final presentation
play

Final Presentation Maggie Mallernee, Zachary Silber, Michael Tong, - PowerPoint PPT Presentation

Final Presentation Maggie Mallernee, Zachary Silber, Michael Tong, Richard Zhang, Joshua Zweig Overview What is C% (and however do you pronounce it)? Cryptography Implementation is Hard Why C%? Goals Encourage Improve Extensibility


  1. Final Presentation Maggie Mallernee, Zachary Silber, Michael Tong, Richard Zhang, Joshua Zweig

  2. Overview What is C% (and however do you pronounce it)?

  3. Cryptography Implementation is Hard Why C%? Goals Encourage Improve Extensibility Correctness Readability Ease the burden of large number arithmetic

  4. Basics of C% – Compiles to LLVM – C-like syntax and semantics – Heap memory management: malloc() and free() – User input: printf() and scanf() Overview The Big Stuff – Cryptographic types: Stones, Mints, Elliptic Curves, and Points – Painless arbitrary precision arithmetic – Overloaded operators covering group operations of modular integers and points over curves

  5. Project Management 51 PRs, 37 Closed, 282 commits

  6. Version Control

  7. Testing It works! This is how we know!

  8. – Execute entire test suite on every push/PR Continuous – Provide detailed feedback Integration – Enforce all tests passing

  9. Architecture A journey from source code to shared secrets

  10. Preprocess • #include statements • Build guards Scan Parse The Big Picture • Semantic Verify checking • Link to openssl Generate bignum LLVM • Built in functions • Type specific behavior

  11. openssl/bn.h (BIGNUM) BigNum special_arith.c Arithmetic codegen.ml (stone)

  12. Compiler Interface – Options allowing user access to each step in the compilation process – Can see the tokenized program, AST, LLVM (sdtout or .ll file), assembly (.s), and compile to a full executable

  13. What exactly does C% do for me? We’re glad you asked

  14. – It’s like C! – Syntax/Comments – Expressions/Statements – Control Flow – Key Features – Pre-processing The Jist – Input/Output – Scoping – Declaration flexibility – Memory management – Operator overloading

  15. – Stones: Basis of all other cryptographic types, links to OpenSSL/BN – Mints: Integers in a finite field modulo some prime p Cryptographic Types – Curves: Elliptic curves, comprised of two mints – Points: Points on a curve, with operations relative to that curve

  16. Cryptography Library – We provide some cool examples! Caesar Cipher? – Caesar Cipher – Simple shifting using Mints – Stream Cipher – Mints and Access methods provide easy tracking of repeated values We have you mod a constant moduli with improved readbility – Diffie Hellman (Modular integer and ECC) covered – Points improve readability – No confusion on Point arithmetic – ElGamal Encryption – Extremely intuitive and clear when using built in Curves and Points

  17. ECC: C v C%

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend