This document discusses using quantum-safe cryptography to protect against future quantum computers. It proposes a "hybrid" approach where a FIPS-approved classical algorithm is used for conformance while a quantum-safe algorithm is also used to provide long-term security. Specifically, it examines using the "OtherInfo" field when deriving keys to include a quantum-safe symmetric key as part of the key derivation process. This would allow quantum-safe encryption of data even when using a FIPS-approved scheme for key establishment and compliance. However, it is unclear if including symmetric keys in "OtherInfo" is permitted by standards.
Connected vehicles will communicate vast amounts of sensitive data over networks, but securing these systems faces unique challenges. Hackers could potentially cause accidents, track drivers, or disable safety features. The automotive industry lacks the security expertise of IT, and adding security slows development. However, vehicle-to-vehicle communication shows promise for accident prevention if privacy and security are prioritized through new protocols, like changing identifiers frequently while authenticating messages through a certificate management system. Governments are now mandating security standards for connected cars to address these risks.
This presentation discusses the use of Garbled Circuits for improving security and simplifying implementation of Secure Credential Management Systems (SCMS) in the Automotive industry
Scaling secure systems like vehicle-to-vehicle communication presents challenges around growing the number of devices, maintaining them securely over long periods of time, and managing privacy across international borders. The biggest constraint is ensuring the many human decisions needed are made correctly and at scale. Centralizing some decisions, like device certification requirements and revocation criteria, while decentralizing others, like authorization, can help reduce the number of human judgments needed. Proper data management is also crucial to balance security, privacy, and accountability. Attention to future threats from quantum computers and evolving standards will further support scalability over time.
This document discusses misbehavior handling throughout the vehicle-to-vehicle (V2V) system lifecycle. It proposes decomposing misbehavior activity into four parts: local misbehavior detection, reporting, investigation, and revocation decision. It suggests considering these parts independently. The best available misbehavior detection algorithm will differ depending on available vehicle sensors. Administrative considerations like privacy and oversight are important. The document outlines two approaches to misbehavior detection - an open garden approach allowing various vehicle-side approaches, and a uniform approach. It recommends following the open garden approach when possible.
Presentation given at WiSec 2017 by Dr. Virendra Kumar. His, along with Drs. Jonathan Petit and William Whyte's, paper was one of six to receive the reproducibility label.
The document discusses the development of the IEEE 1609.2 standard for security in connected vehicles. It explores how the standard was created with only partial contributions from security experts. It aims to examine specific design decisions in the standard, how the divergence between the US and EU versions occurred, and lessons learned for developing security standards in the future. The goal is to understand how to create standards in a more transparent, robust way that avoids issues like regional incompatibility.
The survey of 524 automotive software professionals found:
1) Security is not fully integrated into development processes and developers lack training on secure development practices.
2) Nearly half believe a major overhaul of automotive technology architecture is needed to improve security.
3) There is uncertainty around whether a hack-proof vehicle can be built, with pressures around costs, timelines, and prioritization of security.
This document discusses security challenges and successes for connected vehicles. It outlines how the Secure Credential Management System (SCMS) has been developed and implemented to securely provision vehicle credentials. It also describes how a threat analysis framework identifies device security requirements based on analyzing data confidentiality, integrity and availability levels. Key challenges discussed are how to securely provision device certificates without frequent connectivity and how to balance privacy and misbehavior detection for credential revocation.
Connected vehicles will communicate vast amounts of sensitive data over networks, but securing these systems faces unique challenges. Hackers could potentially cause accidents, track drivers, or disable safety features. The automotive industry lacks the security expertise of IT, and adding security slows development. However, vehicle-to-vehicle communication shows promise for accident prevention if privacy and security are prioritized through new protocols, like changing identifiers frequently while authenticating messages through a certificate management system. Governments are now mandating security standards for connected cars to address these risks.
This presentation discusses the use of Garbled Circuits for improving security and simplifying implementation of Secure Credential Management Systems (SCMS) in the Automotive industry
Scaling secure systems like vehicle-to-vehicle communication presents challenges around growing the number of devices, maintaining them securely over long periods of time, and managing privacy across international borders. The biggest constraint is ensuring the many human decisions needed are made correctly and at scale. Centralizing some decisions, like device certification requirements and revocation criteria, while decentralizing others, like authorization, can help reduce the number of human judgments needed. Proper data management is also crucial to balance security, privacy, and accountability. Attention to future threats from quantum computers and evolving standards will further support scalability over time.
This document discusses misbehavior handling throughout the vehicle-to-vehicle (V2V) system lifecycle. It proposes decomposing misbehavior activity into four parts: local misbehavior detection, reporting, investigation, and revocation decision. It suggests considering these parts independently. The best available misbehavior detection algorithm will differ depending on available vehicle sensors. Administrative considerations like privacy and oversight are important. The document outlines two approaches to misbehavior detection - an open garden approach allowing various vehicle-side approaches, and a uniform approach. It recommends following the open garden approach when possible.
Presentation given at WiSec 2017 by Dr. Virendra Kumar. His, along with Drs. Jonathan Petit and William Whyte's, paper was one of six to receive the reproducibility label.
The document discusses the development of the IEEE 1609.2 standard for security in connected vehicles. It explores how the standard was created with only partial contributions from security experts. It aims to examine specific design decisions in the standard, how the divergence between the US and EU versions occurred, and lessons learned for developing security standards in the future. The goal is to understand how to create standards in a more transparent, robust way that avoids issues like regional incompatibility.
The survey of 524 automotive software professionals found:
1) Security is not fully integrated into development processes and developers lack training on secure development practices.
2) Nearly half believe a major overhaul of automotive technology architecture is needed to improve security.
3) There is uncertainty around whether a hack-proof vehicle can be built, with pressures around costs, timelines, and prioritization of security.
This document discusses security challenges and successes for connected vehicles. It outlines how the Secure Credential Management System (SCMS) has been developed and implemented to securely provision vehicle credentials. It also describes how a threat analysis framework identifies device security requirements based on analyzing data confidentiality, integrity and availability levels. Key challenges discussed are how to securely provision device certificates without frequent connectivity and how to balance privacy and misbehavior detection for credential revocation.
This document provides an overview of certificate management protocols for 1609.2 certificates used in vehicle-to-everything (V2X) communication. It describes the terminology, topology, interfaces, and lifecycles involved in issuing and managing different types of certificates within the Security Credential Management System (SCMS). The document outlines the processes for enrolling to receive certificates, requesting operational certificates, downloading certificates, and handling revocation. It also discusses the ASN.1 module structure used to specify the protocols and packet data units for each interface.
This document summarizes the key findings of a survey conducted by the Ponemon Institute regarding automotive cybersecurity. Some of the main points from the survey include:
- There is a growing concern among automakers and suppliers that hackers are actively targeting modern connected vehicles. However, organizations are not prioritizing security.
- A lack of skilled security personnel and pressure to meet deadlines are hindering secure development practices. Cryptography use and legacy systems are also issues.
- While security responsibility is unclear, respondents believe the most challenging aspects of securing vehicles are the expenses involved, the time added to development, and lack of formal requirements and policies.
RSAC 2021 Spelunking Through the Steps of a Control System HackDan Gunter
An industrial control system was hacked through a multi-stage attack. An attacker first spearphished a user to gain access to the network. They then used remote desktop and remote access software to access the HMI and manipulate control points, disrupting industrial processes. The attack demonstrated tactics like phishing, credential dumping, lateral movement, and control manipulation. Improving security monitoring, hardening systems, limiting access, and increasing user awareness could help prevent similar attacks.
This document contains a CISSP CBK review exam with 55 multiple choice questions covering various topics in cybersecurity. Some of the questions test knowledge of risk management, access controls, cryptography, security operations and incident response. The exam is assessing understanding of fundamental cybersecurity concepts as defined in the Common Body of Knowledge for the CISSP certification.
SDN Security: Two Sides of the Same CoinZivaro Inc
When it comes to Software Defined Networking (SDN) Security there are two sides of the story. This webinar addresses both sides – what security vulnerabilities exist in modern SDN technologies and how SDN technologies can create new security protections. Also included are use cases that SDN solutions can provide and the new applications of SDN that can secure modern enterprise and data center environments.
Presented by GTRI CTO, Scott Hogg, in a webinar on June 9, 2016. For more information, visit http://www.gtri.com/.
This document summarizes a CISSP mentor program session on security assessment and testing. It includes a 10 question quiz on topics like regression testing, fuzzing, static vs dynamic testing, and types of penetration testing. It also discusses a scenario about hiring a security firm to conduct a security assessment and penetration test of a bank's new web application. Key points covered include using a "flag" file instead of real data in a penetration test, the benefits of partial knowledge vs zero knowledge tests, and the proper response if an active compromise is discovered during a test.
Security is a major concern in computer networking which faces increasing threats as the commercial
Internet and related economies continue to grow. Virtualization technologies enabling
scalable Cloud services pose further challenges to the security of computer infrastructures,
demanding novel mechanisms combining the best-of-breed to counter certain types of attacks
. Our work aims to explore advances in Cyber Threat Intelligence (CTI) in the context of
Software Defined Networking (SDN) architectures. While CTI represents a recent approach
to combat threats based on reliable sources, by sharing information and knowledge about
computer criminal activities, SDN is a recent trend in architecting computer networks based
on modularization and programmability principles. In this dissertation, we propose IntelFlow,
an intelligent detection system for SDN that follows a proactive approach using OpenFlow
to deploy countermeasures to the threats learned through a distributed intelligent plane. We
show through a proof of concept implementation that the proposed system is capable of delivering
a number of benefits in terms of effectiveness, altogether contributing to the security
of modern computer network designs.
Securing future connected vehicles and infrastructureAlan Tatourian
Slides from a keynote I gave at AZ Infragard. Since this was a keynote, I tried to dazzle the audience by talking more about technology and portraying security only as part of the underlying architecture of cognitive autonomous systems.
Slide Deck Class Session 11 – FRSecure CISSP Mentor ProgramFRSecure
FRSecure has a goal of changing a broken industry. There are many ways to accomplish this endeavor such as setting high assessment standards, using proprietary reporting methods that are easy to understand to hiring expert talent just to name a few. However, one unique approach FRSecure uses to bring about change is our CISSP Mentor Program. By design the program is provided at no cost to anyone with an interest in the information security industry.
The Business Impact Analysis (BIA) should emphasize system dependencies to allow for proper prioritization. Authentication Header provides strong integrity, authentication, and may provide non-repudiation depending on the cryptographic algorithm and keying method used, while ESP provides integrity and confidentiality but does not provide non-repudiation or protection from traffic analysis. Extensible Authentication Protocol (EAP) is a framework that supports multiple authentication mechanisms for PPP including cleartext passwords, challenge-response, and arbitrary dialog sequences.
Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analys...Ivan Ruchkin
This document proposes an analysis contracts approach to address inter-domain vulnerabilities in cyber-physical systems. It describes analyzing a braking subsystem to determine sensor trustworthiness and secure control. Formal analysis contracts specify inputs, outputs, assumptions and guarantees for failure mode analysis, trustworthiness analysis and secure control analysis. The contracts approach aims to verify analyses are correctly executed to prevent vulnerabilities introduced offline from being exploited online. Future work includes developing richer behavioral and probabilistic contracts and validating the approach on other systems.
This document provides an overview of key topics in automotive software and security:
1. Cars now contain over 1 gigabyte of software code due to increasing automation, connectivity and data analytics capabilities.
2. As vehicles become more connected and automated, software complexity and security risks will continue growing substantially over the next 10-20 years.
3. Developing highly reliable and secure automotive software requires addressing challenges across computing, embedded systems, and functional safety.
1) Autonomous vehicles require balancing supercomputing complexity, real-time performance, and functional safety.
2) Cyber-physical systems rely on four pillars: connectivity, monitoring, prediction, and self-optimization.
3) Ultra-reliable systems require qualities like self-healing, where the system can autonomously change its structure to maintain behavior despite failures.
Tools Of The Hardware Hacking Trade FinalPriyanka Aash
This document provides an overview of various tools that can be used for hardware hacking and analysis. It discusses tools for tasks like information gathering, device teardown, interface monitoring and analysis, and firmware extraction. Specific tools covered include oscilloscopes, logic analyzers, protocol analyzers, the Bus Pirate, USB-to-serial adapters, software defined radios, soldering equipment, device programmers, debug tools, and imaging equipment like x-rays and electron microscopes. Examples are given of how several of these tools have been used in past hardware analyses and attacks. The document concludes by encouraging the reader to set up a hardware hacking lab and collaborate with others to stay up-to-date on new tools and techniques.
Presentation slides presented by Cody Thomas and Christopher Korban at x33fcon 2018 about how to jumpstart your purple teaming with the MITRE ATT&CK framework, and accompanying Adversary Emulation Plans
Cyber Defense - How to be prepared to APTSimone Onofri
This document provides an overview of a presentation on cyber defense and cyber attack simulations. It begins with an agenda and introductions. It then discusses the evolving threats landscape, with attacks increasing in scale, scope and sophistication. It outlines the cyber attack simulation methodology, including researching the target, infiltrating networks, establishing footholds, moving laterally and exfiltrating data. It describes three scenario examples - a web attack, phishing email, and exploiting physical access. Each scenario provides the rules of engagement, attack overview and lessons learned. It concludes with quotes emphasizing the importance of preparation and deception in warfare.
The Finest Penetration Testing Framework for Software-Defined NetworksPriyanka Aash
Software-Defined Networking (SDN) is getting attention for the next-generation networking today. The key concept of SDN is to decouple the control logic from the traditional network devices so that network developers can design innovative network functions in a more flexible and programmable way. However, SDN is not always bringing advantages to us. Security experts have constantly raised security concerns about SDN, and some vulnerabilities have been uncovered in the real world. If SDN is not secure, how can we measure the security level of SDN environments?
In this talk, we introduce a powerful penetration testing tool for SDN called DELTA, which is officially supported by Open Networking Foundation (ONF). First, DELTA can automate diverse published attack scenarios against various SDN components from testing to evaluating. Also, to discover unknown vulnerabilities that may exist in SDN, DELTA leverages a blackbox fuzzing technique that randomizes different control flows in SDN. It enables us to systemically reveal unknown security issues rather than the empirical and ad-hoc methods that most previous studies use. By using DELTA, anyone can easily and thoroughly test not only popular open source SDN controllers (i.e., ONOS, OpenDaylight, Floodlight, and Ryu), but also SDN-enabled switches (i.e., OpenvSwitch, HP, and Pica8) in the real world.
We will show nine new attack cases that have been found by DELTA but never been announced before.
Also, we will discuss:
- What control flows are in SDN, and why those are important as a key feature compared to the traditional networks.
- What key components and workflow of DELTA to attack the real SDN components.
- Which nine new attack cases have been discovered by DELTA, and we will demonstrate it. For example, one of the new attacks violates the table condition, leading to the black hole of handling packets in the switch.
2014-12-16 defense news - shutdown the hackersShawn Wells
The document discusses technologies for continuous monitoring and data standardization. It begins with an overview of a presentation on vulnerability management, configuration management, and the DoD Centralized Super Computing Facility story. It then covers various topics related to cybersecurity including reliance on technology over time, the ever-increasing capability and complexity of systems, cybercrime statistics, and the Security Content Automation Protocol (SCAP).
The document discusses the impacts of quantum computing on security for large financial organizations. It outlines NIST's process for standardizing post-quantum cryptography to develop cryptographic systems secure against both quantum and classical computers. The timeline and evaluation criteria for candidate algorithms are presented, along with families of algorithms being considered like lattice-based, code-based, and hash-based signatures. The document also examines challenges for replacing cryptographic algorithms in legacy infrastructure, assessing the quantum resistance of routing and switching vendors, and the impact on common cryptographic algorithms used in applications.
1) McClansy Security Corporation is a cybersecurity consulting and R&D company founded in 2021 with a vision of providing quantum security technology to protect against sophisticated threats.
2) The company's founder gained experience in quantum encryption methodologies working with IBM and NIST between 2018-2021. McClansy is developing advanced cybersecurity software and services including quantum key distribution and random number generation.
3) Quantum computing poses risks like potentially breaking public key cryptography used for online transactions. McClansy aims to address these risks through its quantum transformation services and developing the first quantum security products by 2023.
This document provides an overview of certificate management protocols for 1609.2 certificates used in vehicle-to-everything (V2X) communication. It describes the terminology, topology, interfaces, and lifecycles involved in issuing and managing different types of certificates within the Security Credential Management System (SCMS). The document outlines the processes for enrolling to receive certificates, requesting operational certificates, downloading certificates, and handling revocation. It also discusses the ASN.1 module structure used to specify the protocols and packet data units for each interface.
This document summarizes the key findings of a survey conducted by the Ponemon Institute regarding automotive cybersecurity. Some of the main points from the survey include:
- There is a growing concern among automakers and suppliers that hackers are actively targeting modern connected vehicles. However, organizations are not prioritizing security.
- A lack of skilled security personnel and pressure to meet deadlines are hindering secure development practices. Cryptography use and legacy systems are also issues.
- While security responsibility is unclear, respondents believe the most challenging aspects of securing vehicles are the expenses involved, the time added to development, and lack of formal requirements and policies.
RSAC 2021 Spelunking Through the Steps of a Control System HackDan Gunter
An industrial control system was hacked through a multi-stage attack. An attacker first spearphished a user to gain access to the network. They then used remote desktop and remote access software to access the HMI and manipulate control points, disrupting industrial processes. The attack demonstrated tactics like phishing, credential dumping, lateral movement, and control manipulation. Improving security monitoring, hardening systems, limiting access, and increasing user awareness could help prevent similar attacks.
This document contains a CISSP CBK review exam with 55 multiple choice questions covering various topics in cybersecurity. Some of the questions test knowledge of risk management, access controls, cryptography, security operations and incident response. The exam is assessing understanding of fundamental cybersecurity concepts as defined in the Common Body of Knowledge for the CISSP certification.
SDN Security: Two Sides of the Same CoinZivaro Inc
When it comes to Software Defined Networking (SDN) Security there are two sides of the story. This webinar addresses both sides – what security vulnerabilities exist in modern SDN technologies and how SDN technologies can create new security protections. Also included are use cases that SDN solutions can provide and the new applications of SDN that can secure modern enterprise and data center environments.
Presented by GTRI CTO, Scott Hogg, in a webinar on June 9, 2016. For more information, visit http://www.gtri.com/.
This document summarizes a CISSP mentor program session on security assessment and testing. It includes a 10 question quiz on topics like regression testing, fuzzing, static vs dynamic testing, and types of penetration testing. It also discusses a scenario about hiring a security firm to conduct a security assessment and penetration test of a bank's new web application. Key points covered include using a "flag" file instead of real data in a penetration test, the benefits of partial knowledge vs zero knowledge tests, and the proper response if an active compromise is discovered during a test.
Security is a major concern in computer networking which faces increasing threats as the commercial
Internet and related economies continue to grow. Virtualization technologies enabling
scalable Cloud services pose further challenges to the security of computer infrastructures,
demanding novel mechanisms combining the best-of-breed to counter certain types of attacks
. Our work aims to explore advances in Cyber Threat Intelligence (CTI) in the context of
Software Defined Networking (SDN) architectures. While CTI represents a recent approach
to combat threats based on reliable sources, by sharing information and knowledge about
computer criminal activities, SDN is a recent trend in architecting computer networks based
on modularization and programmability principles. In this dissertation, we propose IntelFlow,
an intelligent detection system for SDN that follows a proactive approach using OpenFlow
to deploy countermeasures to the threats learned through a distributed intelligent plane. We
show through a proof of concept implementation that the proposed system is capable of delivering
a number of benefits in terms of effectiveness, altogether contributing to the security
of modern computer network designs.
Securing future connected vehicles and infrastructureAlan Tatourian
Slides from a keynote I gave at AZ Infragard. Since this was a keynote, I tried to dazzle the audience by talking more about technology and portraying security only as part of the underlying architecture of cognitive autonomous systems.
Slide Deck Class Session 11 – FRSecure CISSP Mentor ProgramFRSecure
FRSecure has a goal of changing a broken industry. There are many ways to accomplish this endeavor such as setting high assessment standards, using proprietary reporting methods that are easy to understand to hiring expert talent just to name a few. However, one unique approach FRSecure uses to bring about change is our CISSP Mentor Program. By design the program is provided at no cost to anyone with an interest in the information security industry.
The Business Impact Analysis (BIA) should emphasize system dependencies to allow for proper prioritization. Authentication Header provides strong integrity, authentication, and may provide non-repudiation depending on the cryptographic algorithm and keying method used, while ESP provides integrity and confidentiality but does not provide non-repudiation or protection from traffic analysis. Extensible Authentication Protocol (EAP) is a framework that supports multiple authentication mechanisms for PPP including cleartext passwords, challenge-response, and arbitrary dialog sequences.
Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analys...Ivan Ruchkin
This document proposes an analysis contracts approach to address inter-domain vulnerabilities in cyber-physical systems. It describes analyzing a braking subsystem to determine sensor trustworthiness and secure control. Formal analysis contracts specify inputs, outputs, assumptions and guarantees for failure mode analysis, trustworthiness analysis and secure control analysis. The contracts approach aims to verify analyses are correctly executed to prevent vulnerabilities introduced offline from being exploited online. Future work includes developing richer behavioral and probabilistic contracts and validating the approach on other systems.
This document provides an overview of key topics in automotive software and security:
1. Cars now contain over 1 gigabyte of software code due to increasing automation, connectivity and data analytics capabilities.
2. As vehicles become more connected and automated, software complexity and security risks will continue growing substantially over the next 10-20 years.
3. Developing highly reliable and secure automotive software requires addressing challenges across computing, embedded systems, and functional safety.
1) Autonomous vehicles require balancing supercomputing complexity, real-time performance, and functional safety.
2) Cyber-physical systems rely on four pillars: connectivity, monitoring, prediction, and self-optimization.
3) Ultra-reliable systems require qualities like self-healing, where the system can autonomously change its structure to maintain behavior despite failures.
Tools Of The Hardware Hacking Trade FinalPriyanka Aash
This document provides an overview of various tools that can be used for hardware hacking and analysis. It discusses tools for tasks like information gathering, device teardown, interface monitoring and analysis, and firmware extraction. Specific tools covered include oscilloscopes, logic analyzers, protocol analyzers, the Bus Pirate, USB-to-serial adapters, software defined radios, soldering equipment, device programmers, debug tools, and imaging equipment like x-rays and electron microscopes. Examples are given of how several of these tools have been used in past hardware analyses and attacks. The document concludes by encouraging the reader to set up a hardware hacking lab and collaborate with others to stay up-to-date on new tools and techniques.
Presentation slides presented by Cody Thomas and Christopher Korban at x33fcon 2018 about how to jumpstart your purple teaming with the MITRE ATT&CK framework, and accompanying Adversary Emulation Plans
Cyber Defense - How to be prepared to APTSimone Onofri
This document provides an overview of a presentation on cyber defense and cyber attack simulations. It begins with an agenda and introductions. It then discusses the evolving threats landscape, with attacks increasing in scale, scope and sophistication. It outlines the cyber attack simulation methodology, including researching the target, infiltrating networks, establishing footholds, moving laterally and exfiltrating data. It describes three scenario examples - a web attack, phishing email, and exploiting physical access. Each scenario provides the rules of engagement, attack overview and lessons learned. It concludes with quotes emphasizing the importance of preparation and deception in warfare.
The Finest Penetration Testing Framework for Software-Defined NetworksPriyanka Aash
Software-Defined Networking (SDN) is getting attention for the next-generation networking today. The key concept of SDN is to decouple the control logic from the traditional network devices so that network developers can design innovative network functions in a more flexible and programmable way. However, SDN is not always bringing advantages to us. Security experts have constantly raised security concerns about SDN, and some vulnerabilities have been uncovered in the real world. If SDN is not secure, how can we measure the security level of SDN environments?
In this talk, we introduce a powerful penetration testing tool for SDN called DELTA, which is officially supported by Open Networking Foundation (ONF). First, DELTA can automate diverse published attack scenarios against various SDN components from testing to evaluating. Also, to discover unknown vulnerabilities that may exist in SDN, DELTA leverages a blackbox fuzzing technique that randomizes different control flows in SDN. It enables us to systemically reveal unknown security issues rather than the empirical and ad-hoc methods that most previous studies use. By using DELTA, anyone can easily and thoroughly test not only popular open source SDN controllers (i.e., ONOS, OpenDaylight, Floodlight, and Ryu), but also SDN-enabled switches (i.e., OpenvSwitch, HP, and Pica8) in the real world.
We will show nine new attack cases that have been found by DELTA but never been announced before.
Also, we will discuss:
- What control flows are in SDN, and why those are important as a key feature compared to the traditional networks.
- What key components and workflow of DELTA to attack the real SDN components.
- Which nine new attack cases have been discovered by DELTA, and we will demonstrate it. For example, one of the new attacks violates the table condition, leading to the black hole of handling packets in the switch.
2014-12-16 defense news - shutdown the hackersShawn Wells
The document discusses technologies for continuous monitoring and data standardization. It begins with an overview of a presentation on vulnerability management, configuration management, and the DoD Centralized Super Computing Facility story. It then covers various topics related to cybersecurity including reliance on technology over time, the ever-increasing capability and complexity of systems, cybercrime statistics, and the Security Content Automation Protocol (SCAP).
The document discusses the impacts of quantum computing on security for large financial organizations. It outlines NIST's process for standardizing post-quantum cryptography to develop cryptographic systems secure against both quantum and classical computers. The timeline and evaluation criteria for candidate algorithms are presented, along with families of algorithms being considered like lattice-based, code-based, and hash-based signatures. The document also examines challenges for replacing cryptographic algorithms in legacy infrastructure, assessing the quantum resistance of routing and switching vendors, and the impact on common cryptographic algorithms used in applications.
1) McClansy Security Corporation is a cybersecurity consulting and R&D company founded in 2021 with a vision of providing quantum security technology to protect against sophisticated threats.
2) The company's founder gained experience in quantum encryption methodologies working with IBM and NIST between 2018-2021. McClansy is developing advanced cybersecurity software and services including quantum key distribution and random number generation.
3) Quantum computing poses risks like potentially breaking public key cryptography used for online transactions. McClansy aims to address these risks through its quantum transformation services and developing the first quantum security products by 2023.
Mark Carney presents quantum exploits for quantum hackers! These are the slides for his talk given at DEF CON 30, on 12th Aug 2022
In this talk Mark presents a concise quantum overview, some quantum implants for use with quantum exploits, the real way to think about 'store-now decrypt-later', what 'quantum crime' will looks like, and finally comes to the launch of the world's first embedded quantum simulator - uQ (https://github.com/Quantum-Village/micro-quantum)
Mark has thought long and hard about the realities of the post-quantum future - and has some deep insights into how hackers can (and probably will) shape the future of this industry, and maybe the world.
Come and explore the new and exciting world of quantum computing, and find out what the future really holds @ Quantum Village!
Running head: QUANTUM COMPUTING
QUANTUM COMPUTING 9
Research Paper: Quantum Computing
(Student’s Name)
(Professor’s Name)
(Course Title)
(Date of Submission)
Abstract
Quantum computers are a new era of invention, and its innovation is still to come. The revolution of the quantum computers produced a lot of challenges for ethical decision-making and predictions at different levels of life; therefore, it raised new concerns such as invasion of privacy and national security. In fact, it can be used easily to access and steal private information and data, while on the other hand, quantum computers can help to eliminate these unethical intrusions and secure the information.
Quantum computers will be the most powerful computer in the world that would open the door to encrypt the information in much less time. On the contrary, the supercomputers sometimes take so many hours to encrypt, whereas quantum computers can be used for the same purpose in a shorter time period making it harder to decrypt the data and information.
Many years from now, quantum computers will become mainstays throughout the world of computing. It will serve the individual and the community, but there is a significant concern that quantum computers could be used to invade people’s privacy (Hirvensalo, 2012).
Literature Review
The study area that is aimed on the implementation of quantum theory principles to develop computer technology is called Quantum computing. The field of quantum mechanics arose from German physicist Max Planck’s attempts to describe the spectrum emitted by hot bodies and specifically he wondered the reason behind the shift in color from red to yellow to blue as the temperature of a flame increased.
https://www.stratfor.com/analysis/approaching-quantum-leap-computing
There has been tremendous development in quantum computing since then and more research is been done to realize its full potential. Generally, quantum computing depends on quantum laws of physics. Rather than store information as 0s or 1s as conventional computers do, a quantum computer uses qubits which can be a 1 or a 0 or both at the same time. The quantum superposition along with the quantum effects of entanglement and quantum tunneling enable computers to consider and manipulate all combinations of bits simultaneously. This effect will make quantum computation powerful and fast (Williams, 2014).
http://www.dwavesys.com/quantum-computing
Researchers in quantum computing have enjoyed a greater level of success. The first small 2-qubit quantum computer was developed in 1997 and in 2001 a 5-qubit quantum computer was used to successfully factor the number 15 [85].Since then, experimental progress on a number of different technologies has been steady but slow, although the practical problems facing physical realizations of quantum computers can be addressed. It is believed that a quant.
Research paper of quantum computer in cryptographyAkshay Shelake
- The document discusses the history of quantum computing and its potential threat to modern cryptography. It explores how a quantum computer could break encryption systems like RSA by efficiently solving large integer factorization problems, using Peter Shor's algorithm.
- Cryptography organizations are researching alternatives like error-correcting codes, hash functions, and lattice/multivariate cryptography that could defend against quantum computers.
- The development of quantum computing prompts the need to transition encryption methods before full-scale quantum computers are built, otherwise governments and businesses could suffer security breaches and loss of encrypted data.
The convergence of IoT and Quantum ComputingAhmed Banafa
One of the top candidates to help in securing IoT is Quantum Computing, while the idea of convergence of IoT and Quantum Computing is not a new topic, it was discussed in many works of literature and covered by various researchers, but nothing is close to practical applications so far.
Quantum Computing is not ready yet, it is years away from deployment on a commercial scale.
Why Should You Pay Attention To Quantum Computing?Milos Dunjic
Quantum computing, is an exciting and rather unusual field of informatics. Recently I had privilege to participate on The Quantum Panel, as part of the Payments Canada conference, where I shared some of my view with wider audience.
There is no impenetrable system - So, why we are still waiting to get breached?Nane Kratzke
This is some input for a panel discussion about "Security and Safety in Cloud-based Systems and Services" (9th International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2018) in Barcelona, Spain in February 2018).
Although it might be hard to accept. By principle, attackers can establish footholds in our systems whenever they want (zero-day exploits). Cloud application security engineering efforts focus to harden the "fortress walls". Therefore, cloud applications rely on these defensive walls but seldom attack intruders actively. There is the somehow the need for a more reactive component. A component that could be inspired by biological systems. Biological systems consider by design that defensive "walls" can be breached at several layers. So, biological systems provide an additional active defense system to attack potential successful intruders - an immune system. Although several experts find this approach "intriguing", there are follow-up questions arising. What is about exploits that adapt to bio-inspired systems? How to protect the immune system against direct attacks? Are cloud immune systems prone to phenomenons like fever (running hot) or auto-immune diseases (self-attacking)?
Karen Easterbrook, Microsoft
Brian LaMacchia, Microsoft
Quantum computers may be 10 years away, but well-funded adversaries are already preparing for their arrival. Even if they can’t read high-value encrypted traffic today, they are recording and storing for when they can decrypt it in the future. If your secrets need to be protected for more than 10 years, you need to take action now. In this talk, we will explore how sufficiently large quantum computers will catastrophically break all public-key cryptography commonly used today, the overall scope of this threat, and the steps underway to develop and deploy quantum-resistant replacement algorithms and security protocols. We will introduce the code and tools that you can use today to fend off these future advanced threats.
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
First presented at Cybersecurity for Maritime Summit 2017 in Oct 2017. Subsequently presented at Temasek Polytechnic ISACA Day in Nov 2017. Audience comprises of cybersecurity professionals in the maritime sector and also cybersecurity students who are keen to learn more about cybersecurity considerations in a shipping port environment.
SIT launches its first Master program in Computer Science and Software engineering.
Start in September and apply now.
Master in Computer Science and Software Engineering
The program is flexible and really adapted to the needs of industry. It is available both onsite in Switzerland and in an online offering. We offer attractive scholarships for qualified students and it is also possible to have your second year in one of our partner universities in Europe, USA and Asia.
About Schaffhausen Institute of Technology:
With its pioneering curriculum, the Schaffhausen Institute of Technology (SIT) offers a new model of education. Focusing on the most important areas of technology, SIT will drive research, development and innovation in a next generation learning and research environment. Using state-of-the-art facilities, SIT's students, researchers and business allies will address large-scale world problems by developing a technology curriculum based on global issues.
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...Arjan
1) The document proposes protocols for time-delayed encrypted message transmission that would render trusts obsolete over time.
2) It involves encrypting a message and dispersing the decryption key using techniques like memory-hard puzzles, Lagrange interpolation polynomials, and hash functions to ensure the key cannot be reassembled before a specified date.
3) The goal is to provide a way to transmit sensitive information that would be guaranteed to be disclosed after a certain period, even if the original trustees could no longer be relied upon.
Cybersecurity and continuous intelligenceNISIInstituut
Welcome to the cybersecurity & continuous intelligence knowledge slidedeck of NISI (Nederlands Instituut voor de Software Industrie).
Cybersecurity & Continuous Intelligence is a broad topic, covering rules & regulation, internet, cyberwar, software, machine learning and society & trust.
This slidedeck offers you a more in-depth view of this exciting area.
Please contact us directly for more information via email info@nisi.nl or the contact on form on nisi.nl.
Nederlands Instituut voor de Software Industrie
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
The document discusses the ongoing relevance of one-time pads for encryption compared to modern computer algorithms. While modern algorithms are useful against everyday threats, they cannot guarantee absolute security due to vulnerabilities in computer systems and the possibility that governments have found ways to break the algorithms or influence their development. In contrast, a one-time pad system provides mathematical security if implemented correctly, but has challenges with key distribution. Overall the document argues one-time pads still have value for high security applications due to their ability to guarantee unbreakability.
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...Dataconomy Media
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Lead Security Architect At Lloyds Bank Group
Watch more from Data Natives Berlin 2016 here: http://bit.ly/2fE1sEo
Visit the conference website to learn more: www.datanatives.io
Follow Data Natives:
https://www.facebook.com/DataNatives
https://twitter.com/DataNativesConf
Stay Connected to Data Natives by Email: Subscribe to our newsletter to get the news first about Data Natives 2017: http://bit.ly/1WMJAqS
About the Author:
Anish has been working in the security and cryptography area for the past 15 years, as a researcher and as a consultant. His first brush with payments systems was 15 years ago when he was involved in building a micropayments system for Ericsson. He has spent half his career researching cryptographic algorithms and protocols at three different research groups including Microsoft Research. He also has published multiple papers in the area of security and cryptography and contributed to thought leadership in security space, through guides, POV, white papers and talks. He has also worked as a strategy consultant for Accenture and Capgemini. Most recently he has been involved in the Blockchain ecosystem as one of the founding members of UKDCA . He is also on the advisory board for Ripple Labs, IEET, EA ventures, Adjoint and Chain of Things. These days he works for large UK bank where he is lead security architect.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Exploring Quantum Cryptography: The Future of Unbreakable EncryptionPC Doctors NET
In an age where digital communication and data privacy are paramount concerns, the world of cryptography has been on a relentless quest to develop unbreakable encryption methods. The emergence of quantum cryptography has ignited a beacon of hope, promising a future where information can be secured with unparalleled certainty. In this article, we delve into the fascinating realm of quantum cryptography and how it is poised to reshape the landscape of data security.
Jason Christopher, Dragos Principal Cyber Risk Advisor, joins CyberWire for this podcast that discusses the evolution of ICS/OT ransomware, its impacts on the community, and cybersecurity best practices ICS/OT practitioners can implement to combat it. Listen to the full podcast here: https://dragos.com/resource/ransomware-in-an-industrial-world/
This document discusses cyber physical systems (CPS), which integrate computing systems with physical processes. It provides examples of CPS like shipping, healthcare, energy and smart grids. It discusses security issues that are unique to CPS compared to traditional IT systems, including availability, integrity and timeliness. The document outlines two real-world incidents involving CPS - the Stuxnet attack on Iran's nuclear facilities and the kAndyKAn3 worm attacking a toy factory. It also covers CPS components like sensors, PLCs and HMIs. In closing, it discusses design principles and open research questions around CPS security.
Similar to Quantum Safety in Certified Cryptographic Modules (20)
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
2. What’s Causing All the Fuss? Shor’s Algorithm
(From Quantum Computing for Computer Scientists by Noson Yanofsky and Mirco Mannucci)
Input: A positive integer N with n = [log2 N].
Output: A factor p of N if it exists.
1. Use a polynomial algorithm to determine if N is prime or a power of prime. If it is a prime, declare
that it is and exit. If it is a power of a prime number, declare that it is and exit.
2. Randomly choose an integer a such that 1 < a < N. Perform Euclid’s algorithm to determine
GCD( a, N). If the GCD is not 1, then return it and exit.
3. Use the quantum circuit below to find a period r.
4. If r is odd or if ar ≡ − 1 Mod N, then return to #2 and choose another a.
5. Use Euclid’s algorithm to calculate GCD((𝑎 𝑟/2
+1),N) and GCD((𝑎 𝑟/2
−1),N) . Return at least one
of the nontrivial solutions.
Note: These gate
symbols denote
measuring the
qubit.
Note: The
QFT is a
“Quantum
Fourier
Transform”
gate.
3. Insights from “Cybersecurity in an era with quantum
computers: will we be ready?” – 5 Main Points
The referenced paper was written by Michele Mosca (University of Waterloo, Chairman of the Institute for Quantum Computing, Canada Research
Chair in Quantum Computation)
1.The transition to quantum-safety will take lots of time and energy.
• “There is no quick fix and we cannot quickly make up lost time.”
2.Quantum computer will arrive before we’re ready.
3.A wake up call is needed… The main challenges aren’t technical.
• “Despite the many technical and scientific challenges to deploying quantum-safe cryptography, the main challenges
in my opinion are the business and policy decisions that would drive the adoption of quantum-safe
cryptography….”
4.Quantum computers will be of immense value to mankind, but the impact of quantum
computers on cybersecurity will be catastrophic.
• “Harnessing the power of quantum mechanics in large-scale quantum computers will allow us to solve many valuable
problems for humanity, but we must first take the catastrophic impact of breaking cybersecurity off the table by
developing and deploying a suite of quantum-safe cryptographic tools before quantum computers arrive.”
5.Quantum-safe cryptography is not an option in the new age of quantum computing.
• “Quantum-safe cryptography is a necessary part of cybersecurity in an era with quantum computers…”
5. From “A Two-Qubit Logic Gate in
Silicon”, Nature Magazine, 10/15/15
“Although these silicon qubits represent the smallest
scalable two-qubit system reported so far, the complete
fabrication process is compatible with standard CMOS
(complementary metal – oxide–semiconductor)
technology, and is also consistent with current
transistor feature sizes, offering the prospect of
realizing a large-scale quantum processor using the
same silicon manufacturing technologies that have
enabled the current information age.”
UNSW Can Now Make Qubits Using Standard
CMOS Fabrication Technology….
6. Projected Probability of General Purpose
Quantum Computers Arriving By Year
Critical infrastructure and
industries with fiduciary
responsibilities MUST be re-tooled
when the threat window opens!
The green graph is based on data from
the IQC (Institute for Quantum
Computing) provided earlier in 2015. The
red graph is based on data after
significant breakthroughs were achieved
(Microsoft, UNSW, IBM, Google, etc.)
since the beginning of 2H15.
7. There are 2 Very Important Threats… The 1st Is Already
Here… We Have a FIPS 140-2 Compliant Solution
Threat #1: If QC arrives before all your
classically encrypted data reaches end
of life – you’ve got a major security
breach (data vaulting attack)
Threat #2: If QC arrives before you are
retooled – the problem is even worse –
your system’s real time security will be
completely exposed and the fix will
probably not be quick.
X = “how many years does your data
need to be secure”
Y = “how long will it take you to retool”
Z = “when will QC arrive”
8. Applying the IQC “Panic” Equation
Time you
need your
current
encryption to
be secure
(X)
Time needed to
retool crypto,
standards and IT
infrastructure
(Y)
Assessment
on when QC
threat arrives
(see chart 5)
(Z)
Time Your Keys
(and Confidential
Data) are Exposed
15 10 10 15 Years
15 10 15 10 Years
15 3 5 13 Years
15 3 10 10 Years
15 3 15 10 Years
30 5 12 23 Years
• More realistic confidentiality
period for banks, healthcare,
govt., etc.
• Aggressive retooling time
• Assumption that QC will arrive
fairly slowly
• Three years is extremely
aggressive retooling –
effectively mass panic mode.
• Ten years is aggressive but
achievable retooling.
• Fifteen years of data
confidentiality (x) is low for
many govt, health, financial …
institutions
9. From A New Study: “Most Organizations Can’t
Protect Digital Information in the Long-Term”
“New research has revealed that the majority of organizations DO NOT have a coherent long-term strategy
for their vital digital information even though virtually all of them (98%) are required to keep information for
ten years or longer.”
“While 97% of information professionals understand the need for a specialized approach to these assets,
only 11% are storing them in systems specifically designed to ensure long-term protection and access. This
gap has economic, legal, and business competitiveness implications. The research, conducted by think tank
the Information Governance Initiative (IGI), provides a new benchmark for organizations to evaluate their
capability and outlines tactics for closing this critical gap. It also reports on how leading organizations like
Associated Press, HSBC, and the State of Texas have addressed this challenge.”
“The research, conducted by think tank the Information Governance Initiative (IGI), provides a new
benchmark for organizations to evaluate their capability and outlines tactics for closing this critical gap. It
also reports on how leading organizations like Associated Press, HSBC, and the State of Texas have addressed
this challenge.”
https://www.helpnetsecurity.com/2016/05/17/protect-digital-information/
10. A Common Sense Timeline to Quantum Safety –
Building a Quantum Risk Mgmt. Plan (QRMP)
2016 2017
2018
2019 2020 2021 2022 2023 2024 2025
Deliver Phase 1 - Quantum
Risk Management Plan as an
RFP Response
Deliver Phase 2 - Quantum-Safe Solutions:
• Quantum-safe TLS to combat data vaulting threat
• Quantum-safe code signing
• Quantum-safe symmetric keys
Deliver Phase 3 – Complete Quantum-Safety
• Quantum-Safe Standardized PKI
• Quantum-Safe Authentication, Key Management, etc.
Probability of general purpose QC
doing crypto breaking is very real
after 2022 – it could occur sooner…
1 ½ yrs 4 ½ yrs
Template for a “Quantum Risk Management Plan” (QRMP)
11. NTRU and pqNTRUsign Algorithm Summary
Quantum Bit Strength NTRU Encryption
Algorithm
pqNTRUsign Signature Algorithm
128
NTRU-443
(Private key size = 396 bits
Public key size = 665 bytes)
pqNTRUsign-563
(Private Key Size= 540 bits, Public key size =1056 bytes,
signature size = 1056 bytes )
192
NTRU-587
(Private key size = 504 bits
Public key size = 881 bytes)
pqNTRUsign-743
(Private Key Size= 560 bits, Public key size =1486 bytes,
signature size = 1486 bytes )
256
NTRU-743
(Private key size = 740 bits
Public key size = 1115 bytes)
pqNTRUsign-907
(Private Key Size = 640 bits, Public key size =1814 bytes,
signature size = 1814 bytes )
Notes:
1. For post-quantum cryptography you need to know their quantum bit strengths – not the classical bit strengths.
2. The suffixes on the NTRU and pqNTRUsign algorithms designate their polynomial which is one-half of the NTRU
lattice size they use.
3. For NTRU private keys, store the seed and compute it on demand for decryption. (private keys are less than 100
bytes). The seed size is 2x the security level (quantum bit strength) (e.g. for NTRU-443 it is 256 bits.)
12. NTRU Standardization and Adoption
• NTRUEncrypt
• 2008: IEEE standard 1363.1 – NTRUEncrypt
• 2010: X9 standard X9.98 – NTRUEncrypt
• Quantum-Safe Hybrid (QSH) Internet Draft – Standalone RFC in
Progress
• Involved with quantum-safe standardization work with NIST, ISO,
ETSI.
• Implemented in:
• wolfSSL (wolfSSL supports 1 billion TLS connections worldwide)
• Cyph (IM), Imprivata ( Healthcare IT), Unseen (IM), Texas Instruments OMAP chip
(cellphone technology), WikID (2FA) , EchoSat (POS credit card devices)
• Following the NSA Announcement, 2015 technical breakthroughs, etc. …
Interest has understandably skyrocketed.
13. How long do your secrets need to
live?
• If you send something now…
• Encrypted with an algorithm that’s later broken…
• And someone’s stored your message…
• They can decrypt it
• Encryption needs to take into account the lifetime for which
your data might remain sensitive
• Attacker who doesn’t actively get involved at the time of the
interaction, but passively records traffic for later analysis
• Fits known attacker pattern
• Attacks:
• Quantum computing
• Other yet-to-be-discovered classical
18. Potential transitional solution
• “Hybrid” approach
• FIPS-approved algorithm for conformance, quantum-safe algorithm for quantum-
safety
• But isn’t it still not allowed to run a non-Approved algorithm in Approved mode?
25. Looking closer at decryption (3)
• The field “OtherInfo” is input to
the KDF and FIPS 140-2 puts
no constraints on where it
comes from
• Idea: Use this to quantum-
safe our exchange
• Question: Is this permissible?
29. Suitable schemes in SP 800-56B
Scheme Section Uses
KDF
KAS1 Key
Agreement (basic
or with
confirmation)
8.2 ✔
KAS2 Key
agreement (basic
or with any form of
confirmation)
8.3 ✔
KTS-OAEP (basic or
with confirmation)
9.2 NO
KTS-KEM-KWS 9.3 ✔
KDF Section Allows OtherInfo
Single-step Key-
Derivation
Function
5.8.1 ✔
Extraction-then-
Expansion Key-
Derivation
Procedure
5.8.2 ✔
Application-
Specific Key-
Derivation
Methods
5.8.2
… all but one scheme, and both baseline KDFs, in SP 800-
56B support OtherInfo
==> all but one scheme, if used with either baseline KDF,
supports quantum-safe hybrid
30. Suitable Schemes in SP 800-56A
Scheme Section Uses KDF
dhHybrid1 6.1.1.1 ✔
(Cofactor) Full Unified Model 6.1.1.2 ✔
MQV2 6.1.1.3 ✔
Full MQV 6.1.1.4 ✔
dhEphem 6.1.2.1 ✔
(Cofactor) Ephemeral Unified
Model
6.1.2.2 ✔
dhHybridOneFlow 6.2.1.1 ✔
(Cofactor) One-Pass Unified Model 6.2.1.2 ✔
MQV1 6.2.1.3 ✔
One-Pass MQV 6.2.1.4 ✔
dhOneFlow 6.2.2.1 ✔
(Cofactor) One-Pass Diffie-Hellman 6.2.2.2 ✔
dhStatic 6.3.1 ✔
(Cofactor) Static Unified Model 6.3.2 ✔
KDF Section Allows OtherInfo
Single-step Key-
Derivation
Function
5.8.1 ✔
Extraction-then-
Expansion Key-
Derivation
Procedure
5.8.2 ✔
Application-
Specific Key-
Derivation
Methods
5.8.2
… every single scheme, and both baseline KDFs, in SP 800-
56A support OtherInfo
==> every scheme, if used with either baseline KDF,
supports quantum-safe hybrid
31. This is clearly okay
• q-pub/q-priv are ephemeral keys to the greatest extent possible – ideally,
they are used for a single exchange and then deleted
• It is clear that a FIPS-approved module, running in FIPS mode, can do this
• You can construct a security proof showing that this “doesn’t make things
worse”
32. TLS Negotiation with QSH (Quantum Safe
Hybrid)
Alice Symmetric Key (K1)
K1 = KDF(S,q)
Note: KDF = Key Derivation Function
Bob Symmetric Key (K2)
K2 = KDF(S,q)
Note: KDF = Key Derivation Function
#1 TLS Initial Handshake:
• Client gives NTRU public key to server and indicates it has QSH
support when it sends “HelloClient” to start negotiation
• If server selects QSH, it creates a random number, q, encrypts it
with the NTRU public key and sends it to the client.
Alice Bob
#2 Create Pre-Master Secret:
• Standard Diffie-Hellman, RSA, ECC, etc. TLS handshake protocol
runs creatings/sharing the same pre-master secret, S, on each
endpoint
Step #1
Step #2
Step #3
qq
S S
K1=K2
33. What about this?
• Same as previous, except the quantum-safe decryption runs inside the
secured boundary
• Clearly more secure…
• ... But can it be done in Approved mode?
34. Approved mode
• If we could argue that QSH wasn’t a “security” function but a “key uniqueness”
function, it would be okay to run it internally
• If we could argue that QSH wasn’t a “security” function but a “personalization
function”, it would be okay to run it internally
• If NIST changed this to “employs only Approved security functions, except to
derive the OtherInfo field”; or simply issued guidance that using non-Approved
functions to derive the OtherInfo field is okay, it would be okay to run it internally
35. • Tomorrow: QSH via ephemeral
keys in software outside the FIPS
device, shared secret entered via
OtherInfo
• Two years (?): NIST issues
guidance allowing OtherInfo to be
obtained using non-Approved
security mechanisms; FIPS-
approved devices, running in FIPS
Approved Mode, can carry out
QSH
• Five years (?): NIST approves
quantum-safe algorithms: FIPS-
approved devices can be in FIPS
mode while only running quantum-
safe algorithms
Roadmap to quantum-safe devices
running in FIPS Approved mode