Information Security Methods and Practices in Classical and Quantum Regimes.

Slides:



Advertisements
Similar presentations
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Advertisements

1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
7. Asymmetric encryption-
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Quantum Key Distribution Yet another method of generating a key.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Quantum Cryptography Marshall Roth March 9, 2007.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Lecture 23 Cryptography CPE 401 / 601 Computer Network Systems Slides are modified from Jim Kurose & Keith Ross.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
I-4 security.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Lec. 5 : History of Cryptologic Research II
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Midterm Review Cryptography & Network Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Cryptography Lecture 7: RSA Primality Testing Piotr Faliszewski.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Nawaf M Albadia
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
Chaos, Communication and Consciousness Module PH19510 Lecture 13 Encryption in the Computer Age.
Quantum Cryptography Antonio Acín
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Chap 6: Security and Protection
Quantum Cryptography Alok.T.J EC 11.
Security through Encryption
Presentation transcript:

Information Security Methods and Practices in Classical and Quantum Regimes

Cryptography What’s that mean? ▫Kryptos: hidden, secret ▫Gráphō: to write What does it do? ▫Encryption: plaintext  ciphertext ▫Decryption: ciphertext  plaintext Why would you want that? ▫Confidentiality ▫Integrity, authentication, signing, interactive proofs, secure multi-party computation

Cryptology, Cryptanalysis, Cryptolinguistics Frequency analysis Brute force Differential Integral Impossible differential Boomerang Mod n Related key Slide Timing XSL Linear Multiple linear Davies’ attack Improved Davies’ attack

Demands for resilient crypto Auguste Kerckhoff’s principle ▫Cipher practically indecipherable ▫Cipher and keys not required to be secret ▫Key communicable and retainable ▫Applicable to telegraphic communication ▫Portable and human effort efficient ▫Easy to use Bruce Shneier ▫“Secrecy … is a prime cause of brittleness… Conversely, openness provides ductility.” Eric Raymond ▫“Any security software design that doesn't assume the enemy possesses the source code is already untrustworthy; therefore, *never trust closed source.” Shannon’s maxim ▫“The enemy knows the system.”

Classical Regime Written language text

Transposition Exchange the position of two symbols in the text Like an anagram Scytale E.g. text  cipher Hello world!  eHll oowlr!d

Substitution Systematically exchange a symbol in the text with another symbol Caesar cipher, EXCESS-3 E.g. text  cipher Aabcd  Ddefg

Poly-Alphabetic Substitution Repeated and dynamic substitution(s) Wehrmacht Enigma Series of rotors

One Time Pad Perfect secrecy ▫Coined by Shannon ▫H(M) = H(M|C) Requirements ▫Perfect randomness ▫Secure key generation and exchange ▫Careful adherence to process

Classical Regime Binary bit sequence

Secret Key Crypto Perfect secrecy ▫Coined by Shannon ▫H(M) = H(M|C) Requirements ▫Perfect randomness ▫Secure key generation and exchange ▫Careful adherence to process

Symmetric Key Crypto The same (or similar) key ▫For both encryption and decryption Data Encryption Standard ▫56 bit key ▫Feistel network ▫Broken in 1999 in 22 hours 15 minutes by Deep Crack Triple-DES ▫56 bit keys (3 unique) ▫en-de-en-crypt Advanced Encryption Standard (Rijndael) ▫ bit keys ▫Substitution permutation network

Feistel Network Expansion Key mixing Substitution Permutation

Substitution Permutation Network Substitution ▫1/n input change  1/2 output change ▫confusion Permutation ▫mix up inputs ▫diffusion Round keys

Public Key Crypto Asymmetric keys ▫public and private No secret key Multiple use TLS, SSL, PGP, GPG, digital signatures

RSA Ron Rivest, Adi Shamir, Leonard Adleman; 1978 Key generation ▫Pick two distinct, large prime numbers: p, q ▫Compute their product: n = pq ▫Compute its totient: phi = (p-1)(q-1) ▫Pick a public key exponent: 1 < e < phi, e and phi coprime ▫Compute private key exponent: de = 1 (mod phi) Encryption ▫Forward padding ▫Cipher = text ^ e (mod n)  Exponentiation by squaring Decryption ▫Text = cipher ^ d (mod n)  = text ^ de (mod n) = text ^ (1+k*phi) (mod n) = text (mod n) ▫Reverse padding

Hybrid Crypto Diffe-Hellman key exchange Alice and Bob agree on a finite cyclic group G (Multiplicative group of integers mod p) ▫Period p, prime number ▫Base g, primitive root mod p Alice picks a random natural number a and sends g a mod p to Bob. Bob picks a random natural number b and sends g b mod p to Alice. Alice computes (g b mod p) a mod p Bob computes (g a mod p) b mod p Both know g ab mod p = g ba mod p

Quantum Regime Breaking classical crypto

Peter Shor’s Factorization Algorithm Polynomial time in log N: O( (log N) 3 ) Polynomial gates in log N: O( (log N) 2 ) Complexity class Bounded-Error Quantum Polynomial (BQP) Transform from to periodicity ▫Pick 1 < r < N: a r = 1 mod N ▫a r -1 = (a r/2 +1)(a r/2 -1) = 0 mod N ▫N = (a r/2 +1)(a r/2 -1) = pq Quantum Fourier Transform ▫Map x-space to ω-space ▫Measure with 1/r 2 probability

Factor 15 In 2001 IBM demonstrated Shor’s Algorithm and factored 15 into 3 and 5 NMR implementation with 7 qubits pentafluorobutadienyl cyclopentadienyldicarbon yl-iron complex (C11H5F5O2Fe)

DWave Superconducting processors Adiabatic quantum algorithms Solving Quantum Unconstrained Binary Optimization problems (QUBO is in NP)

Quantum Regime Future proof cryptography

Quantum Key Distribution Quantum communication channel ▫Single photon, entangled photon pair Preparation ▫Alice prepares a state, sends to Bob, measures Entanglement ▫Alice and Bob each receive half the pair, measure

Non-Orthogonal Bases Complementary bases ▫Basis A: { |0>, |1> } ▫Basis B: { |+>, |-> } Indistinguishable transmission states ▫|+> = 0.5 |0> |1> ▫|-> = 0.5 |0> |1> Random choice of en-de-coding bases ▫Succeeds ~ p = 0.5

True Random Number Generation Quantum mechanics at < atomic scale ▫Shot noise ▫Nuclear decay ▫Optics Thermal noise ▫Resistor heat ▫Avalanche/Zener diode breakdown noise ▫Atmospheric noise

EPR Einstein, Podolsky, Rosen (1935) Entangled qubits Violation of Bell Inequality

BB84 Charles A Bennett, Gilles Brassard (1984) Single photon source, polarization One way, Alice prepares sends to Bob ▫Psi encoded as random bits a, random bases b Bob measures ▫Decoded in random bases b’ ▫50% successfully measured bits a’ = a Measurement bases are shared publicly ▫Throw away a, a’ for b != b’

E91 Artur Ekert (1991) Entangled photon source ▫Perfect correlation, 100% a = a’ if b = b’ ▫Non-locality, > 50% a a’ ▫Eve measurement reduces correlation

B92 Charles A. Bennett (1992) Dim signal pulse, bright reference pulse ▫Maintains phase with a single qubit transmitted Bases: rectilinear, circular ▫P 0 = 1 - |u 1 ><u 1 |  P 0 |u 0 > = 1 ; p= 1 - | | 2 > 0  P 0 |u 1 > = 0 ▫P 1 = 1 - |u 0 ><u 0 |  P 1 |u 0 > = 0  P 1 |u 1 > = 1 ; p= 1 - | | 2 > 0 Throw away measurements != 1

SARG04 Scarani et. al. (2004) Attenuated laser pulses

Information Reconciliation 1992 Bennett, Bessette, Brassard, Salvail, Smolin Cascade protocol, repititious Compare block parity bits ▫Odd 1 count: parity = 1; even 1 count transmitted ▫Even 1 count: parity = 0; even 1 count transmitted Two-out-of-five code ▫Every transmission has two 1s and three 0s Hamming codes ▫Additional bits used to identify and correct errors

Privacy Amplification Shortened key length Universal hash function ▫Range r ▫Collision probability p < 1/r

Quantum Regime Attacks

Intercept and Resend Eve measures the qubit in basis b’’ ▫50% probability of correct measurement Eve sends to a’’ Bob ▫25% probability of correct measurement Probability of detection ▫P = 1 – (0.75) n ▫99% in n = 16 bits

Security Proofs BB84 is proven unconditionally secure against unlimited resources, provided that: ▫Eve cannot access Alice and Bob's encoding and decoding devices ▫The random number generators used by Alice and Bob must be trusted and truly random ▫The classical communication channel must be authenticated using an unconditionally secure authentication scheme

Man in the Middle Senders and recipients are indistinguishable on public channels Eve could pose as Bob ▫Receiving some large portion of messages ▫Responding promptly, at least before Bob Wegman-Carter authentication ▫Alice and Bob share a secret key

Photon Number Splitting No true single photon sources Attenuated laser pulses ▫Some small number of photons per pulse, i.e. 0.1 If > 1 photon are present, splitting can occur without detection during reconciliation A secure key is still possible, but requires additional privacy amplification

Hacking Gain access to security equipment ▫Foil random number generation ▫Plant Trojan horse Faked state attack ▫Eve - actively quenched detector module Phase remapping attack ▫Move from { |0>, |1>, |+>, |-> } to { |0>, |δ/2>, |δ>, |3δ/2> } Time-shift attack ▫Demonstrated to have ~ 4% mutual information gathered from the idQuantique ID-500 QKD

Denial of Service Stop Alice and Bob from communicating ▫Via Classical channel(s) ▫Via Quantum channel(s) Physically block transmissions Introduce large volume of errors

Quantum Regime Commercially available devices

MagiQ – QPN 8505 “Any sufficiently advanced technology is indistinguishable from magic.” –Arthur C Clarke Transmits qubit polarization over optical fiber 256 bit AES; 1,000 keys per second 140 km range, more with repeaters

idQuantique – Cerberis, Centauris Transmits qubit phase over optical fiber High speed layer 2 encryption 256 bit AES; 12 key-devices per minute, 100 km range

SmartQuantum – KeyGen, Defender Generate and distribute secret keys over quantum channel Use classical encryption and communication

Quintessence Labs G2 QKD Continuous variable brightness laser beams ▫Cheaper than SPS Dense wavelength division multiplexing ▫Erbium doped fiber amplifiers ~ 1550 nm

BBN Technologies DARPA QNet ▫Fully operational October 23, 2003 ▫Harvard University ▫Boston University ▫BBN Technologies QKD ▫Weak coherence ▫5 MHz pulse rate ▫0.1 mean photons/pulse

John Krah University of Washington Physics Department