POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW? Hanno Bck - - PowerPoint PPT Presentation

post quantum cryptography
SMART_READER_LITE
LIVE PREVIEW

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW? Hanno Bck - - PowerPoint PPT Presentation

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW? Hanno Bck https://hboeck.de 1 INTRODUCTION Hanno Bck, freelance journalist and hacker. Writing for Golem.de and others. Fuzzing Project , funded by Linux Foundation's Core


slide-1
SLIDE 1

1

POST-QUANTUM CRYPTOGRAPHY

HOW WILL WE ENCRYPT TOMORROW?

Hanno Böck https://hboeck.de

slide-2
SLIDE 2

2

INTRODUCTION

Hanno Böck, freelance journalist and hacker. Writing for and others. Golem.de , funded by Linux Foundation's Core Infrastructure Initiative. Fuzzing Project Author of monthly . Bulletproof TLS Newsletter

slide-3
SLIDE 3

3

Richard Feynman presents idea of a quantum computer

1982

CC by-sa 3.0, Tamiko Thiel, Wikimedia Commons

slide-4
SLIDE 4

4

Peter Shor shows quantum computers could break public key cryptography

1994

CC sa 1.0, Peter Shor, Wikimedia Commons

slide-5
SLIDE 5

5

QUANTUM COMPUTERS

Well understood theory, but hard to engineer. Some researchers give timeframes of 10-15 years for scalable quantum computers.

slide-6
SLIDE 6

6

POST-QUANTUM CRYPTOGRAPHY

Algorithms that we believe to be resistant to quantum attacks. Development still in early stages.

slide-7
SLIDE 7

7

SYMMETRIC POST-QUANTUM CRYPTOGRAPHY

Hash functions (SHA-2, SHA-3) and symmetric encryption (AES) are the easy part. Just use larger keys (256 bit is fine).

slide-8
SLIDE 8

8

PUBLIC KEY CRYPTOGRAPHY

Encryption with separate public and private key Signatures Key exchanges

slide-9
SLIDE 9

9

UNDERLYING PROBLEMS OF PUBLIC KEY CRYPTOGRAPHY

Factoring-based (RSA) Discrete-logarithm-based (Diffie Hellman, DSA, ElGamal) Elliptic-curve-based (ECDSA, ECDH, X25519, Ed25519) Quantum computers break all three.

slide-10
SLIDE 10

10

CRYPTO IS BROKEN

Almost every crypto soware and protocol today uses these algorithms. TLS/SSL, SSH, OpenPGP/GnuPG, Signal, Whatsapp, OTR, OMEMO, ... Quantum computers break practically everything using crypto.

slide-11
SLIDE 11

11

CANDIDATES FOR POST-QUANTUM CRYPTOGRAPHY

Code-based cryptography Lattice-based cryptography Isogeny-based cryptography Hash-based signatures Multivariate cryptography

slide-12
SLIDE 12

12

CONSERVATIVE, SAFE CHOICES

EU PQCRYPTO recommendations

slide-13
SLIDE 13

13

MCELIECE / MCBITS

McEliece: Code-based encryption. Parameters from paper (Bernstein, Chou, Schwabe, 2013). McBits Good: old, well researched Bad: large keys (~1 MB)

slide-14
SLIDE 14

14

HASH-BASED SIGNATURES

Good: as secure as the hash function : needs internal state XMSS : no state, but large signatures SPHINCS

slide-15
SLIDE 15

15

LATTICES

Ntru, Ring-Learning-With-Errors, , Ntru prime, BLISS, Tesla#. New Hope Pro: Practical, fast, relatively small keys. Con: Patents, conflicts over security estimates. Most likely candidate for early deployments.

slide-16
SLIDE 16

16

SUPERSINGULAR ISOGENIES OF ELLIPTIC CURVES

SIDH - Diffie-Hellman-alike key exchange. Pro: Very similar workflow to Diffie Hellman, small keys. Con: Not that fast, very new, needs more research.

slide-17
SLIDE 17

17

POST-QUANTUM CRYPTOGRAPHY TODAY

We have the choice between very impractical and experimental algorithms.

slide-18
SLIDE 18

18

IMPLEMENTATION CONSIDERATIONGS

slide-19
SLIDE 19

19

ATTACKS ON OLD CRYPTO

Logjam, FREAK, DROWN, SWEET32

slide-20
SLIDE 20

20

DEPRECATION IS HARD

It oen takes decades to deprecate old crypto. Windows-XP- compatibility is still a concern for some. If quantum computers come in 10-15 years then the transition will be rough.

slide-21
SLIDE 21

21

IT'S NOT JUST THE ALGORITHMS

Secure algorithms can be used in insecure ways. October 2016: Three research papers on potential backdoors and security issues with Diffie Hellman. If we don't even know how to use the oldest public key algorithm safely, how should we know how to use entirely new algorithms?

slide-22
SLIDE 22

22

STORE NOW, DECRYPT LATER

Attackers could store large amounts of encrypted communication today and decrypt it once a quantum computer is available. Strong argument for fast deployment.

slide-23
SLIDE 23

23

HYBRID MODES

No confidence in practical postquantum schemes. Combine experimental postquantum algorithm with well researched prequantum algorithm. Example: X25519 (elliptic curve) and New Hope (lattice- based) key exchange.

slide-24
SLIDE 24

24

CECPQ1

Google deployed New Hope / X25519 hybrid in Chrome/BoringSSL and on some servers.

slide-25
SLIDE 25

25

REBELALLIANCE

Hybrid New Hope / X25519 key exchange for tor.

slide-26
SLIDE 26

26

QUANTUM MYTHBUSTING

slide-27
SLIDE 27

27

WHEN WILL I HAVE A QUANTUM COMPUTER ON MY DESK?

Maybe never.

slide-28
SLIDE 28

28

QUANTUM ALGORITHMS

Quantum computers don't magically make everything faster, they're faster for very specific problems (factoring, physical simulations). Even if possible: It's not clear if there's a need for home quantum computers. Possible scenario: Quantum computers are run by universities and companies, one can rent computing time.

slide-29
SLIDE 29

29

D-WAVE

The D-Wave quantum computer can't run Shor's algorithm. It's not clear if D-Wave quantum computers can do anything

  • useful. But they are almost certainly irrelevant for

cryptography.

slide-30
SLIDE 30

30

QUANTUM CRYPTOGRAPHY

Image public domain, Wikimedia Commons

slide-31
SLIDE 31

31

CLARIFICATION OF VOCABULARY

Quantum computing: Using quantum effects to solve mathematical problems that can't efficiently be solved on normal computers. Post-Quantum cryptography: Cryptography that resists attacks with quantum computers. Quantum cryptography / quantum key distribution: Using physical channels to exchange cryptographic keys.

slide-32
SLIDE 32

32

QUANTUM CRYPTOGRAPHY / QKD

Idea: cryptography that is secure based on the laws of physics. Send single particles with polarized encoding, exchange polarization filter configuration. This has major drawbacks and solves nothing.

slide-33
SLIDE 33

33

HUGE HYPE

Latest trend: Talk about Quantum Internet.

slide-34
SLIDE 34

34

LIMITATIONS

Very likely limited distances (tens or hundreds of kilometers). Or maybe this is good?

slide-35
SLIDE 35

35

But they can only function over distances up to 300 km [...] Instead, repeaters based on trusted nodes or fully quantum devices, possibly involving satellites, are needed to reach global distances. The advantage of trusted-node schemes is that they provide access for lawful intercept, as required by many nation states Source: EU Quantum Manifesto

slide-36
SLIDE 36

36

TRUSTED INTERMEDIATES?

slide-37
SLIDE 37

37

QUANTUM INTERNET?

Let's say I want to send an encrypted message from Berlin to Sydney. Trusted intermediates in Poland, Ukraine, Russia, Kazakhstan, China, India, Burma, Thailand, Malaysia, Indonesia, Australia.

slide-38
SLIDE 38

38

NOT WIRELESS

QKD needs a physical connection between endpoints. No Wifi No mobile Internet

slide-39
SLIDE 39

39

QUANTUM HACKING

Quantum cryptography provides perfect security. However regularly commercial QKD devices get broken. How's that even possible?

slide-40
SLIDE 40

40

QKD: SECURE IN THEORY

The big argument for QKD: It's perfectly secure - based on the laws of physics! However that's only true for an idealized version of QKD, not for any real system.

slide-41
SLIDE 41

41

PROBLEMS OF HARDWARE-BASED SECURITY

If you have a bug in your encryption soware you can install an update (hopefully). If you have a bug in your encryption hardware you need to buy new hardware.

slide-42
SLIDE 42

42

QKD NEEDS AUTHENTICATION

All QKD systems need an authenticated channel. QKD depends on the cryptography its proponents claim it should replace. This limitation is rarely mentioned, but it's significant. It means QKD can't solve the problems created by quantum computers.

slide-43
SLIDE 43

43

"It is a well-established fact that all QKE protocols require that the parties have access to an authentic channel. Without this authenticated link, QKE is vulnerable to man-in-the-middle

  • attacks. Overlooking this fact results in exaggerated claims

and/or false expectations about the potential impact of QKE." ( ) Paterson, Piper, Schack, 2004

slide-44
SLIDE 44

44

QUANTUM CRYPTOGRAPHY

Extremely overhyped with outragerous claims ("Quantum Internet"). Entirely unclear which problems it should solve. Definitely not a solution for the problems created by quantum computers. That solution is Post-Quantum cryptography.

slide-45
SLIDE 45

45

CONCLUSIONS

Quantum computers may come pretty soon (or not at all). We need to be prepared. Post-Quantum cryptography is still in its early stages. We're already too late. Be wary of overhyped claims about quantum cryptography, which likely won't solve anything

slide-46
SLIDE 46

46

MORE INFO

  • EU PQCRYPTO research project
  • NIST

standardization effort Questions? pqcrypto.org pqcrypto.eu.org csrc.nist.gov/groups/ST/post-quantum-crypto/