SlideShare a Scribd company logo
Klaus Schmeh
www.schmeh.org
September 12-14, 2018
How to Explain Post-
Quantum Cryptography to a
Middle School Student
My first
guest is ...
A quantum
computer! Hi!
Let me
introduce you.
Quantum
Computer
Based on
quantum
mechanics
Quantum bit can
have two values
at the same time
(superposition)
Performing
extremely many
computations in
parallel, if there is
only one result
What are you good at?
Examples:
• Find element in large set
• Find optimal solution
What are you not good at?
Sorting.
Because sorting
requires more than
one result.
What are you excellent at?
Prime factorization!
Prime Multiplication
1723 = ? 377 = ??
Prime Factorization
easy difficult
Prime Multiplication
is a one-way
function
RSA crypto system is based
on prime multiplication
1723 =
391
Alice's public keyAlice's private key
Prime numbers used in
practice have >500 digits
Up to a key
length of 5 bits.
Future versions will be
more powerful.
I can break RSA within
seconds.
Thanks for coming!
We need to study quantum-
proof alternatives!
RSA and some other encryption methods can
be broken by a quantum computer!
Six crypto system families are
believed to be quantum proof.
lattice-based
crypto
non-commutative
crypto
multivariate
crypto
code-based
crypto
hash-based
crypto
None of them is in
wide-spread use so far.
isogeny-based
crypto
I can only cover
four today.
US authority NIST has
started a competition! NIST post quantum competition
69 algorithms submitted
The best ones shall be
chosen until around 2023
And now welcome!
Mr. Snail!
Can you explain lattice-
based crypto to us?
lattice-based
crypto
I even can explain
lettuce-based
cryptography.
I prefer lettuce
to lattice.
Lattice pointsLattice
Lettuce field Lettuce points
a
b
Base vectors
d
c
Base vectors
"Good" base
(nearly orthogonal)
"Bad" base
(nearly parallel)
The "closest
lettuce" problem
Which lettuce point is
closest to the snail?
a
b Easy to answer, if good
base is known
d
c
Hard to answer, if only
bad base is known
Easy to answer for two-
dimensional lettuce fields
But if we deal with
250 dimensions?
This can be
regarded as one-
way function
Placing a snail next to
a lattuce point is easy
Finding the closest
lattuce point is difficult
(if only bad base is
available)
d
c
Goldreich–Goldwasser–Halevi (GGH) encryption
Let's now look at a
lettuce-based
encryption scheme!
Message
b
a
Alice's private key
good base
d
c
Alice's public key
bad base
Bob
Alice can decrypt
because she
knows good base
Can GGH be broken with a
quantum computer?
No.
Is GGH a good
scheme? No, it is broken.
But there are
other lettuce
methods.
For instance Learning with
Errors (LWE) methods.
At first sight, LWE
has nothing to do
with lattices ...
294·x + 629·y + 321·z = 38 (mod 797)
701·x + 29·y + 91·z = 462 (mod 797)
613·x + 339·y + 201·z = 636 (mod 797)
256·x + 94·y + 115·z = 522 (mod 797)
704·x + 629·y + 322·z = 477 (mod 797)
391·x + 23·y + 743·z = 213 (mod 797)
290·x + 620·y + 201·z = 40 (mod 797)
211·x + 339·y + 381·z = 510 (mod 797)
Let's look at this
system of equations!
There are
more
equations
than
variables
It is solvable anyway: x=3,
y=7, z=6!
294·x + 629·y + 321·z = 38 (mod 797)
701·x + 29·y + 91·z = 462 (mod 797)
613·x + 339·y + 201·z = 636 (mod 797)
256·x + 94·y + 115·z = 522 (mod 797)
704·x + 629·y + 322·z = 477 (mod 797)
391·x + 23·y + 743·z = 213 (mod 797)
290·x + 620·y + 201·z = 40 (mod 797)
211·x + 339·y + 381·z = 510 (mod 797)
+1
-2
+1
-1
+1
+2
Error
Let's add a few
errors to the
right side!
Errors are small!
294·x + 629·y + 321·z = 38 (mod 797)
701·x + 29·y + 91·z = 462 (mod 797)
613·x + 339·y + 201·z = 636 (mod 797)
256·x + 94·y + 115·z = 522 (mod 797)
704·x + 629·y + 322·z = 477 (mod 797)
391·x + 23·y + 743·z = 213 (mod 797)
290·x + 620·y + 201·z = 40 (mod 797)
211·x + 339·y + 381·z = 510 (mod 797)
+1
-2
+1
-1
+1
+2
Can the errors be
detected without
knowing x, y, and
z?
39
460
523
212
42
511
636
477
Let's assume, only the
incorrect results are
known.
Learning with Errors (LWE) problem
Yes, but it's laborious!
This leads us to a
one-way function!
Adding errors to an equation system is simple Finding these errors is difficult
This can be used for asymmetric encryption!
Learning with Errors one-way function
294·x + 629·y + 321·z = 39 (mod 797)
701·x + 29·y + 91·z = 460 (mod 797)
613·x + 339·y + 201·z = 636 (mod 797)
256·x + 94·y + 115·z = 523 (mod 797)
704·x + 629·y + 322·z = 477 (mod 797)
391·x + 23·y + 743·z = 212 (mod 797)
290·x + 620·y + 201·z = 42 (mod 797)
211·x + 339·y + 381·z = 511 (mod 797)
The Regev
encryption scheme
Alices public key:
Alices private Key: x=3, y=7, z=6
Bob
294·x + 629·y + 321·z = 39 (mod 797)
701·x + 29·y + 91·z = 460 (mod 797)
613·x + 339·y + 201·z = 636 (mod 797)
256·x + 94·y + 115·z = 523 (mod 797)
704·x + 629·y + 322·z = 477 (mod 797)
391·x + 23·y + 743·z = 212 (mod 797)
290·x + 620·y + 201·z = 42 (mod 797)
211·x + 339·y + 381·z = 511 (mod 797)
701·x + 29·y + 91·z = 460 (mod 797)
256·x + 94·y + 115·z = 523 (mod 797)
704·x + 629·y + 322·z = 477 (mod 797)
391·x + 23·y + 743·z = 212 (mod 797)
211·x + 339·y + 381·z = 511 (mod 797)
+ + + +
+ + + +
= = = =
400·x + 791·y + 723·z = 717 (mod 797)
Bob
Alices private Key: x=3, y=7, z=6
Alices public Key:
If Bob wants to encrypt 0:
he adds 1 to the result
If Bob wants to encrypt 1:
he adds 399 to the result
How Bob encrypts one bit
400·x + 791·y + 723·z = 718 (mod 797) 400·x + 791·y + 723·z = 319 (mod 797)
400·x + 791·y + 723·z = 717 (mod 797)
Knows x,y and z
She can easily check if error in result
(718 or 319) is small or great
Alice
Bob
Attacker needs to solve the LWE problem
small error great error
Nice algorithm, but it
encrypts only one bit.
Yes, but there are more
powerful LWE schemes.
An what has Regev to do
with lattices?
I'll show
you.
An equation system
can be thought of
as lettuce field.
Each
column
is a
vector
Attacker needs to solve the closest lettuce problem
Encryption
0: snail close to lettuce
1: halfway between two lettuces
Decryption
Alice knows x, y and z
 she knows the lettuce point
 She can tell if message is 0 or 1
Message=0
Message=1
Are there other lettuce-
based systems? Yes, NTRU, Peikert,
New Hope, ...
There are many of this kind
in the competition. NIST post quantum competition
69 algorithms submitted
Lattice
27
Lettuce
Thanks, Mr.
Snail!
code-based
crypto
Our next guest is a
rocket scientist. Hi!
Explain what an error
correction code is!
code-based
crypto
010100100101001101010101
How can we avoid
transmission errors?
Parity bits
01010011 00101000 11000101
Error detection code
1
010100100101001101010101
Alternative
Transmit-three-times code
01010010 01010010 01010010
Error correction code
1
Transmit-three-times code
01010010 01010010 01010010
Error correction code
We need better error correction
codes than this one.
This isn't rocket
science!
Error correction code
1 0 1 0 1 1 1 1 1 0 1 0 1 1
Linear error
correction code
5 bit 9 bit
1 0 1 0 1 1 1 1 0 1 0 1 1 0
Linear error
correction code
4 bit 10 bit
Maximum of errors corrected:  overhead/2
Linear error
correction codes
1 0 1 0 1 1 1 1 1 0 1 0 1 1
Error correction
code
5 bit 9 bit
1 0 1 0 1
1 0 1 0 1 1 0 1
1 0 1 0 1 1 0 1
0 0 1 0 0 1 0 1
0 0 1 0 1 0 0 1
1 0 1 0 1 1 0 1
1 1 1 1 0 1 0 1 1 1=·
How a linear
error correction
code works.
59 matrix
Adding errors
is easy
Here is a one-
way function!
Finding these
errors is difficult
1011001010101010010101 ... 100
Error
correction
code
01001010 ... 010 0 0 1
In general, there
are exceptions
McEliece Crypto System
Easy error
correction code
1 0 1 0 1 1 0 1
0 0 1 0 1 1 0 0
0 0 1 0 0 1 0 1
1 0 0 0 1 0 0 0
0 0 1 1 1 1 0 1
Alices public key
Difficult error
correction code
=
0 0 1 0 1 1 0 1
1 0 1 0 1 1 0 1
0 0 1 0 0 1 0 1
1 0 1 0 1 1 0 1
1 0 1 0 1 0 0 1
Now we use this
for encryption! There are linear codes, for
which error finding is easy
Alices private key
1 0 1 0 1 1 0 1
1 0 1 0 1 1 0 1
0 0 1 0 0 1 0 1
0 0 1 0 1 0 0 1
1 0 1 0 1 1 0 1
blinding
matrix
0 0 1 0 1 1 0 1
1 0 1 1 1 1 0 1
0 1 1 0 0 1 0 1
0 0 1 0 1 0 0 1
1 0 1 0 0 1 0 0
blinding
matrix
Here's how
to encrypt
Ciphertext
10100110101011011101111011010011010101101110111101
Random number
010111101010110111011110110100010111101010110111011110110001101010110111011110111010101101110111101
McEliece Encryption
Difficult error
correction code
Alices public key
0 0 0 0 0111 1 1
Bob
Introduces errors
(plaintext)
1 0 1 0 1 1 0 1
1 0 1 0 1 1 0 1
0 0 1 0 0 1 0 1
0 0 1 0 1 0 0 1
1 0 1 0 1 1 0 1
Can find errors
(=plaintext) with easy
error correction code
Alice
overhead: 1547 bit
5413 bit
Alices Public Key
0101111010101101110111101101000101111010101101110111101100011010101..............1110111010101101110111101
6960 bit
Bob introduces 119 errors
0 0 0 0 0111 1 1
010111101010110111011110110101011011101111011000110101011011................10101101110111101
Size of public key: about 1MB
Parameters
in practice
NIST post quantum competition
69 algorithms submitted
Lattice
Code
27
21
Lettuce
21 algorithms in the
competition are code-based.
NIST post quantum competition
69 algorithms submitted
Lattice
Code
27
21
Lettuce
Thanks for coming,
Mr. rocket scientist.
And now, please
welcome ...
Mr. Rubik's
Cube.
Hi!
What's your post quantum
crypto method?
Non-commutative
crypto.
Move sequence examples
C
Let me first explain
Rubik's Cube move
sequences.
B
A
A
B
A+B
Move Sequence Addition
Addition means
concatenation.
not commutative
A+B = B+A
B+A
Move Sequence Addition
A
B
A+B
Let's do
another one.
Move Elimination
Let's look at
opposite moves.
A  B
opposite moves eliminate
each other
Move Sequence Negation
A
A-A
Move sequences
can be negated.
elimination
-A
(opposite moves, reverse order)
A-A = 0
eliminations
elimination
Conjugacy Problem
Difficult to solve it
Here's a one-
way function.
A: move sequence
B: move sequence
A B
=
-XX
? ? ? ???
Find X, for which X+A-X = B
Easy to set up such a problem
Equal
Can be used
as key
Stickel Key Exchange
Eavesdropper needs to solve
the conjugacy problem
Alice
Private key:
m, n
Bob
Private key:
r,s
m A + n B
r A + s B
K = mA+rA + sB+nB K = rA+mA + nB+sB
A quantum-
proof key
exchange
A: move sequence
B: move sequence
Similar to
Diffie-Hellman
(not quantum-
proof)
NIST post quantum competition
69 algorithms submitted
Lattice
Code
Non-commutative
27
21
1 Lettuce
Only one non-commutative algorithm,
but no Rubik's Cube algorithm.
NIST post quantum competition
69 algorithms submitted
Lattice
Code
Non-commutative
27
21
1 Lettuce
You're
welcome! Bye.
Thanks, Mr.
Rubik's Cube!
And now welcome
an island salesman!
Hi!
$15000
Tell us what
happened recently. $15000
Yes. But can I
look at it first?
Would you like to
buy an island?
$10000
$15000
Yes, I buy / No, I don't
Both can cheat!
Alice can send a yes and
later say it was a no.
The salesman can say "it was a yes",
though it was a no.
Yes, I buy.
Alice
No, I don't buy.
Alice
Safe 1 Safe 2
Combination safe 1
or
Combination safe 2
Alices
private
key
Alices
public
key
Alice has to reveal half of
her private key
=> She can use it only once
No, I don't buy.
Alice
Yes, I buy.
Alice
This scheme can also be
used in a digital way.
Hash-based signatures
One-way function
(e.g. SHA-2)
Random number 2
Random number 2
Hashing value of
random number 1
Hashing value of
random number 2
For signing a bit, Alice publishes
message 1 or message 2
Alices
private
key
Alices
public
key
Hash-based signaturesHash-based signatures
are quantum-proof!
Can be made more effective
However: keys are long and
can only be used once
NIST post quantum competition
69 algorithms submitted
Lattice
Code
Non-commutative
Hash
27
21
2 Lettuce1
Two of the algorithms in the
competition are hash-based.
NIST post quantum competition
69 algorithms submitted
Thanks, Mr.
salesman!
Lattice
Code
Non-commutative
Hash
27
21
2 Lettuce1
One more look at
the competition NIST post quantum competition
69 algorithms submitted
Lattice
Code
Multivariate
Non-commutative
Hash
Others
27
21
11
1
62
Isogeny
Lettuce
This was our post
quantum overview. NIST post quantum competition
69 algorithms submitted
Lattice
Code
Multivariate
Non-commutative
Hash
Others
27
21
11
1
62
I'm sure, we'll see
some of these
algorithms in practice.
Isogeny
Lettuce
Good-bye!

More Related Content

Similar to How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus Schmeh - 44CON 2018

There are two types of ciphers - Block and Stream. Block is used to .docx
There are two types of ciphers - Block and Stream. Block is used to .docxThere are two types of ciphers - Block and Stream. Block is used to .docx
There are two types of ciphers - Block and Stream. Block is used to .docx
relaine1
 
Hunting primes (a caccia di primi) 27 ott 2014
Hunting primes (a caccia di primi)   27 ott 2014Hunting primes (a caccia di primi)   27 ott 2014
Hunting primes (a caccia di primi) 27 ott 2014
Vincenzo Sambito
 
Understanding Reed-Solomon code
Understanding Reed-Solomon codeUnderstanding Reed-Solomon code
Understanding Reed-Solomon code
继顺(Jeffrey) 王
 
Deep Learning and Design Thinking
Deep Learning and Design ThinkingDeep Learning and Design Thinking
Deep Learning and Design Thinking
Yen-lung Tsai
 
Ekon24 from Delphi to AVX2
Ekon24 from Delphi to AVX2Ekon24 from Delphi to AVX2
Ekon24 from Delphi to AVX2
Arnaud Bouchez
 
Part Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsPart Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digits
johnhwoodsslideshare
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
Kai Koenig
 
Engineering Fast Indexes for Big-Data Applications: Spark Summit East talk by...
Engineering Fast Indexes for Big-Data Applications: Spark Summit East talk by...Engineering Fast Indexes for Big-Data Applications: Spark Summit East talk by...
Engineering Fast Indexes for Big-Data Applications: Spark Summit East talk by...
Spark Summit
 
Engineering fast indexes (Deepdive)
Engineering fast indexes (Deepdive)Engineering fast indexes (Deepdive)
Engineering fast indexes (Deepdive)
Daniel Lemire
 
Neural networks - BigSkyDevCon
Neural networks - BigSkyDevConNeural networks - BigSkyDevCon
Neural networks - BigSkyDevCon
ryanstout
 
Cryptography: way to Arkham - Andriy Savchenko
Cryptography: way to Arkham - Andriy SavchenkoCryptography: way to Arkham - Andriy Savchenko
Cryptography: way to Arkham - Andriy Savchenko
Ruby Meditation
 
Money Manager Presentation-2.pptx
Money Manager Presentation-2.pptxMoney Manager Presentation-2.pptx
Money Manager Presentation-2.pptx
20CE112YASHPATEL
 
Tokyo APAC Groundbreakers tour - The Complete Java Developer
Tokyo APAC Groundbreakers tour - The Complete Java DeveloperTokyo APAC Groundbreakers tour - The Complete Java Developer
Tokyo APAC Groundbreakers tour - The Complete Java Developer
Connor McDonald
 
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
All Things Open
 
Zero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workZero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they work
All Things Open
 
Cryptography (under)engineering
Cryptography (under)engineeringCryptography (under)engineering
Cryptography (under)engineering
slicklash
 
Error detection enhanced decoding of difference set codes for memory applicat...
Error detection enhanced decoding of difference set codes for memory applicat...Error detection enhanced decoding of difference set codes for memory applicat...
Error detection enhanced decoding of difference set codes for memory applicat...
Sherin Deena Sam
 
AES by example
AES by exampleAES by example
AES by example
Shiraz316
 
Rsa example
Rsa exampleRsa example
Rsa example
Abhishek Kesharwani
 
clegoues-pwlconf-sept16-asPDF.pdf
clegoues-pwlconf-sept16-asPDF.pdfclegoues-pwlconf-sept16-asPDF.pdf
clegoues-pwlconf-sept16-asPDF.pdf
aoecmtin
 

Similar to How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus Schmeh - 44CON 2018 (20)

There are two types of ciphers - Block and Stream. Block is used to .docx
There are two types of ciphers - Block and Stream. Block is used to .docxThere are two types of ciphers - Block and Stream. Block is used to .docx
There are two types of ciphers - Block and Stream. Block is used to .docx
 
Hunting primes (a caccia di primi) 27 ott 2014
Hunting primes (a caccia di primi)   27 ott 2014Hunting primes (a caccia di primi)   27 ott 2014
Hunting primes (a caccia di primi) 27 ott 2014
 
Understanding Reed-Solomon code
Understanding Reed-Solomon codeUnderstanding Reed-Solomon code
Understanding Reed-Solomon code
 
Deep Learning and Design Thinking
Deep Learning and Design ThinkingDeep Learning and Design Thinking
Deep Learning and Design Thinking
 
Ekon24 from Delphi to AVX2
Ekon24 from Delphi to AVX2Ekon24 from Delphi to AVX2
Ekon24 from Delphi to AVX2
 
Part Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsPart Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digits
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
 
Engineering Fast Indexes for Big-Data Applications: Spark Summit East talk by...
Engineering Fast Indexes for Big-Data Applications: Spark Summit East talk by...Engineering Fast Indexes for Big-Data Applications: Spark Summit East talk by...
Engineering Fast Indexes for Big-Data Applications: Spark Summit East talk by...
 
Engineering fast indexes (Deepdive)
Engineering fast indexes (Deepdive)Engineering fast indexes (Deepdive)
Engineering fast indexes (Deepdive)
 
Neural networks - BigSkyDevCon
Neural networks - BigSkyDevConNeural networks - BigSkyDevCon
Neural networks - BigSkyDevCon
 
Cryptography: way to Arkham - Andriy Savchenko
Cryptography: way to Arkham - Andriy SavchenkoCryptography: way to Arkham - Andriy Savchenko
Cryptography: way to Arkham - Andriy Savchenko
 
Money Manager Presentation-2.pptx
Money Manager Presentation-2.pptxMoney Manager Presentation-2.pptx
Money Manager Presentation-2.pptx
 
Tokyo APAC Groundbreakers tour - The Complete Java Developer
Tokyo APAC Groundbreakers tour - The Complete Java DeveloperTokyo APAC Groundbreakers tour - The Complete Java Developer
Tokyo APAC Groundbreakers tour - The Complete Java Developer
 
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
 
Zero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workZero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they work
 
Cryptography (under)engineering
Cryptography (under)engineeringCryptography (under)engineering
Cryptography (under)engineering
 
Error detection enhanced decoding of difference set codes for memory applicat...
Error detection enhanced decoding of difference set codes for memory applicat...Error detection enhanced decoding of difference set codes for memory applicat...
Error detection enhanced decoding of difference set codes for memory applicat...
 
AES by example
AES by exampleAES by example
AES by example
 
Rsa example
Rsa exampleRsa example
Rsa example
 
clegoues-pwlconf-sept16-asPDF.pdf
clegoues-pwlconf-sept16-asPDF.pdfclegoues-pwlconf-sept16-asPDF.pdf
clegoues-pwlconf-sept16-asPDF.pdf
 

More from 44CON

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
44CON
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
44CON
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
44CON
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
44CON
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
44CON
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
44CON
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank
44CON
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
44CON
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?
44CON
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy
44CON
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security
44CON
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON
 
44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering
44CON
 

More from 44CON (20)

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
 
44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering
 

Recently uploaded

Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus Schmeh - 44CON 2018

  • 1. Klaus Schmeh www.schmeh.org September 12-14, 2018 How to Explain Post- Quantum Cryptography to a Middle School Student
  • 3. A quantum computer! Hi! Let me introduce you.
  • 4. Quantum Computer Based on quantum mechanics Quantum bit can have two values at the same time (superposition)
  • 5. Performing extremely many computations in parallel, if there is only one result What are you good at? Examples: • Find element in large set • Find optimal solution
  • 6. What are you not good at? Sorting. Because sorting requires more than one result.
  • 7. What are you excellent at? Prime factorization!
  • 8. Prime Multiplication 1723 = ? 377 = ?? Prime Factorization easy difficult Prime Multiplication is a one-way function
  • 9. RSA crypto system is based on prime multiplication 1723 = 391 Alice's public keyAlice's private key Prime numbers used in practice have >500 digits
  • 10. Up to a key length of 5 bits. Future versions will be more powerful. I can break RSA within seconds.
  • 12. We need to study quantum- proof alternatives! RSA and some other encryption methods can be broken by a quantum computer!
  • 13. Six crypto system families are believed to be quantum proof. lattice-based crypto non-commutative crypto multivariate crypto code-based crypto hash-based crypto None of them is in wide-spread use so far. isogeny-based crypto I can only cover four today.
  • 14. US authority NIST has started a competition! NIST post quantum competition 69 algorithms submitted The best ones shall be chosen until around 2023
  • 17. Can you explain lattice- based crypto to us? lattice-based crypto I even can explain lettuce-based cryptography.
  • 18. I prefer lettuce to lattice. Lattice pointsLattice Lettuce field Lettuce points
  • 19. a b Base vectors d c Base vectors "Good" base (nearly orthogonal) "Bad" base (nearly parallel)
  • 20. The "closest lettuce" problem Which lettuce point is closest to the snail? a b Easy to answer, if good base is known d c Hard to answer, if only bad base is known Easy to answer for two- dimensional lettuce fields But if we deal with 250 dimensions?
  • 21. This can be regarded as one- way function Placing a snail next to a lattuce point is easy Finding the closest lattuce point is difficult (if only bad base is available) d c
  • 22. Goldreich–Goldwasser–Halevi (GGH) encryption Let's now look at a lettuce-based encryption scheme! Message b a Alice's private key good base d c Alice's public key bad base Bob Alice can decrypt because she knows good base
  • 23. Can GGH be broken with a quantum computer? No.
  • 24. Is GGH a good scheme? No, it is broken. But there are other lettuce methods.
  • 25. For instance Learning with Errors (LWE) methods. At first sight, LWE has nothing to do with lattices ...
  • 26. 294·x + 629·y + 321·z = 38 (mod 797) 701·x + 29·y + 91·z = 462 (mod 797) 613·x + 339·y + 201·z = 636 (mod 797) 256·x + 94·y + 115·z = 522 (mod 797) 704·x + 629·y + 322·z = 477 (mod 797) 391·x + 23·y + 743·z = 213 (mod 797) 290·x + 620·y + 201·z = 40 (mod 797) 211·x + 339·y + 381·z = 510 (mod 797) Let's look at this system of equations! There are more equations than variables It is solvable anyway: x=3, y=7, z=6!
  • 27. 294·x + 629·y + 321·z = 38 (mod 797) 701·x + 29·y + 91·z = 462 (mod 797) 613·x + 339·y + 201·z = 636 (mod 797) 256·x + 94·y + 115·z = 522 (mod 797) 704·x + 629·y + 322·z = 477 (mod 797) 391·x + 23·y + 743·z = 213 (mod 797) 290·x + 620·y + 201·z = 40 (mod 797) 211·x + 339·y + 381·z = 510 (mod 797) +1 -2 +1 -1 +1 +2 Error Let's add a few errors to the right side! Errors are small!
  • 28. 294·x + 629·y + 321·z = 38 (mod 797) 701·x + 29·y + 91·z = 462 (mod 797) 613·x + 339·y + 201·z = 636 (mod 797) 256·x + 94·y + 115·z = 522 (mod 797) 704·x + 629·y + 322·z = 477 (mod 797) 391·x + 23·y + 743·z = 213 (mod 797) 290·x + 620·y + 201·z = 40 (mod 797) 211·x + 339·y + 381·z = 510 (mod 797) +1 -2 +1 -1 +1 +2 Can the errors be detected without knowing x, y, and z? 39 460 523 212 42 511 636 477 Let's assume, only the incorrect results are known. Learning with Errors (LWE) problem Yes, but it's laborious!
  • 29. This leads us to a one-way function! Adding errors to an equation system is simple Finding these errors is difficult This can be used for asymmetric encryption! Learning with Errors one-way function
  • 30. 294·x + 629·y + 321·z = 39 (mod 797) 701·x + 29·y + 91·z = 460 (mod 797) 613·x + 339·y + 201·z = 636 (mod 797) 256·x + 94·y + 115·z = 523 (mod 797) 704·x + 629·y + 322·z = 477 (mod 797) 391·x + 23·y + 743·z = 212 (mod 797) 290·x + 620·y + 201·z = 42 (mod 797) 211·x + 339·y + 381·z = 511 (mod 797) The Regev encryption scheme Alices public key: Alices private Key: x=3, y=7, z=6 Bob
  • 31. 294·x + 629·y + 321·z = 39 (mod 797) 701·x + 29·y + 91·z = 460 (mod 797) 613·x + 339·y + 201·z = 636 (mod 797) 256·x + 94·y + 115·z = 523 (mod 797) 704·x + 629·y + 322·z = 477 (mod 797) 391·x + 23·y + 743·z = 212 (mod 797) 290·x + 620·y + 201·z = 42 (mod 797) 211·x + 339·y + 381·z = 511 (mod 797) 701·x + 29·y + 91·z = 460 (mod 797) 256·x + 94·y + 115·z = 523 (mod 797) 704·x + 629·y + 322·z = 477 (mod 797) 391·x + 23·y + 743·z = 212 (mod 797) 211·x + 339·y + 381·z = 511 (mod 797) + + + + + + + + = = = = 400·x + 791·y + 723·z = 717 (mod 797) Bob Alices private Key: x=3, y=7, z=6 Alices public Key:
  • 32. If Bob wants to encrypt 0: he adds 1 to the result If Bob wants to encrypt 1: he adds 399 to the result How Bob encrypts one bit 400·x + 791·y + 723·z = 718 (mod 797) 400·x + 791·y + 723·z = 319 (mod 797) 400·x + 791·y + 723·z = 717 (mod 797) Knows x,y and z She can easily check if error in result (718 or 319) is small or great Alice Bob Attacker needs to solve the LWE problem small error great error
  • 33. Nice algorithm, but it encrypts only one bit. Yes, but there are more powerful LWE schemes.
  • 34. An what has Regev to do with lattices? I'll show you.
  • 35. An equation system can be thought of as lettuce field. Each column is a vector Attacker needs to solve the closest lettuce problem Encryption 0: snail close to lettuce 1: halfway between two lettuces Decryption Alice knows x, y and z  she knows the lettuce point  She can tell if message is 0 or 1 Message=0 Message=1
  • 36. Are there other lettuce- based systems? Yes, NTRU, Peikert, New Hope, ...
  • 37. There are many of this kind in the competition. NIST post quantum competition 69 algorithms submitted Lattice 27 Lettuce
  • 39. code-based crypto Our next guest is a rocket scientist. Hi!
  • 40. Explain what an error correction code is! code-based crypto
  • 41. 010100100101001101010101 How can we avoid transmission errors? Parity bits 01010011 00101000 11000101 Error detection code 1
  • 43. Transmit-three-times code 01010010 01010010 01010010 Error correction code We need better error correction codes than this one. This isn't rocket science! Error correction code
  • 44. 1 0 1 0 1 1 1 1 1 0 1 0 1 1 Linear error correction code 5 bit 9 bit 1 0 1 0 1 1 1 1 0 1 0 1 1 0 Linear error correction code 4 bit 10 bit Maximum of errors corrected:  overhead/2 Linear error correction codes
  • 45. 1 0 1 0 1 1 1 1 1 0 1 0 1 1 Error correction code 5 bit 9 bit 1 0 1 0 1 1 0 1 0 1 1 0 1 1 0 1 0 1 1 0 1 0 0 1 0 0 1 0 1 0 0 1 0 1 0 0 1 1 0 1 0 1 1 0 1 1 1 1 1 0 1 0 1 1 1=· How a linear error correction code works. 59 matrix
  • 46. Adding errors is easy Here is a one- way function! Finding these errors is difficult 1011001010101010010101 ... 100 Error correction code 01001010 ... 010 0 0 1 In general, there are exceptions
  • 47. McEliece Crypto System Easy error correction code 1 0 1 0 1 1 0 1 0 0 1 0 1 1 0 0 0 0 1 0 0 1 0 1 1 0 0 0 1 0 0 0 0 0 1 1 1 1 0 1 Alices public key Difficult error correction code = 0 0 1 0 1 1 0 1 1 0 1 0 1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 1 1 0 1 1 0 1 0 1 0 0 1 Now we use this for encryption! There are linear codes, for which error finding is easy Alices private key 1 0 1 0 1 1 0 1 1 0 1 0 1 1 0 1 0 0 1 0 0 1 0 1 0 0 1 0 1 0 0 1 1 0 1 0 1 1 0 1 blinding matrix 0 0 1 0 1 1 0 1 1 0 1 1 1 1 0 1 0 1 1 0 0 1 0 1 0 0 1 0 1 0 0 1 1 0 1 0 0 1 0 0 blinding matrix
  • 48. Here's how to encrypt Ciphertext 10100110101011011101111011010011010101101110111101 Random number 010111101010110111011110110100010111101010110111011110110001101010110111011110111010101101110111101 McEliece Encryption Difficult error correction code Alices public key 0 0 0 0 0111 1 1 Bob Introduces errors (plaintext) 1 0 1 0 1 1 0 1 1 0 1 0 1 1 0 1 0 0 1 0 0 1 0 1 0 0 1 0 1 0 0 1 1 0 1 0 1 1 0 1 Can find errors (=plaintext) with easy error correction code Alice
  • 49. overhead: 1547 bit 5413 bit Alices Public Key 0101111010101101110111101101000101111010101101110111101100011010101..............1110111010101101110111101 6960 bit Bob introduces 119 errors 0 0 0 0 0111 1 1 010111101010110111011110110101011011101111011000110101011011................10101101110111101 Size of public key: about 1MB Parameters in practice
  • 50. NIST post quantum competition 69 algorithms submitted Lattice Code 27 21 Lettuce 21 algorithms in the competition are code-based.
  • 51. NIST post quantum competition 69 algorithms submitted Lattice Code 27 21 Lettuce Thanks for coming, Mr. rocket scientist.
  • 54. What's your post quantum crypto method? Non-commutative crypto.
  • 55. Move sequence examples C Let me first explain Rubik's Cube move sequences. B A
  • 57. not commutative A+B = B+A B+A Move Sequence Addition A B A+B Let's do another one.
  • 58. Move Elimination Let's look at opposite moves. A  B opposite moves eliminate each other
  • 59. Move Sequence Negation A A-A Move sequences can be negated. elimination -A (opposite moves, reverse order) A-A = 0 eliminations elimination
  • 60. Conjugacy Problem Difficult to solve it Here's a one- way function. A: move sequence B: move sequence A B = -XX ? ? ? ??? Find X, for which X+A-X = B Easy to set up such a problem
  • 61. Equal Can be used as key Stickel Key Exchange Eavesdropper needs to solve the conjugacy problem Alice Private key: m, n Bob Private key: r,s m A + n B r A + s B K = mA+rA + sB+nB K = rA+mA + nB+sB A quantum- proof key exchange A: move sequence B: move sequence Similar to Diffie-Hellman (not quantum- proof)
  • 62. NIST post quantum competition 69 algorithms submitted Lattice Code Non-commutative 27 21 1 Lettuce Only one non-commutative algorithm, but no Rubik's Cube algorithm.
  • 63. NIST post quantum competition 69 algorithms submitted Lattice Code Non-commutative 27 21 1 Lettuce You're welcome! Bye. Thanks, Mr. Rubik's Cube!
  • 64. And now welcome an island salesman! Hi! $15000
  • 65. Tell us what happened recently. $15000
  • 66. Yes. But can I look at it first? Would you like to buy an island? $10000 $15000
  • 67.
  • 68. Yes, I buy / No, I don't Both can cheat! Alice can send a yes and later say it was a no. The salesman can say "it was a yes", though it was a no.
  • 69. Yes, I buy. Alice No, I don't buy. Alice Safe 1 Safe 2 Combination safe 1 or Combination safe 2 Alices private key Alices public key Alice has to reveal half of her private key => She can use it only once
  • 70. No, I don't buy. Alice Yes, I buy. Alice This scheme can also be used in a digital way. Hash-based signatures One-way function (e.g. SHA-2) Random number 2 Random number 2 Hashing value of random number 1 Hashing value of random number 2 For signing a bit, Alice publishes message 1 or message 2 Alices private key Alices public key
  • 71. Hash-based signaturesHash-based signatures are quantum-proof! Can be made more effective However: keys are long and can only be used once
  • 72. NIST post quantum competition 69 algorithms submitted Lattice Code Non-commutative Hash 27 21 2 Lettuce1 Two of the algorithms in the competition are hash-based.
  • 73. NIST post quantum competition 69 algorithms submitted Thanks, Mr. salesman! Lattice Code Non-commutative Hash 27 21 2 Lettuce1
  • 74. One more look at the competition NIST post quantum competition 69 algorithms submitted Lattice Code Multivariate Non-commutative Hash Others 27 21 11 1 62 Isogeny Lettuce
  • 75. This was our post quantum overview. NIST post quantum competition 69 algorithms submitted Lattice Code Multivariate Non-commutative Hash Others 27 21 11 1 62 I'm sure, we'll see some of these algorithms in practice. Isogeny Lettuce

Editor's Notes

  1. 60 min.?
  2. https://asecuritysite.com/encryption/lwe_ring https://www.linkedin.com/pulse/eve-magician-does-quantum-robust-trick-william-buchanan/