SlideShare a Scribd company logo
Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018
P.1
Cryptography Unchained
Cryptography
Unchained
10 min
Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018
P.2
Cryptography Unchained
In a world where the flow of information is
increasing exponentially, it becomes essential to have
powerful tools to ensure security features in terms of
data exchange and storage (such as authenticity,
integrity, confidentiality…). Among the available tools,
the "BlockChain" focuses today all the attention and
passions.
As a particularly complex mathematical
construction, and a subject of many articles and books,
BlockChain could deeply transform many sectors and
appears as an essential component of the development
of tomorrow’s communication network. Its "basic
bricks" are quite old and belong to the vast and
fascinating field of cryptography. In this article, we
propose to go back to the roots and explore this
science of secrecy.
Very early in the development of its energy
intelligence & automation solution, our company
BeeBryte got interested in the cryptographic processes
and technologies that lay the foundations of the
security of any information system (confidentiality,
authenticity and integrity). Used separately or in
combination, these technologies are already largely
integrated into our SaaS, especially to protect
communications between our IoT gateway (Box) and
our Cloud-based platform against cyber-attacks.
Cryptography is a discipline that aims at
protecting the integrity and authenticity of a message
as well as its privacy from third-party intrusions. Used
in a vast range of areas, cryptography covers many
features, on top of which the secure transmission of
data (encryption), the generation of secrets between
users, the authentication (or signature) of a message,
and even its protection against any alteration.
Our wish here is to present some functional
components, which are essential to the
implementation of cryptographic protocols, such as
those underlying the BlockChain.
We will not go into detail about the complex
mathematical theories underpinning the exposed
tools. Globally, they rely on operations, which are
relatively simple to perform but extremely difficult to
reverse, except resorting to "brute force", i.e. the
systematic exploration of wide combinations, limited
by the available computing power. We invite the
reader interested in exploring the underlying
mathematics to further his searches on his own.
KEY CONCEPTS
Symmetric Encryption – AES algorithm
Symmetric encryption’s basic concept relies on
the sharing of a common key between interlocutors.
This key is used by the sender to encrypt his message,
which can only be decrypted by using this same key,
that only the recipient and the sender of the message
are familiar with.
The encryption algorithm makes it possible to
transform plain text into blocks which remain
incomprehensible without the key. However, these
algorithms have the major disadvantage of requiring
the prior – confidential – sharing of a common key. This
drawback can however be overcome with the help of
techniques such as the Diffie-Hellman key exchange
protocol.
The most commonly used symmetric
encryption algorithm is the Advanced Encryption
Standard (AES), notably adopted by the NSA in the
United States. This algorithm defines a number of
transformations dedicated to be carried out on data
stored in a table. The length of the key (128, 192 or
256-bit) determines the strength of the encryption.
Illustration of a typical use case:
 Bob wants to send a message to Alice, with whom
he shares a secret that they will use as the
Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018
P.3
Cryptography Unchained
encryption key. They take good care not to
communicate this key to any other third party.
 Bob encrypts the message using the encryption key,
and then sends the encrypted message to Alice.
 By also using the encryption key, Alice is able to
decrypt the message she receives, and accesses
successfully to the initial message from Bob.
Asymmetric encryption - RSA Algorithm
In asymmetric encryption, each user has a pair
of keys: a public key, broadcasted to all users, and a
private key known only to him. Each message
encrypted by one of the two keys can only be
decrypted with the other key constituting the pair.
Because of the high computational complexity
of symmetric encryption algorithms, they are typically
used to encrypt small amounts of data. The asymmetric
encryption is mainly used in 2 situations:
 To certify the identity of the message sender
Let’s consider the case where Bob wants to
transmit a message and ensures to the recipient
that he is the author. By encrypting the message
with his private key, Bob creates a digital signature
that is specific to him. Anyone can decipher his
message using Bob’s public key and thus confirm
that the message is from Bob. Indeed, the use of
another public key would return a wrong message.
 To send protected content to a specific recipient
This time, Bob wants to send a message to
Alice while ensuring that she will be the only one
able to read it. By encrypting his message with the
public key of Alice, Bob ensures that only Alice, the
unique holder of the associated private key, will
decrypt and read it.
Hash Functions
In cryptography, hash functions are
mathematical functions that take as input any type of
data and generate a code (the hash) of fixed length,
representative of the input data.
A hash function has several unique properties
that make it a useful tool for diverse applications in
computer security:
 It is deterministic: for a given input value, the hash
function will always return the same output.
Therefore, the hash can be seen as a signature of
fixed size of a message… but a non-exclusive
signature.
 In fact, several different messages can have the
same hash, but the probability of collisions (i.e. the
probability that two different messages have the
same hash) is extremely low.
This property allows you to authenticate a message:
if one knows the hash (or signature) of a message
and that it receives independently a copy of this
message, after calculation of its hash and positive
comparison with the signature, the authenticity of
the received message is quasi certain.
 A hash function is generally very sensitive to initial
conditions: the slightest modification of the content
input produces a totally different hash. This
property allows – in addition to authentication – to
ensure the integrity of a message, since the smallest
alteration will dramatically invalid its hash.
Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018
P.4
Cryptography Unchained
 It is not directly invertible: calculating the hash
corresponding to a given message is easy, but the
opposite way, that is: to find a message that
corresponds to a hash, is not possible by any direct
calculation. The only solution is to ‘chop’ or hash, in
a systematic way, different messages until falling on
the expected hash, this method being physically
limited by available computing capacity.
Illustration of a typical use case:
 Bob wants to send a message to Alice and wants to
ensure that the content of his message is not
altered during the transmission.
 Alice, on the other hand, wants to ensure that the
message she receives is exactly what Bob wanted
to send her.
 Bob hashes the message that he wants to send to
Alice. He sends his message as well as the
corresponding hash.
 When she receives the message, Alice reads the
plain text message from Bob, and hashes it on her
side. By comparing this hash to the hash Bob
transmitted, she is able to determine whether or
not the message she just read has been corrupted
during the transmission.
Conclusion
The few elementary cryptographic techniques
that we have outlined in this article constitute the basic
components from which are developed more complex
systems such as the BlockChain but can (and must) also
be considered individually as means to address a large
number of features for securing data.
This perspective appeared to us as essential to
further dispassionately discuss the potential
applications of the BlockChain to the energy sector,
with their strengths and potentials but also their
constraints and relevance limits.
BeeBryte is using IoT, AI and BlockChain to get
commercial buildings, factories, EV charging stations or
entire eco-suburbs to consume electricity in a smarter,
more efficient and cheaper way while reducing carbon
footprint! BeeBryte is based in France and Singapore,
and is accelerated by Intel & TechFounders. Since its
creation in 2015, BeeBryte's solutions have been
awarded by prestigious organizations, such as EDF
Pulse, DENA Start-up Energy Transition award & Hello
Tomorrow Challenge.
If you want to participate in the energy revolution,
please contact us at:
contact@beebryte.com
www.twitter.com/BeeBryteGroup
www.beebryte.com

More Related Content

What's hot

Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
Rajat Tripathi
 
Criptography
CriptographyCriptography
Criptography
Sajan Sahu
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
RapidSSLOnline.com
 
Encryption
EncryptionEncryption
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
ijsrd.com
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
Em24873876
Em24873876Em24873876
Em24873876
IJERA Editor
 
Encryption
EncryptionEncryption
Encryption
Jasleen Khalsa
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismAmit Singh
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
editor1knowledgecuddle
 
Cryptography
CryptographyCryptography
Cryptography
S.M. Towhidul Islam
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
inventionjournals
 
Cryptography
CryptographyCryptography
Cryptography
Vicky Kamboj
 
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
 

What's hot (20)

Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
 
Criptography
CriptographyCriptography
Criptography
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
Encryption
EncryptionEncryption
Encryption
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
Em24873876
Em24873876Em24873876
Em24873876
 
Encryption
EncryptionEncryption
Encryption
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
Asif
AsifAsif
Asif
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Cryptography Unchained - BeeBryte (White Paper)

Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
mydrynan
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
hemanthbbc
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
ijircee
 
H42063743
H42063743H42063743
H42063743
IJERA Editor
 
Cryp Essay
Cryp EssayCryp Essay
Cryp Essay
Carmen Sanborn
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
HamnaMalik31
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
Mohit Modi
 
Lecture 02 - 05 Oct 21.pptx
Lecture 02 - 05 Oct 21.pptxLecture 02 - 05 Oct 21.pptx
Lecture 02 - 05 Oct 21.pptx
HammadRao5
 
Slavisa web stories
Slavisa web storiesSlavisa web stories
Slavisa web stories
Slaviša Krstić
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 

Similar to Cryptography Unchained - BeeBryte (White Paper) (20)

Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
 
Encryption
EncryptionEncryption
Encryption
 
cryptography
cryptographycryptography
cryptography
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
H42063743
H42063743H42063743
H42063743
 
Cryp Essay
Cryp EssayCryp Essay
Cryp Essay
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
s117
s117s117
s117
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
 
Week12
Week12Week12
Week12
 
Lecture 02 - 05 Oct 21.pptx
Lecture 02 - 05 Oct 21.pptxLecture 02 - 05 Oct 21.pptx
Lecture 02 - 05 Oct 21.pptx
 
Slavisa web stories
Slavisa web storiesSlavisa web stories
Slavisa web stories
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 

Recently uploaded

【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
pchutichetpong
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 

Recently uploaded (20)

【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 

Cryptography Unchained - BeeBryte (White Paper)

  • 1. Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018 P.1 Cryptography Unchained Cryptography Unchained 10 min
  • 2. Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018 P.2 Cryptography Unchained In a world where the flow of information is increasing exponentially, it becomes essential to have powerful tools to ensure security features in terms of data exchange and storage (such as authenticity, integrity, confidentiality…). Among the available tools, the "BlockChain" focuses today all the attention and passions. As a particularly complex mathematical construction, and a subject of many articles and books, BlockChain could deeply transform many sectors and appears as an essential component of the development of tomorrow’s communication network. Its "basic bricks" are quite old and belong to the vast and fascinating field of cryptography. In this article, we propose to go back to the roots and explore this science of secrecy. Very early in the development of its energy intelligence & automation solution, our company BeeBryte got interested in the cryptographic processes and technologies that lay the foundations of the security of any information system (confidentiality, authenticity and integrity). Used separately or in combination, these technologies are already largely integrated into our SaaS, especially to protect communications between our IoT gateway (Box) and our Cloud-based platform against cyber-attacks. Cryptography is a discipline that aims at protecting the integrity and authenticity of a message as well as its privacy from third-party intrusions. Used in a vast range of areas, cryptography covers many features, on top of which the secure transmission of data (encryption), the generation of secrets between users, the authentication (or signature) of a message, and even its protection against any alteration. Our wish here is to present some functional components, which are essential to the implementation of cryptographic protocols, such as those underlying the BlockChain. We will not go into detail about the complex mathematical theories underpinning the exposed tools. Globally, they rely on operations, which are relatively simple to perform but extremely difficult to reverse, except resorting to "brute force", i.e. the systematic exploration of wide combinations, limited by the available computing power. We invite the reader interested in exploring the underlying mathematics to further his searches on his own. KEY CONCEPTS Symmetric Encryption – AES algorithm Symmetric encryption’s basic concept relies on the sharing of a common key between interlocutors. This key is used by the sender to encrypt his message, which can only be decrypted by using this same key, that only the recipient and the sender of the message are familiar with. The encryption algorithm makes it possible to transform plain text into blocks which remain incomprehensible without the key. However, these algorithms have the major disadvantage of requiring the prior – confidential – sharing of a common key. This drawback can however be overcome with the help of techniques such as the Diffie-Hellman key exchange protocol. The most commonly used symmetric encryption algorithm is the Advanced Encryption Standard (AES), notably adopted by the NSA in the United States. This algorithm defines a number of transformations dedicated to be carried out on data stored in a table. The length of the key (128, 192 or 256-bit) determines the strength of the encryption. Illustration of a typical use case:  Bob wants to send a message to Alice, with whom he shares a secret that they will use as the
  • 3. Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018 P.3 Cryptography Unchained encryption key. They take good care not to communicate this key to any other third party.  Bob encrypts the message using the encryption key, and then sends the encrypted message to Alice.  By also using the encryption key, Alice is able to decrypt the message she receives, and accesses successfully to the initial message from Bob. Asymmetric encryption - RSA Algorithm In asymmetric encryption, each user has a pair of keys: a public key, broadcasted to all users, and a private key known only to him. Each message encrypted by one of the two keys can only be decrypted with the other key constituting the pair. Because of the high computational complexity of symmetric encryption algorithms, they are typically used to encrypt small amounts of data. The asymmetric encryption is mainly used in 2 situations:  To certify the identity of the message sender Let’s consider the case where Bob wants to transmit a message and ensures to the recipient that he is the author. By encrypting the message with his private key, Bob creates a digital signature that is specific to him. Anyone can decipher his message using Bob’s public key and thus confirm that the message is from Bob. Indeed, the use of another public key would return a wrong message.  To send protected content to a specific recipient This time, Bob wants to send a message to Alice while ensuring that she will be the only one able to read it. By encrypting his message with the public key of Alice, Bob ensures that only Alice, the unique holder of the associated private key, will decrypt and read it. Hash Functions In cryptography, hash functions are mathematical functions that take as input any type of data and generate a code (the hash) of fixed length, representative of the input data. A hash function has several unique properties that make it a useful tool for diverse applications in computer security:  It is deterministic: for a given input value, the hash function will always return the same output. Therefore, the hash can be seen as a signature of fixed size of a message… but a non-exclusive signature.  In fact, several different messages can have the same hash, but the probability of collisions (i.e. the probability that two different messages have the same hash) is extremely low. This property allows you to authenticate a message: if one knows the hash (or signature) of a message and that it receives independently a copy of this message, after calculation of its hash and positive comparison with the signature, the authenticity of the received message is quasi certain.  A hash function is generally very sensitive to initial conditions: the slightest modification of the content input produces a totally different hash. This property allows – in addition to authentication – to ensure the integrity of a message, since the smallest alteration will dramatically invalid its hash.
  • 4. Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018 P.4 Cryptography Unchained  It is not directly invertible: calculating the hash corresponding to a given message is easy, but the opposite way, that is: to find a message that corresponds to a hash, is not possible by any direct calculation. The only solution is to ‘chop’ or hash, in a systematic way, different messages until falling on the expected hash, this method being physically limited by available computing capacity. Illustration of a typical use case:  Bob wants to send a message to Alice and wants to ensure that the content of his message is not altered during the transmission.  Alice, on the other hand, wants to ensure that the message she receives is exactly what Bob wanted to send her.  Bob hashes the message that he wants to send to Alice. He sends his message as well as the corresponding hash.  When she receives the message, Alice reads the plain text message from Bob, and hashes it on her side. By comparing this hash to the hash Bob transmitted, she is able to determine whether or not the message she just read has been corrupted during the transmission. Conclusion The few elementary cryptographic techniques that we have outlined in this article constitute the basic components from which are developed more complex systems such as the BlockChain but can (and must) also be considered individually as means to address a large number of features for securing data. This perspective appeared to us as essential to further dispassionately discuss the potential applications of the BlockChain to the energy sector, with their strengths and potentials but also their constraints and relevance limits. BeeBryte is using IoT, AI and BlockChain to get commercial buildings, factories, EV charging stations or entire eco-suburbs to consume electricity in a smarter, more efficient and cheaper way while reducing carbon footprint! BeeBryte is based in France and Singapore, and is accelerated by Intel & TechFounders. Since its creation in 2015, BeeBryte's solutions have been awarded by prestigious organizations, such as EDF Pulse, DENA Start-up Energy Transition award & Hello Tomorrow Challenge. If you want to participate in the energy revolution, please contact us at: contact@beebryte.com www.twitter.com/BeeBryteGroup www.beebryte.com