CRYPTOGRAPHY: STATE OF THE SCIENCE ASIACRYPT 2003 invited talk Adi Shamir Computer Science Dept The Weizmann Institute Israel.

Slides:



Advertisements
Similar presentations
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
Advertisements

11 Provable Security. 22 Given a ciphertext, find the corresponding plaintext.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Part 4  Software 1 Conclusion Part 4  Software 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Oblivious Transfer based on the McEliece Assumptions
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Mechanising Cryptography Professor Richard Walton CB.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 23 Symmetric Encryption
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Computer Security CS 426 Lecture 3
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Lecture 3: Cryptographic Tools
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
CIS 5371 Cryptography Introduction.
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
The Early Days of RSA -- History and Lessons Ronald L. Rivest MIT Lab for Computer Science ACM Turing Award Lecture.
FORESEC Academy FORESEC Academy Security Essentials (IV)
CS 4/585: Cryptography Tom Shrimpton FAB
Chapter 20 Symmetric Encryption and Message Confidentiality.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
CRYPTOGRAPHY How does it impact cyber security and why you need to know more?
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
1 Standardizing Key Derivation Functions Hugo Krawczyk IBM Research Or: google kdf hmac.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Lecture 23 Symmetric Encryption
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Weaknesses in the Generic Group Model
TRUSTED FLOW: Why, How and Where??? Moti Yung Columbia University.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Cryptography CS Lecture 19 Prof. Amit Sahai.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Future Middle School Teachers Janet Beissinger and Bonnie Saunders University of Illinois at Chicago
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Public Key Encryption and Digital Signatures
Big Numbers: Mathematics and Internet Commerce
CAS CS 538 Cryptography.
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security through Encryption
STREAM CIPHERS by Jennifer Seberry.
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

CRYPTOGRAPHY: STATE OF THE SCIENCE ASIACRYPT 2003 invited talk Adi Shamir Computer Science Dept The Weizmann Institute Israel

Cryptography: major trends

u From secret to public

Cryptography is central crypto Math& stat Computers and chips Com&info theory Comp science Hi-tech industry Policy issues

Cryptography is fun u Gets lots of media attention u Attracts hackers u Is full of delightful ideas u Serves as an excellent educational tool

Cryptography: major trends u From secret to public u From national to international

The geography of cryptography u Publicly started in the US

The geography of cryptography u Publicly started in the US u Followed by Europe

The geography of cryptography u Publicly started in the US u Followed by Europe u Is rapidly expanding in Asia

Cryptography: major trends u From secret to public u From national to international u From art to science

Cryptography as a scientific discipline Is thriving as a scientific area of research: u Taught at most major universities u Attracts many excellent students u Discussed at many conferences (>25 in the next 6 months!) u Published in hundreds of papers (e.g., EPRINT) u Major conferences have >500 attendees (Major trade shows have >10,000 attendees) Received the ultimate seal of approval from the general CS community (the Turing award…)

Should we rename the field? u Cryptography means “secret writing” u The official naming of the field: Cryptology = Cryptography + cryptanalysis

Should we rename the field? u Cryptography means “secret writing” u The official naming of the field: Cryptology = Cryptography + cryptanalysis u These terms have problematic conotations u Many research subfields do not deal with the encryption or decryption of secret information

Should we rename the field? u Cryptography means “secret writing” u The official naming of the field: Cryptology = Cryptography + cryptanalysis u These terms have problematic conotations u Many research subfields do not deal with the encryption or decryption of secret information u I propose to call the broader field Adversity Theory = cryptology + other areas

Cryptography: major trends u From secret to public u From national to international u From art to science u From math to physics

Related scientific fields: u OLD COMBINATIONS: u Probability and statistics u Algebra u Number Theory

Related scientific fields: u OLD COMBINATIONS: u Probability and statistics u Algebra u Number Theory u NEW COMBINATIONS: u Signal processing (in steg, fingerprinting) u Electronics (in side channel attacks) u Physics (in quantum computers and crypto)

Cryptography: major trends u From secret to public u From national to international u From art to science u From math to physics u From theory to practice

Cryptography unites Theory & practice u Practical theory: - using abstract math tools in cryptanalysis - proving the security of real protocols -developing new cryptographic schemes u Theoretical practice: - developing new notions of security, complexity, logics, and randomness - turning cryptography from art to science

New challenges in cryptography u Payment systems u Cellular telephony u Wi-Fi networks u RFID tags u DRM systems

Cryptography: major trends u From secret to public u From national to international u From art to science u From math to physics u From theory to practice u From political to legal issues

Cryptographic misconceptions u By policy makers: crypto is dangerous, but: - weak crypto is not a solution - controls can’t stop the inevitable u By researchers: A provably secure system is secure, but: - proven false by indirect attacks - can be based on false assumptions - requires careful choice of parameters u By implementers: Cryptography solves everything, but: - only basic ideas are successfully deployed - only simple attacks are avoided - bad crypto can provide a false sense of security

The three laws of security: u Absolutely secure systems do not exist u To halve your vulnerability, you have to double your expenditure u Cryptography is typically bypassed, not penetrated

Cryptography: A rapidly moving field

u 75-80: Public key cryptography, basic schemes

Cryptography: A rapidly moving field u 75-80: Public key cryptography, basic schemes u 80-85: Theoretical foundations, new protocols

Cryptography: A rapidly moving field u 75-80: Public key cryptography, basic schemes u 80-85: Theoretical foundations, new protocols u 85-90: Zero Knowledge, secure computation

Cryptography: A rapidly moving field u 75-80: Public key cryptography, basic schemes u 80-85: Theoretical foundations, new protocols u 85-90: Zero Knowledge, secure computation u 90-95: Diff&lin cryptanalysis, quantum comp

Cryptography: A rapidly moving field u 75-80: Public key cryptography, basic schemes u 80-85: Theoretical foundations, new protocols u 85-90: Zero Knowledge, secure computation u 90-95: Diff&lin cryptanalysis, quantum comp u 95-00: Side channel attacks, elliptic curves

Cryptography: A rapidly moving field u 75-80: Public key cryptography, basic schemes u 80-85: Theoretical foundations, new protocols u 85-90: Zero Knowledge, secure computation u 90-95: Diff&lin cryptanalysis, quantum comp u 95-00: Side channel attacks, elliptic curves u 00-05: ???

The basic schemes: Major trends

u Secret key cryptography: DES out, AES in

The basic schemes: Major trends u Secret key cryptography: DES out, AES in u Public key cryptography: RSA steady, EC improving, faster schemes increasingly risky and less appealing. Should not be used for long term security.

The basic schemes: Major trends u Secret key cryptography: DES out, AES in u Public key cryptography: RSA steady, EC improving, faster schemes increasingly risky and less appealing. Should not be used for long term security. u Quantum schemes: the wild card

Some of my controvertial positions:

When applied in practice:

Some of my controvertial positions: When applied in practice: u Security should not be overdone

Some of my controvertial positions: When applied in practice: u Security should not be overdone u Security should not be overexposed

Some of my controvertial positions: When applied in practice: u Security should not be overdone u Security should not be overexposed u Security should not be underregulated

Some of my controvertial positions: When applied in practice: u Security should not be overdone u Security should not be overexposed u Security should not be underregulated u Security should be guided by an ethical code

Some of my controvertial positions: When applied in practice: u Security should not be overdone u Security should not be overexposed u Security should not be underregulated u Security should be guided by an ethical code u Security should be complemented by legal measures

Cryptographic status report In each of the six major subareas I’ll summarize: u The major achievements so far u Strong and weak points, major challenges u A 1-10 grade

Theory of cryptography u Well defined primitives & definitions of security u Well understood relationships between notions u Deep connections with randomness & complexity u Beautiful mathematical results u Highly developed theory u Excellent design tools u Challenge: reduce dependence on assumptions u Final grade: 9

Public key encryption and signature schemes u RSA, DH, DSA u Based on modular arithmetic, EC, other ideas(?) u Vigorous cryptanalytic research u Excellent theory u Expanding applications u Challenges: Break a major scheme, make a new one u Final grade: 8

Secret key cryptography – block ciphers u DES, AES, modes of operation u Differential and linear cryptanalysis u Good cryptanalytic tools u Reasonable choice of primitives u Many good schemes u Challenge: Connect strong theory with strong practice u Final grade: 7

Secret key cryptography – stream ciphers u Linear feedback shift registers u Fast correlation attacks, algebraic attacks u Limited cryptanalytic tools u Narrow choice of primitives u Many insecure schemes u Challenge: Improve weak theory and weak practice u Final grade: 4

Theoretical Cryptographic protocols u Zero knowledge interactive proofs u Secure multiparty computations u Almost anything is doable and provable u Many gems u Theoretical protocols are too slow u Challenge: Make the strong theory practical u Final grade: 8

Practical Cryptographic protocols u Many ad-hoc ideas u Proofs in the random oracle model (ROM) u Rapidly expanding body of results u Lots of buggy protocols u Reasonable design primitives u Improving theory u Challenges: incorporate side channel attacks, ROM u Final grade: 5

Cryptographic predictions: u AES will remain secure for the forseeable future u Some PK schemes and key sizes will be successfully attacked in the next few years u Crypto will be invisibly everywhere u Vulnerabilities will be visibly everywhere u Crypto research will remain vigorous, but only its simplest ideas will become practically useful u Non-crypto security will remain a mess

Summary u It was a thrilling 25 year journey u The best is yet to come u Thanks to everyone!