shamir secret sharing presentation

10
Securing Emails using Secret Sharing

Upload: kaliel-williamson

Post on 13-Apr-2017

342 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Shamir Secret Sharing Presentation

Securing Emails using Secret Sharing

Page 2: Shamir Secret Sharing Presentation

Securing Emails using Secret Sharing

Have you ever sent your confidential information such as passport and SSN over email?

Page 3: Shamir Secret Sharing Presentation

Motivation• Most people have done it

• Email servers have confidential information about most people

Page 4: Shamir Secret Sharing Presentation

Shamir Secret Sharing MUA• Secret: Any information that a user wishes to encrypt• Share: The resultant k pieces of information generated from the

secret, which will not yield any useful information on the secret until all shares are combined.

Page 5: Shamir Secret Sharing Presentation

Application• Secure: Perfect information-theoretic security• Extensible: No share is significantly larger than the original secret• Fast: Computational overhead for generating shares and

reconstructing secrets is linear based on the number of shares generated and length of the secret.

Page 6: Shamir Secret Sharing Presentation

System Architecture

• Each piece P represents a different email address to which a single share is sent.

• Share generation happens on the sending end.

• Secret reconstruction happens at the receiving end.

Page 7: Shamir Secret Sharing Presentation

Why use this?• People should have the option to use completely secure email

systems• Connection between user and email provider is typically

encrypted and secure, but from then on there is no guarantee.• Using a web browser to interact with email is inherently insecure• Widely used public key encryption schemes are useless if an

intruder obtains the private key

Page 8: Shamir Secret Sharing Presentation

Example Share Generation• S = 1234

Page 9: Shamir Secret Sharing Presentation

Example Secret Reconstructionx y

1 1494

2 329

3 965

∴𝑆=1234

Page 10: Shamir Secret Sharing Presentation

Next Steps• Collect data and write a research paper• Convert the program into an Android app