SlideShare a Scribd company logo
1 of 82
Download to read offline
A Study of Efficient Pairing
Computation Algorithm Using
KSS Curves
Md. Al-Amin Khandaker
Ph.D. Supervisor: Professor Yasuyuki Nogami
Co-supervisors: Professor Nobuo Funabiki
Professor Satoshi Denno
Ph.D. Dissertation Defense
Graduate School of Natural Science and Technology
Okayama University, Japan
Publications
■ Peer Reviewed Journal: 2
■ International Conference: 8
2
■ Md. Al-Amin Khandaker and Yasuyuki Nogami. “An Improvement of
Scalar Multiplication by Skew Frobenius Map with Multi-Scalar
Multiplication for KSS Curve”. In: IEICE Transactions 100-A.9 (2017), pp.
1838-1845.
■ Md. Al-Amin Khandaker, Taehwan Park,Yasuyuki Nogami, and Howon
Kim. “A Comparative Study of Twist Property in KSS Curves of Embedding
Degree 16 and 18 from the Implementation Perspective”. In:
J. Inform. and Commun. Convergence Engineering 15.2 (2017), pp. 97-103.
Contribution Overview
■ This dissertation provides theoretical and
experimental basis of several improvements of
pairing-based cryptography (PBC).
■ We improved Miller’s algorithm of Ate-based pairing
and Scalar multiplication over KSS curves.
■ Many high-level crypto-protocols based on pairing
can utilize our improvements.
3
Outline
■ Background and Motivation
■ Fundamentals and Challenges of Pairing-Based
Cryptography
■ Improvement of Pairing Algorithm
■ Improvement of Scalar Multiplication
■ Conclusion and Future Works
4
Outline
■ Background and Motivation
■ Fundamentals and Challenges of Pairing-Based
Cryptography
■ Improvement of Pairing Algorithm
■ Improvement of Scalar Multiplication
■ Conclusion and Future Works
5
Background
■ About 40 years ago two important innovation
happened side-by-side.
◻ Internet Protocol Suite
■ (TCP/IP) (January 1, 1983)
◻ Public Key Cryptography
■ Diffie–Hellman key exchange (DH) (1976)
■ RSA cryptosystem (1977)
■ ECC cryptosystem (1985)
6
Internet Protocol Suite
Router Router
Figure: Network Topology
Ethernet/
Fiber Optic/
etc.
7
Internet Protocol Suite
Router Router
Security is powered by Cryptography
Figure: Network Topology
Ethernet/
Fiber/ Satellite/
etc.
8
Internet Protocol Suite
Figure: TPC/IP Data flow
Application
Transport
Internet
Link
Application
Transport
Internet
Link
Internet
Link
Internet
Link
Ethernet Satellite/etc
.
Ethernet
process-to-process
host-to-host
9
Internet Protocol Suite
Application
Transport
Internet
Link
Application
Transport
Internet
Link
Internet
Link
Internet
Link
Ethernet Satellite/etc
.
Ethernet
process-to-process
host-to-host
Most cryptography protocols (e.g.
TLS) are used in Application layer. *
* TLS runs on top of TCP which imply that it is above the Transport layer. It serves encryption to higher layers, which is normally the function
of the Application layer.
10
Before Public Key Cryptography
How can I send a secret message to Bob?
Alice Bob
How can I send a secret message to Alice?
11
Before Public Key Cryptography
Share the secret key by physically meeting or some other way
12
Symmetric(Private) key Cryptography
Before Public Key Cryptography
Encryption
Communication
Media
Decryption
13
After Public Key Cryptography
14
Diffie-Hellman Key-Exchange (DHKE)
Idea Behind the
DHKE
 
15
3 Party Diffie-Hellman
Key-Exchange
16
3 Party Diffie-Hellman
Key-Exchange
The better solution i.e. in one round of communication with
greater security can be done by using Pairing-Based Cryptography
(PBC).
17
Pairing-Based Crypto Application
■ Many elegant cryptographic applications are enabled
by PBC
◻ ID-Based encryption (an ID becomes a public key)
◻ Joux’s 3DH (more efficient key-agreement)
◻ zk-SNARK (used in cryptocurrency z.cash blockchain).
◻ And many more
18
What is Pairing?
19
Input
Pairing process flow
Pairing calculation Output
What is Pairing?
■  
20
Arithmetic Level of Pairing
Protocols
Pairing
Elliptic curve
Extension Field
Prime Field
Higher Complexity
Lower Complexity
21
22
Pairing and Protocols
Pairing
Miller’s
Algorithm
Line evaluation
Final
exponentiation
Easy part
Hard part
Exponentiation (Exp.)
Scalar Multiplication (SCM)
23
Pairing and Protocols
Protocols
SCM in
SCM in
Exp. inPairing
Maps
Difficulty level comparison in terms of computation
costs.
Pairing
24
Pairing and Protocols
Difficulty level comparison in
terms of computation costs.
Pairing
Elliptic curve cryptography
over Prime Field
Elliptic curve cryptography
over Extension Field
Exponentiation over
Extension Field
Elliptic Curve Cryptography and
Pairing over Extension Field
25
Thesis Chapters and Covered Topics
Chapter 4. ICISC 2016, LNCS 10157.
Chapter 3. CANDAR 2016.
ext. ver. JICCE Journal 2017.
Chapter 5. WISA 2016, LNCS 10144.
ext. ver. IEICE Trans. 2017.
Chapter 6. INDOCRYPT 2017. LNCS 10698
Chapter 7. ext. of Chapter 6.
Chapter 8. in CANDAR 2018.
Pairing at
192-bit security
Pairing at 128-bit
security
State-of-the-art
Pairing
Chapter 4. ICISC 2016, LNCS 10157.
Chapter 8. in CANDAR 2018.
Pairing at
192-bit security
Pairing at 128-bit
security
State-of-the-art
Pairing
Outline
■ Background and Motivation
■ Fundamentals and Challenges of Pairing-Based
Cryptography
■ Improvement of Pairing Algorithm
■ Improvement of Scalar Multiplication
■ Conclusion and Future Works
26
Arithmetic Level of Pairing
Protocols
Pairing
Elliptic curve
Extension Field
Prime Field
Higher Complexity
Lower Complexity
27
Extension Field
Prime Field
Prime Field and Extension Field
Towering
used in pairing
28
Arithmetic Level of Pairing
Protocols
Pairing
Elliptic curve
Extension Field
Prime Field
Higher Complexity
Lower Complexity
29
Elliptic curve
Elliptic Curve Cryptography (ECC)
◻ Based on Elliptic Curve Discrete Logarithm Problem
(ECDLP)
◻ ECDLP is harder to break than Integer factoring used
for RSA.
Important: Provides mathematical setting to calculate
Pairing efficiently.
30
■ Benefits
◻ Similar security level with smaller parameter.
◻ Memory efficient [shorter keys and faster execution
time].
Elliptic Curves
31
Elliptic Curves
■  
32
Elliptic Curves
■ Elliptic curve has two basic operations
Elliptic curve addition (ECA) Elliptic curve doubling (ECD)
33
Elliptic Curve Scalar Multiplication
34
Arithmetic Level of Pairing
Protocols
Pairing
Elliptic curve
Extension Field
Prime Field
Higher Complexity
Lower Complexity
35
Pairing
Pairing
■  
Final Exponentiation
Miller’s Algorithm
36
37
Challenges in Pairing
Computation
Difficulty level comparison in
terms of computation costs.
Pairing
Challenges in Pairing Computation
■  
38
Twisting the curve
E
Curve definition Field is
reduced
Challenges in Pairing Computation
■  
39
Challenges in Pairing Computation
40
Pairing-friendly
Curve
Families of
Curve
Sparse
families
MNT
Freeman
Complete
family
BLS
KSS
BN
Curves not
in family
Supersingular
Cock-Pinch
Challenges in Pairing Computation
41
Pairing-friendly
Curve
Families of
Curve
Sparse
families
MNT
Freeman
Complete
family
BLS
KSS
BN
Curves not
in family
Supersingular
Cock-Pinch
Which one is the best
curve for Pairing?
Challenges in Pairing Computation
42
Pairing-friendly
Curve
Families of
Curve
Sparse
families
MNT
Freeman
Complete
family
BLS
KSS
BN
Curves not
in family
Supersingular
Cock-Pinch
No specific answer.
Need research with
different settings.
Challenges in Pairing Computation
43
Pairing-friendly
Curve
Families of
Curve
Sparse
families
MNT
Freeman
Complete
family
BLS
KSS
BN
Curves not
in family
Supersingular
Cock-Pinch
Until 2016:
Best candidate for
128-bit security
2016 extNFS
attack on DLP
Security drops
Challenges in Pairing Computation
44
Pairing-friendly
Curve
Families of
Curve
Sparse
families
MNT
Freeman
Complete
family
BLS
KSS
BN
Curves not
in family
Supersingular
Cock-Pinch
Recently:
Competitive
candidate for
128/192-bit
security
Challenges in Pairing Computation
45
Pairing-friendly
Curve
Families of
Curve
Sparse
families
MNT
Freeman
Complete
family
BLS
KSS
BN
Curves not
in family
Supersingular
Cock-Pinch
Our focus
46
Challenges in Pairing
Computation
Security of Pairing:
Pairing
ECDLP
DLP
Pairing Inversion
Challenges in Pairing Computation
47
Challenges
Curve
Pairing-friendly
Small embedding degree
Good parameter
Security
ECDLP DLP
Pairing
Miller's
Algorithm
Final
exponentiation
Some of them are interconnected.
Outline
■ Background and Motivation
■ Fundamentals and Challenges of Pairing-Based
Cryptography
■ Improvement of Pairing Algorithm
■ Improvement of Scalar Multiplication
■ Conclusion and Future Works
48
KSS-Curves
49
Kachisa-Schaefer-Scott (KSS)
2008
Improvement of Miller’s
Algorithm in KSS-18 Curve
■  
50
The idea is published at ICISC 2016.
Chapter 4 contains the details.
Miller’s Algorithm
■  
Improvement target
51
■  
z : quadratic and cubic
non residue
Isomorphic mapping
Degree 6 Twist for KSS-18 curve
52
 
53
0
0 0
11-Sparse Multiplication
11-Sparse
11 zeros
54
non-zero
zero
■  
Improvement target
Sparse Multiplication
General
multiplication
11-sparse
multiplication
Pseudo 12-sparse
multiplication
more
efficient
A little
more
efficient
55
Pseudo 12-Sparse Multiplication
cancel by final exp.
Pseudo
12-Sparse
11 zeros and 1 one
56
Pseudo 12-Sparse Multiplication
■  
57
Sparse Multiplication
11-sparse multiplication
Pseudo 12-sparse multiplication
58
Sparse Multiplication
Normal
Multiplication
324mul
11-Sparse 78mul
Pseudo 12-Sparse 60mul
Pseudo 12-sparse can reduce 18 multiplications
11-sparse
multiplication
Pseudo 12-sparse
multiplication
59
Experiment & Result
■ Experiment Environment
■ Parameters
CPU Intel Core i5-6600 (3.3GHz)
OS Ubuntu 16.04 LTS
GCC ver. 5.3.1
memory 8.00GB
60
Experiment & Result
74
Miller’s Algo.
Miller’s Algo. Calculation time (192-bit security level)
* 10000 times average
Vector Mult. 12.2% reduction
61
Both the 11-Sparse and pseudo 12-Sparse are new
works in literature.
Outline
■ Background and Motivation
■ Fundamentals and Challenges of Pairing-Based
Cryptography
■ Improvement of Pairing Algorithm
■ Improvement of Scalar Multiplication
■ Conclusion and Future Works
62
Elliptic Curve Scalar Multiplication
63
 
64
0
0 0
 
■  
65
 
■  
66
 
■  
Reverse map
67
 
■  
4-split method
typical method
68
 
■  
4-split method
typical method
69
4-Split Scalar Multiplication
Precomputed tableMSB LSB
1. Binarize
3. Operation
2. Precomputed table
70
4-Split Scalar Multiplication
Precomputed table
MSB LSB
71
4-Split Scalar Multiplication
Precomputed table
MSB LSB
72
computed
4-Split Scalar Multiplication
Precomputed table
MSB LSB
73
computed
4-Split Scalar Multiplication
Precomputed table
MSB LSB
74
ECD
computed
4-Split Scalar Multiplication
Precomputed table
MSB LSB
75
computed
Experiment & Result
Experiment Environment
Parameters 128-bit Security Level
CPU Memory Compiler OS Language Library
Intel Core
i5 5257U
2.7GHz
16GB gcc 4.2.1 OS X 10.14 C GMP
76
Experiment & Result
Pre-computation Algorithm
computation
Time
[ms]
%
increment
ECA ECD ECA ECD
Binary SCM 0 0 120 262 42.81 124
4-Split 24 20 64 68 19.09 -
2-Split 5 6 98 138 28.48 49
8-Split 52 47 67 34 21.85 14
77
ELiPS Library
■ ELiPS (Efficient Library for Pairing-Based
Systems)
◻ Installable Shared Library for C/C++ in Unix
environments.
78
■ Implementations are available in GitHub
■ https://github.com/ISecOkayamaUniv [Lab Profile]
■ https://github.com/ISecOkayamaUni/ELiPS_KSS16
[Library Source]
Outline
■ Background and Motivation
■ Fundamentals and Challenges of Pairing-Based
Cryptography
■ Improvement of Pairing Algorithm
■ Improvement of Scalar Multiplication
■ Conclusion and Future Works
79
Conclusion and Future Work
■ We improved two major operations of
pairing-based cryptography.
◻ Miller’s Algorithm
◻ Scalar Multiplication
■ Similar techniques can be applied to other
curves.
■ As future work, improve the existing
implementations technique.
■ Apply our improvements to application.
80
Thank you for listening
81
Appendix
128 256 1.25 320 5120 1280
Values are in bits. Parameters recommended for KSS-16.
82

More Related Content

What's hot

Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyAdri Jovin
 
Homomorphic Encryption Scheme.pptx
Homomorphic Encryption Scheme.pptxHomomorphic Encryption Scheme.pptx
Homomorphic Encryption Scheme.pptxSneha S K
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryptionNamit Sinha
 
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and...
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and...Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and...
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and...MITSUNARI Shigeo
 
DISCRETE LOGARITHM PROBLEM
DISCRETE LOGARITHM PROBLEMDISCRETE LOGARITHM PROBLEM
DISCRETE LOGARITHM PROBLEMMANISH KUMAR
 
暗認本読書会13 advanced
暗認本読書会13 advanced暗認本読書会13 advanced
暗認本読書会13 advancedMITSUNARI Shigeo
 
Number theory and cryptography
Number theory and cryptographyNumber theory and cryptography
Number theory and cryptographyYasser Ali
 
RSA鍵生成脆弱性ROCAの紹介
RSA鍵生成脆弱性ROCAの紹介RSA鍵生成脆弱性ROCAの紹介
RSA鍵生成脆弱性ROCAの紹介MITSUNARI Shigeo
 
Zksnarks in english
Zksnarks in englishZksnarks in english
Zksnarks in englishRonak Kogta
 
ECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasJames McGivern
 
Lattice Cryptography
Lattice CryptographyLattice Cryptography
Lattice CryptographyPriyanka Aash
 
『データ解析におけるプライバシー保護』勉強会 秘密計算
『データ解析におけるプライバシー保護』勉強会 秘密計算『データ解析におけるプライバシー保護』勉強会 秘密計算
『データ解析におけるプライバシー保護』勉強会 秘密計算MITSUNARI Shigeo
 
クラウドを支えるこれからの暗号技術
クラウドを支えるこれからの暗号技術クラウドを支えるこれからの暗号技術
クラウドを支えるこれからの暗号技術MITSUNARI Shigeo
 
ペアリングベースの効率的なレベル2準同型暗号(SCIS2018)
ペアリングベースの効率的なレベル2準同型暗号(SCIS2018)ペアリングベースの効率的なレベル2準同型暗号(SCIS2018)
ペアリングベースの効率的なレベル2準同型暗号(SCIS2018)MITSUNARI Shigeo
 

What's hot (20)

Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryption
 
暗認本読書会11
暗認本読書会11暗認本読書会11
暗認本読書会11
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Homomorphic Encryption Scheme.pptx
Homomorphic Encryption Scheme.pptxHomomorphic Encryption Scheme.pptx
Homomorphic Encryption Scheme.pptx
 
Homomorphic encryption
Homomorphic encryptionHomomorphic encryption
Homomorphic encryption
 
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and...
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and...Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and...
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and...
 
楕円曲線と暗号
楕円曲線と暗号楕円曲線と暗号
楕円曲線と暗号
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Ch04
Ch04Ch04
Ch04
 
DISCRETE LOGARITHM PROBLEM
DISCRETE LOGARITHM PROBLEMDISCRETE LOGARITHM PROBLEM
DISCRETE LOGARITHM PROBLEM
 
暗認本読書会13 advanced
暗認本読書会13 advanced暗認本読書会13 advanced
暗認本読書会13 advanced
 
Number theory and cryptography
Number theory and cryptographyNumber theory and cryptography
Number theory and cryptography
 
RSA鍵生成脆弱性ROCAの紹介
RSA鍵生成脆弱性ROCAの紹介RSA鍵生成脆弱性ROCAの紹介
RSA鍵生成脆弱性ROCAの紹介
 
Zksnarks in english
Zksnarks in englishZksnarks in english
Zksnarks in english
 
ECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-NinjasECC vs RSA: Battle of the Crypto-Ninjas
ECC vs RSA: Battle of the Crypto-Ninjas
 
Lattice Cryptography
Lattice CryptographyLattice Cryptography
Lattice Cryptography
 
『データ解析におけるプライバシー保護』勉強会 秘密計算
『データ解析におけるプライバシー保護』勉強会 秘密計算『データ解析におけるプライバシー保護』勉強会 秘密計算
『データ解析におけるプライバシー保護』勉強会 秘密計算
 
クラウドを支えるこれからの暗号技術
クラウドを支えるこれからの暗号技術クラウドを支えるこれからの暗号技術
クラウドを支えるこれからの暗号技術
 
ペアリングベースの効率的なレベル2準同型暗号(SCIS2018)
ペアリングベースの効率的なレベル2準同型暗号(SCIS2018)ペアリングベースの効率的なレベル2準同型暗号(SCIS2018)
ペアリングベースの効率的なレベル2準同型暗号(SCIS2018)
 

Similar to Pairing-Based Crypto: Ph.D. defence presentation

An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
 
Data Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyData Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyBALAKUMARC1
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different HardwareIRJET Journal
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmHigh throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmTELKOMNIKA JOURNAL
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithmpaperpublications3
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...IRJET Journal
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET Journal
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfA VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfRamRaja15
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmAlexander Decker
 
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019Jonas Traub
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...IJECEIAES
 
The Transformation of Systems Biology Into A Large Data Science
The Transformation of Systems Biology Into A Large Data ScienceThe Transformation of Systems Biology Into A Large Data Science
The Transformation of Systems Biology Into A Large Data ScienceRobert Grossman
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONIJNSA Journal
 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY Abhishek Majumdar
 

Similar to Pairing-Based Crypto: Ph.D. defence presentation (20)

Acm aictc2016
Acm aictc2016Acm aictc2016
Acm aictc2016
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
Data Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyData Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA Cryptography
 
W4301117121
W4301117121W4301117121
W4301117121
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmHigh throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
Ch03
Ch03Ch03
Ch03
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfA VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
 
Survey of recent deep learning with low precision
Survey of recent deep learning with low precisionSurvey of recent deep learning with low precision
Survey of recent deep learning with low precision
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
 
The Transformation of Systems Biology Into A Large Data Science
The Transformation of Systems Biology Into A Large Data ScienceThe Transformation of Systems Biology Into A Large Data Science
The Transformation of Systems Biology Into A Large Data Science
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
 

Recently uploaded

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 

Recently uploaded (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 

Pairing-Based Crypto: Ph.D. defence presentation