SlideShare a Scribd company logo
1 of 15
Download to read offline
How to share a secret
           by Adi Shamir

           Damitha Premadasa.
            Kelum Senanayake.
Introduction
   About author Adi Shamir
       An Israeli cryptographer born July 6, 1952.
       He is a co-inventor of the RSA algorithm, Feige-Fiat-Shamir
        Identification Scheme.
       One of the inventors of Differential Cryptanalys.
       Has made numerous contributions to the fields of
        cryptography and computer science.
   We rely on secrets such as safe combinations, PIN codes,
    computer passwords, etc.
       Secrets can be lost.
       Documents get destroyed, Hard disks fail,
       People forget, People leave companies, People die...
Example key management scenario
   Eleven scientists are working on a secret project. They
    wish to lock up the documents in a cabinet. The cabinet
    can be opened if and only if six or more of the scientists
    are present.
       What is the smallest number of locks needed?
       What is the smallest number of keys to the locks each scientist
        must carry?
   Minimal solution uses 462 locks and 252 keys per
    scientist.
   Drawbacks:
       These numbers are clearly impractical
       Becomes exponentially worse when the number of scientists
        increases
Key management/cryptographic
schemes
   What is a Key management system.
       Key management is the provisions made in
        a cryptography system design that are related to generation,
        exchange, storage, safeguarding, use, vetting, and replacement
        of keys.
   Properties of key management schemes
       Safety
       Convenience
Shamir's secret-sharing scheme
   Why Threshold schemes?
   Secret sharing scheme,
       Divide secret data (D) in to pieces (n)
       Knowledge of some pieces (k) enables to derive secret data
        (D)
       Knowledge of any pieces (k-1) makes secret data (D)
        completely undetermined.
   Such a scheme is called a (k, n) threshold scheme.
   Easily computable when have necessary data available
   Avoid single point of failure, increase reliability and
    security
   Safety and convenience
Shamir's secret-sharing scheme (A simple
(k, n) threshold scheme)

   Suppose using ( k, n ) threshold scheme to share our
    secret S.
   Choose at random k-1 coefficients a1, a2,.., a(k-1)
    and let a0=S. Build the polynomial.

   q(x) = a0 + a1 * x + a2 *x2 + ... a(k-1) * x(k-1)

   Construct D1=q(1), ..., Di=q(i), ..., Dn=q(n).
   Given any subset of k pairs, can find S using interpolation
   The secret is the constant term a0.
Shamir's Secret Sharing scheme
   The essential idea of Adi Shamir's threshold scheme,
       2 points are sufficient to define a line.
       3 points are sufficient to define a parabola.
       4 points to define a cubic curve and so forth.
       k points to define a polynomial of degree (k - 1)
Example
   S = 1234, n = 6, k = 3
   At random we obtain 2 numbers: a1 = 166, a2 = 94.
   Our polynomial to produce secret shares (points) is
    therefore:
   q(x) = 1234 + 166 x + 94x2
   We construct 6 points from the polynomial:
   (1,1494); (2,1942); (3,2578); (4,3402);
    (5,4414); (6,5614)
   We give each participant a different single point (both x
    and q(x) ).
Example contd…
   Reconstruction the secret,
   In order to reconstruct the secret any 3 points will be
    enough.
   Let us consider (2,1942); (4,3402); (5,4414);
   Using Lagrange basis polynomials, it is possible to
    construct q(x) hence S value can be derived.
Example contd…
Let us consider



We will compute Lagrange basis polynomials:
Example contd…
Therefore,
Useful properties of (k, n) threshold
scheme
   Secure.
   Minimal: The size of each piece does not exceed the size
    of the original data.
   Extensible: When k is kept fixed, Di pieces can be
    dynamically added or deleted without affecting the other
    pieces.
   Dynamic: Security can be easily enhanced without
    changing the secret, but by changing the polynomial
    occasionally (keeping the same free term) and
    constructing new shares to the participants.
Useful properties contd..
   Flexible: In organizations where hierarchy is important,
    we can supply each participant different number of pieces
    according to his importance inside the organization. For
    instance, the president can unlock the safe alone, whereas
    3 secretaries are required together to unlock it.
   Efficient algorithms [O(n log2 n)] available for polynomial
    evaluation and interpolation
Available Implementations
   http://sourceforge.net/projects/secretsharejava/
   http://www.christophedavid.org/w/c/w.php/Calculators/Sh
    amirSecretSharing
   http://point-at-infinity.org/ssss/demo.html
   http://www.buttsoft.com/software/tontine/
   http://www.buttsoft.com/software/tontine/java.html
Q&A


  Thank You

More Related Content

What's hot

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
cryptography
cryptographycryptography
cryptographyswatihans
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptographyanusachu .
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introductionVasuki Ramasamy
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxGauriBornare1
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 

What's hot (20)

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
cryptography
cryptographycryptography
cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
encryption and decryption
encryption and decryptionencryption and decryption
encryption and decryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Kerberos
KerberosKerberos
Kerberos
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introduction
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Viewers also liked

secret sharing schemes
secret sharing schemessecret sharing schemes
secret sharing schemeswonloser
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmNikita Kasar
 
Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionKelum Senanayake
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeKelum Senanayake
 
AIESEC_LCP Interview Slides
AIESEC_LCP Interview SlidesAIESEC_LCP Interview Slides
AIESEC_LCP Interview SlidesMax Lee
 
AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)AIESECUNS
 
What you need to know about GC
What you need to know about GCWhat you need to know about GC
What you need to know about GCKelum Senanayake
 
EP interview preparation training
EP interview preparation trainingEP interview preparation training
EP interview preparation trainingAIESECGreece
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 ProtocolKelum Senanayake
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionKelum Senanayake
 

Viewers also liked (14)

secret sharing schemes
secret sharing schemessecret sharing schemes
secret sharing schemes
 
EP interview question list
EP interview question listEP interview question list
EP interview question list
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's Algorithm
 
Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another Introduction
 
Node.js Introduction
Node.js IntroductionNode.js Introduction
Node.js Introduction
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in Skype
 
AIESEC_LCP Interview Slides
AIESEC_LCP Interview SlidesAIESEC_LCP Interview Slides
AIESEC_LCP Interview Slides
 
AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)
 
What you need to know about GC
What you need to know about GCWhat you need to know about GC
What you need to know about GC
 
EP interview preparation training
EP interview preparation trainingEP interview preparation training
EP interview preparation training
 
GPU Programming with Java
GPU Programming with JavaGPU Programming with Java
GPU Programming with Java
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 Protocol
 
Knight's Tour
Knight's TourKnight's Tour
Knight's Tour
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another Introduction
 

Similar to How to Share a Secret (20)

Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
How to share a secret
How to share a secretHow to share a secret
How to share a secret
 
15
1515
15
 
15
1515
15
 
11
1111
11
 
11
1111
11
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Shilpa ppt
Shilpa pptShilpa ppt
Shilpa ppt
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
OS ppt Modified.pptx
OS ppt Modified.pptxOS ppt Modified.pptx
OS ppt Modified.pptx
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
Kleptography
KleptographyKleptography
Kleptography
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Cybersecurity Research Paper
Cybersecurity Research PaperCybersecurity Research Paper
Cybersecurity Research Paper
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 

Recently uploaded

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Recently uploaded (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

How to Share a Secret

  • 1. How to share a secret by Adi Shamir Damitha Premadasa. Kelum Senanayake.
  • 2. Introduction  About author Adi Shamir  An Israeli cryptographer born July 6, 1952.  He is a co-inventor of the RSA algorithm, Feige-Fiat-Shamir Identification Scheme.  One of the inventors of Differential Cryptanalys.  Has made numerous contributions to the fields of cryptography and computer science.  We rely on secrets such as safe combinations, PIN codes, computer passwords, etc.  Secrets can be lost.  Documents get destroyed, Hard disks fail,  People forget, People leave companies, People die...
  • 3. Example key management scenario  Eleven scientists are working on a secret project. They wish to lock up the documents in a cabinet. The cabinet can be opened if and only if six or more of the scientists are present.  What is the smallest number of locks needed?  What is the smallest number of keys to the locks each scientist must carry?  Minimal solution uses 462 locks and 252 keys per scientist.  Drawbacks:  These numbers are clearly impractical  Becomes exponentially worse when the number of scientists increases
  • 4. Key management/cryptographic schemes  What is a Key management system.  Key management is the provisions made in a cryptography system design that are related to generation, exchange, storage, safeguarding, use, vetting, and replacement of keys.  Properties of key management schemes  Safety  Convenience
  • 5. Shamir's secret-sharing scheme  Why Threshold schemes?  Secret sharing scheme,  Divide secret data (D) in to pieces (n)  Knowledge of some pieces (k) enables to derive secret data (D)  Knowledge of any pieces (k-1) makes secret data (D) completely undetermined.  Such a scheme is called a (k, n) threshold scheme.  Easily computable when have necessary data available  Avoid single point of failure, increase reliability and security  Safety and convenience
  • 6. Shamir's secret-sharing scheme (A simple (k, n) threshold scheme)  Suppose using ( k, n ) threshold scheme to share our secret S.  Choose at random k-1 coefficients a1, a2,.., a(k-1) and let a0=S. Build the polynomial.  q(x) = a0 + a1 * x + a2 *x2 + ... a(k-1) * x(k-1)  Construct D1=q(1), ..., Di=q(i), ..., Dn=q(n).  Given any subset of k pairs, can find S using interpolation  The secret is the constant term a0.
  • 7. Shamir's Secret Sharing scheme  The essential idea of Adi Shamir's threshold scheme,  2 points are sufficient to define a line.  3 points are sufficient to define a parabola.  4 points to define a cubic curve and so forth.  k points to define a polynomial of degree (k - 1)
  • 8. Example  S = 1234, n = 6, k = 3  At random we obtain 2 numbers: a1 = 166, a2 = 94.  Our polynomial to produce secret shares (points) is therefore:  q(x) = 1234 + 166 x + 94x2  We construct 6 points from the polynomial:  (1,1494); (2,1942); (3,2578); (4,3402); (5,4414); (6,5614)  We give each participant a different single point (both x and q(x) ).
  • 9. Example contd…  Reconstruction the secret,  In order to reconstruct the secret any 3 points will be enough.  Let us consider (2,1942); (4,3402); (5,4414);  Using Lagrange basis polynomials, it is possible to construct q(x) hence S value can be derived.
  • 10. Example contd… Let us consider We will compute Lagrange basis polynomials:
  • 12. Useful properties of (k, n) threshold scheme  Secure.  Minimal: The size of each piece does not exceed the size of the original data.  Extensible: When k is kept fixed, Di pieces can be dynamically added or deleted without affecting the other pieces.  Dynamic: Security can be easily enhanced without changing the secret, but by changing the polynomial occasionally (keeping the same free term) and constructing new shares to the participants.
  • 13. Useful properties contd..  Flexible: In organizations where hierarchy is important, we can supply each participant different number of pieces according to his importance inside the organization. For instance, the president can unlock the safe alone, whereas 3 secretaries are required together to unlock it.  Efficient algorithms [O(n log2 n)] available for polynomial evaluation and interpolation
  • 14. Available Implementations  http://sourceforge.net/projects/secretsharejava/  http://www.christophedavid.org/w/c/w.php/Calculators/Sh amirSecretSharing  http://point-at-infinity.org/ssss/demo.html  http://www.buttsoft.com/software/tontine/  http://www.buttsoft.com/software/tontine/java.html
  • 15. Q&A Thank You