Post-Quantum Cryptography Dr. Ruben Niederhagen, February 8, 2016 - - PowerPoint PPT Presentation

post quantum cryptography
SMART_READER_LITE
LIVE PREVIEW

Post-Quantum Cryptography Dr. Ruben Niederhagen, February 8, 2016 - - PowerPoint PPT Presentation

Post-Quantum Cryptography Dr. Ruben Niederhagen, February 8, 2016 Introduction Quantum Computers Using quantum states for computation: Introduced in 1985 by David Deutsch [3]. Operate on qubits using gates that perform reversible


slide-1
SLIDE 1

Post-Quantum Cryptography

  • Dr. Ruben Niederhagen, February 8, 2016
slide-2
SLIDE 2

Introduction

Quantum Computers

Using quantum states for computation:

Introduced in 1985 by David Deutsch [3].

Operate on qubits using gates that perform reversible operations exploiting entanglement and superposition. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 1 (38)

slide-3
SLIDE 3

Introduction

Quantum Computers

Using quantum states for computation:

Introduced in 1985 by David Deutsch [3].

Operate on qubits using gates that perform reversible operations exploiting entanglement and superposition.

Theoretical (since ≈ 1900):

qubit: C2 gate: unitary matrix over C

Physical (since ≈ 1990s):

qubit: photon, electron, atom,

quantum dots...

gate: phase shifter, EM field, laser, ... Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 1 (38)

slide-4
SLIDE 4

Introduction

Quantum Computers

Using quantum states for computation:

Introduced in 1985 by David Deutsch [3].

Operate on qubits using gates that perform reversible operations exploiting entanglement and superposition.

Theoretical (since ≈ 1900):

qubit: C2 gate: unitary matrix over C

Physical (since ≈ 1990s):

qubit: photon, electron, atom,

quantum dots...

gate: phase shifter, EM field, laser, ...

  • Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 1 (38)
slide-5
SLIDE 5

Introduction

Quantum Computers

Using quantum states for computation:

Introduced in 1985 by David Deutsch [3].

Operate on qubits using gates that perform reversible operations exploiting entanglement and superposition.

Theoretical (since ≈ 1900):

qubit: C2 gate: unitary matrix over C

Physical (since ≈ 1990s):

qubit: photon, electron, atom,

quantum dots...

gate: phase shifter, EM field, laser, ...

  • ?

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 1 (38)

slide-6
SLIDE 6

Introduction

Quantum Computers

Quantum algorithms:

Simon’s algorithm, Deutsch–Jozsa algorithm, . . . Grover’s algorithm: search in √n time. Shor’s algorithm: discrete logarithm and integer factorization in polynomial time

(solve the abelian hidden subgroup problem).

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 2 (38)

slide-7
SLIDE 7

Introduction

Quantum Computers

Quantum algorithms:

Simon’s algorithm, Deutsch–Jozsa algorithm, . . . Grover’s algorithm: search in √n time. Shor’s algorithm: discrete logarithm and integer factorization in polynomial time

(solve the abelian hidden subgroup problem).

Effect on current cryptography:

Grover reduces a brute force attack on AES-128 from time c · 2128 to time c′ · 264; similar

for hash-functions.

⇒ Use 256-bit primitives!

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 2 (38)

slide-8
SLIDE 8

Introduction

Quantum Computers

Quantum algorithms:

Simon’s algorithm, Deutsch–Jozsa algorithm, . . . Grover’s algorithm: search in √n time. Shor’s algorithm: discrete logarithm and integer factorization in polynomial time

(solve the abelian hidden subgroup problem).

Effect on current cryptography:

Grover reduces a brute force attack on AES-128 from time c · 2128 to time c′ · 264; similar

for hash-functions.

⇒ Use 256-bit primitives!

Shor breaks all RSA, ECC, DHE, ECDHE, DSA, ECDSA, ..! Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 2 (38)

slide-9
SLIDE 9

Introduction

Quantum Computers The Internet is broken, secure communication is broken; what now?

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 3 (38)

slide-10
SLIDE 10

Introduction

Quantum Computers The Internet is broken, secure communication is broken; what now?

The physicist says:

Use quantum technologies to fight quantum technology!

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 3 (38)

slide-11
SLIDE 11

Introduction

Quantum Computers The Internet is broken, secure communication is broken; what now?

The physicist says:

Use quantum technologies to fight quantum technology!

The cryptographer says:

Just base your crypto on math that quantum computers can’t break.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 3 (38)

slide-12
SLIDE 12

Introduction

“Quantum Cryptography”

“Quantum Cryptography” is

mainly limited to quantum key distribution, Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 4 (38)

slide-13
SLIDE 13

Introduction

“Quantum Cryptography”

“Quantum Cryptography” is

mainly limited to quantum key distribution, provides no authentication (apart from PUF technologies), Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 4 (38)

slide-14
SLIDE 14

Introduction

“Quantum Cryptography”

“Quantum Cryptography” is

mainly limited to quantum key distribution, provides no authentication (apart from PUF technologies), requires direct fiber-optical connection or line of sight, Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 4 (38)

slide-15
SLIDE 15

Introduction

“Quantum Cryptography”

“Quantum Cryptography” is

mainly limited to quantum key distribution, provides no authentication (apart from PUF technologies), requires direct fiber-optical connection or line of sight, has a problem with large distances, Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 4 (38)

slide-16
SLIDE 16

Introduction

“Quantum Cryptography”

“Quantum Cryptography” is

mainly limited to quantum key distribution, provides no authentication (apart from PUF technologies), requires direct fiber-optical connection or line of sight, has a problem with large distances, needs new infrastructure and new technology, Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 4 (38)

slide-17
SLIDE 17

Introduction

“Quantum Cryptography”

“Quantum Cryptography” is

mainly limited to quantum key distribution, provides no authentication (apart from PUF technologies), requires direct fiber-optical connection or line of sight, has a problem with large distances, needs new infrastructure and new technology, does not work for mobile phones, sensor networks, cars, ... Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 4 (38)

slide-18
SLIDE 18

Introduction

“Quantum Cryptography”

“Quantum Cryptography” is

mainly limited to quantum key distribution, provides no authentication (apart from PUF technologies), requires direct fiber-optical connection or line of sight, has a problem with large distances, needs new infrastructure and new technology, does not work for mobile phones, sensor networks, cars, ... does not scale well, and Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 4 (38)

slide-19
SLIDE 19

Introduction

“Quantum Cryptography”

“Quantum Cryptography” is

mainly limited to quantum key distribution, provides no authentication (apart from PUF technologies), requires direct fiber-optical connection or line of sight, has a problem with large distances, needs new infrastructure and new technology, does not work for mobile phones, sensor networks, cars, ... does not scale well, and is not really necessary if one does not insist in physical principles

but is fine with math and computational complexity.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 4 (38)

slide-20
SLIDE 20

Introduction

Post-Quantum Cryptography

Main task of post-quantum cryptography [2]:

Find mathematically hard problems that

cannot be broken by classical computers, Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 5 (38)

slide-21
SLIDE 21

Introduction

Post-Quantum Cryptography

Main task of post-quantum cryptography [2]:

Find mathematically hard problems that

cannot be broken by classical computers, cannot be broken by quantum computers, Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 5 (38)

slide-22
SLIDE 22

Introduction

Post-Quantum Cryptography

Main task of post-quantum cryptography [2]:

Find mathematically hard problems that

cannot be broken by classical computers, cannot be broken by quantum computers, provide a trapdoor for asymmetric crypto, and Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 5 (38)

slide-23
SLIDE 23

Introduction

Post-Quantum Cryptography

Main task of post-quantum cryptography [2]:

Find mathematically hard problems that

cannot be broken by classical computers, cannot be broken by quantum computers, provide a trapdoor for asymmetric crypto, and can be used efficiently in terms of time, memory, and communication. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 5 (38)

slide-24
SLIDE 24

Introduction

Post-Quantum Cryptography

Current approaches are:

code-based cryptography, multivariate cryptography, hash-based cryptography, lattice-based cryptography, and supersingular elliptic curve isogenies. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 6 (38)

slide-25
SLIDE 25

Code-based Cryptography

slide-26
SLIDE 26

Code-based Cryptography

Error-Correcting Codes

Error correction on a noisy channel:

Add redundant information to the message that allows to detect and correct bit-errors.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 7 (38)

slide-27
SLIDE 27

Code-based Cryptography

Error-Correcting Codes

01101100 Error correction on a noisy channel:

Add redundant information to the message that allows to detect and correct bit-errors.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 7 (38)

slide-28
SLIDE 28

Code-based Cryptography

Error-Correcting Codes

01101100 10011001001 encode Error correction on a noisy channel:

Add redundant information to the message that allows to detect and correct bit-errors.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 7 (38)

slide-29
SLIDE 29

Code-based Cryptography

Error-Correcting Codes

01101100 10011001001 encode 10010 001011 transmitt Error correction on a noisy channel:

Add redundant information to the message that allows to detect and correct bit-errors.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 7 (38)

slide-30
SLIDE 30

Code-based Cryptography

Error-Correcting Codes

01101100 10011001001 encode 10011 001001 transmitt Error correction on a noisy channel:

Add redundant information to the message that allows to detect and correct bit-errors.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 7 (38)

slide-31
SLIDE 31

Code-based Cryptography

Error-Correcting Codes

01101100 10011001001 encode 10011 001001 transmitt 01101100 decode Error correction on a noisy channel:

Add redundant information to the message that allows to detect and correct bit-errors.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 7 (38)

slide-32
SLIDE 32

Code-based Cryptography

Error-Correcting Codes

01101100 10011001001 encode 10011 001001 transmitt 01101100 decode Error correction on a noisy channel:

Add redundant information to the message that allows to detect and correct bit-errors. Practical application requires efficient encoding and decoding algorithms.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 7 (38)

slide-33
SLIDE 33

Code-based Cryptography

Error-Correcting Codes

01101100 10011001001 encode 10011 001001 transmitt 01101100 decode Error correction on a noisy channel:

Add redundant information to the message that allows to detect and correct bit-errors. Practical application requires efficient encoding and decoding algorithms. Encoding: Multiply message vector with generator matrix. Decoding: Use decoding algorithm of the code.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 7 (38)

slide-34
SLIDE 34

Code-based Cryptography

McEliece Crypto System

System Parameters: n, t ∈ N, where t ≪ n. Key Generation:

G : k × n generator matrix of a code G, S : k × k random non-singular matrix, P : n × n random permutation matrix. Compute k × n matrix Gpub = SGP.

Public Key: (Gpub, t) Private Key: (S, DG, P)

where DG is an efficient decoding algorithm for G.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 8 (38)

slide-35
SLIDE 35

Code-based Cryptography

McEliece Crypto System

Public Key: (Gpub, t)

(recall: Gpub = SGP)

Private Key: (S, DG, P). Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 9 (38)

slide-36
SLIDE 36

Code-based Cryptography

McEliece Crypto System

Public Key: (Gpub, t)

(recall: Gpub = SGP)

Private Key: (S, DG, P). Encryption:

to encrypt message m ∈ Fk

2,

randomly choose e ∈ Fn

2 of weight t; compute

c = mGpub ⊕ e.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 9 (38)

slide-37
SLIDE 37

Code-based Cryptography

McEliece Crypto System

Public Key: (Gpub, t)

(recall: Gpub = SGP)

Private Key: (S, DG, P). Encryption:

to encrypt message m ∈ Fk

2,

randomly choose e ∈ Fn

2 of weight t; compute

c = mGpub ⊕ e.

Decryption:

compute c′ = cP−1 = mSG ⊕ eP−1, use DG to decode c′ to m′ = mS, compute m = m′S−1 = mSS−1.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 9 (38)

slide-38
SLIDE 38

Code-based Cryptography

McEliece Crypto System

McEliece problem:

Given a McEliece public key (Gpub, t), Gpub ∈ {0, 1}k×n and a cipher text c ∈ {0, 1}n, find a message m ∈ {0, 1}k with wH(mGpub − c) = t.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 10 (38)

slide-39
SLIDE 39

Code-based Cryptography

McEliece Crypto System

McEliece problem:

Given a McEliece public key (Gpub, t), Gpub ∈ {0, 1}k×n and a cipher text c ∈ {0, 1}n, find a message m ∈ {0, 1}k with wH(mGpub − c) = t. The hardness of this problem depends on the specific code. McEliece proposes to use binary Goppa codes.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 10 (38)

slide-40
SLIDE 40

Code-based Cryptography

Niederreiter Crypto System

System Parameters: n, t ∈ N, where t ≪ n. Key Generation:

H :

(n − k) × n parity check matrix of a code G,

P :

n × n random permutation matrix.

Compute S :

(n − k) × (n − k) non-singular matrix, and

Hpub :

(n − k) × n matrix

such that SHP =

  • Idn−k | Hpub

.

Public Key: (Hpub, t) Private Key: (S, DG, P)

where DG is an efficient syndrome decoding algorithm for G.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 11 (38)

slide-41
SLIDE 41

Code-based Cryptography

Niederreiter Crypto System

Public Key: (Hpub, t)

(recall:

  • Idn−k | Hpub

= SHP)

Private Key: (S, DG, P). Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 12 (38)

slide-42
SLIDE 42

Code-based Cryptography

Niederreiter Crypto System

Public Key: (Hpub, t)

(recall:

  • Idn−k | Hpub

= SHP)

Private Key: (S, DG, P). Encryption:

to encrypt message e ∈ Fn

2 of weight t,

compute the syndrome s =

  • Idn−k | Hpub

eT.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 12 (38)

slide-43
SLIDE 43

Code-based Cryptography

Niederreiter Crypto System

Public Key: (Hpub, t)

(recall:

  • Idn−k | Hpub

= SHP)

Private Key: (S, DG, P). Encryption:

to encrypt message e ∈ Fn

2 of weight t,

compute the syndrome s =

  • Idn−k | Hpub

eT.

Decryption:

compute s′ = S−1s = HPeT, use DG to recover e′ = PeT, compute eT = P−1e′ = P−1PeT.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 12 (38)

slide-44
SLIDE 44

Code-based Cryptography

McEliece and Niederreiter

Recommended parameters: n = 6960 m = 13 t = 119 k = n − mt = 5413

Estimated security level: 266 bit. Public key size: (n − k)k bits ≈ 1, 046, 739 bytes.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 13 (38)

slide-45
SLIDE 45

Code-based Cryptography

McEliece and Niederreiter

Recommended parameters: n = 6960 m = 13 t = 119 k = n − mt = 5413

Estimated security level: 266 bit. Public key size: (n − k)k bits ≈ 1, 046, 739 bytes.

Disadvantages of McEliece and Niederreiter:

Large key size when using binary Goppa codes. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 13 (38)

slide-46
SLIDE 46

Code-based Cryptography Further improvements for code-based schemes:

Use codes with a more compact representation, e.g. cyclic codes.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 14 (38)

slide-47
SLIDE 47

Code-based Cryptography Further improvements for code-based schemes:

Use codes with a more compact representation, e.g. cyclic codes. Problems with decoding errors!

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 14 (38)

slide-48
SLIDE 48

Code-based Cryptography Further improvements for code-based schemes:

Use codes with a more compact representation, e.g. cyclic codes. Problems with decoding errors!

Further code-based schemes:

Signature schemes, e.g., CFS: large (huge?) public keys. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 14 (38)

slide-49
SLIDE 49

Code-based Cryptography Further improvements for code-based schemes:

Use codes with a more compact representation, e.g. cyclic codes. Problems with decoding errors!

Further code-based schemes:

Signature schemes, e.g., CFS: large (huge?) public keys. Cryptographic hash functions, e.g., FSB: no competitive performance. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 14 (38)

slide-50
SLIDE 50

Code-based Cryptography Further improvements for code-based schemes:

Use codes with a more compact representation, e.g. cyclic codes. Problems with decoding errors!

Further code-based schemes:

Signature schemes, e.g., CFS: large (huge?) public keys. Cryptographic hash functions, e.g., FSB: no competitive performance. Pseudo random number generators: no competitive performance? Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 14 (38)

slide-51
SLIDE 51

Multivariate Cryptography

5x3

1x2x2 3 + 17x4 2x3 + 23x2 1x4 2 + 13x1 + 12x2 + 5 = 0

12x2

1x3 2x3 + 15x1x3 3 + 25x2x3 3 + 5x1 + 6x3 + 12 = 0

28x1x2x4

3 + 14x3 2x2 3 + 16x1x3 + 32x2 + 7x3 + 10 = 0

54x6

1x3 + 2x4 1 + 59x2 1x3 2 + 42x2 1x7 3 + x1 + 17 = 0

slide-52
SLIDE 52

Multivariate Cryptography

Introduction

Underlying problem:

Solving a system of m multivariate polynomial equations in n variables over Fq is called the MP problem.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 15 (38)

slide-53
SLIDE 53

Multivariate Cryptography

Introduction

Underlying problem:

Solving a system of m multivariate polynomial equations in n variables over Fq is called the MP problem.

Example 5x3

1x2x2 3 + 17x4 2x3 + 23x2 1x4 2 + 13x1 + 12x2 + 5 = 0

12x2

1x3 2x3 + 15x1x3 3 + 25x2x3 3 + 5x1 + 6x3 + 12 = 0

28x1x2x4

3 + 14x3 2x2 3 + 16x1x3 + 32x2 + 7x3 + 10 = 0

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 15 (38)

slide-54
SLIDE 54

Multivariate Cryptography

Introduction

Underlying problem:

Solving a system of m multivariate polynomial equations in n variables over Fq is called the MP problem.

Example 5x3

1x2x2 3 + 17x4 2x3 + 23x2 1x4 2 + 13x1 + 12x2 + 5 = 0

12x2

1x3 2x3 + 15x1x3 3 + 25x2x3 3 + 5x1 + 6x3 + 12 = 0

28x1x2x4

3 + 14x3 2x2 3 + 16x1x3 + 32x2 + 7x3 + 10 = 0

Hardness:

The MP problem is an NP-complete problem even for multivariate quadratic systems and q = 2.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 15 (38)

slide-55
SLIDE 55

Multivariate Cryptography

Introduction

Underlying problem:

Solving a system of m multivariate polynomial equations in n variables over Fq is called the MP problem.

Example x3x2 + x2x1 + x2 + x1 + 1 = 0 x3x1 + x3x2 + x3 + x1 = 0 x3x2 + x3x1 + x3 + x2 = 0 Hardness:

The MP problem is an NP-complete problem even for multivariate quadratic systems and q = 2.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 15 (38)

slide-56
SLIDE 56

Multivariate Cryptography

Introduction

Notation:

For a set f = (f1, . . . , fm) of m quadratic polynomials in n variables over F2, let

f(x) = (f1(x), . . . , fm(x)) ∈ Fm

2 be the solution vector of the evaluation of f for x ∈ Fn 2.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 16 (38)

slide-57
SLIDE 57

Multivariate Cryptography

Introduction

Notation:

For a set f = (f1, . . . , fm) of m quadratic polynomials in n variables over F2, let

f(x) = (f1(x), . . . , fm(x)) ∈ Fm

2 be the solution vector of the evaluation of f for x ∈ Fn 2.

Definition (MQ over F2)

Let MQ(Fn

2, Fm 2 ) be the set of all systems of quadratic equations in

n variables and m equations over F2.

We call one element P ∈ MQ(Fn

2, Fm 2 ) an instance of MQ over F2.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 16 (38)

slide-58
SLIDE 58

Multivariate Cryptography

Basic Idea for Multivariate Public Key Cryptography (MPKC)

System Parameters: m, n, ∈ N. Key Generation:

choose “random” f ∈ MQ(Fn

2, Fm 2 )

such that f−1 is secretly known.

Public Key: f. Private Key: f−1. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 17 (38)

slide-59
SLIDE 59

Multivariate Cryptography

Basic Idea for Multivariate Public Key Cryptography (MPKC)

System Parameters: m, n, ∈ N. Key Generation:

choose “random” f ∈ MQ(Fn

2, Fm 2 )

such that f−1 is secretly known.

Public Key: f. Private Key: f−1. Encryption: to encrypt message m ∈ Fn

2,

compute c = f(m).

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 17 (38)

slide-60
SLIDE 60

Multivariate Cryptography

Basic Idea for Multivariate Public Key Cryptography (MPKC)

System Parameters: m, n, ∈ N. Key Generation:

choose “random” f ∈ MQ(Fn

2, Fm 2 )

such that f−1 is secretly known.

Public Key: f. Private Key: f−1. Encryption: to encrypt message m ∈ Fn

2,

compute c = f(m).

Decryption: Decrypt m = f−1(c). Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 17 (38)

slide-61
SLIDE 61

Multivariate Cryptography

Basic Idea for Multivariate Public Key Cryptography (MPKC)

System Parameters: m, n, ∈ N. Key Generation:

choose “random” f ∈ MQ(Fn

2, Fm 2 )

such that f−1 is secretly known.

Public Key: f. Private Key: f−1. Encryption: to encrypt message m ∈ Fn

2,

compute c = f(m).

Decryption: Decrypt m = f−1(c).

Problem:

How do you find f and f−1 such that f is a hard instance of MQ?

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 17 (38)

slide-62
SLIDE 62

Multivariate Cryptography

Multivariate Public Key Cryptography (MPKC)

Design pattern

Usually, f is constructed as a sequence of invertible functions, e.g.,

f = r ◦ s ◦ t

with r and t multivariate linear and

s quadratic with a easy-to-invert structure.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 18 (38)

slide-63
SLIDE 63

Multivariate Cryptography

Multivariate Public Key Cryptography (MPKC)

Design pattern

Usually, f is constructed as a sequence of invertible functions, e.g.,

f = r ◦ s ◦ t

with r and t multivariate linear and

s quadratic with a easy-to-invert structure.

This often does NOT result in a hard instance of MQ!

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 18 (38)

slide-64
SLIDE 64

Multivariate Cryptography

Multivariate Public Key Cryptography (MPKC)

Design pattern

Usually, f is constructed as a sequence of invertible functions, e.g.,

f = r ◦ s ◦ t

with r and t multivariate linear and

s quadratic with a easy-to-invert structure.

This often does NOT result in a hard instance of MQ!

Recent secure (i.e., not yet broken?) examples:

Rainbow signature scheme, Quartz or HFEv- signature scheme, PMI+ public key encryption scheme. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 18 (38)

slide-65
SLIDE 65

Multivariate Cryptography

Multivariate Public Key Cryptography (MPKC)

Design pattern

Usually, f is constructed as a sequence of invertible functions, e.g.,

f = r ◦ s ◦ t

with r and t multivariate linear and

s quadratic with a easy-to-invert structure.

This often does NOT result in a hard instance of MQ!

Recent secure (i.e., not yet broken?) examples:

Rainbow signature scheme, Quartz or HFEv- signature scheme, PMI+ public key encryption scheme.

  • Easier to construct.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 18 (38)

slide-66
SLIDE 66

Multivariate Cryptography

Multivariate Public Key Cryptography (MPKC)

Further MQ schemes:

symmetric encryption schemes, cryptographic hash functions, and pseudo random number generators. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 19 (38)

slide-67
SLIDE 67

Multivariate Cryptography

Multivariate Public Key Cryptography (MPKC)

Further MQ schemes:

symmetric encryption schemes, cryptographic hash functions, and pseudo random number generators.

Concerns about MQ schemes:

Most public-key encryption schemes have been broken! Efficient (sparse) MQ instances have problems with randomness! Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 19 (38)

slide-68
SLIDE 68

Hash-based Cryptography

slide-69
SLIDE 69

Hash-based Cryptography

Introduction

Basic idea:

Computing pre-images of a cryptographic hash function remains hard also for quantum computers (Grover).

⇒ Use pre-image as private key, hash-value as public key.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 20 (38)

slide-70
SLIDE 70

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-71
SLIDE 71

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

Message: 0b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-72
SLIDE 72

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

Message: 0b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-73
SLIDE 73

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 Message: 0b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-74
SLIDE 74

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message: 0b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-75
SLIDE 75

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message: 0b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-76
SLIDE 76

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message: 0b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-77
SLIDE 77

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message: 0b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-78
SLIDE 78

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message: 0b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-79
SLIDE 79

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message: 0b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-80
SLIDE 80

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-81
SLIDE 81

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message: 1b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-82
SLIDE 82

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message: 1b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-83
SLIDE 83

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message: 1b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-84
SLIDE 84

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message: 1b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-85
SLIDE 85

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message: 1b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-86
SLIDE 86

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message: 1b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-87
SLIDE 87

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message:

10b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-88
SLIDE 88

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message:

10b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-89
SLIDE 89

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message:

10b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-90
SLIDE 90

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message:

10b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-91
SLIDE 91

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message:

10b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-92
SLIDE 92

Hash-based Cryptography

Lamport and Merkle h0,0 h0,1 r0,0 r0,1

public private

h1,0 h1,1 h2,0 h2,1 h3,0 h3,1 r1,0 r1,1 r2,0 r2,1 r3,0 r3,1 t20 t21 t22 t23 t10 t11 t00 Message:

10b

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 21 (38)

slide-93
SLIDE 93

Hash-based Cryptography

(Simplified) Winternitz One-Time Scheme (WOTS)

h r7

public private

r6 r5 r4 r3 r2 r1 r0

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 22 (38)

slide-94
SLIDE 94

Hash-based Cryptography

(Simplified) Winternitz One-Time Scheme (WOTS)

h r7

public private

r6 r5 r4 r3 r2 r1 r0

Message: 101b = 5

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 22 (38)

slide-95
SLIDE 95

Hash-based Cryptography

(Simplified) Winternitz One-Time Scheme (WOTS)

h r7

public private

r6 r5 r4 r3 r2 r1 r0

Message: 101b = 5

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 22 (38)

slide-96
SLIDE 96

Hash-based Cryptography

(Simplified) Winternitz One-Time Scheme (WOTS)

h r7

public private

r6 r5 r4 r3 r2 r1 r0

Message: 101b = 5

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 22 (38)

slide-97
SLIDE 97

Hash-based Cryptography

(Simplified) Winternitz One-Time Scheme (WOTS)

h r7

public private

r6 r5 r4 r3 r2 r1 r0

Message: 101b = 5

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 22 (38)

slide-98
SLIDE 98

Hash-based Cryptography

(Simplified) Winternitz One-Time Scheme (WOTS)

h r7

public private

r6 r5 r4 r3 r2 r1 r0

Message: 101b = 5

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 22 (38)

slide-99
SLIDE 99

Hash-based Cryptography

(Simplified) Winternitz One-Time Scheme (WOTS)

h r7

public private

r6 r5 r4 r3 r2 r1 r0

Message: 101b = 5 Attacker learns private keys and can sign 110b and 111b!

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 22 (38)

slide-100
SLIDE 100

Hash-based Cryptography

(Simplified) Winternitz One-Time Scheme (WOTS)

h r7

public private

r6 r5 r4 r3 r2 r1 r0 h′ r′ r′

1

r′

2

r′

3

r′

4

r′

5

r′

6

r′

7

Message: 101b = 5

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 22 (38)

slide-101
SLIDE 101

Hash-based Cryptography

(Simplified) Winternitz One-Time Scheme (WOTS)

h r7

public private

r6 r5 r4 r3 r2 r1 r0 h′ r′ r′

1

r′

2

r′

3

r′

4

r′

5

r′

6

r′

7

Message: 101b = 5

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 22 (38)

slide-102
SLIDE 102

Hash-based Cryptography

(Simplified) Winternitz One-Time Scheme (WOTS)

h r7

public private

r6 r5 r4 r3 r2 r1 r0 h′ r′ r′

1

r′

2

r′

3

r′

4

r′

5

r′

6

r′

7

Message: 101b = 5

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 22 (38)

slide-103
SLIDE 103

Hash-based Cryptography

(Simplified) Winternitz and Merkle Tree

h0 h′ r0,3 r′

0,0

public private

h1 h′

1

h2 h′

2

h3 h′

3

r1,3 r′

1,0

r2,3 r′

2,0

r3,3 r′

3,0

r0,2 r0,1 r0,0 r1,2 r1,1 r1,0 r2,2 r2,1 r2,0 r3,2 r3,1 r3,0 r′

0,1

r′

0,2

r′

0,3

r′

1,1

r′

1,2

r′

1,3

r′

2,1

r′

2,2

r′

2,3

r′

3,1

r′

3,2

r′

3,3

t20 t21 t22 t23 t10 t11 t00

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 23 (38)

slide-104
SLIDE 104

Hash-based Cryptography

(Simplified) Winternitz and Merkle Tree

h0 h′ r0,3 r′

0,0

public private

h1 h′

1

h2 h′

2

h3 h′

3

r1,3 r′

1,0

r2,3 r′

2,0

r3,3 r′

3,0

r0,2 r0,1 r0,0 r1,2 r1,1 r1,0 r2,2 r2,1 r2,0 r3,2 r3,1 r3,0 r′

0,1

r′

0,2

r′

0,3

r′

1,1

r′

1,2

r′

1,3

r′

2,1

r′

2,2

r′

2,3

r′

3,1

r′

3,2

r′

3,3

t20 t21 t22 t23 t10 t11 t00

Message: 01b = 1

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 23 (38)

slide-105
SLIDE 105

Hash-based Cryptography

(Simplified) Winternitz and Merkle Tree

h0 h′ r0,3 r′

0,0

public private

h1 h′

1

h2 h′

2

h3 h′

3

r1,3 r′

1,0

r2,3 r′

2,0

r3,3 r′

3,0

r0,2 r0,1 r0,0 r1,2 r1,1 r1,0 r2,2 r2,1 r2,0 r3,2 r3,1 r3,0 r′

0,1

r′

0,2

r′

0,3

r′

1,1

r′

1,2

r′

1,3

r′

2,1

r′

2,2

r′

2,3

r′

3,1

r′

3,2

r′

3,3

t20 t21 t22 t23 t10 t11 t00

Message: 01b = 1

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 23 (38)

slide-106
SLIDE 106

Hash-based Cryptography

(Simplified) Winternitz and Merkle Tree

h0 h′ r0,3 r′

0,0

public private

h1 h′

1

h2 h′

2

h3 h′

3

r1,3 r′

1,0

r2,3 r′

2,0

r3,3 r′

3,0

r0,2 r0,1 r0,0 r1,2 r1,1 r1,0 r2,2 r2,1 r2,0 r3,2 r3,1 r3,0 r′

0,1

r′

0,2

r′

0,3

r′

1,1

r′

1,2

r′

1,3

r′

2,1

r′

2,2

r′

2,3

r′

3,1

r′

3,2

r′

3,3

t20 t21 t22 t23 t10 t11 t00

Message: 01b = 1

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 23 (38)

slide-107
SLIDE 107

Hash-based Cryptography

(Simplified) Winternitz and Merkle Tree

h0 h′ r0,3 r′

0,0

public private

h1 h′

1

h2 h′

2

h3 h′

3

r1,3 r′

1,0

r2,3 r′

2,0

r3,3 r′

3,0

r0,2 r0,1 r0,0 r1,2 r1,1 r1,0 r2,2 r2,1 r2,0 r3,2 r3,1 r3,0 r′

0,1

r′

0,2

r′

0,3

r′

1,1

r′

1,2

r′

1,3

r′

2,1

r′

2,2

r′

2,3

r′

3,1

r′

3,2

r′

3,3

t20 t21 t22 t23 t10 t11 t00

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 23 (38)

slide-108
SLIDE 108

Hash-based Cryptography

(Simplified) Winternitz and Merkle Tree

h0 h′ r0,3 r′

0,0

public private

h1 h′

1

h2 h′

2

h3 h′

3

r1,3 r′

1,0

r2,3 r′

2,0

r3,3 r′

3,0

r0,2 r0,1 r0,0 r1,2 r1,1 r1,0 r2,2 r2,1 r2,0 r3,2 r3,1 r3,0 r′

0,1

r′

0,2

r′

0,3

r′

1,1

r′

1,2

r′

1,3

r′

2,1

r′

2,2

r′

2,3

r′

3,1

r′

3,2

r′

3,3

t20 t21 t22 t23 t10 t11 t00

Message: 11b = 3

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 23 (38)

slide-109
SLIDE 109

Hash-based Cryptography

(Simplified) Winternitz and Merkle Tree

h0 h′ r0,3 r′

0,0

public private

h1 h′

1

h2 h′

2

h3 h′

3

r1,3 r′

1,0

r2,3 r′

2,0

r3,3 r′

3,0

r0,2 r0,1 r0,0 r1,2 r1,1 r1,0 r2,2 r2,1 r2,0 r3,2 r3,1 r3,0 r′

0,1

r′

0,2

r′

0,3

r′

1,1

r′

1,2

r′

1,3

r′

2,1

r′

2,2

r′

2,3

r′

3,1

r′

3,2

r′

3,3

t20 t21 t22 t23 t10 t11 t00

Message: 11b = 3

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 23 (38)

slide-110
SLIDE 110

Hash-based Cryptography

(Simplified) Winternitz and Merkle Tree

h0 h′ r0,3 r′

0,0

public private

h1 h′

1

h2 h′

2

h3 h′

3

r1,3 r′

1,0

r2,3 r′

2,0

r3,3 r′

3,0

r0,2 r0,1 r0,0 r1,2 r1,1 r1,0 r2,2 r2,1 r2,0 r3,2 r3,1 r3,0 r′

0,1

r′

0,2

r′

0,3

r′

1,1

r′

1,2

r′

1,3

r′

2,1

r′

2,2

r′

2,3

r′

3,1

r′

3,2

r′

3,3

t20 t21 t22 t23 t10 t11 t00

Message: 11b = 3

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 23 (38)

slide-111
SLIDE 111

Hash-based Cryptography Summary:

Only helpful for Signatures. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 24 (38)

slide-112
SLIDE 112

Hash-based Cryptography Summary:

Only helpful for Signatures. Number of signatures per public key is limited. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 24 (38)

slide-113
SLIDE 113

Hash-based Cryptography Summary:

Only helpful for Signatures. Number of signatures per public key is limited. Tree structures allow to sign many messages, e.g., XMSS. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 24 (38)

slide-114
SLIDE 114

Hash-based Cryptography Summary:

Only helpful for Signatures. Number of signatures per public key is limited. Tree structures allow to sign many messages, e.g., XMSS. There are sate free schemes, e.g., SPHINCS. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 24 (38)

slide-115
SLIDE 115

Hash-based Cryptography Summary:

Only helpful for Signatures. Number of signatures per public key is limited. Tree structures allow to sign many messages, e.g., XMSS. There are sate free schemes, e.g., SPHINCS. Key generation is expensive. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 24 (38)

slide-116
SLIDE 116

Hash-based Cryptography Summary:

Only helpful for Signatures. Number of signatures per public key is limited. Tree structures allow to sign many messages, e.g., XMSS. There are sate free schemes, e.g., SPHINCS. Key generation is expensive. Signatures are relatively large. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 24 (38)

slide-117
SLIDE 117

Lattice-based Cryptography

slide-118
SLIDE 118

Lattice-based Cryptography

Introduction

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 25 (38)

slide-119
SLIDE 119

Lattice-based Cryptography

Introduction

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 25 (38)

slide-120
SLIDE 120

Lattice-based Cryptography

Introduction

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 25 (38)

slide-121
SLIDE 121

Lattice-based Cryptography

Introduction

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 25 (38)

slide-122
SLIDE 122

Lattice-based Cryptography

Introduction

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 25 (38)

slide-123
SLIDE 123

Lattice-based Cryptography

Introduction

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 25 (38)

slide-124
SLIDE 124

Lattice-based Cryptography

Introduction

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 25 (38)

slide-125
SLIDE 125

Lattice-based Cryptography

Introduction

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 25 (38)

slide-126
SLIDE 126

Lattice-based Cryptography

Introduction

Underlying hard problems:

CVP: closest vector problem, SVP: shortest vector problem, LWE: learning with errors. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 26 (38)

slide-127
SLIDE 127

Lattice-based Cryptography

Introduction

Underlying hard problems:

CVP: closest vector problem, SVP: shortest vector problem, LWE: learning with errors.

Popular lattice-based schemes:

public key encryption: NTRU, NTRU prime; key exchange: New Hope (experimentally used by Google). Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 26 (38)

slide-128
SLIDE 128

Lattice-based Cryptography

Introduction

Security proofs of lattice-based schemes:

There are security proofs and

worst-case to average-case reductions.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 27 (38)

slide-129
SLIDE 129

Lattice-based Cryptography

Introduction

Security proofs of lattice-based schemes:

There are security proofs and

worst-case to average-case reductions.

Security proofs are not tight:

Security parameters are chosen based on best-known attacks, not based on security proofs.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 27 (38)

slide-130
SLIDE 130

Lattice-based Cryptography

Introduction

Security proofs of lattice-based schemes:

There are security proofs and

worst-case to average-case reductions.

Security proofs are not tight:

Security parameters are chosen based on best-known attacks, not based on security proofs.

Problems with lattice-based schemes:

Attack-complexity not yet deeply understood, attacks are improved frequently. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 27 (38)

slide-131
SLIDE 131

Supersingular Isogenies

y² = x³ – x + 1

slide-132
SLIDE 132

Supersingular Isogenies

Overview

E EA EB EAB φ(E) ψ(E) ψ′(EA) φ′(EB) Basic idea:

Use secret mappings (isogenies) between elliptic curves to compute a shared secret. Does not operate on points of a curve but on curves using maps. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 28 (38)

slide-133
SLIDE 133

Supersingular Isogenies

Overview

E EA EB EAB φ(E) ψ(E) ψ′(EA) φ′(EB) Features:

DH-like PQ key exchange scheme.

+ Small communication overhead. – High computational cost.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 28 (38)

slide-134
SLIDE 134

Supersingular Isogenies

Overview

E EA EB EAB φ(E) ψ(E) ψ′(EA) φ′(EB) Problems:

Very recent proposal; security not yet well understood. First proposal with ordinary curves broken by quantum computers. New proposal using supersingular curves under examination. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 28 (38)

slide-135
SLIDE 135

Performance and Challenges

slide-136
SLIDE 136

Performance and Challenges

Recommendations

Initial recommendations from the “PQCRYPTO project” (2015) [1]:

Symmetric Encryption: AES-256, Salsa20 with 256-bit key. Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 29 (38)

slide-137
SLIDE 137

Performance and Challenges

Recommendations

Initial recommendations from the “PQCRYPTO project” (2015) [1]:

Symmetric Encryption: AES-256, Salsa20 with 256-bit key. Public-key Encryption: McEliece with binary Goppa codes using length n = 6960,

dimension k = 5413, and adding t = 119 errors.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 29 (38)

slide-138
SLIDE 138

Performance and Challenges

Recommendations

Initial recommendations from the “PQCRYPTO project” (2015) [1]:

Symmetric Encryption: AES-256, Salsa20 with 256-bit key. Public-key Encryption: McEliece with binary Goppa codes using length n = 6960,

dimension k = 5413, and adding t = 119 errors.

Public-key Signatures: XMSS (with state), SPHINCS-256 (stateless). Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 29 (38)

slide-139
SLIDE 139

Performance and Challenges

NIST Post-Quantum Cryptography Standardization

Time line:

  • Feb. 2016

Announcement at PQCrypto 2016

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 30 (38)

slide-140
SLIDE 140

Performance and Challenges

NIST Post-Quantum Cryptography Standardization

Time line:

  • Feb. 2016

Announcement at PQCrypto 2016 April 2016 NIST releases NISTIR 8105 — Report on Post-Quantum Cryptography

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 30 (38)

slide-141
SLIDE 141

Performance and Challenges

NIST Post-Quantum Cryptography Standardization

Time line:

  • Feb. 2016

Announcement at PQCrypto 2016 April 2016 NIST releases NISTIR 8105 — Report on Post-Quantum Cryptography

  • Dec. 2016

Formal Call for Proposals

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 30 (38)

slide-142
SLIDE 142

Performance and Challenges

NIST Post-Quantum Cryptography Standardization

Time line:

  • Feb. 2016

Announcement at PQCrypto 2016 April 2016 NIST releases NISTIR 8105 — Report on Post-Quantum Cryptography

  • Dec. 2016

Formal Call for Proposals

  • Nov. 2017

Deadline for submissions

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 30 (38)

slide-143
SLIDE 143

Performance and Challenges

NIST Post-Quantum Cryptography Standardization

Time line:

  • Feb. 2016

Announcement at PQCrypto 2016 April 2016 NIST releases NISTIR 8105 — Report on Post-Quantum Cryptography

  • Dec. 2016

Formal Call for Proposals

  • Nov. 2017

Deadline for submissions Early 2018 Workshop — Submitter’s Presentations

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 30 (38)

slide-144
SLIDE 144

Performance and Challenges

NIST Post-Quantum Cryptography Standardization

Time line:

  • Feb. 2016

Announcement at PQCrypto 2016 April 2016 NIST releases NISTIR 8105 — Report on Post-Quantum Cryptography

  • Dec. 2016

Formal Call for Proposals

  • Nov. 2017

Deadline for submissions Early 2018 Workshop — Submitter’s Presentations 3-5 years Analysis Phase — NIST will report findings 1-2 workshops during this phase

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 30 (38)

slide-145
SLIDE 145

Performance and Challenges

NIST Post-Quantum Cryptography Standardization

Time line:

  • Feb. 2016

Announcement at PQCrypto 2016 April 2016 NIST releases NISTIR 8105 — Report on Post-Quantum Cryptography

  • Dec. 2016

Formal Call for Proposals

  • Nov. 2017

Deadline for submissions Early 2018 Workshop — Submitter’s Presentations 3-5 years Analysis Phase — NIST will report findings 1-2 workshops during this phase 2 years later Draft Standards ready

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 30 (38)

slide-146
SLIDE 146

Performance and Challenges

NIST Post-Quantum Cryptography Standardization

Round 1 Submissions:

Family Signatures KEM/Encryption sum lattice-based 5 23 28 code-based 3 17 20 multivariate 7 3 10 hash-based 2 2 “others” 3 6 9 sum 20 49 69

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 31 (38)

slide-147
SLIDE 147

Performance and Challenges

Cost of PQ Schemes Scheme Public key size Data size (bytes) (bytes) Classical schemes:

  • RSA:

– RSA-2048 256 256 – RSA-4096 512 512

  • ECC:

– 256-bit 32 32 – 512-bit 64 64

  • Key exchange:

– DH — 256 – 512 – ECDH — 32 – 64

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 32 (38)

slide-148
SLIDE 148

Performance and Challenges

Cost of PQ Schemes Scheme Public key size Data size (bytes) (bytes) Public-key signatures:

  • Hash based:

– XMSS (stateful) 64 2,500 – 2,820 – SPHINCS (state free) 1,056 41,000

  • Multivariate based:

– HFEv- 500,000 – 1,000,000 25 – 32 – Rainbow 148,500 – 1,321,000 64 – 147

  • Lattice based:

– Dilithium 896 – 1760 1386 – 3365 – qTESLA 2,976 – 6,432 2,720 – 5,920

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 32 (38)

slide-149
SLIDE 149

Performance and Challenges

Cost of PQ Schemes Scheme Public key size Data size (bytes) (bytes) Public-key encryption:

  • Code based:
  • McEliece (binary Goppa codes)

958,482 – 1,046,739 187 – 194

  • McEliece (QC-MDPC codes)

4,097 8,226

  • Lattice based:

– NTRUEncrypt 1,023 – 4,097 1023 – 4,097 – Kyber (KEM) 1,088 1,184

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 32 (38)

slide-150
SLIDE 150

Performance and Challenges

Cost of PQ Schemes Scheme Public key size Data size (bytes) (bytes) Key exchange:

  • Lattice based:

– NewHope — 1,824 – 2,048 – Kyber (KEX) — 1,184 – 2,368

  • Supersingular isogenies:

– SIDH — 564

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 32 (38)

slide-151
SLIDE 151

Performance and Challenges

Relative Performance Family Key Generation Public Key Private Key Encryption/Verification Decryption/Signing Code based: slow fast medium Multivariate: slow fast medium Hash based: slow fast slow Lattice based: fast fast fast Isogenies: slow (key exchange) ECC-256 fast medium fast RSA-3072 slow fast slow

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 33 (38)

slide-152
SLIDE 152

Performance and Challenges

Challenges

Open research questions:

Make trusted schemes more efficient. Make efficient schemes more reliable.

Performance Security and Trust Public-key Size Data Size

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 34 (38)

slide-153
SLIDE 153

Performance and Challenges

Challenges

Open research questions:

Make trusted schemes more efficient. Make efficient schemes more reliable.

Real-world PQC:

Investigate the usability of PQC

schemes in real-world applications.

Prepare applications for the transition

to PQC. ⇒ crypto-agility Performance Security and Trust Public-key Size Data Size

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 34 (38)

slide-154
SLIDE 154

Thank you for your attention!

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 35 (38)

slide-155
SLIDE 155

Literature

  • D. Augot, L. Batina, D. J. Bernstein, J. Bos, J. Buchmann, W. Castryck, O. Dunkelman,
  • T. G ¨

uneysu, S. Gueron, A. H ¨ ulsing, T. Lange, M. S. E. Mohamed, C. Rechberger, P . Schwabe,

  • N. Sendrier, F. Vercauteren, and B.-Y. Yang. Initial recommendations of long-term secure

post-quantum systems. Tech. rep.

http://pqcrypto.eu.org/docs/initial-recommendations.pdf. PQCRYPTO

Horizon 2020 ICT-645622, Sept. 2015.

  • D. J. Bernstein, J. Buchmann, and E. Dahmen, eds. Post Quantum Cryptography. Springer,

2008.

  • D. Deutsch. “Quantum Theory, the Church-Turing Principle and the Universal Quantum

Computer”. In: Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences 400.1818 (1985), pp. 97–117.

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 36 (38)

slide-156
SLIDE 156

Image Credits

Title page: by IBM Research, CC BY-ND 2.0 Telegraph: CC0 Creative Commons Hash browns: by Crisco 1492, CC BY-SA 3.0 Lettuce: CC0 Creative Commons Elliptic curve: by Yassine Mrabet, CC BY-SA 3.0 Hurdle: CC0 Creative Commons

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 37 (38)

slide-157
SLIDE 157

Contact Information

  • Dr. Ruben Niederhagen

Cyber-Physical System Security Fraunhofer-Institute for Secure Information Technology Address: Rheinstraße 75 64295 Darmstadt Germany Internet: http://www.sit.fraunhofer.de Phone: +49 6151 869-135 Fax: +49 6151 869-224 E-Mail: ruben.niederhagen@sit.fraunhofer.de

Post-Quantum Cryptography | Dr. Ruben Niederhagen | February 8, 2016 | 38 (38)