Recommendation to Protect Your Data in the Future
- Prof. Dr.-Ing. Tim Güneysu
Arbeitsgruppe Technische Informatik / IT-Sicherheit (CEITS) LEARNTEC – Karlsruhe – 27.01.2016
Recommendation to Protect Your Data in the Future Prof. Dr.-Ing. - - PowerPoint PPT Presentation
Recommendation to Protect Your Data in the Future Prof. Dr.-Ing. Tim Gneysu Arbeitsgruppe Technische Informatik / IT-Sicherheit (CEITS) LEARNTEC Karlsruhe 27.01.2016 Long-Term Security in the Real World Most IT applications have a
Arbeitsgruppe Technische Informatik / IT-Sicherheit (CEITS) LEARNTEC – Karlsruhe – 27.01.2016
2
> 8 years 5-40 years 10 years 5-25 years
3
Message x
Untrusted Channel
Message x Message x
4
LEARNTEC LEARNTEC
Untrusted Channel
ÜOc#2$Kj ÜOc#2$Kj
e e-1
ÜOc#2qß$Kqj
Common problem:
– How can Alice and Bob securely exchange the shared secret k prior to communication?
Secure Channel (?!)
5
LEARNTEC LEARNTEC
Untrusted Channel
%9DKslt3=Öd %9DKslt3=Öd
e
e-1
%9DKslt3=Öd
Alternative: Use asymmetric encryption with two key shares (kpublic, kprivate)
– Function e must be efficient for evaluation in both directions for all key shares (kpublic , kprivate) – Inverting e is hard if kprivate is not present
6
Setup/Parameters Given p prime and generator ∈ 𝑎𝑞
∗
Pick random 𝑏 ∈ 𝑎𝑞−1/ 0,1 and compute 𝑐 = 𝑏 𝑛𝑝𝑒 𝑞 Public key: 𝒍𝒒𝒗𝒄𝒎𝒋𝒅 = (𝑐, 𝑞) Private key: 𝒍𝒒𝒔𝒋𝒘𝒃𝒖𝒇 = 𝑏 RSA encryption for message m Zn
*
Encrypt: Pick random 𝑗 ∈ 𝑎𝑞−1/ 0,1 and compute 𝑢 = 𝑗 𝑛𝑝𝑒 𝑞 Compute 𝑙 = 𝑐𝑗 𝑛𝑝𝑒 𝑞 Finally: 𝒅 = 𝒏 𝒍 mod n Decrypt: Compute 𝑙 = 𝑢𝑏 𝑛𝑝𝑒 𝑞 Finally 𝒅 = 𝒏 𝒍−𝟐 mod n
Setup/Parameters Choose 𝑜 = 𝑞 𝑟 with p,q prime Pick e with gcd(𝑓, (𝑂)) = 1 and with 𝑓 𝑒 = 1 𝑛𝑝𝑒 (𝑂) Public key: 𝒍𝒒𝒗𝒄𝒎𝒋𝒅 = (𝑜, 𝑓) Private key: 𝒍𝒒𝒔𝒋𝒘𝒃𝒖𝒇 = 𝑒 RSA encryption for message m Zn
*
Encrypt: 𝒅 = 𝒏𝒇 mod n Decrypt: 𝒏 = 𝒅𝒆 mod n
7
8
9
Source: ECRYPT II Yearly Key Size Report 2011-2012
(symmetric)
10
11
12
13
14
15
16
McEliece Encryption with binary Goppa codes using length n = 6960, dimension k = 5413 and adding t = 119 errors [3]
XMSS with 256-bit parameter set [4] or SPHINCS-256 [5]
17
[1] Joan Daemen and Vincent Rijmen. The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography. Springer, 2002 [2] Daniel J. Bernstein. The Salsa20 Family of Stream Ciphers. In Matthew J. B. Robshaw and Olivier Billet, editors, New Stream Cipher Designs - The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, pages 84–97. Springer, 2008. [3] Daniel J. Bernstein, Tung Chou, and Peter Schwabe. McBits: Fast Constant-Time CodeBased Cryptography. In Guido Bertoni and Jean-Sebastien Coron, editors, Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings, volume 8086 of Lecture Notes in Computer Science, pages 250–272. Springer, 2013. [4] Johannes A. Buchmann, Erik Dahmen, and Andreas Hülsing. XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions. In BoYin Yang, editor, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings, volume 7071 of Lecture Notes in Computer Science, pages 117–129. Springer, 2011. [5] Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, and Zooko WilcoxO’Hearn. SPHINCS: Practical Stateless Hash-Based Signatures. In Elisabeth Oswald and Marc Fischlin, editors, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, volume 9056 of Lecture Notes in Computer Science, pages 368–
Arbeitsgruppe Technische Informatik / IT-Sicherheit (CEITS) LEARNTEC – Karlsruhe – 27.01.2016