19SCS02 Information and Network Security
(Assignment)
07-01-2021 Information and Network Security
07-01-2021 Information and Network Security
Agenda
• Introduction
• Literature Survey for implementation
• Paillier Cryptosystem
• Application: Paillier Cryptosystem
• ElGamal Cryptosystem
• DEMO
Introduction
• Our life relies so much on technology and several online services such as e-
banking, e-commerce, e-voting and so on.
• So there is a necessity to protect valuable information that is transmitted on
the internet from any unauthorized disclosure and modifications.
• To protect information, transmit it in encrypted form.
• Decryption which sometimes can result in problems like privacy violation or
insider threat.
• These problems can be avoided if data custodians were to operate on users’
encrypted data without knowing the original information or the plaintext.
07-01-2021 Information and Network Security
• In 2017, “A Java Implementation Of Paillier Homomorphic Encryption
Scheme”, Fifth International Conference on Information and Communication
Technology (ICoICT), talks about the implementation of paillier
cryptosystem.
• In 2002, “ElGamal Cryptosystem for enciphering Messages”, IEEE Transaction
on Knowledge and Data Engineering, VOL-14, NO.2, talks about the
implementation of Elgamal cryptosystem.
• Analysis and Implementation of Combined Approach of RSA and ECC
Algorithm for Enhanced Data Security, International Journal of Computer
Applications (0975 – 8887) Volume 129 – No.15, November2015, give the
idea and way to combine two cryptosystem.
07-01-2021 Information and Network Security
Literature Survey for Implementation
07-01-2021 Information and Network Security
Paillier Cryptosystem
• Pascal Paillier (1999)
• Asymmetric Public-key scheme
• Homomorphic Encryption (HE)
P(2+3)C(20+21)C(41)P(5)
• Probabilistic
• Additive HE scheme
• Given the ciphertext C1=Enc(M1) and C2=Enc (M2).
• Can compute C3=C1×C2
• Decrypt the plaintext as M3=M1 +M2 without knowing what is the
value of M1 and M2.
Algorithm
It consists of three steps: Key generation, Encryption, and Decryption:
Key generation:
1. Choose two random primes p and q where p and q should be different from each
other and have equal length.
2. Compute n=p*q and  = lcm(p-1, q-1).
3. Select a random integer g, where g є Z*n
2 .
4. Ensure n divides the order of g by checking µ = (L(gλ mod n2 ))-1 mod n, where the
function L is defined as L(x) = x-1/n .
5. Set the public key as (n, g).
6. Set the private key as (, µ).
07-01-2021 Information and Network Security
07-01-2021 Information and Network Security
Algorithm
Encryption:
1. Let m be the message that we want to encrypt, where m є Zn .
2. Select a random r where r є Zn
*.
3. Compute the ciphertext as c = gm . rn mod n2.
Decryption:
1. Let c be the ciphertext to decrypt, where c є Z*
n
2
2. Compute the message: m = L(c mod n2) . µ mod n.
Application: Electronic voting
• Consider a simple binary ("for“ (1) or "against“ (0)) vote.
• Each voter encrypts their choice before casting their vote.
• The election official takes the product of the m encrypted votes and then decrypts
the result and obtains the value n, which is the sum of all the votes.
• The election official then knows that n people voted for and m-n people
voted against.
• The role of the random r ensures that two equivalent votes will encrypt to the
same value only with negligible likelihood, hence ensuring voter privacy.
07-01-2021 Information and Network Security
07-01-2021 Information and Network Security
Semantic security
• Negligible information about the plaintext.
• The ability to successfully distinguish ciphertext depends on the ability to
decide decisional composite residuosity assumption (DCRA) which is
believed to be intractable.
Z  yn (mod n2)
ElGamal algorithm
07-01-2021 Information and Network Security
• Taher ElGamal in 1984
• Asymmetric Public-key cryptosystem
• Based on the difficulty of finding discrete logarithm in a cyclic group that is
even if we know ga and gk, it is extremely difficult to compute gak
• Used in the free GNU Privacy Guard software, recent versions of PGP and
other cryptosystems.
• Practical use: Hybrid cryptosystem
Algorithm
It consists of three steps: Key generation, Encryption, and Decryption:
1. Bob generates public and private key (Key generation):
a) Bob chooses a very large number q and a cyclic group Fq.
b) From the cyclic group Fq, he choose any element g and an element a such that
gcd(a, q) = 1.
c) Then he computes h = ga.
d) Bob publishes F, h = ga, q and g as his public key and retains a as private key.
2. Alice encrypts data using Bob’s public key (Encryption) :
a) Alice selects an element k from cyclic group F such that gcd(k, q) = 1.
b) Then she computes p = gk and s = hk = gak.
c) She multiples s with M.
d) Then she sends (p, M*s) = (gk, M*s).
07-01-2021 Information and Network Security
07-01-2021 Information and Network Security
3. Bob decrypts the message (Decryption) :
a) Bob calculates s′ = pa = gak.
b) He divides M*s by s′ to obtain M.
Algorithm
DEMO
07-01-2021 Information and Network Security
07-01-2021 Information and Network Security
Analysis
07-01-2021 Information and Network Security
Summary
• Implemented a two-layer cryptosystem, Paillier ElGamal Cryptosystem.
• Performed Analysis on the algorithm.
REFERENCES
07-01-2021
[1] T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in IEEE
Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, July 1985, doi:
10.1109/TIT.1985.1057074.
[2] Paillier P. (1999) Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In:
Stern J. (eds) Advances in Cryptology — EUROCRYPT ’99. EUROCRYPT 1999. Lecture Notes in
Computer Science, vol 1592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48910-X_16.
[3] Alwar. “Analysis and Implementation of Combined Approach of RSA and ECC Algorithm for Enhanced
Data Security.” (2015).
[4] M. Nassar, A. Erradi and Q. M. Malluhi, "Paillier's encryption: Implementation and cloud applications,"
2015 International Conference on Applied Research in Computer Science and Engineering (ICAR), Beirut,
2015, pp. 1-5, doi: 10.1109/ARCSE.2015.7338149.
[5] C. Cai, H. Awano and M. Ikeda, "High-Speed ASIC Implementation of Paillier Cryptosystem with
Homomorphism," 2019 IEEE 13th International Conference on ASIC (ASICON), Chongqing, China, 2019,
pp. 1-4, doi: 10.1109/ASICON47005.2019.8983588.
Information and Network Security

More Related Content

What's hot (20)

RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
ElGamal Encryption Algoritham.pptx
ElGamal Encryption Algoritham.pptxElGamal Encryption Algoritham.pptx
ElGamal Encryption Algoritham.pptx
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital Signature
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Paillier Cryptosystem
Paillier CryptosystemPaillier Cryptosystem
Paillier Cryptosystem
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Homomorphic encryption in cloud computing final
Homomorphic encryption  in cloud computing finalHomomorphic encryption  in cloud computing final
Homomorphic encryption in cloud computing final
 

Similar to Paillier-ElGamal cryptosystem presentation

IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Mumbai Academisc
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDDATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDijait
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
Whitepaper - Protecting Data in Transit
Whitepaper - Protecting Data in TransitWhitepaper - Protecting Data in Transit
Whitepaper - Protecting Data in TransitPhil Bartlett
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storageShivam Singh
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015Ashish Gupta
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
REU Group 2 - Paper
REU Group 2 - PaperREU Group 2 - Paper
REU Group 2 - PaperScott Payne
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security finalAkash Kamble
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATUREijp2p
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme inIJNSA Journal
 
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHYCERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHYIJNSA Journal
 

Similar to Paillier-ElGamal cryptosystem presentation (20)

IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDDATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
Whitepaper - Protecting Data in Transit
Whitepaper - Protecting Data in TransitWhitepaper - Protecting Data in Transit
Whitepaper - Protecting Data in Transit
 
G05124550
G05124550G05124550
G05124550
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
REU Group 2 - Paper
REU Group 2 - PaperREU Group 2 - Paper
REU Group 2 - Paper
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme in
 
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHYCERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
 

Recently uploaded

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 

Recently uploaded (20)

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 

Paillier-ElGamal cryptosystem presentation

  • 1. IMPLEMENTATION OF PAILLIER ELGAMAL CRYPTOSYSTEM GAUTHAM SK Dr. ANJAN K KOUNDINYA MTech S3 Associate Professor Dept. of CSE, BMSIT&M Dept. of CSE, BMSIT&M USN:1BY19SCS02 Information and Network Security (Assignment) 07-01-2021 Information and Network Security
  • 2. 07-01-2021 Information and Network Security Agenda • Introduction • Literature Survey for implementation • Paillier Cryptosystem • Application: Paillier Cryptosystem • ElGamal Cryptosystem • DEMO
  • 3. Introduction • Our life relies so much on technology and several online services such as e- banking, e-commerce, e-voting and so on. • So there is a necessity to protect valuable information that is transmitted on the internet from any unauthorized disclosure and modifications. • To protect information, transmit it in encrypted form. • Decryption which sometimes can result in problems like privacy violation or insider threat. • These problems can be avoided if data custodians were to operate on users’ encrypted data without knowing the original information or the plaintext. 07-01-2021 Information and Network Security
  • 4. • In 2017, “A Java Implementation Of Paillier Homomorphic Encryption Scheme”, Fifth International Conference on Information and Communication Technology (ICoICT), talks about the implementation of paillier cryptosystem. • In 2002, “ElGamal Cryptosystem for enciphering Messages”, IEEE Transaction on Knowledge and Data Engineering, VOL-14, NO.2, talks about the implementation of Elgamal cryptosystem. • Analysis and Implementation of Combined Approach of RSA and ECC Algorithm for Enhanced Data Security, International Journal of Computer Applications (0975 – 8887) Volume 129 – No.15, November2015, give the idea and way to combine two cryptosystem. 07-01-2021 Information and Network Security Literature Survey for Implementation
  • 5. 07-01-2021 Information and Network Security Paillier Cryptosystem • Pascal Paillier (1999) • Asymmetric Public-key scheme • Homomorphic Encryption (HE) P(2+3)C(20+21)C(41)P(5) • Probabilistic • Additive HE scheme • Given the ciphertext C1=Enc(M1) and C2=Enc (M2). • Can compute C3=C1×C2 • Decrypt the plaintext as M3=M1 +M2 without knowing what is the value of M1 and M2.
  • 6. Algorithm It consists of three steps: Key generation, Encryption, and Decryption: Key generation: 1. Choose two random primes p and q where p and q should be different from each other and have equal length. 2. Compute n=p*q and  = lcm(p-1, q-1). 3. Select a random integer g, where g є Z*n 2 . 4. Ensure n divides the order of g by checking µ = (L(gλ mod n2 ))-1 mod n, where the function L is defined as L(x) = x-1/n . 5. Set the public key as (n, g). 6. Set the private key as (, µ). 07-01-2021 Information and Network Security
  • 7. 07-01-2021 Information and Network Security Algorithm Encryption: 1. Let m be the message that we want to encrypt, where m є Zn . 2. Select a random r where r є Zn *. 3. Compute the ciphertext as c = gm . rn mod n2. Decryption: 1. Let c be the ciphertext to decrypt, where c є Z* n 2 2. Compute the message: m = L(c mod n2) . µ mod n.
  • 8. Application: Electronic voting • Consider a simple binary ("for“ (1) or "against“ (0)) vote. • Each voter encrypts their choice before casting their vote. • The election official takes the product of the m encrypted votes and then decrypts the result and obtains the value n, which is the sum of all the votes. • The election official then knows that n people voted for and m-n people voted against. • The role of the random r ensures that two equivalent votes will encrypt to the same value only with negligible likelihood, hence ensuring voter privacy. 07-01-2021 Information and Network Security
  • 9. 07-01-2021 Information and Network Security Semantic security • Negligible information about the plaintext. • The ability to successfully distinguish ciphertext depends on the ability to decide decisional composite residuosity assumption (DCRA) which is believed to be intractable. Z  yn (mod n2)
  • 10. ElGamal algorithm 07-01-2021 Information and Network Security • Taher ElGamal in 1984 • Asymmetric Public-key cryptosystem • Based on the difficulty of finding discrete logarithm in a cyclic group that is even if we know ga and gk, it is extremely difficult to compute gak • Used in the free GNU Privacy Guard software, recent versions of PGP and other cryptosystems. • Practical use: Hybrid cryptosystem
  • 11. Algorithm It consists of three steps: Key generation, Encryption, and Decryption: 1. Bob generates public and private key (Key generation): a) Bob chooses a very large number q and a cyclic group Fq. b) From the cyclic group Fq, he choose any element g and an element a such that gcd(a, q) = 1. c) Then he computes h = ga. d) Bob publishes F, h = ga, q and g as his public key and retains a as private key. 2. Alice encrypts data using Bob’s public key (Encryption) : a) Alice selects an element k from cyclic group F such that gcd(k, q) = 1. b) Then she computes p = gk and s = hk = gak. c) She multiples s with M. d) Then she sends (p, M*s) = (gk, M*s). 07-01-2021 Information and Network Security
  • 12. 07-01-2021 Information and Network Security 3. Bob decrypts the message (Decryption) : a) Bob calculates s′ = pa = gak. b) He divides M*s by s′ to obtain M. Algorithm
  • 14. 07-01-2021 Information and Network Security Analysis
  • 15. 07-01-2021 Information and Network Security Summary • Implemented a two-layer cryptosystem, Paillier ElGamal Cryptosystem. • Performed Analysis on the algorithm.
  • 16. REFERENCES 07-01-2021 [1] T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, July 1985, doi: 10.1109/TIT.1985.1057074. [2] Paillier P. (1999) Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern J. (eds) Advances in Cryptology — EUROCRYPT ’99. EUROCRYPT 1999. Lecture Notes in Computer Science, vol 1592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48910-X_16. [3] Alwar. “Analysis and Implementation of Combined Approach of RSA and ECC Algorithm for Enhanced Data Security.” (2015). [4] M. Nassar, A. Erradi and Q. M. Malluhi, "Paillier's encryption: Implementation and cloud applications," 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR), Beirut, 2015, pp. 1-5, doi: 10.1109/ARCSE.2015.7338149. [5] C. Cai, H. Awano and M. Ikeda, "High-Speed ASIC Implementation of Paillier Cryptosystem with Homomorphism," 2019 IEEE 13th International Conference on ASIC (ASICON), Chongqing, China, 2019, pp. 1-4, doi: 10.1109/ASICON47005.2019.8983588. Information and Network Security