Download presentation
Presentation is loading. Please wait.
1
CRYPTOGRAPHY: STATE OF THE SCIENCE ASIACRYPT 2003 invited talk Adi Shamir Computer Science Dept The Weizmann Institute Israel
2
Cryptography: major trends
3
u From secret to public
4
Cryptography is central crypto Math& stat Computers and chips Com&info theory Comp science Hi-tech industry Policy issues
5
Cryptography is fun u Gets lots of media attention u Attracts hackers u Is full of delightful ideas u Serves as an excellent educational tool
6
Cryptography: major trends u From secret to public u From national to international
7
The geography of cryptography u Publicly started in the US
8
The geography of cryptography u Publicly started in the US u Followed by Europe
9
The geography of cryptography u Publicly started in the US u Followed by Europe u Is rapidly expanding in Asia
10
Cryptography: major trends u From secret to public u From national to international u From art to science
11
Cryptography as a scientific discipline Is thriving as a scientific area of research: u Taught at most major universities u Attracts many excellent students u Discussed at many conferences (>25 in the next 6 months!) u Published in hundreds of papers (e.g., EPRINT) u Major conferences have >500 attendees (Major trade shows have >10,000 attendees) Received the ultimate seal of approval from the general CS community (the Turing award…)
12
Should we rename the field? u Cryptography means “secret writing” u The official naming of the field: Cryptology = Cryptography + cryptanalysis
13
Should we rename the field? u Cryptography means “secret writing” u The official naming of the field: Cryptology = Cryptography + cryptanalysis u These terms have problematic conotations u Many research subfields do not deal with the encryption or decryption of secret information
14
Should we rename the field? u Cryptography means “secret writing” u The official naming of the field: Cryptology = Cryptography + cryptanalysis u These terms have problematic conotations u Many research subfields do not deal with the encryption or decryption of secret information u I propose to call the broader field Adversity Theory = cryptology + other areas
15
Cryptography: major trends u From secret to public u From national to international u From art to science u From math to physics
16
Related scientific fields: u OLD COMBINATIONS: u Probability and statistics u Algebra u Number Theory
17
Related scientific fields: u OLD COMBINATIONS: u Probability and statistics u Algebra u Number Theory u NEW COMBINATIONS: u Signal processing (in steg, fingerprinting) u Electronics (in side channel attacks) u Physics (in quantum computers and crypto)
18
Cryptography: major trends u From secret to public u From national to international u From art to science u From math to physics u From theory to practice
19
Cryptography unites Theory & practice u Practical theory: - using abstract math tools in cryptanalysis - proving the security of real protocols -developing new cryptographic schemes u Theoretical practice: - developing new notions of security, complexity, logics, and randomness - turning cryptography from art to science
20
New challenges in cryptography u Payment systems u Cellular telephony u Wi-Fi networks u RFID tags u DRM systems
21
Cryptography: major trends u From secret to public u From national to international u From art to science u From math to physics u From theory to practice u From political to legal issues
22
Cryptographic misconceptions u By policy makers: crypto is dangerous, but: - weak crypto is not a solution - controls can’t stop the inevitable u By researchers: A provably secure system is secure, but: - proven false by indirect attacks - can be based on false assumptions - requires careful choice of parameters u By implementers: Cryptography solves everything, but: - only basic ideas are successfully deployed - only simple attacks are avoided - bad crypto can provide a false sense of security
23
The three laws of security: u Absolutely secure systems do not exist u To halve your vulnerability, you have to double your expenditure u Cryptography is typically bypassed, not penetrated
24
Cryptography: A rapidly moving field
25
u 75-80: Public key cryptography, basic schemes
26
Cryptography: A rapidly moving field u 75-80: Public key cryptography, basic schemes u 80-85: Theoretical foundations, new protocols
27
Cryptography: A rapidly moving field u 75-80: Public key cryptography, basic schemes u 80-85: Theoretical foundations, new protocols u 85-90: Zero Knowledge, secure computation
28
Cryptography: A rapidly moving field u 75-80: Public key cryptography, basic schemes u 80-85: Theoretical foundations, new protocols u 85-90: Zero Knowledge, secure computation u 90-95: Diff&lin cryptanalysis, quantum comp
29
Cryptography: A rapidly moving field u 75-80: Public key cryptography, basic schemes u 80-85: Theoretical foundations, new protocols u 85-90: Zero Knowledge, secure computation u 90-95: Diff&lin cryptanalysis, quantum comp u 95-00: Side channel attacks, elliptic curves
30
Cryptography: A rapidly moving field u 75-80: Public key cryptography, basic schemes u 80-85: Theoretical foundations, new protocols u 85-90: Zero Knowledge, secure computation u 90-95: Diff&lin cryptanalysis, quantum comp u 95-00: Side channel attacks, elliptic curves u 00-05: ???
31
The basic schemes: Major trends
32
u Secret key cryptography: DES out, AES in
33
The basic schemes: Major trends u Secret key cryptography: DES out, AES in u Public key cryptography: RSA steady, EC improving, faster schemes increasingly risky and less appealing. Should not be used for long term security.
34
The basic schemes: Major trends u Secret key cryptography: DES out, AES in u Public key cryptography: RSA steady, EC improving, faster schemes increasingly risky and less appealing. Should not be used for long term security. u Quantum schemes: the wild card
35
Some of my controvertial positions:
36
When applied in practice:
37
Some of my controvertial positions: When applied in practice: u Security should not be overdone
38
Some of my controvertial positions: When applied in practice: u Security should not be overdone u Security should not be overexposed
39
Some of my controvertial positions: When applied in practice: u Security should not be overdone u Security should not be overexposed u Security should not be underregulated
40
Some of my controvertial positions: When applied in practice: u Security should not be overdone u Security should not be overexposed u Security should not be underregulated u Security should be guided by an ethical code
41
Some of my controvertial positions: When applied in practice: u Security should not be overdone u Security should not be overexposed u Security should not be underregulated u Security should be guided by an ethical code u Security should be complemented by legal measures
42
Cryptographic status report In each of the six major subareas I’ll summarize: u The major achievements so far u Strong and weak points, major challenges u A 1-10 grade
43
Theory of cryptography u Well defined primitives & definitions of security u Well understood relationships between notions u Deep connections with randomness & complexity u Beautiful mathematical results u Highly developed theory u Excellent design tools u Challenge: reduce dependence on assumptions u Final grade: 9
44
Public key encryption and signature schemes u RSA, DH, DSA u Based on modular arithmetic, EC, other ideas(?) u Vigorous cryptanalytic research u Excellent theory u Expanding applications u Challenges: Break a major scheme, make a new one u Final grade: 8
45
Secret key cryptography – block ciphers u DES, AES, modes of operation u Differential and linear cryptanalysis u Good cryptanalytic tools u Reasonable choice of primitives u Many good schemes u Challenge: Connect strong theory with strong practice u Final grade: 7
46
Secret key cryptography – stream ciphers u Linear feedback shift registers u Fast correlation attacks, algebraic attacks u Limited cryptanalytic tools u Narrow choice of primitives u Many insecure schemes u Challenge: Improve weak theory and weak practice u Final grade: 4
47
Theoretical Cryptographic protocols u Zero knowledge interactive proofs u Secure multiparty computations u Almost anything is doable and provable u Many gems u Theoretical protocols are too slow u Challenge: Make the strong theory practical u Final grade: 8
48
Practical Cryptographic protocols u Many ad-hoc ideas u Proofs in the random oracle model (ROM) u Rapidly expanding body of results u Lots of buggy protocols u Reasonable design primitives u Improving theory u Challenges: incorporate side channel attacks, ROM u Final grade: 5
49
Cryptographic predictions: u AES will remain secure for the forseeable future u Some PK schemes and key sizes will be successfully attacked in the next few years u Crypto will be invisibly everywhere u Vulnerabilities will be visibly everywhere u Crypto research will remain vigorous, but only its simplest ideas will become practically useful u Non-crypto security will remain a mess
50
Summary u It was a thrilling 25 year journey u The best is yet to come u Thanks to everyone!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.