Cryptography and Security: The Narrow Road from Theory to Practice Burt Kaliski, RSA Security ISPEC 2006, Hangzhou, China April 13, 2006.

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Cryptography and Data Security: Long-Term Challenges Burt Kaliski, RSA Security Northeastern University CCIS Mini Symposium on Information Security November.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Part 4  Software 1 Conclusion Part 4  Software 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis.
CMSC 456 Introduction to Cryptography
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Cryptography Basic (cont)
Chapter 5 Cryptography Protecting principals communication in systems.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Introduction to Public Key Cryptography
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Crypto Bro Rigby. History
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
CS 4/585: Cryptography Tom Shrimpton FAB
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
SECURITY Chapter 7.3 – 7.5 Presentation by Deepthi Reddy.
Topic 22: Digital Schemes (2)
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Some Perspectives on Smart Card Cryptography
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Potential vulnerabilities of IPsec-based VPN
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
PKCS #5: Password-Based Cryptography Standard
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
ANSI X9.44 and IETF TLS Russ Housley and Burt Kaliski RSA Laboratories November 2002.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
RSA Data Security, Inc. PKCS #13: Elliptic Curve Cryptography Standard Burt Kaliski RSA Laboratories PKCS Workshop October 7, 1998.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
PKCS #5 v2.0: Password-Based Cryptography Standard
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
The Secure Sockets Layer (SSL) Protocol
Efficient CRT-Based RSA Cryptosystems
The Secure Sockets Layer (SSL) Protocol
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Cryptography and Security: The Narrow Road from Theory to Practice Burt Kaliski, RSA Security ISPEC 2006, Hangzhou, China April 13, 2006

Introduction Many research results in cryptography over the past 30 years Few have made it from theory into practice What’s worked well? What hasn’t? Why not, and what researchers can do about it

From Theory to Practice Not every idea will make it into practice, of course “Innovation funnel” suggests that only a few ideas survive the necessary testing Thomas A. Edison: Genius is one per cent inspiration and ninety-nine per cent perspiration. Goal: Increase likelihood that a good idea in cryptography will actually be applied

Some Observations Examples from “Practice & Experience” What’s worked well and What hasn’t NB: “Worked well” doesn’t mean it was brought into practice perfectly, and “hasn’t” doesn’t mean it wasn’t brought into practice at all. But some good ideas have found their way into practice much more easily than others.

What’s Worked Well Basic public-key cryptography —PKCS #1 v1.5 RSA —discrete log. systems (Diffie-Hellman, DSA) —elliptic curve cryptography

What Hasn’t Public-key enhancements and variations —RSA-OAEP, -PSS, -KEM —Cramer-Shoup schemes provable security in standard model, but … —various zero-knowledge versions —other public-key families, e.g., NTRU

What’s Worked Well Basic digital signatures —sign + verify

What Hasn’t Special digital signatures —blind, group, designated confirmer … Direct Anonymous Attestation is a potential exception

What’s Worked Well Advanced Encryption Standard and Triple-DES —culminating many years of research on DES replacements

What Hasn’t Stream ciphers —other than RC4 … Modes of operation —other than basic four (or five)

What’s Worked Well HMAC message authentication —Hash (K 1 || Hash (K 2 || M))

What Hasn’t Many other “fast” MACs Incremental message authentication

What’s Worked Well Shamir secret sharing —k of n for root keys

What Hasn’t Secret sharing with other access structures Distributed cryptography Secure multi-party computation

What’s Worked Well Password hashing —Hash (password + salt)

What Hasn’t Password-authenticated key establishment —aka “zero-knowledge” password protocols

What’s Worked Well SSL-protected e-commerce —server PKI —session key establishment —session encryption

What Hasn’t Digital cash Secure auctions Electronic voting

What’s Worked Well Montgomery multiplication —AR n * BR n  ABR n

What Hasn’t Karatsuba-Ofman multiplication —A H B H, A L B L, (A H +A L )(B H +B L ), recursively

What’s Worked Well Side-channel implementation countermeasures —protection for basic RSA, ECC, AES, etc.

What Hasn’t Intrusion-resilient cryptography —alternatives to RSA, ECC, AES, etc. that are less vulnerable by design

What’s Worked Well Software codebreaking —distributed key search and integer factorization

What Hasn’t Hardware codebreaking —e.g., factoring circuits —“Deep Crack” for DES is a notable exception

Why Not? 1. “Not secure enough” 2. “Too many choices” 3. “No clear advantage” 4. “Too complicated” 5. “Not practical”

“Not Secure Enough” New ideas in cryptography often need a long period of testing before others are confident to adopt them In many cases not enough people are even looking at the idea Expectations keep increasing based on experience with previous ideas Example: NTRU based on a new problem, and also held to a much higher standard than, say, RSA Tight reductions from known problems against broad adversaries gives the most confidence —But ideas based on new problems are also needed!

“Too Many Choices” Research in an area can often result in a multiplicity of choices, none of which has enough support to move ahead of the rest Results build on one another, and it may not be clear when a result is finally “stable” Example: New modes of operation for block ciphers are numerous, though gradually being standardized Competitions can help bring a research area to conclusion and enable a few good choices to advance

“No Clear Advantage” New ideas, though good, may not be enough better than methods that are already available to justify the cost of making the change —Long-term assurances not as appreciated in the short term Cost of introducing a new technology can be very significant, especially when it depends on industry standards Example: RSA-PSS, -KEM provide long-term assurances, but require upgrades to existing systems Transition planning can help phase in a new idea while still supporting available methods New applications generally a better target than existing ones

“Too Complicated” Some new ideas are just too “different” for designers to work with, especially in terms of business models and use cases Example: distributed cryptography requires a non-hierarchical “workflow” that’s not usually found in applications Reference implementations that enable new applications and hide the technical details can facilitate adoption —e.g., RSAREF and PGP for public-key cryptography

“Not Practical” And for some ideas, the time has not yet come — other technologies may need to advance or be developed Example: general secure multiparty computation is still computationally burdensome —Even public-key crypto was challenged in its early days! Patience may be called for, and there’s plenty of time to improve the theory and speculate on future applications in the meantime

Conclusions Researchers whose goal is to have the results of their research applied need to think about technology transfer Results are still important even if not applied directly, since they advance the science in general But better security depends on good research being put into practice Hopefully these experiences will help more good ideas move through that narrow road

Contact Information Burt Kaliski Chief Scientist, RSA Laboratories Vice President of Research, RSA Security