post quantum cryptography
play

Post-quantum cryptography Tanja Lange 23 March 2016 BeNeLux - PowerPoint PPT Presentation

Post-quantum cryptography Tanja Lange 23 March 2016 BeNeLux Mathematical Congress Cryptography Motivation #1: Communication channels are spying on our data. Motivation #2: Communication channels are modifying our data. Bob


  1. Post-quantum cryptography Tanja Lange 23 March 2016 BeNeLux Mathematical Congress

  2. � Cryptography ◮ Motivation #1: Communication channels are spying on our data. ◮ Motivation #2: Communication channels are modifying our data. � Bob Alice Untrustworthy network “Eavesdropper” ◮ Literal meaning of cryptography: “secret writing”. ◮ Achieves various security goals by secretly transforming messages. Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 2

  3. Cryptographic applications in daily life ◮ Mobile phones connecting to cell towers. ◮ Credit cards, EC-cards, access codes for Rabobank. ◮ Electronic passports; soon ID cards. ◮ Internet commerce, online tax declarations, webmail. ◮ Any webpage with https . ◮ Encrypted file system on iPhone (see Apple vs. FBI). ◮ Facebook, WhatsApp, iMessage on iPhone. Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 5

  4. Cryptographic applications in daily life ◮ Mobile phones connecting to cell towers. ◮ Credit cards, EC-cards, access codes for Rabobank. ◮ Electronic passports; soon ID cards. ◮ Internet commerce, online tax declarations, webmail. ◮ Any webpage with https . ◮ Encrypted file system on iPhone (see Apple vs. FBI). ◮ Facebook, WhatsApp, iMessage on iPhone. ◮ PGP encrypted email, Signal, Tor, Tails Qubes OS Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 5

  5. Cryptographic applications in daily life ◮ Mobile phones connecting to cell towers. ◮ Credit cards, EC-cards, access codes for Rabobank. ◮ Electronic passports; soon ID cards. ◮ Internet commerce, online tax declarations, webmail. ◮ Any webpage with https . ◮ Encrypted file system on iPhone (see Apple vs. FBI). ◮ Facebook, WhatsApp, iMessage on iPhone. ◮ PGP encrypted email, Signal, Tor, Tails Qubes OS Snowden in Reddit AmA Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say. Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 5

  6. Cryptographic tools Many factors influence the security and privacy of data ◮ Secure storage, physical security; access control. ◮ Protection against alteration of data ⇒ digital signatures, message authentication codes. ◮ Protection of sensitive content against reading ⇒ encryption. Cryptology is the science that studies mathematical techniques in order to provide secrecy, authenticity and related properties for digital information. Currently used crypto (check the lock icon in your browser) starts with RSA, Diffie-Hellman (DH) in finite fields, or elliptic curve DH followed by AES or ChaCha20. Newer systems: Curve25519, and Ed25519. Security is getting better, but lots of bugs and no secure hardware Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 6

  7. Cryptographic tools Many factors influence the security and privacy of data ◮ Secure storage, physical security; access control. ◮ Protection against alteration of data ⇒ digital signatures, message authentication codes. ◮ Protection of sensitive content against reading ⇒ encryption. Cryptology is the science that studies mathematical techniques in order to provide secrecy, authenticity and related properties for digital information. Currently used crypto (check the lock icon in your browser) starts with RSA, Diffie-Hellman (DH) in finite fields, or elliptic curve DH followed by AES or ChaCha20. Newer systems: Curve25519, and Ed25519. Security is getting better, but lots of bugs and no secure hardware – let alone anti-security measures such as the Dutch “Hackvoorstel”. Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 6

  8. In the long term, all encryption needs to be post-quantum ◮ Mark Ketchen, IBM Research, 2012, on quantum computing: “Were actually doing things that are making us think like, ‘hey this isn’t 50 years off, this is maybe just 10 years off, or 15 years off.’ It’s within reach.” Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 9

  9. In the long term, all encryption needs to be post-quantum ◮ Mark Ketchen, IBM Research, 2012, on quantum computing: “Were actually doing things that are making us think like, ‘hey this isn’t 50 years off, this is maybe just 10 years off, or 15 years off.’ It’s within reach.” ◮ Fast-forward to 2022, or 2027. Quantum computers exist. ◮ Shor’s algorithm solves in polynomial time: ◮ Integer factorization. ◮ The discrete-logarithm problem in finite fields. ◮ The discrete-logarithm problem on elliptic curves. ◮ This breaks all current public-key encryption on the Internet! Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 9

  10. In the long term, all encryption needs to be post-quantum ◮ Mark Ketchen, IBM Research, 2012, on quantum computing: “Were actually doing things that are making us think like, ‘hey this isn’t 50 years off, this is maybe just 10 years off, or 15 years off.’ It’s within reach.” ◮ Fast-forward to 2022, or 2027. Quantum computers exist. ◮ Shor’s algorithm solves in polynomial time: ◮ Integer factorization. ◮ The discrete-logarithm problem in finite fields. ◮ The discrete-logarithm problem on elliptic curves. ◮ This breaks all current public-key encryption on the Internet! ◮ Also, Grover’s algorithm speeds up brute-force searches. ◮ Example: Only 2 64 quantum operations to break AES-128. Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 9

  11. In the long term, all encryption needs to be post-quantum ◮ Mark Ketchen, IBM Research, 2012, on quantum computing: “Were actually doing things that are making us think like, ‘hey this isn’t 50 years off, this is maybe just 10 years off, or 15 years off.’ It’s within reach.” ◮ Fast-forward to 2022, or 2027. Quantum computers exist. ◮ Shor’s algorithm solves in polynomial time: ◮ Integer factorization. ◮ The discrete-logarithm problem in finite fields. ◮ The discrete-logarithm problem on elliptic curves. ◮ This breaks all current public-key encryption on the Internet! ◮ Also, Grover’s algorithm speeds up brute-force searches. ◮ Example: Only 2 64 quantum operations to break AES-128. ◮ Need to switch the Internet to post-quantum encryption. Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 9

  12. Confidence-inspiring crypto takes time to build ◮ Many stages of research from cryptographic design to deployment: ◮ Explore space of cryptosystems. ◮ Study algorithms for the attackers. ◮ Focus on secure cryptosystems. Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 10

  13. Confidence-inspiring crypto takes time to build ◮ Many stages of research from cryptographic design to deployment: ◮ Explore space of cryptosystems. ◮ Study algorithms for the attackers. ◮ Focus on secure cryptosystems. ◮ Study algorithms for the users. ◮ Study implementations on real hardware. ◮ Study side-channel attacks, fault attacks, etc. ◮ Focus on secure, reliable implementations. ◮ Focus on implementations meeting performance requirements. ◮ Integrate securely into real-world applications. Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 10

  14. Confidence-inspiring crypto takes time to build ◮ Many stages of research from cryptographic design to deployment: ◮ Explore space of cryptosystems. ◮ Study algorithms for the attackers. ◮ Focus on secure cryptosystems. ◮ Study algorithms for the users. ◮ Study implementations on real hardware. ◮ Study side-channel attacks, fault attacks, etc. ◮ Focus on secure, reliable implementations. ◮ Focus on implementations meeting performance requirements. ◮ Integrate securely into real-world applications. ◮ Example: ECC introduced 1985 ; big advantages over RSA. Robust ECC is starting to take over the Internet in 2015 . ◮ Post-quantum research can’t wait for quantum computers! Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 10

  15. Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 11

  16. Even higher urgency for long-term confidentiality ◮ Today’s encrypted communication is being stored by attackers and will be decrypted years later with quantum computers. Danger for human-rights workers, medical records, journalists, security research, legal proceedings, state secrets, . . . Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 12

  17. Impact of PQCRYPTO (EU project in Horizon 2020) ◮ All currently used public-key systems on the Internet are broken by quantum computers. ◮ Today’s encrypted communication can be (and is being!) stored by attackers and can be decrypted later with quantum computer. ◮ Post-quantum secure cryptosystems exist but are under-researched – we can recommend secure systems now, but they are big and slow Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 13

  18. Impact of PQCRYPTO (EU project in Horizon 2020) ◮ All currently used public-key systems on the Internet are broken by quantum computers. ◮ Today’s encrypted communication can be (and is being!) stored by attackers and can be decrypted later with quantum computer. ◮ Post-quantum secure cryptosystems exist but are under-researched – we can recommend secure systems now, but they are big and slow hence the logo. Tanja Lange https://pqcrypto.eu.org Post-quantum cryptography 13

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend