Post-quantum RSA (pqRSA) Daniel J. Bernstein Joint work with: - - PowerPoint PPT Presentation

post quantum rsa pqrsa
SMART_READER_LITE
LIVE PREVIEW

Post-quantum RSA (pqRSA) Daniel J. Bernstein Joint work with: - - PowerPoint PPT Presentation

Post-quantum RSA (pqRSA) Daniel J. Bernstein Joint work with: Josh Fried Nadia Heninger Paul Lou Luke Valenta Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta Parameters Scaled-down targets for


slide-1
SLIDE 1

Post-quantum RSA (pqRSA)

Daniel J. Bernstein Joint work with: Josh Fried Nadia Heninger Paul Lou Luke Valenta

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-2
SLIDE 2

Parameters

Scaled-down targets for cryptanalysis:

◮ pqrsa15: 215-byte keys using 512-bit primes. ◮ pqrsa20: 220-byte keys using 512-bit primes. ◮ pqrsa25: 225-byte keys using 1024-bit primes.

Primary parameter set included in submission:

◮ pqrsa30: 230-byte keys using 1024-bit primes.

Feasible option not included in submission:

◮ pqrsa40: 240-byte keys using 4096-bit primes.

Yes, we generated one of these keys.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-3
SLIDE 3

Speeds

Approximate cycles/byte on 1 core of 3GHz Intel Skylake: keygen dec enc pqrsa15 110000 3700 530 pqrsa20 110000 5800 1000 pqrsa25 540000 15000 1400 pqrsa30 550000 21000 1700 (Expect future speedups, especially for keygen.) pqrsa30 keygen: 2.3 days; dec: 2.1 hours; enc: 10.1 minutes.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-4
SLIDE 4

Speeds

Approximate cycles/byte on 1 core of 3GHz Intel Skylake: keygen dec enc pqrsa15 110000 3700 530 pqrsa20 110000 5800 1000 pqrsa25 540000 15000 1400 pqrsa30 550000 21000 1700 (Expect future speedups, especially for keygen.) pqrsa30 keygen: 2.3 days; dec: 2.1 hours; enc: 10.1 minutes. Submission also says “. . . quadrillion cycles”. Should say “trillion”. NIST didn’t notice?

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-5
SLIDE 5

Network traffic

For pqrsa30:

◮ Key:

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 bytes.

◮ Signature:

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ≈230 bytes.

◮ Ciphertext for kem:

. . . . . . . . . . . . . . . . . . . . . . . . . . . 230 bytes.

◮ Ciphertext for encrypt:

. . . . . . . . . . . . . . . . . . . . . . . 230 bytes, including ≈230 bytes of encrypted message. Submission does not cover options for compressing signed messages.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-6
SLIDE 6

Security against known attacks

pqrsa30 security analysis in submission:

◮ 2017 H¨

aner–Roetteler–Svore ⇒ ≈2110 Toffoli gates using ≈234 qubits. Beyond NIST Category 2 under reasonable assumptions.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-7
SLIDE 7

Security against known attacks

pqrsa30 security analysis in submission:

◮ 2017 H¨

aner–Roetteler–Svore ⇒ ≈2110 Toffoli gates using ≈234 qubits. Beyond NIST Category 2 under reasonable assumptions.

◮ Actually higher security: consider communication costs.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-8
SLIDE 8

Security against known attacks

pqrsa30 security analysis in submission:

◮ 2017 H¨

aner–Roetteler–Svore ⇒ ≈2110 Toffoli gates using ≈234 qubits. Beyond NIST Category 2 under reasonable assumptions.

◮ Actually higher security: consider communication costs. ◮ Actually higher security: consider latency limits.

NIST Categories 3–5 are not clearly defined!

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-9
SLIDE 9

Security against known attacks

pqrsa30 security analysis in submission:

◮ 2017 H¨

aner–Roetteler–Svore ⇒ ≈2110 Toffoli gates using ≈234 qubits. Beyond NIST Category 2 under reasonable assumptions.

◮ Actually higher security: consider communication costs. ◮ Actually higher security: consider latency limits.

NIST Categories 3–5 are not clearly defined!

◮ Maybe lower security: e.g., lower-cost multiplications?

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-10
SLIDE 10

Security against known attacks

pqrsa30 security analysis in submission:

◮ 2017 H¨

aner–Roetteler–Svore ⇒ ≈2110 Toffoli gates using ≈234 qubits. Beyond NIST Category 2 under reasonable assumptions.

◮ Actually higher security: consider communication costs. ◮ Actually higher security: consider latency limits.

NIST Categories 3–5 are not clearly defined!

◮ Maybe lower security: e.g., lower-cost multiplications? ◮ Prime size: 512 bits probably ok; 1024 ample.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-11
SLIDE 11

Security against known attacks

pqrsa30 security analysis in submission:

◮ 2017 H¨

aner–Roetteler–Svore ⇒ ≈2110 Toffoli gates using ≈234 qubits. Beyond NIST Category 2 under reasonable assumptions.

◮ Actually higher security: consider communication costs. ◮ Actually higher security: consider latency limits.

NIST Categories 3–5 are not clearly defined!

◮ Maybe lower security: e.g., lower-cost multiplications? ◮ Prime size: 512 bits probably ok; 1024 ample.

Submitted to NIST as Category 2.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-12
SLIDE 12

Security stability

RSA has tons of mathematical structure. Long history of many scary RSA security losses.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-13
SLIDE 13

Security stability

RSA has tons of mathematical structure. Long history of many scary RSA security losses. pqRSA already has close to the worst performance-security tradeoffs in this competition. Further security losses would not be surprising. e.g. Shor vs. small primes has barely been studied.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-14
SLIDE 14

Security stability

RSA has tons of mathematical structure. Long history of many scary RSA security losses. pqRSA already has close to the worst performance-security tradeoffs in this competition. Further security losses would not be surprising. e.g. Shor vs. small primes has barely been studied. But users keep using RSA.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-15
SLIDE 15

Security stability

RSA has tons of mathematical structure. Long history of many scary RSA security losses. pqRSA already has close to the worst performance-security tradeoffs in this competition. Further security losses would not be surprising. e.g. Shor vs. small primes has barely been studied. But users keep using RSA. RSA-512 publicly broken: “Let’s use RSA-768.”

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-16
SLIDE 16

Security stability

RSA has tons of mathematical structure. Long history of many scary RSA security losses. pqRSA already has close to the worst performance-security tradeoffs in this competition. Further security losses would not be surprising. e.g. Shor vs. small primes has barely been studied. But users keep using RSA. RSA-512 publicly broken: “Let’s use RSA-768.” RSA-768 publicly broken: “Let’s use RSA-1024.”

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-17
SLIDE 17

Security stability

RSA has tons of mathematical structure. Long history of many scary RSA security losses. pqRSA already has close to the worst performance-security tradeoffs in this competition. Further security losses would not be surprising. e.g. Shor vs. small primes has barely been studied. But users keep using RSA. RSA-512 publicly broken: “Let’s use RSA-768.” RSA-768 publicly broken: “Let’s use RSA-1024.” RSA-2048 publicly broken by quantum computers:

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-18
SLIDE 18

Security stability

RSA has tons of mathematical structure. Long history of many scary RSA security losses. pqRSA already has close to the worst performance-security tradeoffs in this competition. Further security losses would not be surprising. e.g. Shor vs. small primes has barely been studied. But users keep using RSA. RSA-512 publicly broken: “Let’s use RSA-768.” RSA-768 publicly broken: “Let’s use RSA-1024.” RSA-2048 publicly broken by quantum computers: “Yeah, NSA already told us to use RSA-3072.”

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-19
SLIDE 19

Familiarity

Users care about more than security+performance. “I learned RSA in school.”

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-20
SLIDE 20

Familiarity

Users care about more than security+performance. “I learned RSA in school.” “Factorization has been deeply studied by some of the great mathematicians going back to the ancient Greeks.”

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-21
SLIDE 21

Familiarity

Users care about more than security+performance. “I learned RSA in school.” “Factorization has been deeply studied by some of the great mathematicians going back to the ancient Greeks.” No mention of how much security has been lost.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-22
SLIDE 22

Familiarity

Users care about more than security+performance. “I learned RSA in school.” “Factorization has been deeply studied by some of the great mathematicians going back to the ancient Greeks.” No mention of how much security has been lost. Is the quoted argument competent cryptography? No.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-23
SLIDE 23

Familiarity

Users care about more than security+performance. “I learned RSA in school.” “Factorization has been deeply studied by some of the great mathematicians going back to the ancient Greeks.” No mention of how much security has been lost. Is the quoted argument competent cryptography? No. Do users continue using RSA? Yes.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-24
SLIDE 24

Familiarity

Users care about more than security+performance. “I learned RSA in school.” “Factorization has been deeply studied by some of the great mathematicians going back to the ancient Greeks.” No mention of how much security has been lost. Is the quoted argument competent cryptography? No. Do users continue using RSA? Yes. Analogy: “Lattice problems have been deeply studied by some of the great mathematicians going back to Gauss.”

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-25
SLIDE 25

Familiarity, continued: quotes from 1997

Lenstra: “The elliptic curve discrete logarithm problem has been around for a relatively short amount of time.” Adleman: “I suspect that the lack of a sub-exponential algorithm is merely a matter of neglect.” Schnorr: “It is unreasonable to assume that it has straight exponential complexity.” Silverman: “Nor is it backed up by as many years of active cryptanalytic research as the RSA results are.”

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-26
SLIDE 26

Risk management

Very plausible nightmare scenario:

◮ Quantum computers are built. ◮ Many users continue using RSA.

Important to analyze the security of pqRSA.

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-27
SLIDE 27

Risk management

Very plausible nightmare scenario:

◮ Quantum computers are built. ◮ Many users continue using RSA.

Important to analyze the security of pqRSA. If we say “Don’t use RSA; system X is better”: Will users obey?

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-28
SLIDE 28

Risk management

Very plausible nightmare scenario:

◮ Quantum computers are built. ◮ Many users continue using RSA.

Important to analyze the security of pqRSA. If we say “Don’t use RSA; system X is better”: Will users obey? Analogy: If we say “Use 256-bit cipher keys”: Will users obey?

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta

slide-29
SLIDE 29

Risk management

Very plausible nightmare scenario:

◮ Quantum computers are built. ◮ Many users continue using RSA.

Important to analyze the security of pqRSA. If we say “Don’t use RSA; system X is better”: Will users obey? Analogy: If we say “Use 256-bit cipher keys”: Will users obey? And is it clear that system X is better? Maybe pqrsa30 is the strongest system in the NIST competition!

Post-quantum RSA Daniel J. Bernstein, Josh Fried, Nadia Heninger, Paul Lou, Luke Valenta