19 big enough what marketing says generate public keys 56
play

19 big enough? What marketing says Generate public keys 56-bit - PowerPoint PPT Presentation

Is 2 255 19 big enough? What marketing says Generate public keys 56-bit crypto: Broken. on a strong elliptic curve 128-bit crypto: Okay. over the field Z (2 255 19). 256-bit crypto: High security! Is that safe? 512-bit


  1. � � � Is 2 255 19 big enough? What marketing says Generate public keys 56-bit crypto: Broken. on a “strong” elliptic curve 128-bit crypto: Okay. over the field Z (2 255 19). 256-bit crypto: High security! Is that safe? 512-bit crypto: Broken. 1024-bit crypto: Shaky. “Size does matter!” 2 255 19 must be, um, 256 bits. Fantastic! Best possible security level.

  2. � � � � enough? What marketing says What NSA says keys 56-bit crypto: Broken. NSA approves products elliptic curve 128-bit crypto: Okay. “classified or mission (2 255 19). 256-bit crypto: High security! national security info 512-bit crypto: Broken. NSA wants “elliptic 1024-bit crypto: Shaky. matter!” GF( ), where is 2 255 greater than 2 255 .” 19 must be, um, 256 bits. Fantastic! So 2 255 + 95 is fine Best possible security level. for national securit but 2 255 19 is not.

  3. � � What marketing says What NSA says 56-bit crypto: Broken. NSA approves products for 128-bit crypto: Okay. “classified or mission critical 256-bit crypto: High security! national security information.” 512-bit crypto: Broken. NSA wants “elliptic curves over 1024-bit crypto: Shaky. GF( ), where is a prime number 2 255 greater than 2 255 .” 19 must be, um, 256 bits. Fantastic! So 2 255 + 95 is fine Best possible security level. for national security information but 2 255 19 is not.

  4. � � says What NSA says What NIST says Broken. NSA approves products for 128-bit AES keys “co Okay. “classified or mission critical ECC primes with “256-383” High security! national security information.” the amount of work Broken. “break the algorithms” NSA wants “elliptic curves over Shaky. is approximately the GF( ), where is a prime number namely 2 128 operations, greater than 2 255 .” be, um, 256 bits. by best techniques So 2 255 + 95 is fine security level. for national security information but 2 255 19 is not.

  5. � What NSA says What NIST says NSA approves products for 128-bit AES keys “correspond” to “classified or mission critical ECC primes with “256-383” bits: national security information.” the amount of work needed to “break the algorithms” NSA wants “elliptic curves over is approximately the same, GF( ), where is a prime number namely 2 128 operations, greater than 2 255 .” by best techniques known. So 2 255 + 95 is fine for national security information but 2 255 19 is not.

  6. � ✁ ✂ ✂ ✂ ✁ ✁ � What NIST says What I say roducts for 128-bit AES keys “correspond” to Given ( ) = AES 2 127 AES mission critical ECC primes with “256-383” bits: using information.” the amount of work needed to Given ( 1 ) ( 2 “break the algorithms” “elliptic curves over find all ✄ using a is approximately the same, is a prime number AES evaluations. namely 2 128 operations, .” Or find some ✄ using by best techniques known. fine evaluations. security information Standard algorithms not. negligible communication perfect parallelization: cr.yp.to/papers.html #bruteforce

  7. ✁ ✁ ✁ ✂ ✂ ✂ What NIST says What I say � (0), find 128-bit AES keys “correspond” to Given ( ) = AES 2 127 AES evaluations. ECC primes with “256-383” bits: using the amount of work needed to Given ( 1 ) ( 2 ) ( 2 40 ), “break the algorithms” 2 127 find all ✄ using a total of is approximately the same, AES evaluations. namely 2 128 operations, 2 87 AES Or find some ✄ using by best techniques known. evaluations. Standard algorithms have negligible communication and perfect parallelization: see, e.g., cr.yp.to/papers.html #bruteforce

  8. ✁ ✁ ✂ ✂ ✂ ✁ What I say Given public key on 255-bit elliptic curve � (0), find eys “correspond” to Given ( ) = AES find secret key 2 127 AES evaluations. “256-383” bits: using 2 127 additions using ork needed to Given ( 1 ) ( 2 ) ( 2 40 ), Given 2 40 public keys, rithms” 2 127 find all ✄ using a total of the same, find all secret keys AES evaluations. 2 147 additions erations, using 2 87 AES Or find some ✄ using techniques known. Finding some key is evaluations. as finding first key: 2 127 additions. Easily Standard algorithms have negligible communication and by random self-reduction. perfect parallelization: see, e.g., See, e.g., Kuhn and cr.yp.to/papers.html #bruteforce

  9. ✁ ✁ ✂ ✂ ✂ ✁ What I say Given public key on 255-bit elliptic curve , � (0), find Given ( ) = AES find secret key 2 127 AES evaluations. using 2 127 additions on using . Given ( 1 ) ( 2 ) ( 2 40 ), Given 2 40 public keys, 2 127 find all ✄ using a total of find all secret keys AES evaluations. 2 147 additions on using . 2 87 AES Or find some ✄ using Finding some key is as hard evaluations. as finding first key: 2 127 additions. Easily prove Standard algorithms have negligible communication and by random self-reduction. perfect parallelization: see, e.g., See, e.g., Kuhn and Struik, 2001. cr.yp.to/papers.html #bruteforce

  10. ✁ ✄ ✁ � ✁ ✂ ✂ ✂ Given public key on Even worse for AES: 255-bit elliptic curve , can try much less computation. � (0), find AES find secret key Success chance drops AES evaluations. 2 127 additions on using . For elliptic curves, 2 ) ( 2 40 ), Given 2 40 public keys, drops quadratically 2 127 a total of find all secret keys evaluations. Bottom line: 128-bit 2 147 additions on using . not comparable in 2 87 AES ✄ using Finding some key is as hard to 255-bit elliptic-curve as finding first key: Is 2 255 19 big enough? 2 127 additions. Easily prove rithms have Is 128-bit AES safe? communication and by random self-reduction. rallelization: see, e.g., See, e.g., Kuhn and Struik, 2001. cr.yp.to/papers.html

  11. � Given public key on Even worse for AES: Attacker 255-bit elliptic curve , can try much less computation. find secret key Success chance drops linearly. 2 127 additions on using . For elliptic curves, success chance Given 2 40 public keys, drops quadratically. find all secret keys Bottom line: 128-bit AES keys are 2 147 additions on using . not comparable in security Finding some key is as hard to 255-bit elliptic-curve keys. as finding first key: Is 2 255 19 big enough? Yes. 2 127 additions. Easily prove Is 128-bit AES safe? Unclear. by random self-reduction. See, e.g., Kuhn and Struik, 2001.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend