SlideShare a Scribd company logo
1 of 14
Encryption now and in the future
Lars Ramkilde Knudsen
Professor @ DTU
Chief Cryptographer @ Dencrypt
20/03-2014Lars R. Knudsen www.dencrypt.dk2 DTU Compute, Technical University of Denmark
About me
• 2001 Professor, DTU, Denmark
• 1999 Professor, University of Bergen, Norway
• 1994 PhD in cryptography, Aarhus University
• Co-designer of Serpent, Grøstl, Present
• Many contributions in cryptanalysis
• Heavily involved in the AES process
20/03-2014Lars R. Knudsen www.dencrypt.dk3 DTU Compute, Technical University of Denmark
Outline
• Encryption
– AES
– RSA
• State of the art cryptanalysis
• “New” cryptanalysis
• Encryption in the future ?
20/03-2014Lars R. Knudsen www.dencrypt.dk4 DTU Compute, Technical University of Denmark
Symmetric encryption
20/03-2014Lars R. Knudsen www.dencrypt.dk5 DTU Compute, Technical University of Denmark
Symmetric encryption
Name Standard
since
Designed
around
DES: Data Encryption Standard 1977 1974 ?
AES: Advanced Encryption Standard 2001 1996
RC4 (not a
standard)
“Public”
since 1994
1987
SHA-1 1993 1991 ?
20/03-2014Lars R. Knudsen www.dencrypt.dk6 DTU Compute, Technical University of Denmark
Public-key encryption
Message MessageEncryption Decryption
Public-key encryption
%AC&@9^(
20/03-2014Lars R. Knudsen www.dencrypt.dk7 DTU Compute, Technical University of Denmark
Public-key encryption
Name Relying on
difficulty of
Designed
around
Comment
RSA Factoring 1977 De facto
standard
El-Gamal Discrete logarithm
in Zp
1985 Used for
signatures
Elliptic curves Discrete logarithm
in EC
1985 Attractive,
short keys
Diffie-Hellman DH-problem in Zp 1976 Classic
20/03-2014Lars R. Knudsen www.dencrypt.dk8 DTU Compute, Technical University of Denmark
State-of-the art cryptanalysis of AES
Algorithm Number of rounds
AES-128 10
AES-192 12
AES-256 14
Number of
rounds
Year Comment
6 1997 “Practical”
7 2000/2008 Not practical
8 2008 Not practical
9 2014 Not practical
( 10 2011 Biclique )
( 11 2009 Related keys)
20/03-2014Lars R. Knudsen www.dencrypt.dk9 DTU Compute, Technical University of Denmark
State-of-the-art, factoring RSA numbers
0
100
200
300
400
500
600
700
800
900
1985 1990 1995 2000 2005 2010 2015
Factoring RSA numbers
Factoring RSA
numbers
20/03-2014Lars R. Knudsen www.dencrypt.dk10 DTU Compute, Technical University of Denmark
RSA key sizes used now
www Public-key Hash Size of keys
SAS RSA SHA-1 2048
Facebook RSA SHA-1 2048
IACR RSA SHA-1 2048
EFF RSA SHA-1 4096
20/03-2014Lars R. Knudsen www.dencrypt.dk11 DTU Compute, Technical University of Denmark
RSA versus AES, effective key lengths
RSA modulo in bits Effective key length
1024 86
2048 116
4096 156
AES Effective key length
AES-128 128
AES-192 192
AES-256 256
20/03-2014Lars R. Knudsen www.dencrypt.dk12 DTU Compute, Technical University of Denmark
How much can “they” break ?
Traditional cryptanalysis
–AES: I don’t know, but design almost 20 years old..
–RSA: more is known about factoring than what is
publicly available
We have learned that practical breaks also include to
–Steal or find the key
–Exploit non-randomness in keys
–Exploit bad implementations (software and hardware)
20/03-2014Lars R. Knudsen www.dencrypt.dk13 DTU Compute, Technical University of Denmark
Cryptography in the future
Conventional crypto-security principles
• Kerckhoffs’ principle
• Standard algorithms, old algorithms….
• Public keys can be made public
New crypto-security principles
• Dynamic encryption, ignoring Kerckhoffs
• Trust the cryptographers, use newer systems
• Public keys do not have to be public
• Mind your random numbers
20/03-2014Lars R. Knudsen www.dencrypt.dk14 DTU Compute, Technical University of Denmark
Thank you for your attention

More Related Content

Similar to Encryption Past, Present and Future

Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelMohit Goel
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsAngelo Corsaro
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.Tuhin_Das
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsReza Rahimi
 
Detecting Mobile Malware with Apache Spark with David Pryce
Detecting Mobile Malware with Apache Spark with David PryceDetecting Mobile Malware with Apache Spark with David Pryce
Detecting Mobile Malware with Apache Spark with David PryceDatabricks
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxHardik Manocha
 
Cyclone DDS Unleashed: The Origins
Cyclone DDS Unleashed: The OriginsCyclone DDS Unleashed: The Origins
Cyclone DDS Unleashed: The OriginsZettaScaleTechnology
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 

Similar to Encryption Past, Present and Future (20)

Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
Nwc rsa
Nwc rsaNwc rsa
Nwc rsa
 
CV English
CV EnglishCV English
CV English
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
 
cv-frode-figenschou-en
cv-frode-figenschou-encv-frode-figenschou-en
cv-frode-figenschou-en
 
SMRUDAS
SMRUDAS SMRUDAS
SMRUDAS
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
Resume 2012 05
Resume 2012 05Resume 2012 05
Resume 2012 05
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
 
Detecting Mobile Malware with Apache Spark with David Pryce
Detecting Mobile Malware with Apache Spark with David PryceDetecting Mobile Malware with Apache Spark with David Pryce
Detecting Mobile Malware with Apache Spark with David Pryce
 
Presentation
PresentationPresentation
Presentation
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 
Cyclone DDS Unleashed: The Origins
Cyclone DDS Unleashed: The OriginsCyclone DDS Unleashed: The Origins
Cyclone DDS Unleashed: The Origins
 
SILECS/SLICES
SILECS/SLICESSILECS/SLICES
SILECS/SLICES
 
Curriculum Vitae It Oriented
Curriculum Vitae It OrientedCurriculum Vitae It Oriented
Curriculum Vitae It Oriented
 
H42054550
H42054550H42054550
H42054550
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 

More from InfinIT - Innovationsnetværket for it

More from InfinIT - Innovationsnetværket for it (20)

Erfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermarkErfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermark
 
Object orientering, test driven development og c
Object orientering, test driven development og cObject orientering, test driven development og c
Object orientering, test driven development og c
 
Embedded softwaredevelopment hcs
Embedded softwaredevelopment hcsEmbedded softwaredevelopment hcs
Embedded softwaredevelopment hcs
 
C og c++-jens lund jensen
C og c++-jens lund jensenC og c++-jens lund jensen
C og c++-jens lund jensen
 
201811xx foredrag c_cpp
201811xx foredrag c_cpp201811xx foredrag c_cpp
201811xx foredrag c_cpp
 
C som-programmeringssprog-bt
C som-programmeringssprog-btC som-programmeringssprog-bt
C som-programmeringssprog-bt
 
Infinit seminar 060918
Infinit seminar 060918Infinit seminar 060918
Infinit seminar 060918
 
DCR solutions
DCR solutionsDCR solutions
DCR solutions
 
Not your grandfathers BPM
Not your grandfathers BPMNot your grandfathers BPM
Not your grandfathers BPM
 
Kmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolutionKmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolution
 
EcoKnow - oplæg
EcoKnow - oplægEcoKnow - oplæg
EcoKnow - oplæg
 
Martin Wickins Chatbots i fronten
Martin Wickins Chatbots i frontenMartin Wickins Chatbots i fronten
Martin Wickins Chatbots i fronten
 
Marie Fenger ai kundeservice
Marie Fenger ai kundeserviceMarie Fenger ai kundeservice
Marie Fenger ai kundeservice
 
Mads Kaysen SupWiz
Mads Kaysen SupWizMads Kaysen SupWiz
Mads Kaysen SupWiz
 
Leif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support CenterLeif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support Center
 
Jan Neerbek NLP og Chatbots
Jan Neerbek NLP og ChatbotsJan Neerbek NLP og Chatbots
Jan Neerbek NLP og Chatbots
 
Anders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer SupportAnders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer Support
 
Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018
 
Innovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekterInnovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekter
 
Rokoko infin it presentation
Rokoko infin it presentation Rokoko infin it presentation
Rokoko infin it presentation
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Encryption Past, Present and Future

  • 1. Encryption now and in the future Lars Ramkilde Knudsen Professor @ DTU Chief Cryptographer @ Dencrypt
  • 2. 20/03-2014Lars R. Knudsen www.dencrypt.dk2 DTU Compute, Technical University of Denmark About me • 2001 Professor, DTU, Denmark • 1999 Professor, University of Bergen, Norway • 1994 PhD in cryptography, Aarhus University • Co-designer of Serpent, Grøstl, Present • Many contributions in cryptanalysis • Heavily involved in the AES process
  • 3. 20/03-2014Lars R. Knudsen www.dencrypt.dk3 DTU Compute, Technical University of Denmark Outline • Encryption – AES – RSA • State of the art cryptanalysis • “New” cryptanalysis • Encryption in the future ?
  • 4. 20/03-2014Lars R. Knudsen www.dencrypt.dk4 DTU Compute, Technical University of Denmark Symmetric encryption
  • 5. 20/03-2014Lars R. Knudsen www.dencrypt.dk5 DTU Compute, Technical University of Denmark Symmetric encryption Name Standard since Designed around DES: Data Encryption Standard 1977 1974 ? AES: Advanced Encryption Standard 2001 1996 RC4 (not a standard) “Public” since 1994 1987 SHA-1 1993 1991 ?
  • 6. 20/03-2014Lars R. Knudsen www.dencrypt.dk6 DTU Compute, Technical University of Denmark Public-key encryption Message MessageEncryption Decryption Public-key encryption %AC&@9^(
  • 7. 20/03-2014Lars R. Knudsen www.dencrypt.dk7 DTU Compute, Technical University of Denmark Public-key encryption Name Relying on difficulty of Designed around Comment RSA Factoring 1977 De facto standard El-Gamal Discrete logarithm in Zp 1985 Used for signatures Elliptic curves Discrete logarithm in EC 1985 Attractive, short keys Diffie-Hellman DH-problem in Zp 1976 Classic
  • 8. 20/03-2014Lars R. Knudsen www.dencrypt.dk8 DTU Compute, Technical University of Denmark State-of-the art cryptanalysis of AES Algorithm Number of rounds AES-128 10 AES-192 12 AES-256 14 Number of rounds Year Comment 6 1997 “Practical” 7 2000/2008 Not practical 8 2008 Not practical 9 2014 Not practical ( 10 2011 Biclique ) ( 11 2009 Related keys)
  • 9. 20/03-2014Lars R. Knudsen www.dencrypt.dk9 DTU Compute, Technical University of Denmark State-of-the-art, factoring RSA numbers 0 100 200 300 400 500 600 700 800 900 1985 1990 1995 2000 2005 2010 2015 Factoring RSA numbers Factoring RSA numbers
  • 10. 20/03-2014Lars R. Knudsen www.dencrypt.dk10 DTU Compute, Technical University of Denmark RSA key sizes used now www Public-key Hash Size of keys SAS RSA SHA-1 2048 Facebook RSA SHA-1 2048 IACR RSA SHA-1 2048 EFF RSA SHA-1 4096
  • 11. 20/03-2014Lars R. Knudsen www.dencrypt.dk11 DTU Compute, Technical University of Denmark RSA versus AES, effective key lengths RSA modulo in bits Effective key length 1024 86 2048 116 4096 156 AES Effective key length AES-128 128 AES-192 192 AES-256 256
  • 12. 20/03-2014Lars R. Knudsen www.dencrypt.dk12 DTU Compute, Technical University of Denmark How much can “they” break ? Traditional cryptanalysis –AES: I don’t know, but design almost 20 years old.. –RSA: more is known about factoring than what is publicly available We have learned that practical breaks also include to –Steal or find the key –Exploit non-randomness in keys –Exploit bad implementations (software and hardware)
  • 13. 20/03-2014Lars R. Knudsen www.dencrypt.dk13 DTU Compute, Technical University of Denmark Cryptography in the future Conventional crypto-security principles • Kerckhoffs’ principle • Standard algorithms, old algorithms…. • Public keys can be made public New crypto-security principles • Dynamic encryption, ignoring Kerckhoffs • Trust the cryptographers, use newer systems • Public keys do not have to be public • Mind your random numbers
  • 14. 20/03-2014Lars R. Knudsen www.dencrypt.dk14 DTU Compute, Technical University of Denmark Thank you for your attention