IEEE CyberTrust workshop

Slides:



Advertisements
Similar presentations
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Advertisements

Digital Signatures and Hash Functions. Digital Signatures.
Measures of Dispersion and Standard Scores
Session 4 Asymmetric ciphers.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Cryptography and Network Security (CS435) Part Ten (Hash and MAC algorithms)
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Hashing General idea: Get a large array
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
1 Cryptography and Network Security (Various Hash Algorithms) Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Changed by Somesh Jha)
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Lecture 6: Public Key Cryptography
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Bob can sign a message using a digital signature generation algorithm
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Prime Numbers Prime numbers only have divisors of 1 and self
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Introduction This chapter gives you several methods which can be used to solve complicated equations to given levels of accuracy These are similar to.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Finding & Using Standard Deviation. Entry Task What trends do you see in your experimental results? How confident are you in your data? (very confident,
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
11 Authentication Algorithms Discussions CCSDS Security WG Winter 2007 Colorado Springs, Colorado USA Howard Weiss NASA/JPL/SPARTA
PRIME NUMBERS AND FACTOR TREES. DEFINITION Prime Number – An integer whose only factors are 1 and itself 2, 3, 5, 7,11, 13, 17, 19.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
MA/CSSE 473 Day 05 More induction Factors and Primes Recursive division algorithm.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Computer Graphics CC416 Lecture 04: Bresenham Line Algorithm & Mid-point circle algorithm Dr. Manal Helal – Fall 2014.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
1 Solve it with the Computer Rick Spillman CSCE 115 Spring 2013 Lecture 12.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Public Key Cryptography
Public Key Encryption Major topics The RSA scheme was devised in 1978
CSE565: Computer Security Lecture 7 Number Theory Concepts
MA/CSSE 473 Day 05 Factors and Primes Recursive division algorithm.
IEEE CyberTrust workshop
Cryptography Much of computer security is about keeping secrets
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Encryption and Digital Signatures
Review Graph Directed Graph Undirected Graph Sub-Graph
Public Key Cryptosystems - RSA
Cryptographic Hash Functions Part I
Message Authentication and Hash Functions
Chapter 11 – Message Authentication and Hash Functions
Cryptography: Basics (2)
Copyright © Cengage Learning. All rights reserved.
Algebra 2 – Outcomes Construct a quadratic equation from its roots.
Introduction to Cryptography
Cryptography Lecture 16.
Elliptic-Curve Cryptography (ECC)
Using the Rule Normal Quantile Plots
0.4 Nth Roots and Real Exponents
Presentation transcript:

IEEE CyberTrust workshop Title: Rapid Factorization of Composite Primes - An alternative to the sieve method Author: André Brisson Summary: One approach to Trusted Computing is based on PKI and a 2048-bit RSA public and private key pair that is created randomly on the chip at time of manufacture and cannot be changed. Trusted Computing relies on the secrecy of a prime number composite which is the product of two prime factors. Reversing this is factorization. The security underpinning is that prime number composites can only be attacked by brute force and that the work space is so large that this kind of attack is not feasible in any usable time frame.

NSA announced in August 2015 that it planned to move to a new cipher suite that is resistant to quantum attacks. Integer Factorization Cryptography and Elliptical Curve Cryptography are readily breakable by quantum computing attacks. NSA is completing quantum computing facilities. NIST recommended key strength up to 2031 and beyond is 256-bits. When we are presented key sizes for integer factorization cryptography like RSA it is easy to get a false sense of confidence. It seems sufficient to have 2048 bit keys but a 2048-bit is 258 characters long and yet offers only 112 bits of security. That represents a lot of processing for minimal protection. This paper examines other vulnerabilities of cryptography that relies on public key pairs and prime composites.

If one looks at a Cartesian plane and a rendition of a normal curve, the following elements are readily identifiable: 1. We can draw a normal curve with one endpoint on the X axis being equal to the Prime Number Composite (P#C). 2. We can take the square root of the prime number composite and this becomes the mean. 3. We know that one of each of the two factors we are looking for will reside somewhere on either side of the mean. 4. Looking at the graph we will search for the smaller prime number factor of the prime number composite in the smaller workspace area. Our first step is to bisect the smaller area of the curve along the X axis. In this example it is labeled bisection. 5. We rapidly test to see whether the point of bisection is a whole number. If it is (unlikely) then we have found one of our factors. If this was the case then we simply have to divide this number into the prime number composite to get the other factor. 6. If this is not the case then the challenge now is to decide which side of this bisection we jump to in order to make the next bisection. We take two points on either side of the previous bisection and divide the larger point by the smaller point and take the sixth derivative of this value. The more volatile remainder will be closer to the solution so the next bisection will be on that side. Repeat steps until the smaller prime number factor is found.

A simple example of a 128-bit prime number composite is created by multiplying the following two prime number values together: 11,114,329 times 11,114,423 = 123,529,353,867,167 A simple brute force attack would test every single number from 1 to 123,529,353,867,167 including non-prime numbers to find a number that divides evenly into our prime number composite. However, testing over 123 trillion numbers is a BIG task. Doing one test per second of all possibilities it would take over 3,900 centuries. Taking the square root value of the prime number composite will bisect the range of possible values (123,529,353,867,167) so that one prime factor will fall BELOW the square root value and one prime factor will fall ABOVE this value. This exponentially reduces the workspace to search. Factor 1 (11,114,329) < square root of the prime number composite < Factor 2 (11,114,423)

By solving for the smaller prime factor value we reduce our “brute force workspace” from 123,529,353,867,167 calculations to 11,114,375 calculations or one ten millionth the size of the prime number composite. In a simple brute force attack we would still be testing non-prime numbers which cannot be one of the factors. We can speed up the attack by using lists of prime numbers values that have already been calculated in a dictionary. Given that prime numbers prime numbers up to 10^18 have been calculated this dictionary attack might be valid through the entire life expectancy and utility of RSA Integer Factorization as determined by the NIST. The square root of a 256 character number is 16 characters long.

DEMO 11,114,329 times 11,114,423 = 123529353867167 104729 times 81343 = 8518971047 100057 times 96293 = 9634788701 IFC is used in many places within networks and appear in different sizes i.e. hashes, signatures (Google broke SHA with collision attack) Optimize: 64-bit, samples of comparisons after bisection, run on quantum computers etc. In Denial Code Red http://www.wnlabs.com/products/InDenialCodeRedDirect.php END