SlideShare a Scribd company logo
1 of 15
Download to read offline
How to share a secret
           by Adi Shamir

           Damitha Premadasa.
            Kelum Senanayake.
Introduction
   About author Adi Shamir
       An Israeli cryptographer born July 6, 1952.
       He is a co-inventor of the RSA algorithm, Feige-Fiat-Shamir
        Identification Scheme.
       One of the inventors of Differential Cryptanalys.
       Has made numerous contributions to the fields of
        cryptography and computer science.
   We rely on secrets such as safe combinations, PIN codes,
    computer passwords, etc.
       Secrets can be lost.
       Documents get destroyed, Hard disks fail,
       People forget, People leave companies, People die...
Example key management scenario
   Eleven scientists are working on a secret project. They
    wish to lock up the documents in a cabinet. The cabinet
    can be opened if and only if six or more of the scientists
    are present.
       What is the smallest number of locks needed?
       What is the smallest number of keys to the locks each scientist
        must carry?
   Minimal solution uses 462 locks and 252 keys per
    scientist.
   Drawbacks:
       These numbers are clearly impractical
       Becomes exponentially worse when the number of scientists
        increases
Key management/cryptographic
schemes
   What is a Key management system.
       Key management is the provisions made in
        a cryptography system design that are related to generation,
        exchange, storage, safeguarding, use, vetting, and replacement
        of keys.
   Properties of key management schemes
       Safety
       Convenience
Shamir's secret-sharing scheme
   Why Threshold schemes?
   Secret sharing scheme,
       Divide secret data (D) in to pieces (n)
       Knowledge of some pieces (k) enables to derive secret data
        (D)
       Knowledge of any pieces (k-1) makes secret data (D)
        completely undetermined.
   Such a scheme is called a (k, n) threshold scheme.
   Easily computable when have necessary data available
   Avoid single point of failure, increase reliability and
    security
   Safety and convenience
Shamir's secret-sharing scheme (A simple
(k, n) threshold scheme)

   Suppose using ( k, n ) threshold scheme to share our
    secret S.
   Choose at random k-1 coefficients a1, a2,.., a(k-1)
    and let a0=S. Build the polynomial.

   q(x) = a0 + a1 * x + a2 *x2 + ... a(k-1) * x(k-1)

   Construct D1=q(1), ..., Di=q(i), ..., Dn=q(n).
   Given any subset of k pairs, can find S using interpolation
   The secret is the constant term a0.
Shamir's Secret Sharing scheme
   The essential idea of Adi Shamir's threshold scheme,
       2 points are sufficient to define a line.
       3 points are sufficient to define a parabola.
       4 points to define a cubic curve and so forth.
       k points to define a polynomial of degree (k - 1)
Example
   S = 1234, n = 6, k = 3
   At random we obtain 2 numbers: a1 = 166, a2 = 94.
   Our polynomial to produce secret shares (points) is
    therefore:
   q(x) = 1234 + 166 x + 94x2
   We construct 6 points from the polynomial:
   (1,1494); (2,1942); (3,2578); (4,3402);
    (5,4414); (6,5614)
   We give each participant a different single point (both x
    and q(x) ).
Example contd…
   Reconstruction the secret,
   In order to reconstruct the secret any 3 points will be
    enough.
   Let us consider (2,1942); (4,3402); (5,4414);
   Using Lagrange basis polynomials, it is possible to
    construct q(x) hence S value can be derived.
Example contd…
Let us consider



We will compute Lagrange basis polynomials:
Example contd…
Therefore,
Useful properties of (k, n) threshold
scheme
   Secure.
   Minimal: The size of each piece does not exceed the size
    of the original data.
   Extensible: When k is kept fixed, Di pieces can be
    dynamically added or deleted without affecting the other
    pieces.
   Dynamic: Security can be easily enhanced without
    changing the secret, but by changing the polynomial
    occasionally (keeping the same free term) and
    constructing new shares to the participants.
Useful properties contd..
   Flexible: In organizations where hierarchy is important,
    we can supply each participant different number of pieces
    according to his importance inside the organization. For
    instance, the president can unlock the safe alone, whereas
    3 secretaries are required together to unlock it.
   Efficient algorithms [O(n log2 n)] available for polynomial
    evaluation and interpolation
Available Implementations
   http://sourceforge.net/projects/secretsharejava/
   http://www.christophedavid.org/w/c/w.php/Calculators/Sh
    amirSecretSharing
   http://point-at-infinity.org/ssss/demo.html
   http://www.buttsoft.com/software/tontine/
   http://www.buttsoft.com/software/tontine/java.html
Q&A


  Thank You

More Related Content

What's hot

Message Authentication Requirement-MAC
Message Authentication Requirement-MACMessage Authentication Requirement-MAC
Message Authentication Requirement-MACSou Jana
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyAdri Jovin
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authenticationchauhankapil
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityBikramjit Sarkar, Ph.D.
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionVipin Tejwani
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptographyFarah Shaikh
 
Shamir Secret Sharing Presentation
Shamir Secret Sharing PresentationShamir Secret Sharing Presentation
Shamir Secret Sharing PresentationKaliel Williamson
 
Lattice Cryptography
Lattice CryptographyLattice Cryptography
Lattice CryptographyPriyanka Aash
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 

What's hot (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Message Authentication Requirement-MAC
Message Authentication Requirement-MACMessage Authentication Requirement-MAC
Message Authentication Requirement-MAC
 
Cryptography
CryptographyCryptography
Cryptography
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Shamir Secret Sharing Presentation
Shamir Secret Sharing PresentationShamir Secret Sharing Presentation
Shamir Secret Sharing Presentation
 
Lattice Cryptography
Lattice CryptographyLattice Cryptography
Lattice Cryptography
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Viewers also liked

secret sharing schemes
secret sharing schemessecret sharing schemes
secret sharing schemeswonloser
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmNikita Kasar
 
Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionKelum Senanayake
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeKelum Senanayake
 
AIESEC_LCP Interview Slides
AIESEC_LCP Interview SlidesAIESEC_LCP Interview Slides
AIESEC_LCP Interview SlidesMax Lee
 
AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)AIESECUNS
 
What you need to know about GC
What you need to know about GCWhat you need to know about GC
What you need to know about GCKelum Senanayake
 
EP interview preparation training
EP interview preparation trainingEP interview preparation training
EP interview preparation trainingAIESECGreece
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 ProtocolKelum Senanayake
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionKelum Senanayake
 

Viewers also liked (14)

secret sharing schemes
secret sharing schemessecret sharing schemes
secret sharing schemes
 
EP interview question list
EP interview question listEP interview question list
EP interview question list
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's Algorithm
 
Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another Introduction
 
Node.js Introduction
Node.js IntroductionNode.js Introduction
Node.js Introduction
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in Skype
 
AIESEC_LCP Interview Slides
AIESEC_LCP Interview SlidesAIESEC_LCP Interview Slides
AIESEC_LCP Interview Slides
 
AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)
 
What you need to know about GC
What you need to know about GCWhat you need to know about GC
What you need to know about GC
 
EP interview preparation training
EP interview preparation trainingEP interview preparation training
EP interview preparation training
 
GPU Programming with Java
GPU Programming with JavaGPU Programming with Java
GPU Programming with Java
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 Protocol
 
Knight's Tour
Knight's TourKnight's Tour
Knight's Tour
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another Introduction
 

Similar to How to Share a Secret (20)

Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
How to share a secret
How to share a secretHow to share a secret
How to share a secret
 
15
1515
15
 
15
1515
15
 
11
1111
11
 
11
1111
11
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Shilpa ppt
Shilpa pptShilpa ppt
Shilpa ppt
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
OS ppt Modified.pptx
OS ppt Modified.pptxOS ppt Modified.pptx
OS ppt Modified.pptx
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
Kleptography
KleptographyKleptography
Kleptography
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Cybersecurity Research Paper
Cybersecurity Research PaperCybersecurity Research Paper
Cybersecurity Research Paper
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

How to Share a Secret

  • 1. How to share a secret by Adi Shamir Damitha Premadasa. Kelum Senanayake.
  • 2. Introduction  About author Adi Shamir  An Israeli cryptographer born July 6, 1952.  He is a co-inventor of the RSA algorithm, Feige-Fiat-Shamir Identification Scheme.  One of the inventors of Differential Cryptanalys.  Has made numerous contributions to the fields of cryptography and computer science.  We rely on secrets such as safe combinations, PIN codes, computer passwords, etc.  Secrets can be lost.  Documents get destroyed, Hard disks fail,  People forget, People leave companies, People die...
  • 3. Example key management scenario  Eleven scientists are working on a secret project. They wish to lock up the documents in a cabinet. The cabinet can be opened if and only if six or more of the scientists are present.  What is the smallest number of locks needed?  What is the smallest number of keys to the locks each scientist must carry?  Minimal solution uses 462 locks and 252 keys per scientist.  Drawbacks:  These numbers are clearly impractical  Becomes exponentially worse when the number of scientists increases
  • 4. Key management/cryptographic schemes  What is a Key management system.  Key management is the provisions made in a cryptography system design that are related to generation, exchange, storage, safeguarding, use, vetting, and replacement of keys.  Properties of key management schemes  Safety  Convenience
  • 5. Shamir's secret-sharing scheme  Why Threshold schemes?  Secret sharing scheme,  Divide secret data (D) in to pieces (n)  Knowledge of some pieces (k) enables to derive secret data (D)  Knowledge of any pieces (k-1) makes secret data (D) completely undetermined.  Such a scheme is called a (k, n) threshold scheme.  Easily computable when have necessary data available  Avoid single point of failure, increase reliability and security  Safety and convenience
  • 6. Shamir's secret-sharing scheme (A simple (k, n) threshold scheme)  Suppose using ( k, n ) threshold scheme to share our secret S.  Choose at random k-1 coefficients a1, a2,.., a(k-1) and let a0=S. Build the polynomial.  q(x) = a0 + a1 * x + a2 *x2 + ... a(k-1) * x(k-1)  Construct D1=q(1), ..., Di=q(i), ..., Dn=q(n).  Given any subset of k pairs, can find S using interpolation  The secret is the constant term a0.
  • 7. Shamir's Secret Sharing scheme  The essential idea of Adi Shamir's threshold scheme,  2 points are sufficient to define a line.  3 points are sufficient to define a parabola.  4 points to define a cubic curve and so forth.  k points to define a polynomial of degree (k - 1)
  • 8. Example  S = 1234, n = 6, k = 3  At random we obtain 2 numbers: a1 = 166, a2 = 94.  Our polynomial to produce secret shares (points) is therefore:  q(x) = 1234 + 166 x + 94x2  We construct 6 points from the polynomial:  (1,1494); (2,1942); (3,2578); (4,3402); (5,4414); (6,5614)  We give each participant a different single point (both x and q(x) ).
  • 9. Example contd…  Reconstruction the secret,  In order to reconstruct the secret any 3 points will be enough.  Let us consider (2,1942); (4,3402); (5,4414);  Using Lagrange basis polynomials, it is possible to construct q(x) hence S value can be derived.
  • 10. Example contd… Let us consider We will compute Lagrange basis polynomials:
  • 12. Useful properties of (k, n) threshold scheme  Secure.  Minimal: The size of each piece does not exceed the size of the original data.  Extensible: When k is kept fixed, Di pieces can be dynamically added or deleted without affecting the other pieces.  Dynamic: Security can be easily enhanced without changing the secret, but by changing the polynomial occasionally (keeping the same free term) and constructing new shares to the participants.
  • 13. Useful properties contd..  Flexible: In organizations where hierarchy is important, we can supply each participant different number of pieces according to his importance inside the organization. For instance, the president can unlock the safe alone, whereas 3 secretaries are required together to unlock it.  Efficient algorithms [O(n log2 n)] available for polynomial evaluation and interpolation
  • 14. Available Implementations  http://sourceforge.net/projects/secretsharejava/  http://www.christophedavid.org/w/c/w.php/Calculators/Sh amirSecretSharing  http://point-at-infinity.org/ssss/demo.html  http://www.buttsoft.com/software/tontine/  http://www.buttsoft.com/software/tontine/java.html
  • 15. Q&A Thank You