19 big enough? What marketing says Generate public keys 56-bit - - PowerPoint PPT Presentation

19 big enough what marketing says generate public keys 56
SMART_READER_LITE
LIVE PREVIEW

19 big enough? What marketing says Generate public keys 56-bit - - PowerPoint PPT Presentation

Is 2 255 19 big enough? What marketing says Generate public keys 56-bit crypto: Broken. on a strong elliptic curve 128-bit crypto: Okay. over the field Z (2 255 19). 256-bit crypto: High security! Is that safe? 512-bit


slide-1
SLIDE 1

Is 2255

  • 19 big enough?

Generate public keys

  • n a “strong” elliptic curve
  • ver the field Z (2255
  • 19).

Is that safe? “Size does matter!” What marketing says 56-bit crypto: Broken. 128-bit crypto: Okay. 256-bit crypto: High security! 512-bit crypto: Broken. 1024-bit crypto: Shaky. 2255

  • 19 must be, um, 256 bits.

Fantastic! Best possible security level.

slide-2
SLIDE 2
  • enough?

keys elliptic curve (2255

  • 19).

matter!” What marketing says 56-bit crypto: Broken. 128-bit crypto: Okay. 256-bit crypto: High security! 512-bit crypto: Broken. 1024-bit crypto: Shaky. 2255

  • 19 must be, um, 256 bits.

Fantastic! Best possible security level. What NSA says NSA approves products “classified or mission national security info NSA wants “elliptic GF( ), where is greater than 2255.” So 2255 + 95 is fine for national securit but 2255

  • 19 is not.
slide-3
SLIDE 3

What marketing says 56-bit crypto: Broken. 128-bit crypto: Okay. 256-bit crypto: High security! 512-bit crypto: Broken. 1024-bit crypto: Shaky. 2255

  • 19 must be, um, 256 bits.

Fantastic! Best possible security level. What NSA says NSA approves products for “classified or mission critical national security information.” NSA wants “elliptic curves over GF( ), where is a prime number greater than 2255.” So 2255 + 95 is fine for national security information but 2255

  • 19 is not.
slide-4
SLIDE 4

says Broken. Okay. High security! Broken. Shaky.

  • be, um, 256 bits.

security level. What NSA says NSA approves products for “classified or mission critical national security information.” NSA wants “elliptic curves over GF( ), where is a prime number greater than 2255.” So 2255 + 95 is fine for national security information but 2255

  • 19 is not.

What NIST says 128-bit AES keys “co ECC primes with “256-383” the amount of work “break the algorithms” is approximately the namely 2128 operations, by best techniques

slide-5
SLIDE 5

What NSA says NSA approves products for “classified or mission critical national security information.” NSA wants “elliptic curves over GF( ), where is a prime number greater than 2255.” So 2255 + 95 is fine for national security information but 2255

  • 19 is not.

What NIST says 128-bit AES keys “correspond” to ECC primes with “256-383” bits: the amount of work needed to “break the algorithms” is approximately the same, namely 2128 operations, by best techniques known.

slide-6
SLIDE 6

roducts for mission critical information.” “elliptic curves over is a prime number .” fine security information

  • not.

What NIST says 128-bit AES keys “correspond” to ECC primes with “256-383” bits: the amount of work needed to “break the algorithms” is approximately the same, namely 2128 operations, by best techniques known. What I say Given ( ) = AES

  • using

2127 AES Given ( 1)

( 2

✁ ✂ ✂ ✂ ✁

find all

✄ using a

AES evaluations. Or find some

✄ using

evaluations. Standard algorithms negligible communication perfect parallelization: cr.yp.to/papers.html #bruteforce

slide-7
SLIDE 7

What NIST says 128-bit AES keys “correspond” to ECC primes with “256-383” bits: the amount of work needed to “break the algorithms” is approximately the same, namely 2128 operations, by best techniques known. What I say Given ( ) = AES

(0), find

using 2127 AES evaluations. Given ( 1)

( 2)

✁ ✂ ✂ ✂ ✁

( 240), find all

✄ using a total of

2127 AES evaluations. Or find some

✄ using

287 AES evaluations. Standard algorithms have negligible communication and perfect parallelization: see, e.g., cr.yp.to/papers.html #bruteforce

slide-8
SLIDE 8

eys “correspond” to “256-383” bits:

  • rk needed to

rithms” the same, erations, techniques known. What I say Given ( ) = AES

(0), find

using 2127 AES evaluations. Given ( 1)

( 2)

✁ ✂ ✂ ✂ ✁

( 240), find all

✄ using a total of

2127 AES evaluations. Or find some

✄ using

287 AES evaluations. Standard algorithms have negligible communication and perfect parallelization: see, e.g., cr.yp.to/papers.html #bruteforce Given public key on 255-bit elliptic curve find secret key using 2127 additions Given 240 public keys, find all secret keys using 2147 additions Finding some key is as finding first key: 2127 additions. Easily by random self-reduction. See, e.g., Kuhn and

slide-9
SLIDE 9

What I say Given ( ) = AES

(0), find

using 2127 AES evaluations. Given ( 1)

( 2)

✁ ✂ ✂ ✂ ✁

( 240), find all

✄ using a total of

2127 AES evaluations. Or find some

✄ using

287 AES evaluations. Standard algorithms have negligible communication and perfect parallelization: see, e.g., cr.yp.to/papers.html #bruteforce Given public key on 255-bit elliptic curve , find secret key using 2127 additions on . Given 240 public keys, find all secret keys using 2147 additions on . Finding some key is as hard as finding first key: 2127 additions. Easily prove by random self-reduction. See, e.g., Kuhn and Struik, 2001.

slide-10
SLIDE 10

AES

(0), find

AES evaluations.

2)

✁ ✂ ✂ ✂ ✁

( 240),

a total of 2127 evaluations.

✄ using

287 AES rithms have communication and rallelization: see, e.g., cr.yp.to/papers.html Given public key on 255-bit elliptic curve , find secret key using 2127 additions on . Given 240 public keys, find all secret keys using 2147 additions on . Finding some key is as hard as finding first key: 2127 additions. Easily prove by random self-reduction. See, e.g., Kuhn and Struik, 2001. Even worse for AES: can try much less computation. Success chance drops For elliptic curves, drops quadratically Bottom line: 128-bit not comparable in to 255-bit elliptic-curve Is 2255

  • 19 big enough?

Is 128-bit AES safe?

slide-11
SLIDE 11

Given public key on 255-bit elliptic curve , find secret key using 2127 additions on . Given 240 public keys, find all secret keys using 2147 additions on . Finding some key is as hard as finding first key: 2127 additions. Easily prove by random self-reduction. See, e.g., Kuhn and Struik, 2001. Even worse for AES: Attacker can try much less computation. Success chance drops linearly. For elliptic curves, success chance drops quadratically. Bottom line: 128-bit AES keys are not comparable in security to 255-bit elliptic-curve keys. Is 2255

  • 19 big enough? Yes.

Is 128-bit AES safe? Unclear.