SlideShare a Scribd company logo
1 of 39
Download to read offline
“Identity”-Based Cryptography
What it is NOT
+
Where is Money?
Lessons learned from near
half century for
Public Key Cryptography
DaoliName
January 2019
Executive Summary
• When public key crypto was invented, offline
authentication was a magic; now everyone hates offline
• When ID-based crypto was invented, non-interaction
was a magic, even though the cost for communications
was already much lowered
• In an era everybody is online, public key should feature
online too, and even ID based
• Domain Name Systems (DNS) as an extremely efficient
and successful online servicing hierarchy, can be
streamline secured if domain names are public keys
• PKC2.0: Registered bitstrings as authenticated public
keys to enable crypto capabilities for smart dusts
2DaoliName All Rights Reserved ©2019
Content
• Not very interesting technicalities on Identity
+ “Identity” Based Cryptography (IBC + “IBC”)
• Some slides, in particular those on IBCs, were pasted
from SlideShare; we did so in order to walk ourselves
away from pitfalls, historical ones even backdate to PKI
• Bla, bla, bla, ..., however none is PPT technology
• Jump to Slide entitled: “Fortunately Internet was NOT
Invented by Cryptographers”, that should be a good
way to review this slide set
• Money is never an issue, so technical reviewers do feel
free to skip anywhere money is mentioned :-)
Footnote: “Identity”, “ID”, “IBC”, “IBE”, “IBS”: Quotes to
eye-catch a key and unique difference from all known
Identity Based Crypto: We feature online & interaction
3DaoliName All Rights Reserved ©2019
Problems with PKI
• Sender (or verifier)
must have recipient’s
(or signer's) certificate
• Complexity of certificate mgnt;
A real world hard truth: Daily-
in-use public key certificates
bind “Crypt32.dll” as “chained-
melody” to the Chinese Patent
Office website, forcing 2019
users to re-install WindowsXP
clients in order to run 32-bit MS
iExplorer (to sign patent filings)
e3eab
1253b
682fd
a7af15
3f6550
ccb6e
4DaoliName All Rights Reserved ©2019
Identity-Based Cryptography (IBC)
• Non-Interactive:
Cryptography for unprepared
users (“Unprepared” is not very
meaningful. No surprise please.)
• Public key is the user's identity,
e.g., email address, phone
number, ... (We like domain
names, IP addresses, phone
numbers, ... to be public keys.)
• Sender only needs to know
recipient’s identity to send an
encrypted message (How?)
5DaoliName All Rights Reserved ©2019
History of ID Based Crypto
• Seminally proposed by Shamir in 1984
Shamir came up with a working system for
identity-based signature (IBS), but no system
for identity-based encryption (IBE)
• First IBE system discovered in 2001 by Boneh
and Franklin, using Weil pairing
• Many many schemes followed, but few
application, unfortunately
6DaoliName All Rights Reserved ©2019
Identity-Based Crypto (IBC)
Private Key Generator
7DaoliName All Rights Reserved ©2019
“Fairy Tales” About IBC
When IBC was an ugly duckling,
how could it avoid merciless taunts?
1. Inherent key escrow
2. No key revocation
3. PKG requires extremely strong security
assurance, since it holds all private keys
and must remain online
Bla bla bla ...
None of these accusations make a good sense
We shall refute all and each one by one
8DaoliName All Rights Reserved ©2019
Elliptic Curve Additive Group
y2 = x3 + ax + b (mod p)
• x, y, a, b in GF(p)
If 4a3 + 27b2 ≠ 0 (mod p),
then a group can be
formed:
• Points on the curve
plus the infinity point
• Additive operation “+”
being geometrically
defined
9DaoliName All Rights Reserved ©2019
Bilinear Pairing: 1st Crypto Use
Burton Kaliski Jr., 1988
G, G1 : (sub)groups of prime order q | (p-1)
Bilinear pairing map ê: let P = ( x, y )  G2
• Bilinear: ê( [a]P, [b]P ) = ê( P, P )
ab
• Non-degenerate:
P generates G  ê( P, P ) generates G1
• Efficiently computable
___________________
Kaliski's Recounting the History: Victor Miller visited Ron Rivest when I was a
graduate student, and he met with me about my research. If I recall correctly,
I asked him if he knew a way to determine whether an elliptic curve group was
cyclic, and he suggested the Weil pairing. He also gave me a copy of his
algorithm for computing the Weil pairing, and agreed that I could implement it
for my thesis.
10DaoliName All Rights Reserved ©2019
Diffie-Hellman Problem
Computation: Hard; Decision: Easy
Given < P, [a]P, [b]P, [c]P > for integers a, b, c
Deciding c =?= ab (mod q) use bilinear pairing:
ê( P, [c]P ) =?= ê( [a]P, [b]P )
Since this is equivalent to
ê( P, P )c =?= ê( P, P )ab
Evaluation: No need of knowing integers a, b, c
This is extremely important and useful for IBC
11DaoliName All Rights Reserved ©2019
System Setup
For primes p, q and groups defined in
slides 9, 10, let a Private Key Generator, PKG,
set an arbitrary curve point in the order q subgroup:
P = ( x, y ) mod p
PKG picks a random integer s < q, and sets PPKG = [s]P
PKG chooses two hash functions:
G: {0,1}*→ ( x, y ): hash arbitrary bitstring to the curve
H: ê(P, Q) → {0,1}log2 q : hash GF(p) to log2q-bit strings
PKG publicizes system public parameters:
< p, q, P, PPKG, G, H >
PKG securely keeps secret “master_secret_key”: s
12DaoliName All Rights Reserved ©2019
User Key Setting
Alice's key setting:
Her public key: RA = G( Alice )
Her private key is issued by PKG as: dA = [s]RA
Note: RA = ( x, y ) mod p, is a point on the curve
N.B. Hashing to elliptic curve is very very important!
Some authors, e.g., those who have proposed SM9,
choose to hash to discrete logarithm integers
We shall comment undesirable consequences in so
doing in a moment
13DaoliName All Rights Reserved ©2019
ElGamal Encryption
Encryption: To send encrypted M to Alice,
Bob picks a random integer r < q, and computes
C = < [r]P, M⊕H( gA
r ) >
where gA = ê( PPKG, RA )
Decryption: ( for C = < U, V > )
V ⊕ H( ê( U, [s]RA ) ) = M
Decryption correctness:
ê( U, dA ) = ê( [r]P, [s]RA ) =
ê( [s]P, [r]RA ) = ê( PPKG, RA )r = gA
r
That is, Alice can use her private key to reproduce gA
r,
equal to Bob computed using Alice's IBC public key
14DaoliName All Rights Reserved ©2019
Fairy Tale Refutation:
“Inherent Key Escrow”
Let PKG2 publicize point QPKG2 = [t]P, for a random
integer t < q as its “master” secret key
For RA = G(Alice), her private key dA = [s]RA + [t]RA
Then, to non-escrow ElGamal encrypt message M:
Bob picks a random integer r < q, and computes:
C = < [r]P, M⊕H( gA
r ) >, where
gA
r = ê( PPKG, RA )r * ê( QPKG2, RA )r Bob computes
= ê( [r]P, dA ) Alice computes in decryption
15DaoliName All Rights Reserved ©2019
A Stronger Refutation
Let Alice play the role of “PKG2”: QA = [a]P,
for a < q being her “private_key_self”, kept secret from
PKG, Alice's “private_key_whole” is: dA = [s]RA + [a]RA
Then, to no-key-escrow ElGamal encrypt message M,
Bob picks a random integer r < q, and computes:
C = < [r]P, M⊕H( gA
r ) >, where
gA
r = ê( PPKG, RA )r * ê( QA, RA )r Bob computes
= ê( [r]P, dA ) Alice computes in decryption
This is an “IBE”, quoted as Bob needs to first get Alice's
non-ID based, yet authenticated, public key QA, we will
discuss absurdity for PKG to forge QA in a backup slide
16DaoliName All Rights Reserved ©2019
Fairy Tale Refutation:
“No Key Revocation”
Lift version first:
To interact or not to
interact?
That is THE question!
Interaction can let Bob get
non-ID based, yet well
authenticated, public key
QA of Alice, and provide a
new usefulness to “IBC”
Rationale unfolding ...
17DaoliName All Rights Reserved ©2019
History of Digital Signature
In 1976, Diffie-Hellman Open Question:
How to digitally sign a document, use or not use
( g, gx ) form of public key
In 1978, RSA answered so beautifully:
Md mod N
In 1984, ElGamal answered for public key being
( g, gx ): use a random r to cover the private key a,
the covered discrete log can be computed publicly
18DaoliName All Rights Reserved ©2019
An “ID” Based Signature
Let Alice’s “private_key_PKG” be:
dA = [s]RA = [s]G( Alice )
Let Alice also have “private_key_self”: a < q, kept
secret from PKG as in no-key-escrow encryption
In registration, Alice signs the system public point P:
QA = [a]P
Alice's public key parameter:
< RA, QA >
“ID” quoted as the public key has a non-ID feature QA
19DaoliName All Rights Reserved ©2019
An “ID” Based Signature
Alice to sign M:
SigA( M ) = dA + [a]G( M )
Public Verification:
ê( P, SigA( M ) ) =?= ê( PPKG, RA ) * ê( QA, G( M ) )
Staring at Alice's “private_key_self” longer:
• Integer a can be one-time and random, and thus,
QA = [a]P becomes part of randomized signature
• After signing with a, Alice can further sign a next
signature using a + b (mod q), with randomized
signature part being Q'A = [a + b]P, and so on ...
20DaoliName All Rights Reserved ©2019
Tale Refutation for Signature:
“Inherent Key Escrow”
• Alice can publicize first QA = [a]P, where the first
“private_key_self” a is kept secret from any PKG;
she can use a + b as new “private_key_self”, for
Q'A = [b]P, let verifier use QA + Q'A in place of QA
• Alice's “private_key_PKG” dA can also easily be
issued by a distributed multiple of PKGs, exactly the
same as refutation to “inherent key escrow” tale for
ElGamal encryption; our usecase does feature so
• A verifier can also prevent PKGs from forgery by
challenging a multiplier to “private_key_self” of Alice
(detail provided in a backup slide)
21DaoliName All Rights Reserved ©2019
Refutation to Fairy Tale 3:
Two Approaches to IBC
1. Hash to elliptic curve
G( Alice ), G( M ), are curve points ( x, y ) to make
use of beautiful ease of decision DH
2. Hash to discrete logarithm (e.g., SM9)
Signature follows ElGamal's old game of using a
random number to protect private key
Our “IBC” schemes all enjoy approach 1: PKGs can
be distributed, even Alice be one such, to refute Fairy
Tale 3: “Highly strong security requirement for PKG”
IBCs taking approach 2 seem to suffer all tale scorns
22DaoliName All Rights Reserved ©2019
It's Open System, Stupid
Voltage Security Inc. (Boneh's company)
to sell ID-Based Crypto Email
Many (more likely, cryptographers) think Email is
the killer-app of ID-Based Crypto
Unfortunately, this killer-app is itself now almost
killed, e.g., colleagues & friends of DaoliName
have not been using it for ages
At any rate, even Email must also be an open
system, mustn't it?
23DaoliName All Rights Reserved ©2019
Cryptographers' System View
Viral growth of a product/service/business by opening
system up shouldn't be cryptographers' job optimum
A crypto product should always be “hush-hush”
Make it open? What are you talking about?!
Private Key Generator
24DaoliName All Rights Reserved ©2019
Fortunately Internet was NOT
Invented by Cryptographers
Internet has never been architect-ed to be a
product, or for an app, not even for an industry,
Internet is an Open System!
Crypto if vended as product (box) can hardly be
an open system
What is easily missing? Key management
Imagine Alice having bought an “IBC Email” box:
“Has Bob also bought this four-double-letter
fragment named gadget from Dan?” or “Is Bob's
ID based key still OK?”
25DaoliName All Rights Reserved ©2019
PKI Certificate as a Product
Given key revocation can hardly be a sold
box, why to vend PKI certificates in the first
place? Our WindowsXP, 32-bit iExplorer using
Chinese patent filers are only 1 drop in an ocean of
govt services users who may be experiencing mental,
if not physical, fragmentation �
Making PKI an Open System shouldn't be very
difficult; it's the thought got stuck offline that is!
An offline box is “buy once use forever” (BOUF). To
vend smart BOUF, money is not enough to hire smart
makers. Now nearly century/2 elapsed: Who pays for
key revocation to have user experience cared for?
26DaoliName All Rights Reserved ©2019
Has Public Key Ever
Well Done Key Management?
1976: Key agreement problem was suddenly solved,
key channel setup no longer need Kerberos-like online
1978: Offline CA PKI, then you go!
2000: Even OFF offline was discovered: ID is public key,
not even communication needed!
1997 (RFC 2065) to date: DNSSEC, Extremely efficient
online DNS hierarchy is bundled to same structured but
offline PKI hierarchy. Can, on Gods' green Earth, pull-
the-plug take so long no thanking to PKI burning energy?
2019: Everybody hates offline!
27DaoliName All Rights Reserved ©2019
Domain Name System DNS:
An Awesome Online Service
Internet trade-mark registration of names +
online query for (registered name, IP addresses)
binding
Real-time query, if (DN, IP, TTL) with TTL being valid,
use the binding, otherwise, as if binding revoked
Both being pyramid hierarchies, online DNS is far far
more successful than offline CA PKI
It's Open, cross app, and cross industry!
DNS will be with us forever: Programmers can't hard-
wire code IPs
28DaoliName All Rights Reserved ©2019
Bitstring Registration for
Streamline Key Mgnt Services
Global authenticated bitstring registration: “Is this
phone no., (IP addr, ...) registered as a public key?”
Use the existing DNS “trade-mark” reg hierarchy
Answer is small (see a backup slide) to be wrapped
in a 512-byte UDP packet, not only to penetrate
firewalls, but more importantly to provide value to
client users: streamline key mgnt service for dusts
User: “Is the private key behind this bitstring (DN, IP
addr, phone no) crypto-worthy (e.g., not revoked)?”
DaoliName: “Check TTL yourself! It's 'IBC' signed!”
29DaoliName All Rights Reserved ©2019
Where IS Money?
PKI has never answered this question well,
in near half century proud of offline “magic” authentication
Worse for IBC: PKI can sell some certificates, i.e., service
We've never heard IBC made any servicing money
Open up online, like the Internet, is the key to success
From data plane: Billions of smart dusts shall appreciate
value of their “IBC” authenticated bitstring IDs to enjoy
crypto, e.g., an IP addr can run IPSec (reverse DN query)
From control plane: A new TLD “.mi” (sounding crypto in
Chinese) to sell secure name registration, as “IBC”
signature secured DNS (volume of DN squatting probable)
30DaoliName All Rights Reserved ©2019
What for Sale
The following two well established
services have been very lucrative:
1. Trade-mark registration is a brand name (maybe
value add on, + logo binding) service, to sell,
physically, to a nation's businesses
2. DNS registration = Service 1 + IP address binding
service, to sell, digitally, to the globe's businesses
The new “IBC” enabled bitstring registration = Service 2
+ authenticated public key capability service, to sell,
digitally and securely, to the globe's businesses +
individual users + client dusts. Securely means
authenticated bitstring as public key bound to, e.g., IP
addresses
31DaoliName All Rights Reserved ©2019
Summary
Historical rethinking of (not quoted, aka
non-interact or offline) ID Based Crypto, and PKI
Refutation to all nonsensical tales about IBC:
If you can’t fix it, feature it!
Crypto, in fact, key mgnt, vended as boxes, being too
smart, too conservative, too complex, and too fragment,
to be early to market, vending crypto boxes is hard, no
money, no progress, then chunks of century go by
Online is THE feature, never a problem
“IBC” is not non-interactive, not offline, not a product,
not for one industry. It is services for PKC 2.0
32DaoliName All Rights Reserved ©2019
Backup Slides: “IBC” Signature
Authenticated Bitstrings
A registered bitstring suffices to provide public keys to
verify its bona-fide-ness as being signed authoritative answer
Upper level hierarchical nodes: delegated & distributed PKGs,
Commercial lower level nodes: authoritative servers
Upper level nodes colluding forging a non-ID point QA of a low
level node is as absurd as PKI CAs faking user certificates
“IBC” signatures of upper level nodes form “Compressed
Fingerprints” (CF) of theirs down the DNS hierarchy, and
these CFs are curve “+”ed to a single curve point
Final CF small enough (Barreto-Naehrig curves) for 512-byte
UDP packet to penetrate firewalls to reach clients & dusts
33DaoliName All Rights Reserved ©2019
“IBC” CFs Secured DNSSEC
Feature Online and Interaction
A DNS Asker, e.g., client or ISP on behalf of
client, as CF verifier, queries DN to the DNS hierarchy
Each of the answering nodes upper in the DNS
hierarchy above a leaf node Auth (who has
“authoritative record binding”), computes a CF using
the “IBC” signature formula to answer Asker
Asker challenges Auth random v, requiring Auth to use
va as “private_key_self” to randomize CFAuth output
Asker verifies: ê(P, CFAuth(M)) = ...* ê(QAuth, G(M))v
34DaoliName All Rights Reserved ©2019
Biz Plan 1: Cold Start for DNSSEC
Sales to DNS Servers
• “IBC” secured DNSSEC registration, to banks,
govt services and organizations; these entities have
force to impose clients to use “IBC” signed DNSSEC,
to grow to commercial organizations
• Hardware Signature Modules (HSMs) running PCT
patented “IBC” Compressed Fingerprint protocols, to
DNS servers. This sales will be virally growing to the
global wide millions of authoritative DNS commercial
servers (lower level nodes)
Not to clients or IoT dusts (too fragmented market):
• Open source reference code plugins for mobile apps,
then for web browsers, OS drivers ... to virally spread
35DaoliName All Rights Reserved ©2019
Biz Plan 1: Go to Market Strategy
Top level non-commercial nodes, i.e., root “”,
g-TLDs, cc-TLDs (“.com”, “.net”, “.org”, “.edu”, ...,
“.uk”, “.cn”, ...), are presumably hard to join “Cold Start”. Thus:
• Responsibly build their CFs for them. Responsibility means
to very carefully secure their “private_key_self”s, and
respectively their CFs, securely kept in HSMs on their behalf
• Sell DNSSEC registration to commercial levels of nodes as
descendants of the unsold top level non-registered names
• IETF RFCs, open source recursive resolvers, to make viral
spreading clients. If CF verification returns NO, re-query, e.g.,
DaoliName servers, for CF signed authoritative bindings
• Someday, top level nodes would appreciate value of “IBC”.
Then Their “private_key_self”s and CFs could be returned to
them as their due properties
36DaoliName All Rights Reserved ©2019
Biz Plan 2: Dream of
A Cryptographer Turned Engineer
All smart phones, IP addresses, smart dusts, in
particular, those appearing 5G ones, and IPv6
route-able devices, may have cross app, cross
industry, cross social media, ..., PKC 2.0
Alice's query: Is this unique phone number (or IP
address) of Bob (of course should be anonymous)
registered with authentication to have “ID” Based
Crypto capability?
“IBC” signed answer can just use the existing 512-
byte UDP packet to transmit! No reinvention of
EDNS0, or TCP DNS, or any such new wheels!
37DaoliName All Rights Reserved ©2019
Open System
Open Standard
Open Source
Open IETF RFCs
One World, One Dream
Only the World First to become better and better,
can China be also good as part of :-)
We want to work with the World to secure DNS, and
to pervade PKC 2.0
Money is never an issue, it can only be great return!
38DaoliName All Rights Reserved ©2019
DaoliName Key Management Solution

More Related Content

Similar to DaoliName Key Management Solution

13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxImXaib
 
I Left My JWT in San JOSE
I Left My JWT in San JOSEI Left My JWT in San JOSE
I Left My JWT in San JOSEBrian Campbell
 
IS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographyIS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographySarthak Patel
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developersKai Koenig
 
An Introduction to the Emerging JSON-Based Identity and Security Protocols (O...
An Introduction to the Emerging JSON-Based Identity and Security Protocols (O...An Introduction to the Emerging JSON-Based Identity and Security Protocols (O...
An Introduction to the Emerging JSON-Based Identity and Security Protocols (O...Brian Campbell
 
What is the cost of a secret
What is the cost of a secretWhat is the cost of a secret
What is the cost of a secretLibbySchulze
 
Zero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workZero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workAll Things Open
 
2024 Kernelcon Attack and Defense of AI.pdf
2024 Kernelcon Attack and Defense of AI.pdf2024 Kernelcon Attack and Defense of AI.pdf
2024 Kernelcon Attack and Defense of AI.pdfGabriel Schuyler
 
JavaScript Fundamentals
JavaScript FundamentalsJavaScript Fundamentals
JavaScript FundamentalsDeepank Vora
 
Chapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer NetworksChapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer NetworksAndy Juan Sarango Veliz
 
IntroductiontocryptographyCryptoIntro.pdf
IntroductiontocryptographyCryptoIntro.pdfIntroductiontocryptographyCryptoIntro.pdf
IntroductiontocryptographyCryptoIntro.pdfchumtiyababu
 
36_Cryptography.pdf
36_Cryptography.pdf36_Cryptography.pdf
36_Cryptography.pdfssuserfb92ae
 
Dial M For Mitigation
Dial M For MitigationDial M For Mitigation
Dial M For MitigationGraham Lee
 
DaoLiName-Decentralized Identity as Public Key
DaoLiName-Decentralized Identity as Public KeyDaoLiName-Decentralized Identity as Public Key
DaoLiName-Decentralized Identity as Public KeyDaoliCloud Ltd
 
Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
Real-time Fraud Detection for Southeast Asia’s Leading Mobile PlatformReal-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
Real-time Fraud Detection for Southeast Asia’s Leading Mobile PlatformScyllaDB
 
A TLS Story
A TLS StoryA TLS Story
A TLS Storyereddick
 

Similar to DaoliName Key Management Solution (20)

13
1313
13
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
I Left My JWT in San JOSE
I Left My JWT in San JOSEI Left My JWT in San JOSE
I Left My JWT in San JOSE
 
IS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographyIS Unit 3_Public Key Cryptography
IS Unit 3_Public Key Cryptography
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
 
An Introduction to the Emerging JSON-Based Identity and Security Protocols (O...
An Introduction to the Emerging JSON-Based Identity and Security Protocols (O...An Introduction to the Emerging JSON-Based Identity and Security Protocols (O...
An Introduction to the Emerging JSON-Based Identity and Security Protocols (O...
 
What is the cost of a secret
What is the cost of a secretWhat is the cost of a secret
What is the cost of a secret
 
Zero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workZero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they work
 
2024 Kernelcon Attack and Defense of AI.pdf
2024 Kernelcon Attack and Defense of AI.pdf2024 Kernelcon Attack and Defense of AI.pdf
2024 Kernelcon Attack and Defense of AI.pdf
 
JavaScript Fundamentals
JavaScript FundamentalsJavaScript Fundamentals
JavaScript Fundamentals
 
Chapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer NetworksChapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer Networks
 
AllBits presentation - Security in Theory
AllBits presentation - Security in TheoryAllBits presentation - Security in Theory
AllBits presentation - Security in Theory
 
IntroductiontocryptographyCryptoIntro.pdf
IntroductiontocryptographyCryptoIntro.pdfIntroductiontocryptographyCryptoIntro.pdf
IntroductiontocryptographyCryptoIntro.pdf
 
Part2-Apps-Security.pptx
Part2-Apps-Security.pptxPart2-Apps-Security.pptx
Part2-Apps-Security.pptx
 
36_Cryptography.pdf
36_Cryptography.pdf36_Cryptography.pdf
36_Cryptography.pdf
 
Dial M For Mitigation
Dial M For MitigationDial M For Mitigation
Dial M For Mitigation
 
DaoLiName-Decentralized Identity as Public Key
DaoLiName-Decentralized Identity as Public KeyDaoLiName-Decentralized Identity as Public Key
DaoLiName-Decentralized Identity as Public Key
 
Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
Real-time Fraud Detection for Southeast Asia’s Leading Mobile PlatformReal-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
 
A TLS Story
A TLS StoryA TLS Story
A TLS Story
 

Recently uploaded

How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 

Recently uploaded (20)

Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 

DaoliName Key Management Solution

  • 1. “Identity”-Based Cryptography What it is NOT + Where is Money? Lessons learned from near half century for Public Key Cryptography DaoliName January 2019
  • 2. Executive Summary • When public key crypto was invented, offline authentication was a magic; now everyone hates offline • When ID-based crypto was invented, non-interaction was a magic, even though the cost for communications was already much lowered • In an era everybody is online, public key should feature online too, and even ID based • Domain Name Systems (DNS) as an extremely efficient and successful online servicing hierarchy, can be streamline secured if domain names are public keys • PKC2.0: Registered bitstrings as authenticated public keys to enable crypto capabilities for smart dusts 2DaoliName All Rights Reserved ©2019
  • 3. Content • Not very interesting technicalities on Identity + “Identity” Based Cryptography (IBC + “IBC”) • Some slides, in particular those on IBCs, were pasted from SlideShare; we did so in order to walk ourselves away from pitfalls, historical ones even backdate to PKI • Bla, bla, bla, ..., however none is PPT technology • Jump to Slide entitled: “Fortunately Internet was NOT Invented by Cryptographers”, that should be a good way to review this slide set • Money is never an issue, so technical reviewers do feel free to skip anywhere money is mentioned :-) Footnote: “Identity”, “ID”, “IBC”, “IBE”, “IBS”: Quotes to eye-catch a key and unique difference from all known Identity Based Crypto: We feature online & interaction 3DaoliName All Rights Reserved ©2019
  • 4. Problems with PKI • Sender (or verifier) must have recipient’s (or signer's) certificate • Complexity of certificate mgnt; A real world hard truth: Daily- in-use public key certificates bind “Crypt32.dll” as “chained- melody” to the Chinese Patent Office website, forcing 2019 users to re-install WindowsXP clients in order to run 32-bit MS iExplorer (to sign patent filings) e3eab 1253b 682fd a7af15 3f6550 ccb6e 4DaoliName All Rights Reserved ©2019
  • 5. Identity-Based Cryptography (IBC) • Non-Interactive: Cryptography for unprepared users (“Unprepared” is not very meaningful. No surprise please.) • Public key is the user's identity, e.g., email address, phone number, ... (We like domain names, IP addresses, phone numbers, ... to be public keys.) • Sender only needs to know recipient’s identity to send an encrypted message (How?) 5DaoliName All Rights Reserved ©2019
  • 6. History of ID Based Crypto • Seminally proposed by Shamir in 1984 Shamir came up with a working system for identity-based signature (IBS), but no system for identity-based encryption (IBE) • First IBE system discovered in 2001 by Boneh and Franklin, using Weil pairing • Many many schemes followed, but few application, unfortunately 6DaoliName All Rights Reserved ©2019
  • 7. Identity-Based Crypto (IBC) Private Key Generator 7DaoliName All Rights Reserved ©2019
  • 8. “Fairy Tales” About IBC When IBC was an ugly duckling, how could it avoid merciless taunts? 1. Inherent key escrow 2. No key revocation 3. PKG requires extremely strong security assurance, since it holds all private keys and must remain online Bla bla bla ... None of these accusations make a good sense We shall refute all and each one by one 8DaoliName All Rights Reserved ©2019
  • 9. Elliptic Curve Additive Group y2 = x3 + ax + b (mod p) • x, y, a, b in GF(p) If 4a3 + 27b2 ≠ 0 (mod p), then a group can be formed: • Points on the curve plus the infinity point • Additive operation “+” being geometrically defined 9DaoliName All Rights Reserved ©2019
  • 10. Bilinear Pairing: 1st Crypto Use Burton Kaliski Jr., 1988 G, G1 : (sub)groups of prime order q | (p-1) Bilinear pairing map ê: let P = ( x, y )  G2 • Bilinear: ê( [a]P, [b]P ) = ê( P, P ) ab • Non-degenerate: P generates G  ê( P, P ) generates G1 • Efficiently computable ___________________ Kaliski's Recounting the History: Victor Miller visited Ron Rivest when I was a graduate student, and he met with me about my research. If I recall correctly, I asked him if he knew a way to determine whether an elliptic curve group was cyclic, and he suggested the Weil pairing. He also gave me a copy of his algorithm for computing the Weil pairing, and agreed that I could implement it for my thesis. 10DaoliName All Rights Reserved ©2019
  • 11. Diffie-Hellman Problem Computation: Hard; Decision: Easy Given < P, [a]P, [b]P, [c]P > for integers a, b, c Deciding c =?= ab (mod q) use bilinear pairing: ê( P, [c]P ) =?= ê( [a]P, [b]P ) Since this is equivalent to ê( P, P )c =?= ê( P, P )ab Evaluation: No need of knowing integers a, b, c This is extremely important and useful for IBC 11DaoliName All Rights Reserved ©2019
  • 12. System Setup For primes p, q and groups defined in slides 9, 10, let a Private Key Generator, PKG, set an arbitrary curve point in the order q subgroup: P = ( x, y ) mod p PKG picks a random integer s < q, and sets PPKG = [s]P PKG chooses two hash functions: G: {0,1}*→ ( x, y ): hash arbitrary bitstring to the curve H: ê(P, Q) → {0,1}log2 q : hash GF(p) to log2q-bit strings PKG publicizes system public parameters: < p, q, P, PPKG, G, H > PKG securely keeps secret “master_secret_key”: s 12DaoliName All Rights Reserved ©2019
  • 13. User Key Setting Alice's key setting: Her public key: RA = G( Alice ) Her private key is issued by PKG as: dA = [s]RA Note: RA = ( x, y ) mod p, is a point on the curve N.B. Hashing to elliptic curve is very very important! Some authors, e.g., those who have proposed SM9, choose to hash to discrete logarithm integers We shall comment undesirable consequences in so doing in a moment 13DaoliName All Rights Reserved ©2019
  • 14. ElGamal Encryption Encryption: To send encrypted M to Alice, Bob picks a random integer r < q, and computes C = < [r]P, M⊕H( gA r ) > where gA = ê( PPKG, RA ) Decryption: ( for C = < U, V > ) V ⊕ H( ê( U, [s]RA ) ) = M Decryption correctness: ê( U, dA ) = ê( [r]P, [s]RA ) = ê( [s]P, [r]RA ) = ê( PPKG, RA )r = gA r That is, Alice can use her private key to reproduce gA r, equal to Bob computed using Alice's IBC public key 14DaoliName All Rights Reserved ©2019
  • 15. Fairy Tale Refutation: “Inherent Key Escrow” Let PKG2 publicize point QPKG2 = [t]P, for a random integer t < q as its “master” secret key For RA = G(Alice), her private key dA = [s]RA + [t]RA Then, to non-escrow ElGamal encrypt message M: Bob picks a random integer r < q, and computes: C = < [r]P, M⊕H( gA r ) >, where gA r = ê( PPKG, RA )r * ê( QPKG2, RA )r Bob computes = ê( [r]P, dA ) Alice computes in decryption 15DaoliName All Rights Reserved ©2019
  • 16. A Stronger Refutation Let Alice play the role of “PKG2”: QA = [a]P, for a < q being her “private_key_self”, kept secret from PKG, Alice's “private_key_whole” is: dA = [s]RA + [a]RA Then, to no-key-escrow ElGamal encrypt message M, Bob picks a random integer r < q, and computes: C = < [r]P, M⊕H( gA r ) >, where gA r = ê( PPKG, RA )r * ê( QA, RA )r Bob computes = ê( [r]P, dA ) Alice computes in decryption This is an “IBE”, quoted as Bob needs to first get Alice's non-ID based, yet authenticated, public key QA, we will discuss absurdity for PKG to forge QA in a backup slide 16DaoliName All Rights Reserved ©2019
  • 17. Fairy Tale Refutation: “No Key Revocation” Lift version first: To interact or not to interact? That is THE question! Interaction can let Bob get non-ID based, yet well authenticated, public key QA of Alice, and provide a new usefulness to “IBC” Rationale unfolding ... 17DaoliName All Rights Reserved ©2019
  • 18. History of Digital Signature In 1976, Diffie-Hellman Open Question: How to digitally sign a document, use or not use ( g, gx ) form of public key In 1978, RSA answered so beautifully: Md mod N In 1984, ElGamal answered for public key being ( g, gx ): use a random r to cover the private key a, the covered discrete log can be computed publicly 18DaoliName All Rights Reserved ©2019
  • 19. An “ID” Based Signature Let Alice’s “private_key_PKG” be: dA = [s]RA = [s]G( Alice ) Let Alice also have “private_key_self”: a < q, kept secret from PKG as in no-key-escrow encryption In registration, Alice signs the system public point P: QA = [a]P Alice's public key parameter: < RA, QA > “ID” quoted as the public key has a non-ID feature QA 19DaoliName All Rights Reserved ©2019
  • 20. An “ID” Based Signature Alice to sign M: SigA( M ) = dA + [a]G( M ) Public Verification: ê( P, SigA( M ) ) =?= ê( PPKG, RA ) * ê( QA, G( M ) ) Staring at Alice's “private_key_self” longer: • Integer a can be one-time and random, and thus, QA = [a]P becomes part of randomized signature • After signing with a, Alice can further sign a next signature using a + b (mod q), with randomized signature part being Q'A = [a + b]P, and so on ... 20DaoliName All Rights Reserved ©2019
  • 21. Tale Refutation for Signature: “Inherent Key Escrow” • Alice can publicize first QA = [a]P, where the first “private_key_self” a is kept secret from any PKG; she can use a + b as new “private_key_self”, for Q'A = [b]P, let verifier use QA + Q'A in place of QA • Alice's “private_key_PKG” dA can also easily be issued by a distributed multiple of PKGs, exactly the same as refutation to “inherent key escrow” tale for ElGamal encryption; our usecase does feature so • A verifier can also prevent PKGs from forgery by challenging a multiplier to “private_key_self” of Alice (detail provided in a backup slide) 21DaoliName All Rights Reserved ©2019
  • 22. Refutation to Fairy Tale 3: Two Approaches to IBC 1. Hash to elliptic curve G( Alice ), G( M ), are curve points ( x, y ) to make use of beautiful ease of decision DH 2. Hash to discrete logarithm (e.g., SM9) Signature follows ElGamal's old game of using a random number to protect private key Our “IBC” schemes all enjoy approach 1: PKGs can be distributed, even Alice be one such, to refute Fairy Tale 3: “Highly strong security requirement for PKG” IBCs taking approach 2 seem to suffer all tale scorns 22DaoliName All Rights Reserved ©2019
  • 23. It's Open System, Stupid Voltage Security Inc. (Boneh's company) to sell ID-Based Crypto Email Many (more likely, cryptographers) think Email is the killer-app of ID-Based Crypto Unfortunately, this killer-app is itself now almost killed, e.g., colleagues & friends of DaoliName have not been using it for ages At any rate, even Email must also be an open system, mustn't it? 23DaoliName All Rights Reserved ©2019
  • 24. Cryptographers' System View Viral growth of a product/service/business by opening system up shouldn't be cryptographers' job optimum A crypto product should always be “hush-hush” Make it open? What are you talking about?! Private Key Generator 24DaoliName All Rights Reserved ©2019
  • 25. Fortunately Internet was NOT Invented by Cryptographers Internet has never been architect-ed to be a product, or for an app, not even for an industry, Internet is an Open System! Crypto if vended as product (box) can hardly be an open system What is easily missing? Key management Imagine Alice having bought an “IBC Email” box: “Has Bob also bought this four-double-letter fragment named gadget from Dan?” or “Is Bob's ID based key still OK?” 25DaoliName All Rights Reserved ©2019
  • 26. PKI Certificate as a Product Given key revocation can hardly be a sold box, why to vend PKI certificates in the first place? Our WindowsXP, 32-bit iExplorer using Chinese patent filers are only 1 drop in an ocean of govt services users who may be experiencing mental, if not physical, fragmentation � Making PKI an Open System shouldn't be very difficult; it's the thought got stuck offline that is! An offline box is “buy once use forever” (BOUF). To vend smart BOUF, money is not enough to hire smart makers. Now nearly century/2 elapsed: Who pays for key revocation to have user experience cared for? 26DaoliName All Rights Reserved ©2019
  • 27. Has Public Key Ever Well Done Key Management? 1976: Key agreement problem was suddenly solved, key channel setup no longer need Kerberos-like online 1978: Offline CA PKI, then you go! 2000: Even OFF offline was discovered: ID is public key, not even communication needed! 1997 (RFC 2065) to date: DNSSEC, Extremely efficient online DNS hierarchy is bundled to same structured but offline PKI hierarchy. Can, on Gods' green Earth, pull- the-plug take so long no thanking to PKI burning energy? 2019: Everybody hates offline! 27DaoliName All Rights Reserved ©2019
  • 28. Domain Name System DNS: An Awesome Online Service Internet trade-mark registration of names + online query for (registered name, IP addresses) binding Real-time query, if (DN, IP, TTL) with TTL being valid, use the binding, otherwise, as if binding revoked Both being pyramid hierarchies, online DNS is far far more successful than offline CA PKI It's Open, cross app, and cross industry! DNS will be with us forever: Programmers can't hard- wire code IPs 28DaoliName All Rights Reserved ©2019
  • 29. Bitstring Registration for Streamline Key Mgnt Services Global authenticated bitstring registration: “Is this phone no., (IP addr, ...) registered as a public key?” Use the existing DNS “trade-mark” reg hierarchy Answer is small (see a backup slide) to be wrapped in a 512-byte UDP packet, not only to penetrate firewalls, but more importantly to provide value to client users: streamline key mgnt service for dusts User: “Is the private key behind this bitstring (DN, IP addr, phone no) crypto-worthy (e.g., not revoked)?” DaoliName: “Check TTL yourself! It's 'IBC' signed!” 29DaoliName All Rights Reserved ©2019
  • 30. Where IS Money? PKI has never answered this question well, in near half century proud of offline “magic” authentication Worse for IBC: PKI can sell some certificates, i.e., service We've never heard IBC made any servicing money Open up online, like the Internet, is the key to success From data plane: Billions of smart dusts shall appreciate value of their “IBC” authenticated bitstring IDs to enjoy crypto, e.g., an IP addr can run IPSec (reverse DN query) From control plane: A new TLD “.mi” (sounding crypto in Chinese) to sell secure name registration, as “IBC” signature secured DNS (volume of DN squatting probable) 30DaoliName All Rights Reserved ©2019
  • 31. What for Sale The following two well established services have been very lucrative: 1. Trade-mark registration is a brand name (maybe value add on, + logo binding) service, to sell, physically, to a nation's businesses 2. DNS registration = Service 1 + IP address binding service, to sell, digitally, to the globe's businesses The new “IBC” enabled bitstring registration = Service 2 + authenticated public key capability service, to sell, digitally and securely, to the globe's businesses + individual users + client dusts. Securely means authenticated bitstring as public key bound to, e.g., IP addresses 31DaoliName All Rights Reserved ©2019
  • 32. Summary Historical rethinking of (not quoted, aka non-interact or offline) ID Based Crypto, and PKI Refutation to all nonsensical tales about IBC: If you can’t fix it, feature it! Crypto, in fact, key mgnt, vended as boxes, being too smart, too conservative, too complex, and too fragment, to be early to market, vending crypto boxes is hard, no money, no progress, then chunks of century go by Online is THE feature, never a problem “IBC” is not non-interactive, not offline, not a product, not for one industry. It is services for PKC 2.0 32DaoliName All Rights Reserved ©2019
  • 33. Backup Slides: “IBC” Signature Authenticated Bitstrings A registered bitstring suffices to provide public keys to verify its bona-fide-ness as being signed authoritative answer Upper level hierarchical nodes: delegated & distributed PKGs, Commercial lower level nodes: authoritative servers Upper level nodes colluding forging a non-ID point QA of a low level node is as absurd as PKI CAs faking user certificates “IBC” signatures of upper level nodes form “Compressed Fingerprints” (CF) of theirs down the DNS hierarchy, and these CFs are curve “+”ed to a single curve point Final CF small enough (Barreto-Naehrig curves) for 512-byte UDP packet to penetrate firewalls to reach clients & dusts 33DaoliName All Rights Reserved ©2019
  • 34. “IBC” CFs Secured DNSSEC Feature Online and Interaction A DNS Asker, e.g., client or ISP on behalf of client, as CF verifier, queries DN to the DNS hierarchy Each of the answering nodes upper in the DNS hierarchy above a leaf node Auth (who has “authoritative record binding”), computes a CF using the “IBC” signature formula to answer Asker Asker challenges Auth random v, requiring Auth to use va as “private_key_self” to randomize CFAuth output Asker verifies: ê(P, CFAuth(M)) = ...* ê(QAuth, G(M))v 34DaoliName All Rights Reserved ©2019
  • 35. Biz Plan 1: Cold Start for DNSSEC Sales to DNS Servers • “IBC” secured DNSSEC registration, to banks, govt services and organizations; these entities have force to impose clients to use “IBC” signed DNSSEC, to grow to commercial organizations • Hardware Signature Modules (HSMs) running PCT patented “IBC” Compressed Fingerprint protocols, to DNS servers. This sales will be virally growing to the global wide millions of authoritative DNS commercial servers (lower level nodes) Not to clients or IoT dusts (too fragmented market): • Open source reference code plugins for mobile apps, then for web browsers, OS drivers ... to virally spread 35DaoliName All Rights Reserved ©2019
  • 36. Biz Plan 1: Go to Market Strategy Top level non-commercial nodes, i.e., root “”, g-TLDs, cc-TLDs (“.com”, “.net”, “.org”, “.edu”, ..., “.uk”, “.cn”, ...), are presumably hard to join “Cold Start”. Thus: • Responsibly build their CFs for them. Responsibility means to very carefully secure their “private_key_self”s, and respectively their CFs, securely kept in HSMs on their behalf • Sell DNSSEC registration to commercial levels of nodes as descendants of the unsold top level non-registered names • IETF RFCs, open source recursive resolvers, to make viral spreading clients. If CF verification returns NO, re-query, e.g., DaoliName servers, for CF signed authoritative bindings • Someday, top level nodes would appreciate value of “IBC”. Then Their “private_key_self”s and CFs could be returned to them as their due properties 36DaoliName All Rights Reserved ©2019
  • 37. Biz Plan 2: Dream of A Cryptographer Turned Engineer All smart phones, IP addresses, smart dusts, in particular, those appearing 5G ones, and IPv6 route-able devices, may have cross app, cross industry, cross social media, ..., PKC 2.0 Alice's query: Is this unique phone number (or IP address) of Bob (of course should be anonymous) registered with authentication to have “ID” Based Crypto capability? “IBC” signed answer can just use the existing 512- byte UDP packet to transmit! No reinvention of EDNS0, or TCP DNS, or any such new wheels! 37DaoliName All Rights Reserved ©2019
  • 38. Open System Open Standard Open Source Open IETF RFCs One World, One Dream Only the World First to become better and better, can China be also good as part of :-) We want to work with the World to secure DNS, and to pervade PKC 2.0 Money is never an issue, it can only be great return! 38DaoliName All Rights Reserved ©2019