ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS

Similar documents
Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

The Quantum Threat to Cybersecurity (for CxOs)

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

The quantum threat to cryptography

What are we talking about when we talk about post-quantum cryptography?

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Post-Quantum Cryptography & Privacy. Andreas Hülsing

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

Cryptography in a quantum world

Post-Quantum Cryptography & Privacy. Andreas Hülsing

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

FPGA-BASED ACCELERATOR FOR POST-QUANTUM SIGNATURE SCHEME SPHINCS-256

Cyber Security in the Quantum Era

Daniel J. Bernstein University of Illinois at Chicago. means an algorithm that a quantum computer can run.

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016

Public-key Cryptography and elliptic curves

Quantum Computers Is the Future Here?

A brief survey of post-quantum cryptography. D. J. Bernstein University of Illinois at Chicago

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Post Quantum Cryptography. Kenny Paterson Information Security

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW?

Quantum Cryptography

Lecture 1: Introduction to Public key cryptography

The Reality of Quantum Computing

ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Overview. Public Key Algorithms II

Quantum Differential and Linear Cryptanalysis

Information Security in the Age of Quantum Technologies

CPSC 467: Cryptography and Computer Security

Week 12: Hash Functions and MAC

From NewHope to Kyber. Peter Schwabe April 7, 2017

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018

ENEE 457: Computer Systems Security 09/19/16. Lecture 6 Message Authentication Codes and Hash Functions

An Introduction to Pairings in Cryptography

Lattice-Based Cryptography

On the Big Gap Between p and q in DSA

CRYSTALS Kyber and Dilithium. Peter Schwabe February 7, 2018

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING-

CPSC 467: Cryptography and Computer Security

Quantum Cryptography

EU investment in Quantum Technologies

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Cryptanalysis of the Algebraic Eraser

Quantum Technologies for Cryptography

CPSC 467: Cryptography and Computer Security

Foundations of Network and Computer Security

Alternative Approaches: Bounded Storage Model

ECS 189A Final Cryptography Spring 2011

On the Legacy of Quantum Computation and Communication to Cryptography

Quantum Technologies: Threats & Solutions to Cybersecurity

Quantum Computing is Here, Powered by Open Source. Konstantinos Karagiannis CTO, Security Consulting BT

CPSC 467b: Cryptography and Computer Security

Number theory (Chapter 4)

Open spatial data infrastructure

Quantum Wireless Sensor Networks

Cryptographical Security in the Quantum Random Oracle Model

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Introduction to Modern Cryptography Lecture 11

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

Further progress in hashing cryptanalysis

10 - February, 2010 Jordan Myronuk

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Introduction to Information Security

Dan Boneh. Introduction. Course Overview

8 Elliptic Curve Cryptography

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Lecture 18 - Secret Sharing, Visual Cryptography, Distributed Signatures

Some Attacks on Merkle-Damgård Hashes

The science behind these computers originates in

Quo Vadis PKI? IEEE International Conference on Public Key Infrastructure and its Applications: PKIA 2017 Bangalore 14-15, November 2017

BLOCK CIPHERS KEY-RECOVERY SECURITY

Foundations of Network and Computer Security

Mathematics of Public Key Cryptography

On the Key-collisions in the Signature Schemes

Blockchain and Quantum Computing

Breaking Symmetric Cryptosystems Using Quantum Algorithms

Analog Computing: a different way to think about building a (quantum) computer

Please bring the task to your first physics lesson and hand it to the teacher.

Lecture th January 2009 Fall 2008 Scribes: D. Widder, E. Widder Today s lecture topics

9 Knapsack Cryptography

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

STARTING WITH CONFIDENCE

CPSC 467: Cryptography and Computer Security

1 Indistinguishability for multiple encryptions

Summary of Hyperion Research's First QC Expert Panel Survey Questions/Answers. Bob Sorensen, Earl Joseph, Steve Conway, and Alex Norton

CPSC 467: Cryptography and Computer Security

Security Implications of Quantum Technologies

C L O U D S E C U R I T Y A L L I A N C E : W H E R E W E A R E & W H E R E W E A R E G O I N G

Portal for ArcGIS: An Introduction. Catherine Hynes and Derek Law

SIGNATURE SCHEMES & CRYPTOGRAPHIC HASH FUNCTIONS. CIS 400/628 Spring 2005 Introduction to Cryptography

Finite Automata Part One

VIDEO Intypedia008en LESSON 8: SECRET SHARING PROTOCOL. AUTHOR: Luis Hernández Encinas. Spanish Scientific Research Council in Madrid, Spain

Finite Automata Part One

Quantum threat...and quantum solutions

Day 1: Over + Over Again

Transcription:

SESSION ID: SP02-R14 ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS Jon Geater Chief Technology Officer Thales esecurity @jongeater

Hold onto your hats! This is a very fast-paced presentation The idea is not to teach you everything in-depth, but to give you the right questions you can look up later Jumping-off points and resources will be posted to my Thales esecurity blog and twitter after the talk follow me @jongeater! Here we go 2

Hold onto your hats! Constantly hit with new stories claiming to change the world Much of it is just sensationalist Or simply uninformed 3

In other words. BEWARE FAKE NEWS 4

Hold onto your hats! Constantly hit with new stories claiming to change the world Much of it is just sensationalist Or simply uninformed Nonetheless there are kernels of truth worth grabbing hold of 5

Lions, Tigers and Bears. Oh my! 6

First: Quantum 7

Quantum Computing Quantum Computing To run quantum algorithms you need a quantum computer It s often suggested that quantum computers are on a path to directly replace existing computer systems, but this is not (necessarily) true. Different types of quantum computing Annealing vs Universal Think valve machine vs semiconductors Different machines are better specialised to different tasks Don t forget the practical aspects There has been some notable progress IBM s Quantum Experience D-Wave 8

Quantum Cryptogrpahy Quantum Cryptography Quantum Cryptography is effectively doing cryptography with quantum computers There are several potential techniques One thing that is well established is Quantum Key Distribution This has almost nothing to do with Quantum Computing! Transmit keys from one place to another as quantum state in photons Relies on the quantum mechanical phenomenon that you cannot observe a photon without disturbing its state Theoretically extremely secure, but suffers practical issues Famously recently used by China in satellites 9

Quantum Cryptanalysis Quantum Cryptanalysis Quantum Cryptanalysis is effectively breaking cryptography with quantum computers Grover s algorithm Given a functioning Universal Quantum Computer, Grover s algorithm weakens the currently assumed strength of symmetric algorithms like AES Shor s algorithm Given a functioning Universal Quantum Computer, Shor s algorithm weakens the currently assumed strength of asymmetric algorithms like RSA, ECC This is the big threat If our cryptography is broken, then everything breaks! 10

Quantum Cryptanalysis Quantum Cryptanalysis Quantum Cryptanalysis is effectively breaking cryptography with quantum computers Grover s algorithm Given a functioning Universal Quantum Computer, Grover s algorithm weakens the currently assumed strength of symmetric algorithms like AES Shor s algorithm Given a functioning Universal Quantum Computer, Shor s algorithm weakens the currently assumed strength of asymmetric algorithms like RSA, ECC This is the big threat If our cryptography is broken, then everything breaks! 11

Quantum Cryptanalysis Don t let the Sun go down on me This essentially puts a sunset on current popular algorithms But this is business as usual! Remember SHA-1? Single DES? DSA? Remember what happened in 2010? But don t jump too soon Work out what your exposure is Work out how long it will take for you to move Balance this risk against the possibility that the new algorithms might have classical weaknesses! NIST competition going on right now 12

Here s one we made earlier!

Here s one we made earlier! MBEDTLS CHROMIUM

Here s one we made earlier! Don t worry about this: it s just a lack of root issuer certificate part of the transition pain.

Here s one we made earlier! This is the important part: All resources served securely with NEWHOPE and CHACHA

Quantum Computing and Security The fundamentals Several different quantum-related technologies are often reported together. They are NOT the same! RSA and ECC are the place to concentrate on replacements Chances of needing PQC by 2031 rated as high a 50% Why it matters to security Some of the technology is securityenhancing, some very much not I hope this is obvious! Data security lifetime is important! Remember adversaries can collect traffic NOW and break LATER 17

NEXT UP

Next: Machine Learning, AI, 19

Relationship with Big Data 20

All things to all men 21

A favourite example: Connected Car 22

A favourite example: Connected Car https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ 23

A favourite example: Connected Car https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ 24

A favourite example: Connected Car https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ 25

A favourite example: Connected car 26

A favourite example: Connected car 27

A favourite example: Connected car 28

A favourite example: Connected car 29

Artificial Intelligence and Security The fundamentals This is another area where multiple very different technologies are often conflated Input and Training Data become more important than the program Overlaying with traditional systems is most effective for now Why it matters to security Risk of conferring benefits of all on one: systems will fail We don t know how to apply certification to this type of system Don t substitute out existing best practice just yet! 30

NEXT UP

Last but not least: Blockchain 32

One of the biggest problems with blockchain 33

One of the biggest problems with blockchain FOMO 34

Bitcoin 35

Not Bitcoin 36

Bitcoin hacks 37

Bitcoin hacks 38

Bitcoin hacks https://magoo.github.io/blockchain-graveyard/ 39

The end of PKI? PKI 40

Blockchain security addressed 41

Enterprise use PUBLIC ALL CAN VIEW WRITE RESTRICTED ALL CAN VIEW ALL CAN WRITE PRIVATE VIEW RESTRICTED WRITE RESTRICTED VIEW RESTRICTED ALL CAN WRITE PERMISSIONED PERMISSIONLESS 42

Enterprise use PUBLIC PRIVATE PERMISSIONED PERMISSIONLESS 43

Enterprise use PUBLIC PRIVATE PERMISSIONED PERMISSIONLESS 44

Example: Hyperledger Fabric Architecture APIs SDKs MEMBERSHIP BLOCKCHAIN TRANSACTIONS CHAINCODE Membership Services Blockchain Services Chaincode Services Registration Identity Management Auditability Consensus Manager P2P Protocol Distributed Ledger Ledger Storage Secure Container Secure Registry Services Event Stream 45

Blockchain and security The fundamentals Blockchain is not bitcoin Blockchain is not magic Just because it s on the ledger, doesn t make it true Crypto protection is vital Why it matters to security Focus on private/permissioned We still have to build system security just the same as we did before Data security is still vital: maybe more so than before because of non-repudiation. Blockchain does A, not CI As ever 46

TAKE-AWAYS

Key take-aways HOW WE BUILD SYSTEMS IS FUNDAMENTALLY CHANGING 48

Key take-aways EVERYTHING YOU KNOW IS WRONG 49

Key take-aways EVERYTHING YOU KNOW IS WRONG 50

Key take-aways Quantum Crypto: Remember the difference between the different technologies Don t panic, but do plan! Take this as a nudge to do standard good transition planning Existing best practice still applies. Remember PQC only brings you back up to 256-bit (ish) Machine learning & AI This absolutely will change the world of safety and security but there s a way to go yet Whole system approach including humans and classic apps is essential Attack focus shifts from the application to the data and/or training set Blockchain Don t feel compelled to use it! The difference between public and private ledgers is huge. Don t think about Bitcoin. Crypto key protection is even more sensitive than it was before 51

Apply What You Have Learned Today Don t forget the fundamentals Identify your business problems before looking for solutions Don t panic Look to deploy these techniques over the next few years As part of larger systems. None of them is a Silver Bullet Always concentrate on the cryptographic data security Whether training sets or big data for AI, or a shadow data store for a blockchain, the need for strong crypto is growing! Invest in flexible and strong cryptographic key management systems 52

THANK YOU! Questions? Comments?