Cryptography in a Post Quantum Computing World Máire O’Neill.

Slides:



Advertisements
Similar presentations
Public Key Cryptosystem
Advertisements

Paper by: Craig Gentry Presented By: Daniel Henneberger.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Lattice-Based Cryptography. Cryptographic Hardness Assumptions Factoring is hard Discrete Log Problem is hard  Diffie-Hellman problem is hard  Decisional.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Quantum Computing Ambarish Roy Presentation Flow.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Quantum Computation and Error Correction Ali Soleimani.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Public Key Cryptography and the RSA Algorithm
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
By: Mike Neumiller & Brian Yarbrough
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
The RSA Algorithm Rocky K. C. Chang, March
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Calculating Discrete Logarithms John Hawley Nicolette Nicolosi Ryan Rivard.
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
Lecture note 8: Quantum Algorithms
Topic 22: Digital Schemes (2)
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Cove: A Practical Quantum Computer Programming Framework Matt Purkeypile (DCS3) Winter 2009.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Fall 2002CS 395: Computer Security1 Chapter 9: Public Key Cryptography.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
KEYNOTE OF THE FUTURE 1: CIARA MOORE CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
Use or disclosure of the contents of this page is restricted by the terms on the notice page Intel Strategy for Post Quantum Crypto Ernie Brickell Presentation.
Chapter 9 – Public Key Cryptography and RSA Every Egyptian received two names, which were known respectively as the true name and the good name, or the.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Quantum Computers By Ryan Orvosh.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Quantum Computing: An Introduction
Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge.
QUANTUM COMPUTING By Sandeep Neeli.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Practical Aspects of Modern Cryptography
Recent Advances in Quantum Computing
The Application of Elliptic Curves Cryptography in Embedded Systems
Presentation transcript:

Cryptography in a Post Quantum Computing World Máire O’Neill

Quantum Computing Traditional Computing -Involves bits that exist in 2 states: binary 1 and 0 -Performs one calculation at a time, in sequence Quantum Computing -Involves qubits, that exist in a superposition state: can be both 1 and 0 at the same time -Can perform millions of calculations simultaneously A 30-qubit quantum computer would have the same processing power as a conventional computer processing commands at 10 teraflops per second.

Quantum Computing Needs to use algorithms that exploit its power of quantum parallelism: Shor’s Algorithm (1994) -Can be used to quickly factorise large numbers (exponential speedup) -Significant implications for current cryptographic techniques Grover’s Algorithm(1996) -Can be used to search an unsorted database faster than a conventional computer (quadratic speedup - O(N 1/2 ) time rather than O(N) ) Peter Shor

Quantum Computing Problems with Quantum Computing -Difficult to realise on a large scale due to decoherence, i.e. unwanted interaction between the system and the environment, which introduces errors -Also difficult to maintain the lifetime of information -Observing quantum particles changes the outcome => difficult to verify -In quantum communications the transmission distance is limited (eg, photons are transmitted through fibre-optic cables and over long distances the signal fades)

Quantum Computing – recent breakthroughs -Largest number yet to be factored into its primes by a quantum algorithm -RSA Lab’s largest published semi-prime contains 617 decimal digits (2058 bits) > Impossible to factorise using classical computing > Would be possible using quantum computing as it could run all the necessary calculations in parallel.

Quantum Computing – recent breakthroughs -Uses both classical communication and quantum entanglement, i.e. multiple particles that are linked together such that the measurement of one particle’s quantum state determines the states of the other particles. -Achieved across free-space between La Palma & Tenerife (making path between satellites and a ground station more feasible) -Quantum communications has been demonstrated over 250km via fibre optics

Quantum Computing – recent breakthroughs -A quantum memory state held stable at room temp for 39 minutes, almost 100 times longer than previous record (and 3 hours at cryogenic temperatures) -Not long, but in this amount of time, could run >20M calculations

The World’s First Quantum Computer ??? Quantum Computing – recent breakthroughs D-Wave’s current model billed as a 512-qubit machine (2012). Bought by Lockheed Martin & Google/NASA Difficult to verify if performing quantum operations or not! Has shown significant speed-ups but only for certain calculations Has helped to advance the research in Quantum Computing

NSA funding a $79.7 million research program to build a ‘crytologically useful quantum computer’ S. Rich, B.Gellman, The Washington Post Quantum Computing – NSA’s Efforts

Post-Quantum Cryptography

What happens when quantum computers become a reality 10/15 years from now? Commonly used public-key cryptographic algorithms (based on integer factorisation and discrete log problem) such as: RSA, DSA, Diffie-Hellman Key Exchange, ECC, ECDSA will be vulnerable to Shor’s algorithm and will no longer be secure. Symmetric algorithms appear to be secure against quantum computers (and Grover’s algorithm) by simply increasing the associated key sizes. Need for Post-Quantum Cryptography But what about key exchange?

What is Post-Quantum Cryptography? Disadvantages of Quantum Crypto: Expensive, assumes authentication, limited distance, etc.. Ref: Post Quantum Cryptography  Quantum Cryptography

What is Post-Quantum Cryptography? Post Quantum Cryptography algorithms refer to conventional non-quantum cryptographic algorithms that remain secure even after practical quantum computing is a reality. Main types of post quantum cryptography (public-key algorithm and signature schemes): Code-based Hash-based Multivariate-quadratic Lattice-based

Post-Quantum Cryptography Code-Based Cryptography -Based on difficulty in decoding a random linear code -Both encryption and signature schemes. Encryption schemes include: McEliece (1978); Niederreiter (1986); and variants -Niederreiter most efficient -Relatively large public key sizes (65/192kBytes for 80/128-bit security) Advantages/Disadvantages -Most mature PQ Crypto -Rarely used in practice due to large public key sizes

Post-Quantum Cryptography Hash-Based Cryptography -Security relies on collision resistance of cryptographic hash function -Only signature schemes exist, such as: Merkle signature schemes (1989); CMSS (2006); XMSS(2011) -Based on one-time signature (OTS) schemes; however, in these each key can only be used once -Combined with hash trees, key can be used to sign multiple messages -Relatively small public/private key sizes (eg 46 Bytes – 7568 Bytes) Advantages/Disadvantages -Most promising PQ signature schemes -Limited use of each public key

Post-Quantum Cryptography Multivariate-Quadratic Cryptography -Based on difficulty in solving a set of nonlinear MQ equations -Only signature schemes exist, such as: Oil and Vinegar (1997); Rainbow (2005); Quartz/HFE (1996); Matsumoto-Imai (1998) -Large public and private key sizes (up to 75kBytes) Advantages/Disadvantages -Underlying operations can be implemented efficiently (more efficient than ECC/RSA) -Not suitable for embedded devices due to large key sizes

Post-Quantum Cryptography Lattice-based Cryptography -Based on shortest vector problem/closest vector problem -Both encryption and signature schemes. Encryption schemes include: NTRU (1996); LWE (2005); R-LWE (2010); -Recent advances with ideal lattices have made them more practical -Large public /private key sizes (up to 732kBytes) Advantages/Disadvantages -Underlying operations can be implemented efficiently -Most promising PQ crypto, attracting most interest in research community

Post-Quantum Cryptography Summary -Code-based most mature PQ crypto -Lattice-based most promising: > standardised in 2008 (IEEE Std ) > it allows for other constructions/applications beyond public-key encryption, eg. identity-based encryption, homomorphic encryption. Challenges in Post-Quantum Cryptography -Further security analysis of PQ crypto algorithms needed -Suitable parameter choices still an open research problem – currently use relatively large key sizes -Optimal and practical PQ algorithm implementations are needed -Resistance of PQ crypto architectures to physical/side-channel leakages

Post-Quantum Cryptography

Fully Homomorphic Encryption

Accelerating Fully Homomorphic Encryption (FHE) What is Fully Homomorphic Encryption? -In 2009, Craig Gentry using lattice-based cryptography showed the first fully homomorphic encryption scheme -Fully homomorphic encryption allows computations on encrypted data, allowing privacy of encrypted data stored on the cloud. -Significant potential, but:  Key generation can take over 2 hours  Very large public-key sizes (10MB to 2GB)  Long encryption time (up to 7 mins)  Memory to store parameters an issue -Need for optimised and practical implementations

Accelerating Fully Homomorphic Encryption (FHE) Current research at CSIT Accelerating main underlying primitives in integer-based FHE i.e. large-integer multiplication and modular reduction ParameterToySmallMediumLarge Accelerating Fully Homomorphic Encryption Public key sizes >19GBits

ParameterToySmallMediumLarge Current research at CSIT Proposed an improved Low Hamming Weight Multiplier Architecture Accelerating Fully Homomorphic Encryption (FHE) b i can be taken to be a LHW integer with max HW of 15 Accelerating Fully Homomorphic Encryption

Accelerating Fully Homomorphic Encryption (FHE) Proposed Design Time (s) No. of Slice Registers No. of Slice LUTs No. of DSP48E1s RAM access bit width Toy with 256-pt FFT Small with 256-pt FFT Medium with 512-pt FFT Large with 1024-pt FFT All designs fit easily on a Xilinx Virtex-7 XC7VX1140T device GroupToySmallMediumLarge This work: Xilinx Virtex s0.0255s0.47 s7.88 s Ref: Intel Core 2 Duo0.05 s1.0 s21 s7 min 15 s GPU Platform 1.69 s x55 improvement in speed over reference s/w design for Large parameters x66 improvement in speed over GPU-based design Accelerating Fully Homomorphic Encryption

Accelerating Fully Homomorphic Encryption (FHE) issues/14/embcrypt2014.html