the death and rebirth of classical cryptography in a
play

The death and rebirth of classical cryptography in a quantum world - PowerPoint PPT Presentation

The death and rebirth of classical cryptography in a quantum world Goutam Paul http://www.goutampaul.com Cryptology and Security Research Unit, Indian Statistical Institute, Kolkata February 10, 2016 Lecture at International School and


  1. The death and rebirth of classical cryptography in a quantum world Goutam Paul http://www.goutampaul.com Cryptology and Security Research Unit, Indian Statistical Institute, Kolkata February 10, 2016 Lecture at International School and Conference on Quantum Information, Institute of Physics (IOP), Bhubaneswar (Feb 9-18, 2016).

  2. Outline Pre-Quantum Cryptograpghy 1 Public Key Cryptography RSA Quantum Attacks on Classical Cryptosystems 2 Solving Hard Problems by Quantum Computers Death of Classical Public Key Cryptography Need for QKD Quantum Cryptography 3 Quantum Key Distribution (QKD) Other Quantum Cryptography Algorithms Post-Quantum Cryptography 4 Rebirth of Classical Cryptography

  3. Roadmap Pre-Quantum Cryptograpghy 1 Public Key Cryptography RSA Quantum Attacks on Classical Cryptosystems 2 Solving Hard Problems by Quantum Computers Death of Classical Public Key Cryptography Need for QKD Quantum Cryptography 3 Quantum Key Distribution (QKD) Other Quantum Cryptography Algorithms Post-Quantum Cryptography 4 Rebirth of Classical Cryptography

  4. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography The Crypto World Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 4 of 28

  5. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography PKC: Origin and History Timeline 1976: The Idea - Whitfield Diffie and Martin Hellman 1976: Diffie and Hellman Key Exchange algorithm 1978: Rivest, Shamir and Adleman invented RSA Actual Timeline (?) [announced in 1997] 1970: The Idea - James H. Ellis (British intelligence) 1973: Clifford Cocks developed RSA algorithm 1974: Malcom Williamson built Diffie-Hellman scheme Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 5 of 28

  6. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Public Key Framework Goal: Alice and Bob communicate securely, avoiding Charles Alice (receiver) Key Gen: Construct related pair of keys (public and private) Key Dist: Publish public key and keep private key secret Bob (sender) Get Key: Obtain an authentic Public Key of Alice Encrypt: Use it to encrypt message and send to Alice Alice (receiver) Get Cipher: Obtain the ciphertext sent by Bob Decrypt: Use Private Key to decrypt the ciphertext Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 6 of 28

  7. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Examples of Public Key Cryptosystems Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 7 of 28

  8. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Examples of Public Key Cryptosystems RSA (1977) Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 7 of 28

  9. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Examples of Public Key Cryptosystems RSA (1977) Knapsack (1978) Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 7 of 28

  10. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Examples of Public Key Cryptosystems RSA (1977) Knapsack (1978) Goldwasser-Micali (1982) Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 7 of 28

  11. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Examples of Public Key Cryptosystems RSA (1977) Knapsack (1978) Goldwasser-Micali (1982) ElGamal (1985) Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 7 of 28

  12. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Examples of Public Key Cryptosystems RSA (1977) Knapsack (1978) Goldwasser-Micali (1982) ElGamal (1985) ECC (1985) Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 7 of 28

  13. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Examples of Public Key Cryptosystems RSA (1977) Knapsack (1978) Goldwasser-Micali (1982) ElGamal (1985) ECC (1985) Cramer-Shoup (1998) Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 7 of 28

  14. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Examples of Public Key Cryptosystems RSA (1977) Knapsack (1978) Goldwasser-Micali (1982) ElGamal (1985) ECC (1985) Cramer-Shoup (1998) Paillier (1999) Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 7 of 28

  15. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Example: RSA Cryptosystem Key Gen Choose two large primes p and q Compute the product N = pq Compute Euler’s Totient function φ ( N ) = ( p − 1)( q − 1) Choose positive integer e such that gcd( e , φ ( N )) = 1 Compute d such that ed ≡ 1 (mod φ ( N )) Key Dist Public Key = � N , e � and Private Key = � N , d � Message M produces Ciphertext C = M e mod N Encryption Ciphertext C produces Message M = C d mod N Decryption Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 8 of 28

  16. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Example: an RSA Instance Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 9 of 28

  17. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Example: an RSA Instance Suppose p = 653 , q = 877. Then N = pq = 572681, φ ( N ) = ( p − 1)( q − 1) = 571152. Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 9 of 28

  18. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Example: an RSA Instance Suppose p = 653 , q = 877. Then N = pq = 572681, φ ( N ) = ( p − 1)( q − 1) = 571152. Suppose Bob chooses e = 13 as the encryption exponent. Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 9 of 28

  19. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Example: an RSA Instance Suppose p = 653 , q = 877. Then N = pq = 572681, φ ( N ) = ( p − 1)( q − 1) = 571152. Suppose Bob chooses e = 13 as the encryption exponent. Now he has to find the decryption exponent d which is e − 1 in Z φ ( N ) . Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 9 of 28

  20. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Example: an RSA Instance Suppose p = 653 , q = 877. Then N = pq = 572681, φ ( N ) = ( p − 1)( q − 1) = 571152. Suppose Bob chooses e = 13 as the encryption exponent. Now he has to find the decryption exponent d which is e − 1 in Z φ ( N ) . One can check that 13 × 395413 ≡ 1 (mod 571152). Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 9 of 28

  21. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Example: an RSA Instance Suppose p = 653 , q = 877. Then N = pq = 572681, φ ( N ) = ( p − 1)( q − 1) = 571152. Suppose Bob chooses e = 13 as the encryption exponent. Now he has to find the decryption exponent d which is e − 1 in Z φ ( N ) . One can check that 13 × 395413 ≡ 1 (mod 571152). Hence, the RSA parameters for Bob are public key: (13 , 572681), and private key: (395413 , 572681). Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 9 of 28

  22. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Example: an RSA Instance (contd...) Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 10 of 28

  23. Pre-Quantum Cryptograpghy Quantum Attacks on Classical Cryptosystems Public Key Cryptography Quantum Cryptography RSA Post-Quantum Cryptography Example: an RSA Instance (contd...) To encrypt a plaintext m = 12345, Alice uses Bob’s public key (13 , 572681), and calculates c = 12345 13 mod 572681 = 536754 and sends c to Bob. Goutam Paul The death and rebirth of classical cryptography in a quantum world Slide 10 of 28

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend