towards new international cryptographic standards
play

Towards New International Cryptographic Standards Designing and - PowerPoint PPT Presentation

Towards New International Cryptographic Standards Designing and Breaking Cryptography Lo Perrin Cosmiq TEAM Inria, Paris, France FIC 2020, Lille We (the Cosmiq team) are working on the foundations of cryptography. What kind of algorithms do


  1. Towards New International Cryptographic Standards Designing and Breaking Cryptography Léo Perrin Cosmiq TEAM Inria, Paris, France FIC 2020, Lille

  2. We (the Cosmiq team) are working on the foundations of cryptography. What kind of algorithms do we study? 1 Why do we design new ones? 2 3 What kind of flaws do we find in other ones? 2 / 15

  3. Towards New International Cryptographic Standards What Are Cryptographic Primitives? What is Cryptography? CRYPTO LUX 3 / 15

  4. Towards New International Cryptographic Standards What Are Cryptographic Primitives? What is Cryptography? Envelope: Confidentiality (nobody can read it) CRYPTO LUX 3 / 15

  5. Towards New International Cryptographic Standards What Are Cryptographic Primitives? What is Cryptography? Envelope: Confidentiality (nobody can read it) Seal: Integrity CRYPTO (nobody can modify it) LUX 3 / 15

  6. Towards New International Cryptographic Standards What Are Cryptographic Primitives? What is Cryptography? Envelope: Confidentiality (nobody can read it) Seal: Integrity CRYPTO (nobody can modify it) LUX Paul Signature: Authentication (it was wri  en by the right person) 3 / 15

  7. Communications Secure Library Protocols Cryptographic Primitives RSA, AES, SHA-256, ECDSA... Towards New International Cryptographic Standards What Are Cryptographic Primitives? How Is It Used? Application 4 / 15

  8. Secure Library Protocols Cryptographic Primitives RSA, AES, SHA-256, ECDSA... Towards New International Cryptographic Standards What Are Cryptographic Primitives? How Is It Used? Application Communications 4 / 15

  9. Protocols Cryptographic Primitives RSA, AES, SHA-256, ECDSA... Towards New International Cryptographic Standards What Are Cryptographic Primitives? How Is It Used? Application Communications Secure Library 4 / 15

  10. Cryptographic Primitives RSA, AES, SHA-256, ECDSA... Towards New International Cryptographic Standards What Are Cryptographic Primitives? How Is It Used? Application Communications Secure Library Protocols 4 / 15

  11. RSA, AES, SHA-256, ECDSA... Towards New International Cryptographic Standards What Are Cryptographic Primitives? How Is It Used? Application Communications Secure Library Protocols Cryptographic Primitives 4 / 15

  12. Towards New International Cryptographic Standards What Are Cryptographic Primitives? How Is It Used? Application Communications Secure Library Protocols Cryptographic Primitives RSA, AES, SHA-256, ECDSA... 4 / 15

  13. Towards New International Cryptographic Standards What Are Cryptographic Primitives? What Do Primitives Do? A cryptographic primitive is a basic building block ; it has a very simple API but very sophisticated inner workings! The block cipher For any k -bit long key κ , E κ is a permutation of { 0 , 1 } n . Typically, n ∈ { 64 , 128 } and k ∈ { 128 , 256 } . To ensure security : no matter how many pairs ( x , E κ ( x )) are known, it is impossible to recover k 1 1 Except by trying all possible κ which has 2 k possible values. 5 / 15

  14. Towards New International Cryptographic Standards How Are They Picked? How are the primitives used in practice chosen? 6 / 15

  15. Design Public Analysis Deployment Academic community Industry Small teams Scope statement Try and break pub- Implements Algorithm lished algorithms algorithms in specification actual products... Design choices Unbroken ...unless a new justifications algorithms are attack is found eventually trusted Security analysis time Publication Standardization Conf., competition NIST, ISO, IETF... Towards New International Cryptographic Standards How Are They Picked? Life Cycle of a Cryptographic Primitive Fundamental Research 7 / 15

  16. Academic community Industry Small teams Scope statement Try and break pub- Implements Algorithm lished algorithms algorithms in specification actual products... Design choices Unbroken ...unless a new justifications algorithms are attack is found eventually trusted Security analysis Conf., competition NIST, ISO, IETF... Towards New International Cryptographic Standards How Are They Picked? Life Cycle of a Cryptographic Primitive Fundamental Research Design Public Analysis Deployment time Publication Standardization 7 / 15

  17. Scope statement Try and break pub- Implements Algorithm lished algorithms algorithms in specification actual products... Design choices Unbroken ...unless a new justifications algorithms are attack is found eventually trusted Security analysis Towards New International Cryptographic Standards How Are They Picked? Life Cycle of a Cryptographic Primitive Fundamental Research Design Public Analysis Deployment Academic community Industry Small teams time Publication Standardization Conf., competition NIST, ISO, IETF... 7 / 15

  18. Try and break pub- Implements lished algorithms algorithms in actual products... Unbroken ...unless a new algorithms are attack is found eventually trusted Towards New International Cryptographic Standards How Are They Picked? Life Cycle of a Cryptographic Primitive Fundamental Research Design Public Analysis Deployment Academic community Industry Small teams Scope statement Algorithm specification Design choices justifications Security analysis time Publication Standardization Conf., competition NIST, ISO, IETF... 7 / 15

  19. Try and break pub- Implements lished algorithms algorithms in actual products... Unbroken ...unless a new algorithms are attack is found eventually trusted Towards New International Cryptographic Standards How Are They Picked? Life Cycle of a Cryptographic Primitive Fundamental Research Design Public Analysis Deployment Academic community Industry Small teams Scope statement Algorithm specification Design choices justifications Security analysis time Publication Standardization Conf., competition NIST, ISO, IETF... 7 / 15

  20. Implements algorithms in actual products... Unbroken ...unless a new algorithms are attack is found eventually trusted Towards New International Cryptographic Standards How Are They Picked? Life Cycle of a Cryptographic Primitive Fundamental Research Design Public Analysis Deployment Academic community Industry Small teams Scope statement Try and break pub- Algorithm lished algorithms specification Design choices justifications Security analysis time Publication Standardization Conf., competition NIST, ISO, IETF... 7 / 15

  21. Implements algorithms in actual products... Unbroken ...unless a new algorithms are attack is found eventually trusted Towards New International Cryptographic Standards How Are They Picked? Life Cycle of a Cryptographic Primitive Fundamental Research Design Public Analysis Deployment Academic community Industry Small teams Scope statement Try and break pub- Algorithm lished algorithms specification Design choices justifications Security analysis time Publication Standardization Conf., competition NIST, ISO, IETF... 7 / 15

  22. Implements algorithms in actual products... ...unless a new attack is found Towards New International Cryptographic Standards How Are They Picked? Life Cycle of a Cryptographic Primitive Fundamental Research Design Public Analysis Deployment Academic community Industry Small teams Scope statement Try and break pub- Algorithm lished algorithms specification Design choices Unbroken justifications algorithms are eventually trusted Security analysis time Publication Standardization Conf., competition NIST, ISO, IETF... 7 / 15

  23. Towards New International Cryptographic Standards How Are They Picked? Life Cycle of a Cryptographic Primitive Fundamental Research Design Public Analysis Deployment Academic community Industry Small teams Scope statement Try and break pub- Implements Algorithm lished algorithms algorithms in specification actual products... Design choices Unbroken ...unless a new justifications algorithms are attack is found eventually trusted Security analysis time Publication Standardization Conf., competition NIST, ISO, IETF... 7 / 15

  24. ??? Towards New International Cryptographic Standards How Are They Picked? Breaking the Pipeline Fundamental Research Design Public Analysis Deployment Academic community Industry Small teams Scope statement Try and break pub- Implements Algorithm lished algorithms algorithms in specification actual Design choices Unbroken products justifications algorithms are eventually trusted Security analysis time Publication Standardization 8 / 15

  25. Scope statement Try and break pub- Algorithm lished algorithms specification Design choices Unbroken justifications algorithms are eventually trusted Security analysis Towards New International Cryptographic Standards How Are They Picked? Breaking the Pipeline Fundamental Research Design Public Analysis Deployment Academic community Industry Small teams ??? Implements algorithms in actual products time Publication Standardization 8 / 15

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend