Long-term security for cars
Daniel J. Bernstein1,2 Tanja Lange1
1Technische Universiteit Eindhoven 2University of Illinois at Chicago
Long-term security for cars Daniel J. Bernstein 1 , 2 Tanja Lange 1 1 - - PowerPoint PPT Presentation
Long-term security for cars Daniel J. Bernstein 1 , 2 Tanja Lange 1 1 Technische Universiteit Eindhoven 2 University of Illinois at Chicago 16 November 2016 2 / 31 3 / 31 4 / 31 D-Wave quantum computer isnt universal . . . Cant store
1Technische Universiteit Eindhoven 2University of Illinois at Chicago
2 / 31
3 / 31
4 / 31
5 / 31
5 / 31
6 / 31
6 / 31
◮ Integer factorization.
◮ Discrete-logarithms in finite fields.
◮ Discrete-logarithms on elliptic curves.
6 / 31
◮ Integer factorization.
◮ Discrete-logarithms in finite fields.
◮ Discrete-logarithms on elliptic curves.
6 / 31
7 / 31
7 / 31
7 / 31
7 / 31
7 / 31
8 / 31
9 / 31
9 / 31
9 / 31
9 / 31
◮ Jun 19 – 23 PQC school; Jun 22 & 23 Executive school ◮ Jun 26 – 28 PQCrypto 10 / 31
◮ Explore space of cryptosystems. ◮ Study algorithms for the attackers. ◮ Focus on secure cryptosystems. 11 / 31
◮ Explore space of cryptosystems. ◮ Study algorithms for the attackers. ◮ Focus on secure cryptosystems. ◮ Study algorithms for the users. ◮ Study implementations on real hardware. ◮ Study side-channel attacks, fault attacks, etc. ◮ Focus on secure, reliable implementations. ◮ Focus on implementations meeting performance requirements. ◮ Integrate securely into real-world applications. 11 / 31
◮ Explore space of cryptosystems. ◮ Study algorithms for the attackers. ◮ Focus on secure cryptosystems. ◮ Study algorithms for the users. ◮ Study implementations on real hardware. ◮ Study side-channel attacks, fault attacks, etc. ◮ Focus on secure, reliable implementations. ◮ Focus on implementations meeting performance requirements. ◮ Integrate securely into real-world applications.
11 / 31
12 / 31
13 / 31
13 / 31
14 / 31
◮ AES-256 ◮ Salsa20 with a 256-bit key
◮ GCM using a 96-bit nonce and a 128-bit authenticator ◮ Poly1305
◮ length n = 6960, dimension k = 5413, t = 119 errors
◮ XMSS with any of the parameters specified in CFRG draft ◮ SPHINCS-256
15 / 31
16 / 31
17 / 31
17 / 31
17 / 31
18 / 31
18 / 31
19 / 31
19 / 31
20 / 31
20 / 31
21 / 31
22 / 31
23 / 31
24 / 31
25 / 31
26 / 31
27 / 31
28 / 31
28 / 31
◮ Signer builds huge tree of certificate authorities. ◮ Signature includes certificate chain. ◮ Each CA is a hash of master secret and tree position.
◮ Random bottom-level CA signs message.
29 / 31
◮ Signer builds huge tree of certificate authorities. ◮ Signature includes certificate chain. ◮ Each CA is a hash of master secret and tree position.
◮ Random bottom-level CA signs message.
29 / 31
◮ Signer builds huge tree of certificate authorities. ◮ Signature includes certificate chain. ◮ Each CA is a hash of master secret and tree position.
◮ Random bottom-level CA signs message.
29 / 31
30 / 31
◮ Many pointers: e.g., PQCrypto conference series. ◮ Bibliography for 4 major PQC systemss.
◮ Expert recommendations. ◮ Free software libraries. (Coming soon) ◮ More benchmarking to compare cryptosystems. (Coming soon) ◮ 2017: workshop and spring/summer school.
◮ Get used to post-quantum cryptosystems. ◮ Improve; implement; integrate into real-world systems. 31 / 31