SlideShare a Scribd company logo
FRONTIERS IN CRYPTOGRAPHY
May 2017
Robert E. Tarjan

Chief Scientist, Intertrust Technologies

James S. McDonnell Distinguished University Professor 

of Computer Science, Princeton University
Whitebox Security
OUTLINE
•  The Public Key Cryptography Revolution
•  Blackbox vs. whitebox threat models
•  Obfuscation
•  Theoretical results
•  Practical implementations
•  Whitebox Cryptography
•  A specific kind of obfuscation, specifically for cryptography
•  The Future
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 2
IN THE BEGINNING…
…there was symmetric key cryptography.
But how could the parties agree on keys?
SECURE COMMUNICATION
OUT OF BAND KEY AGREEMENT
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 3
Proposed by Diffie and Hellman (1976)
First practical public key cryptosystem RSA (1978)
PUBLIC KEY CRYPTOGRAPY
Alice’s PRIVATE key
 Alice’s PUBLIC key
 Bob’s PUBLIC key
 Bob’s PRIVATE key
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 4
SECURE COMMUNICATION
Protected Environment
Managed Device
Crypto Library
Protected Environment
Managed Device
Crypto Library
The communication channel is protected with cryptography.
The cryptographic key used at the endpoints is assumed to be protected by other means.
The attacker can’t look into that crypto library. It’s a “black box”.
BLACKBOX SECURITY ASSUMPTION
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 5
SECURE COMMUNICATION
Unprotected Environment
Unmanaged Device
Crypto Library
The attacker can look into the crypto library.
How do we secure the key?
WHITEBOX
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 6
SECURE COMMUNICATION
Cloud
Services
Unprotected Environment
Unmanaged Device
Crypto Library
Put the key back into a Blackbox!
HARDWARE SECURITY
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 7
Cloud
ServicesSECURE COMMUNICATION
Blackbox
PROBLEMS WITH HARDWARE SECURITY
Therefore, whitebox security solutions will continue to be important! 
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 8
•  Attacks do exist
•  Exploiting vulnerabilities 

(e.g. backdoors, update mechanisms, cold boot attacks)
•  Differential power analysis (Kocher, et al, CRYPTO ’99)
•  Recovery
•  Hardware is hard to update if compromised
•  But software can be patched
•  Priorities
•  Users want cost savings and speed
•  Security is often secondary
Source: SPA trace showing an entire DES operation / 

(December 14, 2010) by Mad fab / Wikimedia Creative Commons (CC BY-SA 2.0)
Provable security
guarantees
Very expensive for skilled
attackers to succeed
Lots of computation 

and space required 
Must be fast and use
limited memory
Security
Practice
Theory
Performance
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 9
THEORY VS. PRACTICE
Obfuscator: An algorithm O such that for any program P, O(P) is a program that:
•  computes the same function as P
•  is hard to analyze / reverse-engineer
•  is not too big or too slow
Intuition: an obfuscator provides a “virtual blackbox” – O(P) is a blackbox that
computes P.
Why might obfuscators exist?
•  All canonical hard problems are problems of reverse engineering: SAT, HALTING
•  Rice’s Theorem: You can’t look at the code (Turing Machine description) of a function and find out
a non-trivial property of it.
A Virtual Blackbox
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 10
WHAT IS AN OBFUSCATOR?
 ON THE (IM)POSSIBILITY OF OBFUSCATION
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 11
Barak, et al. “On the (im)possibility of obfuscating programs.” 

– JACM 2002
Looks like bad news. Is obfuscation really impossible?
•  There is a family of efficient programs P that are not obfuscatable in the sense that
•  given any efficient program P′ that computes the same function as a program P ∈ P, 

secrets from the “source code” of P can be recovered, yet
•  given black box (oracle) access to a program P ∈ P, no efficient algorithm can reconstruct 

the secrets of P.
•  Definitions
•  Indistinguishability obfuscation – given any two equivalent circuits C0 and C1 of similar size, 

the obfuscations iO(C0) and iO(C1) are computationally indistinguishable.
•  Candidate iO functions have been described that are feasible, albeit impractical.
•  Apon et al (2014) – obfuscation of a 16 bit point function blows up to 31GB.
INDISTINGUISHABILITY OBFUSCATION
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 12
Garg, et al. “Candidate indistinguishability obfuscation
and functional encryption for all circuits.”
– FOCS 2013
There is hope that obfuscation in some form is possible!
“Standard” Assumption (e.g. LWE) 
“Most” of cryptography
+ OWFs
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 13
Indistinguishability
Obfuscation
VISION: IO AS HUB FOR CRYPTOGRAPHY
IO AS A HUB FOR CRYPTOGRAPHY
iO + One Way Functions gives 

Virtual Blackbox Cryptography

A great theoretical achievement,
but very far from being practical

© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 14
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 15
IO AS A HUB FOR CRYPTOGRAPHY
(IMAGE FROM BARAK 2016)
Indistinguishability
Obfuscators
Deniable 

Encryption
Public Key
Encryption
Short Signatures
Group Key
Exchange
Traitor Tracing
Oblivious
Transfer
Multiparty Secure
Computation
Non-interactive
Zero Knowledge
Identity-based
Encryption
Functional

Encryption
Source: Boaz Barak: Hopes, fears, and software obfuscation. Commun. ACM 59(3): 88-96 (2016)
•  Originally done for fun
•  International Obfuscated C Code Contest
•  Started in 1984, still going on
•  As a security mechanism
•  Make it hard to understand code, so it is hard to reverse engineer.
•  Reorder data
•  Changing encodings
•  Converting static data
to procedures
•  Replacing instructions
•  Opaque predicates
•  Inserting dead code
•  Inserting irrelevant code
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 16
OBFUSCATION IN PRACTICE
•  Reordering
•  Loop Transformations
•  Function splitting/recombination
•  Aliasing
•  Control flow obfuscation
•  Data flow obfuscation
•  Parallelized code
•  Name scrambling
•  Removing standard library calls
•  Breaking relations
•  Packing/encryption
•  Dynamic code modifications
•  Environmental requirements
•  Virtualization
•  Emulation
•  Anti-debugging techniques
Source: Passport photo of Alan Turing at age 16 (circa 1928) / 

Wikimedia Creative Commons (CC BY-SA 2.0)
Alan Turing (1912 – 1954)
•  What if we wanted to obfuscate a specific algorithm instead of using generic transformations 

on arbitrary algorithms? Could we provide better security?
•  In particular, can we do better on cryptographic algorithms? 

Cryptography is often the key to making applications secure.
•  The answer is yes. This is an active area of research.
Chow, et al (2002)
Implementations of AES
and DES
Billet, et al (2004)
Cryptanalysis of 

Chow’s algorithms
Bos, et al (2015)
Differential Code Analysis

Saniflex, et al (2015)
Differential Fault Analysis
CHES 2017
Challenge
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 17
WHITEBOX CRYPTOGRAPHY
WHO USES WHITEBOX SECURITY TODAY?
Connected Car
 Entertainment
Mobile Payments
 Medical
IoT
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 18
•  Can any theoretical method be made practical?
•  Can theoretical methods be built on stronger foundations?
•  In practice, is the cat-and-mouse game winnable?
•  Do we need entirely new techniques?
•  How do we address the overall security problem, including prevention 

of out-of-band and side-channel attacks?
•  Cryptography is (still) a robust and evolving discipline, with many interesting 

problems to solve.
© 2017 Intertrust Technologies Corporation. All Rights Reserved.
 19
WHAT IS THE FUTURE?
www.intertrust.com
THANK YOU
…and my thanks to Bill Horne, Steve Mitchell, and Tomas Sander 

for designing the talk and making the slides!

© 2017 Intertrust Technologies Corporation. All Rights Reserved.

More Related Content

What's hot

Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
Amit Rohatgi
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
Bryan Len
 
IOT Security
IOT SecurityIOT Security
IOT Security
Sylvain Martinez
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
African Cyber Security Summit
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
ForgeRock
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
Clare Nelson, CISSP, CIPP-E
 
Arnaud Thiercelin at AI Frontiers : AI in the Sky
Arnaud Thiercelin at AI Frontiers : AI in the SkyArnaud Thiercelin at AI Frontiers : AI in the Sky
Arnaud Thiercelin at AI Frontiers : AI in the Sky
AI Frontiers
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
 
Fixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoTFixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoT
NUS-ISS
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Design World
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
Gerry Elman
 
BlockchainLAB Hackathon
BlockchainLAB HackathonBlockchainLAB Hackathon
BlockchainLAB Hackathon
Aleksandr Kopnin
 
AI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OTAI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OT
Justin Hayward
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
EASTWEST Public Relations
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
Tutun Juhana
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Stanford School of Engineering
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
Rishabh Sharma
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
Leonardo De Moura Rocha Lima
 

What's hot (20)

Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
Arnaud Thiercelin at AI Frontiers : AI in the Sky
Arnaud Thiercelin at AI Frontiers : AI in the SkyArnaud Thiercelin at AI Frontiers : AI in the Sky
Arnaud Thiercelin at AI Frontiers : AI in the Sky
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
Fixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoTFixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoT
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
 
BlockchainLAB Hackathon
BlockchainLAB HackathonBlockchainLAB Hackathon
BlockchainLAB Hackathon
 
AI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OTAI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OT
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 

Viewers also liked

FIDO認証で「あんしんをもっと便利に」
FIDO認証で「あんしんをもっと便利に」FIDO認証で「あんしんをもっと便利に」
FIDO認証で「あんしんをもっと便利に」
LINE Corporation
 
Prometheus casual talk1
Prometheus casual talk1Prometheus casual talk1
Prometheus casual talk1
wyukawa
 
ゲーム開発を加速させる クライアントセキュリティ
ゲーム開発を加速させる クライアントセキュリティゲーム開発を加速させる クライアントセキュリティ
ゲーム開発を加速させる クライアントセキュリティ
LINE Corporation
 
Prometheus on AWS
Prometheus on AWSPrometheus on AWS
Prometheus on AWS
Mitsuhiro Tanda
 
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
Tokuhiro Matsuno
 
Monitoring Kafka w/ Prometheus
Monitoring Kafka w/ PrometheusMonitoring Kafka w/ Prometheus
Monitoring Kafka w/ Prometheus
kawamuray
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
FIDO Alliance
 

Viewers also liked (7)

FIDO認証で「あんしんをもっと便利に」
FIDO認証で「あんしんをもっと便利に」FIDO認証で「あんしんをもっと便利に」
FIDO認証で「あんしんをもっと便利に」
 
Prometheus casual talk1
Prometheus casual talk1Prometheus casual talk1
Prometheus casual talk1
 
ゲーム開発を加速させる クライアントセキュリティ
ゲーム開発を加速させる クライアントセキュリティゲーム開発を加速させる クライアントセキュリティ
ゲーム開発を加速させる クライアントセキュリティ
 
Prometheus on AWS
Prometheus on AWSPrometheus on AWS
Prometheus on AWS
 
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
promgen - prometheus managemnet tool / simpleclient_java hacks @ Prometheus c...
 
Monitoring Kafka w/ Prometheus
Monitoring Kafka w/ PrometheusMonitoring Kafka w/ Prometheus
Monitoring Kafka w/ Prometheus
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 

Similar to FRONTIERS IN CRYPTOGRAPHY

Cloud last
Cloud lastCloud last
Cloud last
Anmitas1
 
Oral.pptx
Oral.pptxOral.pptx
Oral.pptx
Sasal6
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
Our Concurrent Past; Our Distributed Future
Our Concurrent Past; Our Distributed FutureOur Concurrent Past; Our Distributed Future
Our Concurrent Past; Our Distributed Future
C4Media
 
DevSecOps and Drupal: Securing your applications in a modern IT landscape
DevSecOps and Drupal: Securing your applications in a modern IT landscapeDevSecOps and Drupal: Securing your applications in a modern IT landscape
DevSecOps and Drupal: Securing your applications in a modern IT landscape
Will Hall
 
2016 05 sanger
2016 05 sanger2016 05 sanger
2016 05 sanger
Chris Dwan
 
Oral.pptx
Oral.pptxOral.pptx
Oral.pptx
Sasal6
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
archana lisbon
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
Daniel Miessler
 
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREDESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREAyanda Demilade
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12Arindam Paul
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
FRSecure
 
How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?
Amazon Web Services
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
AliSalman110
 
Software Preservation: challenges and opportunities for reproductibility (Sci...
Software Preservation: challenges and opportunities for reproductibility (Sci...Software Preservation: challenges and opportunities for reproductibility (Sci...
Software Preservation: challenges and opportunities for reproductibility (Sci...
Roberto Di Cosmo
 
ScilabTEC 2015 - Irill
ScilabTEC 2015 - IrillScilabTEC 2015 - Irill
ScilabTEC 2015 - Irill
Scilab
 
Ppsp icassp17v10
Ppsp icassp17v10Ppsp icassp17v10
Ppsp icassp17v10
Gérard Chollet
 
Long Life Software
Long Life SoftwareLong Life Software
Long Life Software
Mike Long
 
Building cloud-enabled genomics workflows with Luigi and Docker
Building cloud-enabled genomics workflows with Luigi and DockerBuilding cloud-enabled genomics workflows with Luigi and Docker
Building cloud-enabled genomics workflows with Luigi and Docker
Jacob Feala
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
Journal For Research
 

Similar to FRONTIERS IN CRYPTOGRAPHY (20)

Cloud last
Cloud lastCloud last
Cloud last
 
Oral.pptx
Oral.pptxOral.pptx
Oral.pptx
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Our Concurrent Past; Our Distributed Future
Our Concurrent Past; Our Distributed FutureOur Concurrent Past; Our Distributed Future
Our Concurrent Past; Our Distributed Future
 
DevSecOps and Drupal: Securing your applications in a modern IT landscape
DevSecOps and Drupal: Securing your applications in a modern IT landscapeDevSecOps and Drupal: Securing your applications in a modern IT landscape
DevSecOps and Drupal: Securing your applications in a modern IT landscape
 
2016 05 sanger
2016 05 sanger2016 05 sanger
2016 05 sanger
 
Oral.pptx
Oral.pptxOral.pptx
Oral.pptx
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
 
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREDESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
 
How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?How Can We Answer the Really BIG Questions?
How Can We Answer the Really BIG Questions?
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Software Preservation: challenges and opportunities for reproductibility (Sci...
Software Preservation: challenges and opportunities for reproductibility (Sci...Software Preservation: challenges and opportunities for reproductibility (Sci...
Software Preservation: challenges and opportunities for reproductibility (Sci...
 
ScilabTEC 2015 - Irill
ScilabTEC 2015 - IrillScilabTEC 2015 - Irill
ScilabTEC 2015 - Irill
 
Ppsp icassp17v10
Ppsp icassp17v10Ppsp icassp17v10
Ppsp icassp17v10
 
Long Life Software
Long Life SoftwareLong Life Software
Long Life Software
 
Building cloud-enabled genomics workflows with Luigi and Docker
Building cloud-enabled genomics workflows with Luigi and DockerBuilding cloud-enabled genomics workflows with Luigi and Docker
Building cloud-enabled genomics workflows with Luigi and Docker
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
 

More from LINE Corporation

JJUG CCC 2018 Fall 懇親会LT
JJUG CCC 2018 Fall 懇親会LTJJUG CCC 2018 Fall 懇親会LT
JJUG CCC 2018 Fall 懇親会LT
LINE Corporation
 
Reduce dependency on Rx with Kotlin Coroutines
Reduce dependency on Rx with Kotlin CoroutinesReduce dependency on Rx with Kotlin Coroutines
Reduce dependency on Rx with Kotlin Coroutines
LINE Corporation
 
Kotlin/NativeでAndroidのNativeメソッドを実装してみた
Kotlin/NativeでAndroidのNativeメソッドを実装してみたKotlin/NativeでAndroidのNativeメソッドを実装してみた
Kotlin/NativeでAndroidのNativeメソッドを実装してみた
LINE Corporation
 
Use Kotlin scripts and Clova SDK to build your Clova extension
Use Kotlin scripts and Clova SDK to build your Clova extensionUse Kotlin scripts and Clova SDK to build your Clova extension
Use Kotlin scripts and Clova SDK to build your Clova extension
LINE Corporation
 
The Magic of LINE 購物 Testing
The Magic of LINE 購物 TestingThe Magic of LINE 購物 Testing
The Magic of LINE 購物 Testing
LINE Corporation
 
GA Test Automation
GA Test AutomationGA Test Automation
GA Test Automation
LINE Corporation
 
UI Automation Test with JUnit5
UI Automation Test with JUnit5UI Automation Test with JUnit5
UI Automation Test with JUnit5
LINE Corporation
 
Feature Detection for UI Testing
Feature Detection for UI TestingFeature Detection for UI Testing
Feature Detection for UI Testing
LINE Corporation
 
LINE 新星計劃介紹與新創團隊分享
LINE 新星計劃介紹與新創團隊分享LINE 新星計劃介紹與新創團隊分享
LINE 新星計劃介紹與新創團隊分享
LINE Corporation
 
​LINE 技術合作夥伴與應用分享
​LINE 技術合作夥伴與應用分享​LINE 技術合作夥伴與應用分享
​LINE 技術合作夥伴與應用分享
LINE Corporation
 
LINE 開發者社群經營與技術推廣
LINE 開發者社群經營與技術推廣LINE 開發者社群經營與技術推廣
LINE 開發者社群經營與技術推廣
LINE Corporation
 
日本開發者大會短講分享
日本開發者大會短講分享日本開發者大會短講分享
日本開發者大會短講分享
LINE Corporation
 
LINE Chatbot - 活動報名報到設計分享
LINE Chatbot - 活動報名報到設計分享LINE Chatbot - 活動報名報到設計分享
LINE Chatbot - 活動報名報到設計分享
LINE Corporation
 
在 LINE 私有雲中使用 Managed Kubernetes
在 LINE 私有雲中使用 Managed Kubernetes在 LINE 私有雲中使用 Managed Kubernetes
在 LINE 私有雲中使用 Managed Kubernetes
LINE Corporation
 
LINE TODAY高效率的敏捷測試開發技巧
LINE TODAY高效率的敏捷測試開發技巧LINE TODAY高效率的敏捷測試開發技巧
LINE TODAY高效率的敏捷測試開發技巧
LINE Corporation
 
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
LINE Corporation
 
LINE Things - LINE IoT平台新技術分享
LINE Things - LINE IoT平台新技術分享LINE Things - LINE IoT平台新技術分享
LINE Things - LINE IoT平台新技術分享
LINE Corporation
 
LINE Pay - 一卡通支付新體驗
LINE Pay - 一卡通支付新體驗LINE Pay - 一卡通支付新體驗
LINE Pay - 一卡通支付新體驗
LINE Corporation
 
LINE Platform API Update - 打造一個更好的Chatbot服務
LINE Platform API Update - 打造一個更好的Chatbot服務LINE Platform API Update - 打造一個更好的Chatbot服務
LINE Platform API Update - 打造一個更好的Chatbot服務
LINE Corporation
 
Keynote - ​LINE 的技術策略佈局與跨國產品開發
Keynote - ​LINE 的技術策略佈局與跨國產品開發Keynote - ​LINE 的技術策略佈局與跨國產品開發
Keynote - ​LINE 的技術策略佈局與跨國產品開發
LINE Corporation
 

More from LINE Corporation (20)

JJUG CCC 2018 Fall 懇親会LT
JJUG CCC 2018 Fall 懇親会LTJJUG CCC 2018 Fall 懇親会LT
JJUG CCC 2018 Fall 懇親会LT
 
Reduce dependency on Rx with Kotlin Coroutines
Reduce dependency on Rx with Kotlin CoroutinesReduce dependency on Rx with Kotlin Coroutines
Reduce dependency on Rx with Kotlin Coroutines
 
Kotlin/NativeでAndroidのNativeメソッドを実装してみた
Kotlin/NativeでAndroidのNativeメソッドを実装してみたKotlin/NativeでAndroidのNativeメソッドを実装してみた
Kotlin/NativeでAndroidのNativeメソッドを実装してみた
 
Use Kotlin scripts and Clova SDK to build your Clova extension
Use Kotlin scripts and Clova SDK to build your Clova extensionUse Kotlin scripts and Clova SDK to build your Clova extension
Use Kotlin scripts and Clova SDK to build your Clova extension
 
The Magic of LINE 購物 Testing
The Magic of LINE 購物 TestingThe Magic of LINE 購物 Testing
The Magic of LINE 購物 Testing
 
GA Test Automation
GA Test AutomationGA Test Automation
GA Test Automation
 
UI Automation Test with JUnit5
UI Automation Test with JUnit5UI Automation Test with JUnit5
UI Automation Test with JUnit5
 
Feature Detection for UI Testing
Feature Detection for UI TestingFeature Detection for UI Testing
Feature Detection for UI Testing
 
LINE 新星計劃介紹與新創團隊分享
LINE 新星計劃介紹與新創團隊分享LINE 新星計劃介紹與新創團隊分享
LINE 新星計劃介紹與新創團隊分享
 
​LINE 技術合作夥伴與應用分享
​LINE 技術合作夥伴與應用分享​LINE 技術合作夥伴與應用分享
​LINE 技術合作夥伴與應用分享
 
LINE 開發者社群經營與技術推廣
LINE 開發者社群經營與技術推廣LINE 開發者社群經營與技術推廣
LINE 開發者社群經營與技術推廣
 
日本開發者大會短講分享
日本開發者大會短講分享日本開發者大會短講分享
日本開發者大會短講分享
 
LINE Chatbot - 活動報名報到設計分享
LINE Chatbot - 活動報名報到設計分享LINE Chatbot - 活動報名報到設計分享
LINE Chatbot - 活動報名報到設計分享
 
在 LINE 私有雲中使用 Managed Kubernetes
在 LINE 私有雲中使用 Managed Kubernetes在 LINE 私有雲中使用 Managed Kubernetes
在 LINE 私有雲中使用 Managed Kubernetes
 
LINE TODAY高效率的敏捷測試開發技巧
LINE TODAY高效率的敏捷測試開發技巧LINE TODAY高效率的敏捷測試開發技巧
LINE TODAY高效率的敏捷測試開發技巧
 
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
LINE 區塊鏈平台及代幣經濟 - LINK Chain及LINK介紹
 
LINE Things - LINE IoT平台新技術分享
LINE Things - LINE IoT平台新技術分享LINE Things - LINE IoT平台新技術分享
LINE Things - LINE IoT平台新技術分享
 
LINE Pay - 一卡通支付新體驗
LINE Pay - 一卡通支付新體驗LINE Pay - 一卡通支付新體驗
LINE Pay - 一卡通支付新體驗
 
LINE Platform API Update - 打造一個更好的Chatbot服務
LINE Platform API Update - 打造一個更好的Chatbot服務LINE Platform API Update - 打造一個更好的Chatbot服務
LINE Platform API Update - 打造一個更好的Chatbot服務
 
Keynote - ​LINE 的技術策略佈局與跨國產品開發
Keynote - ​LINE 的技術策略佈局與跨國產品開發Keynote - ​LINE 的技術策略佈局與跨國產品開發
Keynote - ​LINE 的技術策略佈局與跨國產品開發
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 

FRONTIERS IN CRYPTOGRAPHY

  • 1. FRONTIERS IN CRYPTOGRAPHY May 2017 Robert E. Tarjan Chief Scientist, Intertrust Technologies James S. McDonnell Distinguished University Professor 
 of Computer Science, Princeton University Whitebox Security
  • 2. OUTLINE •  The Public Key Cryptography Revolution •  Blackbox vs. whitebox threat models •  Obfuscation •  Theoretical results •  Practical implementations •  Whitebox Cryptography •  A specific kind of obfuscation, specifically for cryptography •  The Future © 2017 Intertrust Technologies Corporation. All Rights Reserved. 2
  • 3. IN THE BEGINNING… …there was symmetric key cryptography. But how could the parties agree on keys? SECURE COMMUNICATION OUT OF BAND KEY AGREEMENT © 2017 Intertrust Technologies Corporation. All Rights Reserved. 3
  • 4. Proposed by Diffie and Hellman (1976) First practical public key cryptosystem RSA (1978) PUBLIC KEY CRYPTOGRAPY Alice’s PRIVATE key Alice’s PUBLIC key Bob’s PUBLIC key Bob’s PRIVATE key © 2017 Intertrust Technologies Corporation. All Rights Reserved. 4 SECURE COMMUNICATION
  • 5. Protected Environment Managed Device Crypto Library Protected Environment Managed Device Crypto Library The communication channel is protected with cryptography. The cryptographic key used at the endpoints is assumed to be protected by other means. The attacker can’t look into that crypto library. It’s a “black box”. BLACKBOX SECURITY ASSUMPTION © 2017 Intertrust Technologies Corporation. All Rights Reserved. 5 SECURE COMMUNICATION
  • 6. Unprotected Environment Unmanaged Device Crypto Library The attacker can look into the crypto library. How do we secure the key? WHITEBOX © 2017 Intertrust Technologies Corporation. All Rights Reserved. 6 SECURE COMMUNICATION Cloud Services
  • 7. Unprotected Environment Unmanaged Device Crypto Library Put the key back into a Blackbox! HARDWARE SECURITY © 2017 Intertrust Technologies Corporation. All Rights Reserved. 7 Cloud ServicesSECURE COMMUNICATION Blackbox
  • 8. PROBLEMS WITH HARDWARE SECURITY Therefore, whitebox security solutions will continue to be important! © 2017 Intertrust Technologies Corporation. All Rights Reserved. 8 •  Attacks do exist •  Exploiting vulnerabilities 
 (e.g. backdoors, update mechanisms, cold boot attacks) •  Differential power analysis (Kocher, et al, CRYPTO ’99) •  Recovery •  Hardware is hard to update if compromised •  But software can be patched •  Priorities •  Users want cost savings and speed •  Security is often secondary Source: SPA trace showing an entire DES operation / 
 (December 14, 2010) by Mad fab / Wikimedia Creative Commons (CC BY-SA 2.0)
  • 9. Provable security guarantees Very expensive for skilled attackers to succeed Lots of computation 
 and space required Must be fast and use limited memory Security Practice Theory Performance © 2017 Intertrust Technologies Corporation. All Rights Reserved. 9 THEORY VS. PRACTICE
  • 10. Obfuscator: An algorithm O such that for any program P, O(P) is a program that: •  computes the same function as P •  is hard to analyze / reverse-engineer •  is not too big or too slow Intuition: an obfuscator provides a “virtual blackbox” – O(P) is a blackbox that computes P. Why might obfuscators exist? •  All canonical hard problems are problems of reverse engineering: SAT, HALTING •  Rice’s Theorem: You can’t look at the code (Turing Machine description) of a function and find out a non-trivial property of it. A Virtual Blackbox © 2017 Intertrust Technologies Corporation. All Rights Reserved. 10 WHAT IS AN OBFUSCATOR?
  • 11.  ON THE (IM)POSSIBILITY OF OBFUSCATION © 2017 Intertrust Technologies Corporation. All Rights Reserved. 11 Barak, et al. “On the (im)possibility of obfuscating programs.” 
 – JACM 2002 Looks like bad news. Is obfuscation really impossible? •  There is a family of efficient programs P that are not obfuscatable in the sense that •  given any efficient program P′ that computes the same function as a program P ∈ P, 
 secrets from the “source code” of P can be recovered, yet •  given black box (oracle) access to a program P ∈ P, no efficient algorithm can reconstruct 
 the secrets of P.
  • 12. •  Definitions •  Indistinguishability obfuscation – given any two equivalent circuits C0 and C1 of similar size, 
 the obfuscations iO(C0) and iO(C1) are computationally indistinguishable. •  Candidate iO functions have been described that are feasible, albeit impractical. •  Apon et al (2014) – obfuscation of a 16 bit point function blows up to 31GB. INDISTINGUISHABILITY OBFUSCATION © 2017 Intertrust Technologies Corporation. All Rights Reserved. 12 Garg, et al. “Candidate indistinguishability obfuscation and functional encryption for all circuits.” – FOCS 2013 There is hope that obfuscation in some form is possible!
  • 13. “Standard” Assumption (e.g. LWE) “Most” of cryptography + OWFs © 2017 Intertrust Technologies Corporation. All Rights Reserved. 13 Indistinguishability Obfuscation VISION: IO AS HUB FOR CRYPTOGRAPHY
  • 14. IO AS A HUB FOR CRYPTOGRAPHY iO + One Way Functions gives 
 Virtual Blackbox Cryptography A great theoretical achievement, but very far from being practical © 2017 Intertrust Technologies Corporation. All Rights Reserved. 14
  • 15. © 2017 Intertrust Technologies Corporation. All Rights Reserved. 15 IO AS A HUB FOR CRYPTOGRAPHY (IMAGE FROM BARAK 2016) Indistinguishability Obfuscators Deniable 
 Encryption Public Key Encryption Short Signatures Group Key Exchange Traitor Tracing Oblivious Transfer Multiparty Secure Computation Non-interactive Zero Knowledge Identity-based Encryption Functional
 Encryption Source: Boaz Barak: Hopes, fears, and software obfuscation. Commun. ACM 59(3): 88-96 (2016)
  • 16. •  Originally done for fun •  International Obfuscated C Code Contest •  Started in 1984, still going on •  As a security mechanism •  Make it hard to understand code, so it is hard to reverse engineer. •  Reorder data •  Changing encodings •  Converting static data to procedures •  Replacing instructions •  Opaque predicates •  Inserting dead code •  Inserting irrelevant code © 2017 Intertrust Technologies Corporation. All Rights Reserved. 16 OBFUSCATION IN PRACTICE •  Reordering •  Loop Transformations •  Function splitting/recombination •  Aliasing •  Control flow obfuscation •  Data flow obfuscation •  Parallelized code •  Name scrambling •  Removing standard library calls •  Breaking relations •  Packing/encryption •  Dynamic code modifications •  Environmental requirements •  Virtualization •  Emulation •  Anti-debugging techniques Source: Passport photo of Alan Turing at age 16 (circa 1928) / 
 Wikimedia Creative Commons (CC BY-SA 2.0) Alan Turing (1912 – 1954)
  • 17. •  What if we wanted to obfuscate a specific algorithm instead of using generic transformations 
 on arbitrary algorithms? Could we provide better security? •  In particular, can we do better on cryptographic algorithms? 
 Cryptography is often the key to making applications secure. •  The answer is yes. This is an active area of research. Chow, et al (2002) Implementations of AES and DES Billet, et al (2004) Cryptanalysis of 
 Chow’s algorithms Bos, et al (2015) Differential Code Analysis Saniflex, et al (2015) Differential Fault Analysis CHES 2017 Challenge © 2017 Intertrust Technologies Corporation. All Rights Reserved. 17 WHITEBOX CRYPTOGRAPHY
  • 18. WHO USES WHITEBOX SECURITY TODAY? Connected Car Entertainment Mobile Payments Medical IoT © 2017 Intertrust Technologies Corporation. All Rights Reserved. 18
  • 19. •  Can any theoretical method be made practical? •  Can theoretical methods be built on stronger foundations? •  In practice, is the cat-and-mouse game winnable? •  Do we need entirely new techniques? •  How do we address the overall security problem, including prevention 
 of out-of-band and side-channel attacks? •  Cryptography is (still) a robust and evolving discipline, with many interesting 
 problems to solve. © 2017 Intertrust Technologies Corporation. All Rights Reserved. 19 WHAT IS THE FUTURE?
  • 20. www.intertrust.com THANK YOU …and my thanks to Bill Horne, Steve Mitchell, and Tomas Sander 
 for designing the talk and making the slides! © 2017 Intertrust Technologies Corporation. All Rights Reserved.