applied cryptography
play

Applied Cryptography December 2017 ECDLP is the problem of finding - PowerPoint PPT Presentation

Applied Cryptography December 2017 ECDLP is the problem of finding an ECC user's secret key, given the user's public key. Unfortunately, there is a gap between ECDLP difficulty and ECC security.There are many attacks that break


  1. Applied Cryptography December 2017

  2. …ECDLP is the problem of finding an ECC user's secret key, given the user's public key. Unfortunately, there is a gap between ECDLP difficulty and ECC security….There are many attacks that break real-world ECC without solving ECDLP. The core problem is that if you implement the standard curves, chances are you're doing it wrong. https://safecurves.cr.yp.to/ 2

  3. The Basics

  4. Use the right primitives • Encryption != Integrity • Encryption != Authentication • Hashing != Encryption • Hashing != Irreversible (in general) Garbled != Senseless

  5. Understand your cryptographic libraries • Understand their purpose • Understand their assumptions • Validate input to the libraries • Check return values 5

  6. Side Channels

  7. Crypto black box • Perform complex mathematics • Fast enough to be suitable • On general purpose hardware • Correctly for all inputs Without any measurable side effect

  8. Side effects? • Data and error conditions • Processing time • Data access time • Power fluctuations • Electromagnetic emissions Acoustic emissions 8

  9. Password Storage

  10. What could be simpler? • Take password • Store in database • ….? • Profit!

  11. Step 1 – Hash it! • Get password • Store SHA256(password) • Preimage resistance for the win! Precomputed dictionary attack Everything* falls 11

  12. Step 2 – Hash it with salt! • Get password • Store random || SHA256(random|| password) • No precomputation! Active dictionary attack Pretty much everything falls 12

  13. Step 3 – Expensive hash it with salt! • Get password • Store random || PBKDF2(random|| password) • Slow computation! Active dictionary attack with acceleration Normal passwords fail 13

  14. Step 4 – Argon2d with salt! • Get password • Store random || argon2d(random|| password) • No acceleration! Active dictionary attack Bad passwords fail 14

  15. Step 2 – Argon2d with salt! • Get password • Store random || argon2d(random|| password) • *whew* Denial of Service? Data independence? 15

  16. Conclusions

  17. Think big • Crypto without math is wrong • Crypto without system context also wrong • Understand your users, your systems, and your libraries • Secure accordingly

  18. Thank you! scott.stender@nccgroup.trust @scottstender

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend