from theoretical crypto to practice gloups an abominable
play

From theoretical crypto to practice: gloups an abominable gap - PowerPoint PPT Presentation

From theoretical crypto to practice: gloups an abominable gap Cryptie, Oblazy Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 1 / 35 Encryption and Signature: Just a 2 min reminder 1 Libraries 2 Funny Cryptography 3 Cryptie, O. Blazy (Xlim)


  1. From theoretical crypto to practice: gloups an abominable gap Cryptie, Oblazy Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 1 / 35

  2. Encryption and Signature: Just a 2 min reminder 1 Libraries 2 Funny Cryptography 3 Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 2 / 35

  3. Encryption and Signature: Just a 2 min reminder 1 Libraries 2 Funny Cryptography 3 Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 2 / 35

  4. Encryption and Signature: Just a 2 min reminder 1 Libraries 2 Funny Cryptography 3 Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 2 / 35

  5. Encryption and Signature: Just a 2 min reminder 1 Libraries 2 Funny Cryptography 3 Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 3 / 35

  6. Definition (Encryption Scheme) E = ( Setup , EKeyGen , Encrypt , Decrypt ) : Setup ( 1 K ) : param; EKeyGen ( param ) : public encryption key pk, private decryption key dk; Encrypt ( pk , m ; r ) : ciphertext c on m ∈ M and pk; Decrypt ( dk , c ) : decrypts c under dk. Encrypt pk , r C m dk Decrypt Indistinguishability : Given M 0 , M 1 , it should be hard to guess which one is encrypted in C . Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 4 / 35

  7. Definition An assymetric encryption scheme allows Cryptie, using the public key of Bob, to encrypt a message to Bob in such a way that only Bob, with his secret key, can read it. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 5 / 35

  8. m Definition (Signature Scheme) S = ( Setup , SKeyGen , Sign , Verif ) : Setup ( 1 K ) : param; Sign sk ; s SKeyGen ( param ) : public verification key vk, private signing key sk; Sign ( sk , m ; s ) : signature σ on m , under sk; Verif ( vk , m , σ ) : checks whether σ is valid on m . σ ( m ) Unforgeability : Given q pairs ( m i , σ i ) , it should be hard to output a valid σ on a fresh m . Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 6 / 35

  9. Definition A signature scheme allows Cryptie, using her secret key, to sign a document in such a way that anybody knowing her public key, for example Bob, can be sure that she signs exactly this document. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 7 / 35

  10. Definition A signature scheme allows Cryptie, using her secret key, to sign a document in such a way that anybody knowing her public key, for example Bob, can be sure that she signs exactly this document. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 7 / 35

  11. Encryption and Signature: Just a 2 min reminder 1 Libraries 2 Funny Cryptography 3 Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 8 / 35

  12. Libre Crypto libraries? we have a lot of them NaCL Public domain Botan (simplified) BSD Boncycastle MIT License Cryptlib Sleepycat License Crypto++ Boost Software License 1.0 (Public domain for files) Libgcrypt LGPLv2.1+ Libtomcrypt Public License and WTFPL Nettle GPLv2+ and LGPLv3+ OpenSSL and LibreSSL OpenSSL License, original SSLeay Licence etc ... ⇒ You can even discover some new Free Software license ! ⇒ Mostly vanilla crypto... ⇒ Community knows the good parameter, the good curve but... Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 9 / 35

  13. Academical crypto in real world When academics says "this is broken", it is patched (nearly in a timely manner). Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 10 / 35

  14. Academical crypto in real world When academics says "this is broken", it is patched (nearly in a timely manner). Example First theoretical academic attack on SHA-1 in 2005 First academic attack that may(?) be used 2010-2015ish. Start of the end of SHA-1 2013-2015. Summer 2016: Practical attacks. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 10 / 35

  15. Academical crypto in real world 2 What about funny crypto? 20+ years later the lucky ones are just starting to be used (in weird Blockchains). Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 11 / 35

  16. What kind of strange properties can we have? Weird signatures Strange encryption Crazy stuff ⇒ Let’s talk about funny crypto Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 12 / 35

  17. Encryption and Signature: Just a 2 min reminder 1 Libraries 2 Funny Cryptography 3 Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 13 / 35

  18. Weird signatures Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 14 / 35

  19. Sanitizable Signatures [KR00] Definition A sanitizable signature allows Alice to signs a text in such a way that she can give Cryptie the right to modify some parts of it while keeping a correct signature of her on this modified message. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 15 / 35

  20. Group Signatures [CvH91] Definition A group signature allows Bob to signs as a member of a group in such a way that only a special (optional) entity, an "Opener", would be able to know that HE was the signer of the given message. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 16 / 35

  21. Group Signatures [CvH91] Definition A group signature allows Bob to signs as a member of a group in such a way that only a special (optional) entity, an "Opener", would be able to know that HE was the signer of the given message. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 16 / 35

  22. Group Signatures [CvH91] Definition A group signature allows Bob to signs as a member of a group in such a way that only a special (optional) entity, an "Opener", would be able to know that HE was the signer of the given message. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 16 / 35

  23. Group Signatures [CvH91] Definition A group signature allows Bob to signs as a member of a group in such a way that only a special (optional) entity, an "Opener", would be able to know that HE was the signer of the given message. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 16 / 35

  24. Group Ring Signatures [RST01] Definition A group ring signature allows Bob to signs as a member of a group , that he built alone, in such a way that only a special (optional) entity, an "Opener", no one would be able to know that HE was the signer of the given message. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 17 / 35

  25. Group Ring Signatures [RST01] Definition A group ring signature allows Bob to signs as a member of a group , that he built alone, in such a way that only a special (optional) entity, an "Opener", no one would be able to know that HE was the signer of the given message. The only technology using it is some Blockchain implementation... Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 17 / 35

  26. Blind Signatures [Chaum83] Definition A blind signature allows Alice to signs a letter "through" its envelope. If later, she sees two documents she signs, she won’t be able to know which text she signs when. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 18 / 35

  27. Blind Signatures [Chaum83] Definition A blind signature allows Alice to signs a letter "through" its envelope. If later, she sees two documents she signs, she won’t be able to know which text she signs when. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 18 / 35

  28. Strange encryption Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 19 / 35

  29. Homomorphic Encryption [RSA77] Definition In an Homomorphic Encryption, a user encrypts a message M , using a public encryption key. The resulting ciphertext can then be decrypted using a secret decryption key. Ciphertexts can be combined, so that the decryption leads to the combination of the plaintext Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 20 / 35

  30. Homomorphic Encryption [RSA77] Definition In an Homomorphic Encryption, a user encrypts a message M , using a public encryption key. The resulting ciphertext can then be decrypted using a secret decryption key. Ciphertexts can be combined, so that the decryption leads to the combination of the plaintext Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 20 / 35

  31. Homomorphic Encryption [RSA77] Definition In an Homomorphic Encryption, a user encrypts a message M , using a public encryption key. The resulting ciphertext can then be decrypted using a secret decryption key. Ciphertexts can be combined, so that the decryption leads to the combination of the plaintext Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 20 / 35

  32. Homomorphic Encryption [RSA77] Definition In an Homomorphic Encryption, a user encrypts a message M , using a public encryption key. The resulting ciphertext can then be decrypted using a secret decryption key. Ciphertexts can be combined, so that the decryption leads to the combination of the plaintext Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 20 / 35

  33. Threshold Encryption [DDFY94] Definition In a Threshold Encryption, a user encrypts a message M , using a public encryption key. The resulting ciphertext can then be decrypted using at least k secret decryption keys. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 21 / 35

  34. Threshold Encryption [DDFY94] Definition In a Threshold Encryption, a user encrypts a message M , using a public encryption key. The resulting ciphertext can then be decrypted using at least k secret decryption keys. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 21 / 35

  35. Threshold Encryption [DDFY94] Definition In a Threshold Encryption, a user encrypts a message M , using a public encryption key. The resulting ciphertext can then be decrypted using at least k secret decryption keys. Cryptie, O. Blazy (Xlim) RMLL CC-BY-SA 4.0 21 / 35

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend