SlideShare a Scribd company logo
1 of 35
Download to read offline
Source: Kaspersky Lab
Source: Kaspersky Lab
2000 2002 2004 2006 2008 2010 2012 2014 2016 2018
Relative Algorithms Strength Over Time
MD5 SHA1 RSA 1024->2048 RSA->ECC PQC
1st better-than-brute-
force attack on SHA-1
1st MD5
collision
1st SHA-1
collision
MSR PQC
project starts
NSA revises Suite B
& says PQC coming
Crypto SDL bans
RSA <2048
NIST announces
RSA-1024 transition
Windows blocks
RSA <1024
FLAME attack on
MS PKI
NSA announces Suite B,
starts move to ECC
MD5 (1991)
SHA-1 (1995)
RSA (1978), RSA-1024 (US/CA NT 4.0 1996)
Quantum is coming
Photos courtesy of: Professor Charlie Marcus
Van Meter et al., 2006
RSA-2048
Challenge
Problem
Number of bits N
TimetoFactorN-bitNumber
Difficulty of factoring
Difficulty of elliptic
curve discrete
logarithms
Can be solved efficiently by a
large-scale quantum computer
(Shor’s Algorithm 1994)
RSA signatures
Elliptic curve
Diffie–Hellman
key exchange
AES SHA-2
Impacted by quantum computing but we can
mitigate by increasing key sizes
(Grover’s Algorithm 1996)
Source: Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms, Roeteller et al., Asiacrypt 2017.
Hypothetical 15-Year View for PQ Crypto
~ 2030
Quantum Computer Breaks
Asymmetric Crypto
Dec 2017 – Dec 2023
NIST PQ Standardization Process
WE ARE
HERE
JAN 2015 JAN 2016 JAN 2017 JAN 2018 JAN 2019 JAN 2020 JAN 2021 JAN 2022 JAN 2023 JAN 2024 JAN 2025 JAN 2026 JAN 2027 JAN 2028 JAN 2029 Dec 2029
R&D
ROLLOUTS DECOMMISSION
PILOTS
MIGRATION
STANDARDS DISCUSSIONS
NIST Post-Quantum
Project
• “Competition” launched Nov 30, 2017
• Research teams from around the world have
responded
• 69 submissions, of which 5 withdrawn, a few others
have apparently successful attacks.
• Four candidates entered by Microsoft & collaborators
• While NIST analyzes, crypto community gleefully doing
cryptanalysis
• Round 2 candidates likely announced Summer 2019
• NIST expected to pick multiple algorithms
This Photo by Unknown Author is licensed under CC BY-SA
Isogeny-based
Finding a specific isogeny between two elliptic curves or a
path between them in the isogeny graph
Other
Lattice-Based
Hardness of finding shortest vector in a high-
dimensional lattice
Hash-based
Security of hash functions
Multivariate
Multivariate quadratic polynomial problem (MQ)
Code-based
Hardness of decoding a random linear code
• The Frodo team:
Microsoft (Craig Costello, Karen Easterbrook, Brian LaMacchia,
Michael Naehrig, Patrick Longa)
Google (Ilya Mironov, Ananth Raghunathan)
NXP (Joppe Bos)
CWI (Leo Ducas)
McMaster University (Douglas Stebila)
University of Michigan (Chris Peikert)
Ege University (Erdem Alkim)
Stanford University (Valeria Nikolaenko)
• Lattice-based encryption based on the “learning with errors” problem
• LWE, not R-LWE: Frodo doesn’t have a ring…
• Based upon well-studied problem
• Efficiency: Fast, but relatively large keys.
Meet Frodo
A visual explanation
Given a public matrix (blue) and our secret (red), and adding a little error (yellow), get an answer (green)
To break this, adversary must calculate the secret (red)
• The SIKE Team:
Microsoft (Craig Costello, Brian LaMacchia, Michael Naehrig, Patrick Longa)
Amazon (Matt Campagna)
InfoSec Global (Basil Hess, Vladimir Soukharev)
Texas Instruments (Brian Koziel)
University of Waterloo (David Jao, David Urbanik)
Université de Versailles (Luca DeFeo)
Radboud University (Joost Renes)
Florida Atlantic University (Reza Azarderakhsh, Amir Jalali)
• Elliptic curve-based KEM, based on the “supersingular isogeny” problem
• Related D-H: “SIDH” – Supersingular Isogeny Diffie-Hellman
• Fewer years of study (cryptanalysis) in comparison to lattices
• Efficiency: Small keys, but relatively slow
Performance Metrics – Key Exchange/Encipherment
Time (ms) Comm. (bytes) Quantum
SecurityA→B B→A
RSA 3072 4.58 387 384 -
ECDH nistp256 1.40 32 32 -
NewHope 0.06 1824 2048 206 bits
FrodoKEM-640 1.19 9,616 9,752 Level 1 (*)
SIKEp503 9.0 378 378 Level 1 (*)
Classical
Lattice-
based
Isogeny
Timings obtained on Intel Core i7 (3.4GHz) Skylake.
(*) Matches brute-force security of AES-128.
• The qTESLA team:
Microsoft (Patrick Longa)
Isara Corporation (Edward Eaton, Gus Gutowski)
Ondokuz Mayis University (Sedat Akleylek, Erdem Alkim)
Technische U. Darmstädt (Nina Bindel, Johannes Buchmann, Juliane Krämer,
Harun Polat)
University of São Paulo (Jefferson Ricardini, Gustavo Zanon)
University of Washington-Tacoma (Paulo Barreto)
Performance Metrics – Digital Signatures
Sign
(ms)
Verify
(ms)
Privkey
(bytes)
Pubkey
(bytes)
Signature
(bytes)
Quantum
Security
RSA 4096 6.033 0.093 512 512 512 -
Picnic-L1-FS 1.95 1.36 16 32 34,000 Level 1 (*)
qTESLA-I 0.15 0.03 1,216 1,504 1,376 Level 1 (*)
qTESLA-III-speed 0.24 0.07 2,112 3,104 2,848 Level 3 (*)
Timings obtained on Intel Core i7 (3.4GHz) Skylake.
(*) Level 1 matches brute-force security of AES-128, Level 3 matches AES-192.
https://openquantumsafe.org/
PQC Protocol Integrations using OQS
• We integrated the OQS library into protocols to provide PQC and
hybrid ciphersuites
• Hybrid: keep your FIPS or otherwise approved crypto, add PQ protection
• For more on hybrid PKI, see Bindel et al. 2017:
https://eprint.iacr.org/2017/460.pdf
• OpenSSL, with TLS 1.2 and 1.3 support
• https://github.com/open-quantum-safe/openssl
• OpenSSH
• https://github.com/open-quantum-safe/openssh-portable
• OpenVPN: For securing links against “record now/exploit later”
attacks.
• https://github.com/Microsoft/PQCrypto-VPN
PQ-VPN Demo Architecture
• Making legacy applications PQ-agile can be difficult and expensive
• A PQ-VPN wrapper is a deployment option that doesn’t require updating the
entire legacy stack
Browser
azuresite.com
office365.com
ssh
3rd Party
App
PQ-enabled
OpenVPN
client
Azure
PQ-enabled
OpenVPN
server
3rd Party
App
Service
sshd
Office365
Internet
dnsleaktest.com
azuresite.com
TLS
TLS
TLS
TLS
TLS
Windows PC
PQ-protected VPN
tunnel
PQAP: An RPi3 PQ-VPN Appliance
• Our PQ-VPN project also includes
software and instructions for
building a PQ secure VPN appliance
using a standard Raspberry Pi 3.
• Acts as a WiFi access point, tunnels
all of its traffic over PQ-VPN to a
cloud-hosted endpoint.
• No software install needed on client
devices.
• All connected devices device get
PQ security transparently. Yeah, we changed the password on this…
Systems: Key Scenarios for Microsoft
• Public Key Infrastructure (PKI)
• Both corporate and externally-facing
• Code signing for Microsoft products and services
• Authenticode (e.g. Windows DLLs)
• UWP (Microsoft Store) applications
• XBOX
• Azure Cloud Computing
• Key Vault
PQC with a Hardware Security Module
• We added support for the Picnic algorithm to an Utimaco HSM
• To the HSM simulator first, then cross-compiled to the HSM itself.
• Where possible, we replaced functions in MS software with calls to Utimaco
firmware: RNG, SHA-3, ASN.1 utilities
• Goal: demonstrate three key PKI CA operations
1. HSM generates & stores new PQ CA key and issues self-signed cert
2. HSM generates & stores new PQ EE key, CA issues cert for EE key
3. User creates CSR outside the HSM for a legacy (RSA) key pair.
Sends CSR to PQ CA in the HSM. CA issues PQ cert for RSA public key.
• All PQ operations use Picnic keys and signatures
Libraries:
• https://github.com/Microsoft/PQCrypto-LWEKE
• https://github.com/Microsoft/PQCrypto-SIKE
• https://github.com/qtesla/qTesla
• https://github.com/Microsoft/Picnic
Protocol Integrations:
• https://openquantumsafe.org/
• https://github.com/open-quantum-safe/openssl
• https://github.com/open-quantum-safe/openssh-portable
• https://github.com/Microsoft/PQCrypto-VPN
Overall project site:
• https://www.microsoft.com/en-us/research/project/post-quantum-cryptography/
PQ Open Source Releases
Summary – Preparing for a PQ future
• Quantum computers are coming – maybe not for a decade or more, but
within the protection lifetime of data we are generating and encrypting
today
• We need to start planning the transition to post-quantum cryptographic algorithms
now.
• To prepare for the PQ transition, all our systems need cryptographic agility
• Hybrid solutions combining classical and post-quantum primitives look promising; they
provide both traditional cryptographic guarantees as well as some PQ resistance
• Practical engineering options exist today for deploying PQ
• But it is going to take a long time to update our software stacks…
• We may already be late to transition
• Some of our customers have data with a protection lifespan of 15-20 years or more.
• IoT and critical infrastructure have devices that won’t be updated for 15+ years.
Preparing Today’s Analysis Tools for PQ
• The NIST competition attracted lots of new candidate algorithms with
open source reference and optimized implementations
• While the PQ community cryptanalyzes all the proposals, assume that the bad
guys are already looking at how they can leverage PQ algorithms too.
• Tools you use to parse protocols, search for algorithm signatures, etc.,
may encounter encryption algorithms that don’t match what you’ve
seen previously
• Same is true for digital signatures
• Once NIST chooses algorithms, there will be a bunch of churn in the
commonly-used security protocols as they are upgraded to support PQ
How will we know when an adversary has access
to a sufficiently large quantum computer?
https://github.com/Microsoft/PQCrypto-LWEKE
https://github.com/Microsoft/PQCrypto-SIKE
https://github.com/qtesla/qTesla
https://github.com/Microsoft/Picnic
https://openquantumsafe.org/
https://github.com/open-quantum-safe/openssl
https://github.com/open-quantum-safe/openssh-portable
https://github.com/Microsoft/PQCrypto-VPN
https://www.microsoft.com/en-us/research/project/post-quantum-cryptography/
bal@microsoft.com
keaster@microsoft.com

More Related Content

What's hot

Aprendizado de Máquina
Aprendizado de MáquinaAprendizado de Máquina
Aprendizado de Máquinabutest
 
PyTorch Introduction
PyTorch IntroductionPyTorch Introduction
PyTorch IntroductionYash Kawdiya
 
Word Embeddings - Introduction
Word Embeddings - IntroductionWord Embeddings - Introduction
Word Embeddings - IntroductionChristian Perone
 
Support Vector Machines
Support Vector MachinesSupport Vector Machines
Support Vector Machinesnextlib
 
Model evaluation - machine learning
Model evaluation - machine learningModel evaluation - machine learning
Model evaluation - machine learningSon Phan
 
ΠΛΗ20.ΚΑΡΤΑ - ΣΥΝΔΥΑΣΜΟΙ
ΠΛΗ20.ΚΑΡΤΑ - ΣΥΝΔΥΑΣΜΟΙ ΠΛΗ20.ΚΑΡΤΑ - ΣΥΝΔΥΑΣΜΟΙ
ΠΛΗ20.ΚΑΡΤΑ - ΣΥΝΔΥΑΣΜΟΙ Dimitris Psounis
 
[발표요약본] 메타버스 보안위협에 대한 대응 방안 v1.0
[발표요약본] 메타버스 보안위협에 대한 대응 방안 v1.0[발표요약본] 메타버스 보안위협에 대한 대응 방안 v1.0
[발표요약본] 메타버스 보안위협에 대한 대응 방안 v1.0james yoo
 
Aplicacoes web semantica saude
Aplicacoes web semantica saudeAplicacoes web semantica saude
Aplicacoes web semantica saudeIvan Ricarte
 
Semi-supervised Learning
Semi-supervised LearningSemi-supervised Learning
Semi-supervised Learningbutest
 
AutoML - The Future of AI
AutoML - The Future of AIAutoML - The Future of AI
AutoML - The Future of AINing Jiang
 
Lecture 01: Machine Learning for Language Technology - Introduction
 Lecture 01: Machine Learning for Language Technology - Introduction Lecture 01: Machine Learning for Language Technology - Introduction
Lecture 01: Machine Learning for Language Technology - IntroductionMarina Santini
 
Lecture 1: What is Machine Learning?
Lecture 1: What is Machine Learning?Lecture 1: What is Machine Learning?
Lecture 1: What is Machine Learning?Marina Santini
 

What's hot (20)

Paradigma Orientado a Objeto
Paradigma Orientado a ObjetoParadigma Orientado a Objeto
Paradigma Orientado a Objeto
 
Aprendizado de Máquina
Aprendizado de MáquinaAprendizado de Máquina
Aprendizado de Máquina
 
PyTorch Introduction
PyTorch IntroductionPyTorch Introduction
PyTorch Introduction
 
Word Embeddings - Introduction
Word Embeddings - IntroductionWord Embeddings - Introduction
Word Embeddings - Introduction
 
[ppt]
[ppt][ppt]
[ppt]
 
Support Vector Machines
Support Vector MachinesSupport Vector Machines
Support Vector Machines
 
Model evaluation - machine learning
Model evaluation - machine learningModel evaluation - machine learning
Model evaluation - machine learning
 
ΠΛΗ20.ΚΑΡΤΑ - ΣΥΝΔΥΑΣΜΟΙ
ΠΛΗ20.ΚΑΡΤΑ - ΣΥΝΔΥΑΣΜΟΙ ΠΛΗ20.ΚΑΡΤΑ - ΣΥΝΔΥΑΣΜΟΙ
ΠΛΗ20.ΚΑΡΤΑ - ΣΥΝΔΥΑΣΜΟΙ
 
ΠΛΗ20 ΜΑΘΗΜΑ 3.4
ΠΛΗ20 ΜΑΘΗΜΑ 3.4ΠΛΗ20 ΜΑΘΗΜΑ 3.4
ΠΛΗ20 ΜΑΘΗΜΑ 3.4
 
[발표요약본] 메타버스 보안위협에 대한 대응 방안 v1.0
[발표요약본] 메타버스 보안위협에 대한 대응 방안 v1.0[발표요약본] 메타버스 보안위협에 대한 대응 방안 v1.0
[발표요약본] 메타버스 보안위협에 대한 대응 방안 v1.0
 
Aplicacoes web semantica saude
Aplicacoes web semantica saudeAplicacoes web semantica saude
Aplicacoes web semantica saude
 
Semi-supervised Learning
Semi-supervised LearningSemi-supervised Learning
Semi-supervised Learning
 
Meta-Learning Presentation
Meta-Learning PresentationMeta-Learning Presentation
Meta-Learning Presentation
 
ΠΛΗ20 ΜΑΘΗΜΑ 1.1
ΠΛΗ20 ΜΑΘΗΜΑ 1.1ΠΛΗ20 ΜΑΘΗΜΑ 1.1
ΠΛΗ20 ΜΑΘΗΜΑ 1.1
 
AutoML - The Future of AI
AutoML - The Future of AIAutoML - The Future of AI
AutoML - The Future of AI
 
Regularization
RegularizationRegularization
Regularization
 
12 SQL - Junções / Join
12 SQL - Junções / Join12 SQL - Junções / Join
12 SQL - Junções / Join
 
Lecture 01: Machine Learning for Language Technology - Introduction
 Lecture 01: Machine Learning for Language Technology - Introduction Lecture 01: Machine Learning for Language Technology - Introduction
Lecture 01: Machine Learning for Language Technology - Introduction
 
ΠΛΗ20 ΜΑΘΗΜΑ 3.7
ΠΛΗ20 ΜΑΘΗΜΑ 3.7ΠΛΗ20 ΜΑΘΗΜΑ 3.7
ΠΛΗ20 ΜΑΘΗΜΑ 3.7
 
Lecture 1: What is Machine Learning?
Lecture 1: What is Machine Learning?Lecture 1: What is Machine Learning?
Lecture 1: What is Machine Learning?
 

Similar to BlueHat v18 || Record now, decrypt later - future quantum computers are a present threat

Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldSiri Murthy
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsSeddiq Q. Abd Al-Rahman
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1Omkar Salunke
 
Test Execution Infrastructure for IoT Quality analysis
Test Execution Infrastructure for IoT Quality analysisTest Execution Infrastructure for IoT Quality analysis
Test Execution Infrastructure for IoT Quality analysisAxel Rennoch
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsFinalyearprojects Toall
 
"Traffic Speed Control System in the Cloud using Machine Learning" by Albert ...
"Traffic Speed Control System in the Cloud using Machine Learning" by Albert ..."Traffic Speed Control System in the Cloud using Machine Learning" by Albert ...
"Traffic Speed Control System in the Cloud using Machine Learning" by Albert ...DevClub_lv
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical NetworksADVA
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...MyNOG
 
Akshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedInAkshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedInAkshay Kale
 
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET Journal
 
How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?Amazon Web Services
 
Quantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionQuantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionHedera Hashgraph
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyCSNP
 

Similar to BlueHat v18 || Record now, decrypt later - future quantum computers are a present threat (20)

Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
Test Execution Infrastructure for IoT Quality analysis
Test Execution Infrastructure for IoT Quality analysisTest Execution Infrastructure for IoT Quality analysis
Test Execution Infrastructure for IoT Quality analysis
 
Seminar V2
Seminar V2Seminar V2
Seminar V2
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Cisco OpenSOC
Cisco OpenSOCCisco OpenSOC
Cisco OpenSOC
 
"Traffic Speed Control System in the Cloud using Machine Learning" by Albert ...
"Traffic Speed Control System in the Cloud using Machine Learning" by Albert ..."Traffic Speed Control System in the Cloud using Machine Learning" by Albert ...
"Traffic Speed Control System in the Cloud using Machine Learning" by Albert ...
 
Quantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic ModulesQuantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic Modules
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
Akshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedInAkshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedIn
 
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
 
How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?
 
Quantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionQuantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief Introduction
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
IoT meets Big Data
IoT meets Big DataIoT meets Big Data
IoT meets Big Data
 
Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival
 

More from BlueHat Security Conference

BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Security Conference
 
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Security Conference
 
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Security Conference
 
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Security Conference
 
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Security Conference
 
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Security Conference
 
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Security Conference
 
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Security Conference
 
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Security Conference
 
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Security Conference
 
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Security Conference
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat Security Conference
 
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat Security Conference
 
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat Security Conference
 
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat Security Conference
 
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat Security Conference
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat Security Conference
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat Security Conference
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat Security Conference
 

More from BlueHat Security Conference (20)

BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
 
BlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || KeynoteBlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || Keynote
 
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
 
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
 
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
 
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
 
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
 
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
 
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
 
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
 
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
 
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiled
 
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
 
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
 
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
 
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and well
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without device
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

BlueHat v18 || Record now, decrypt later - future quantum computers are a present threat

  • 1.
  • 4.
  • 5. 2000 2002 2004 2006 2008 2010 2012 2014 2016 2018 Relative Algorithms Strength Over Time MD5 SHA1 RSA 1024->2048 RSA->ECC PQC 1st better-than-brute- force attack on SHA-1 1st MD5 collision 1st SHA-1 collision MSR PQC project starts NSA revises Suite B & says PQC coming Crypto SDL bans RSA <2048 NIST announces RSA-1024 transition Windows blocks RSA <1024 FLAME attack on MS PKI NSA announces Suite B, starts move to ECC MD5 (1991) SHA-1 (1995) RSA (1978), RSA-1024 (US/CA NT 4.0 1996)
  • 7.
  • 8. Photos courtesy of: Professor Charlie Marcus
  • 9.
  • 10. Van Meter et al., 2006 RSA-2048 Challenge Problem Number of bits N TimetoFactorN-bitNumber
  • 11. Difficulty of factoring Difficulty of elliptic curve discrete logarithms Can be solved efficiently by a large-scale quantum computer (Shor’s Algorithm 1994) RSA signatures Elliptic curve Diffie–Hellman key exchange AES SHA-2 Impacted by quantum computing but we can mitigate by increasing key sizes (Grover’s Algorithm 1996)
  • 12. Source: Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms, Roeteller et al., Asiacrypt 2017.
  • 13. Hypothetical 15-Year View for PQ Crypto ~ 2030 Quantum Computer Breaks Asymmetric Crypto Dec 2017 – Dec 2023 NIST PQ Standardization Process WE ARE HERE JAN 2015 JAN 2016 JAN 2017 JAN 2018 JAN 2019 JAN 2020 JAN 2021 JAN 2022 JAN 2023 JAN 2024 JAN 2025 JAN 2026 JAN 2027 JAN 2028 JAN 2029 Dec 2029 R&D ROLLOUTS DECOMMISSION PILOTS MIGRATION STANDARDS DISCUSSIONS
  • 14.
  • 15.
  • 16. NIST Post-Quantum Project • “Competition” launched Nov 30, 2017 • Research teams from around the world have responded • 69 submissions, of which 5 withdrawn, a few others have apparently successful attacks. • Four candidates entered by Microsoft & collaborators • While NIST analyzes, crypto community gleefully doing cryptanalysis • Round 2 candidates likely announced Summer 2019 • NIST expected to pick multiple algorithms This Photo by Unknown Author is licensed under CC BY-SA
  • 17. Isogeny-based Finding a specific isogeny between two elliptic curves or a path between them in the isogeny graph Other Lattice-Based Hardness of finding shortest vector in a high- dimensional lattice Hash-based Security of hash functions Multivariate Multivariate quadratic polynomial problem (MQ) Code-based Hardness of decoding a random linear code
  • 18. • The Frodo team: Microsoft (Craig Costello, Karen Easterbrook, Brian LaMacchia, Michael Naehrig, Patrick Longa) Google (Ilya Mironov, Ananth Raghunathan) NXP (Joppe Bos) CWI (Leo Ducas) McMaster University (Douglas Stebila) University of Michigan (Chris Peikert) Ege University (Erdem Alkim) Stanford University (Valeria Nikolaenko) • Lattice-based encryption based on the “learning with errors” problem • LWE, not R-LWE: Frodo doesn’t have a ring… • Based upon well-studied problem • Efficiency: Fast, but relatively large keys.
  • 19. Meet Frodo A visual explanation Given a public matrix (blue) and our secret (red), and adding a little error (yellow), get an answer (green) To break this, adversary must calculate the secret (red)
  • 20. • The SIKE Team: Microsoft (Craig Costello, Brian LaMacchia, Michael Naehrig, Patrick Longa) Amazon (Matt Campagna) InfoSec Global (Basil Hess, Vladimir Soukharev) Texas Instruments (Brian Koziel) University of Waterloo (David Jao, David Urbanik) Université de Versailles (Luca DeFeo) Radboud University (Joost Renes) Florida Atlantic University (Reza Azarderakhsh, Amir Jalali) • Elliptic curve-based KEM, based on the “supersingular isogeny” problem • Related D-H: “SIDH” – Supersingular Isogeny Diffie-Hellman • Fewer years of study (cryptanalysis) in comparison to lattices • Efficiency: Small keys, but relatively slow
  • 21. Performance Metrics – Key Exchange/Encipherment Time (ms) Comm. (bytes) Quantum SecurityA→B B→A RSA 3072 4.58 387 384 - ECDH nistp256 1.40 32 32 - NewHope 0.06 1824 2048 206 bits FrodoKEM-640 1.19 9,616 9,752 Level 1 (*) SIKEp503 9.0 378 378 Level 1 (*) Classical Lattice- based Isogeny Timings obtained on Intel Core i7 (3.4GHz) Skylake. (*) Matches brute-force security of AES-128.
  • 22. • The qTESLA team: Microsoft (Patrick Longa) Isara Corporation (Edward Eaton, Gus Gutowski) Ondokuz Mayis University (Sedat Akleylek, Erdem Alkim) Technische U. Darmstädt (Nina Bindel, Johannes Buchmann, Juliane Krämer, Harun Polat) University of São Paulo (Jefferson Ricardini, Gustavo Zanon) University of Washington-Tacoma (Paulo Barreto)
  • 23.
  • 24. Performance Metrics – Digital Signatures Sign (ms) Verify (ms) Privkey (bytes) Pubkey (bytes) Signature (bytes) Quantum Security RSA 4096 6.033 0.093 512 512 512 - Picnic-L1-FS 1.95 1.36 16 32 34,000 Level 1 (*) qTESLA-I 0.15 0.03 1,216 1,504 1,376 Level 1 (*) qTESLA-III-speed 0.24 0.07 2,112 3,104 2,848 Level 3 (*) Timings obtained on Intel Core i7 (3.4GHz) Skylake. (*) Level 1 matches brute-force security of AES-128, Level 3 matches AES-192.
  • 26. PQC Protocol Integrations using OQS • We integrated the OQS library into protocols to provide PQC and hybrid ciphersuites • Hybrid: keep your FIPS or otherwise approved crypto, add PQ protection • For more on hybrid PKI, see Bindel et al. 2017: https://eprint.iacr.org/2017/460.pdf • OpenSSL, with TLS 1.2 and 1.3 support • https://github.com/open-quantum-safe/openssl • OpenSSH • https://github.com/open-quantum-safe/openssh-portable • OpenVPN: For securing links against “record now/exploit later” attacks. • https://github.com/Microsoft/PQCrypto-VPN
  • 27. PQ-VPN Demo Architecture • Making legacy applications PQ-agile can be difficult and expensive • A PQ-VPN wrapper is a deployment option that doesn’t require updating the entire legacy stack Browser azuresite.com office365.com ssh 3rd Party App PQ-enabled OpenVPN client Azure PQ-enabled OpenVPN server 3rd Party App Service sshd Office365 Internet dnsleaktest.com azuresite.com TLS TLS TLS TLS TLS Windows PC PQ-protected VPN tunnel
  • 28. PQAP: An RPi3 PQ-VPN Appliance • Our PQ-VPN project also includes software and instructions for building a PQ secure VPN appliance using a standard Raspberry Pi 3. • Acts as a WiFi access point, tunnels all of its traffic over PQ-VPN to a cloud-hosted endpoint. • No software install needed on client devices. • All connected devices device get PQ security transparently. Yeah, we changed the password on this…
  • 29. Systems: Key Scenarios for Microsoft • Public Key Infrastructure (PKI) • Both corporate and externally-facing • Code signing for Microsoft products and services • Authenticode (e.g. Windows DLLs) • UWP (Microsoft Store) applications • XBOX • Azure Cloud Computing • Key Vault
  • 30. PQC with a Hardware Security Module • We added support for the Picnic algorithm to an Utimaco HSM • To the HSM simulator first, then cross-compiled to the HSM itself. • Where possible, we replaced functions in MS software with calls to Utimaco firmware: RNG, SHA-3, ASN.1 utilities • Goal: demonstrate three key PKI CA operations 1. HSM generates & stores new PQ CA key and issues self-signed cert 2. HSM generates & stores new PQ EE key, CA issues cert for EE key 3. User creates CSR outside the HSM for a legacy (RSA) key pair. Sends CSR to PQ CA in the HSM. CA issues PQ cert for RSA public key. • All PQ operations use Picnic keys and signatures
  • 31. Libraries: • https://github.com/Microsoft/PQCrypto-LWEKE • https://github.com/Microsoft/PQCrypto-SIKE • https://github.com/qtesla/qTesla • https://github.com/Microsoft/Picnic Protocol Integrations: • https://openquantumsafe.org/ • https://github.com/open-quantum-safe/openssl • https://github.com/open-quantum-safe/openssh-portable • https://github.com/Microsoft/PQCrypto-VPN Overall project site: • https://www.microsoft.com/en-us/research/project/post-quantum-cryptography/ PQ Open Source Releases
  • 32. Summary – Preparing for a PQ future • Quantum computers are coming – maybe not for a decade or more, but within the protection lifetime of data we are generating and encrypting today • We need to start planning the transition to post-quantum cryptographic algorithms now. • To prepare for the PQ transition, all our systems need cryptographic agility • Hybrid solutions combining classical and post-quantum primitives look promising; they provide both traditional cryptographic guarantees as well as some PQ resistance • Practical engineering options exist today for deploying PQ • But it is going to take a long time to update our software stacks… • We may already be late to transition • Some of our customers have data with a protection lifespan of 15-20 years or more. • IoT and critical infrastructure have devices that won’t be updated for 15+ years.
  • 33. Preparing Today’s Analysis Tools for PQ • The NIST competition attracted lots of new candidate algorithms with open source reference and optimized implementations • While the PQ community cryptanalyzes all the proposals, assume that the bad guys are already looking at how they can leverage PQ algorithms too. • Tools you use to parse protocols, search for algorithm signatures, etc., may encounter encryption algorithms that don’t match what you’ve seen previously • Same is true for digital signatures • Once NIST chooses algorithms, there will be a bunch of churn in the commonly-used security protocols as they are upgraded to support PQ
  • 34. How will we know when an adversary has access to a sufficiently large quantum computer?