Title: How secure is Public Key Cryptography
1How secure is Public Key Cryptography ?
- Johannes Buchmann
- Informatik und Mathematik
- TU Darmstadt
2Security goals
3Security goals
4Security goals
- Confidentiality
- Authentication
-
-
5Security goals
- Confidentiality
- Authentication
- Integrity
-
6Security goals
- Confidentiality
- Authentication
- Integrity
- Non-repudiation
7Encryption
8Digital signature
?
9Digital signature
?
10General RSA
11General RSA
12General RSA
- G group
- we can efficiently compute
- product
-
13General RSA
- G group
- we can efficiently compute
- product
- power
-
14General RSA
- If group order unknown
- then extracting eth roots
-
- is intractable
15General RSA
- If group order unknown
- then extracting eth roots
-
- is intractable
16General RSA
- If group order k is known
- and gcd(e,k) 1, then
-
- computing eth roots is easy
17General RSA
- If group order k is known
- and gcd(e,k) 1, then
-
- computing eth roots is easy
18General RSA
- Public key group G, exponent e
-
19General RSA
- Public key group G, exponent e
- Private key order k of G
- exponent d with
- dek 1
-
20General RSA
- Public key group G, exponent e
- Private key order k of G
- exponent d with
- dek 1
- enables to extract eth roots
21Encryption
Bob
Alice
Secret message m
22Encryption
Bob
Alice
Plaintext m Bobs public key (G,e)
23Encryption
Bob
Alice
Plaintext m Bobs public key (G,e) Ciphertext
c
24Encryption
Bob
Alice
Plaintext m Bobs public key (G,e) Ciphertext
c
Bobs private key d
25Encryption
Bob
Alice
Plaintext m Bobs public key (G,e) Ciphertext
c
Bobs private key d Plaintext
26Digital signature
?
27Digital signature
?
Message m Alicess secret key d
28Digital signature
?
Message m Alicess secret key d Signature
29Digital signature
?
Message m Alicess secret key d Signature
Alices public key (e,G)
30Digital signature
?
Message m Alicess secret key d Signature
Alices public key (e,G) Verification
31Multiplicative group of residues
32RSA security based onfactoring problem
33Fermat numbers
34Fermat numbers
F0 3, F1 5, F2 17, F3 257, F4
65537 prime numbers
35 Factorizations of m Digits Year
Discoverer 5 10 1732 Euler
6 20 1880 Landry Le
Lasseur 7 39 1970 Morrison
Brillhart 8 78 1980 Brent
Pollard 9 155 1990 Lenstra,
Manasse a larger team 10 309 1953
Selfridge 1962
Brillhart 1995
Brent 11 617 1899 Cunningham
1988 Brent Morain
36RSA-155, 512 Bitstill used
n 1094173864157052742180970732204035761 2003732
9454492059909138421314763499842 889347847179972578
91267332497625752899 78183379707653724402714674353
159335433 3897
37RSA challenge numbers
- Year n Algorithm
MIPS Years - 1991 RSA-100 QS 7
- 1992 RSA-110 QS 75
- 1993 RSA-120 QS 830
- 1994 RSA-129 QS 5000
38RSA challenge numbers
- Year n Algorithm
MIPS Years - 1991 RSA-100 QS 7
- 1992 RSA-110 QS 75
- 1993 RSA-120 QS 830
- 1994 RSA-129 QS 5000
- 1996 RSA-130 NFS 500
39RSA challenge numbers
- Year n Algorithm
MIPS Years - 1991 RSA-100 QS 7
- 1992 RSA-110 QS 75
- 1993 RSA-120 QS 830
- 1994 RSA-129 QS 5000
- 1996 RSA-130 NFS 500
- 1999 RSA-140 NFS 2000
- 1999 RSA-155 NFS 8000
40Complexity
41Complexity
42Complexity
43Complexity
u1 exponential time
u0 polynomial time
44MPQS (1985, Silverman)
45MPQS (1985, Silverman)
46ECM (Lenstra 1985)
47ECM (Lenstra 1985)
48NFS (1990, Pollard)
49NFS (1990, Pollard)
50NFS (1990, Pollard)
51How difficult is factoring?How secure is RSA?
- Lenstra Verheul 1999
- 1024-bit RSA secure until 2002
- 2048-bit RSA secure until 2023
52How difficult is factoring?How secure is RSA?
- Lenstra Verheul 1999
- 1024-bit RSA secure until 2002
- 2048-bit RSA secure until 2023
- but
- mathematical progress cannot be predicted
53Why is this a problem?
- Most public key products RSA based
54RSA
55If factoring becomes easy
56If factoring becomes easy
- How to maintain security infrastructures?
57If factoring becomes easy
- How to maintain security infrastructures?
- What happens to long term encryptions?
58If factoring becomes easy
- How to maintain security infrastructures?
- What happens to long term encryptions?
- What happens to long term signatures?
59We need alternatives
- Develop new crypto primitives
- Study their security
- and efficiency
60Alternative
- Discrete logarithm problem
61Groups
62Groups
- Multiplicative group of finite fields
63Groups
- Multiplicative group of finite fields
- Point group of elliptic curve over finite field
64Groups
- Multiplicative group of finite fields
- Point group of elliptic curve over finite field
- Class group of number field
65Alternative
- Shortest vector problem
- NTRU (Silverman)
- Goldwasser-Kilian-Halevi
Given an n-dimensional lattice Find a shortest
non-zero lattice vector
66We need alternative
- symmetric cryptosystems
- hash functions
- pseudorandom number generators
- ...
67We need provably secure protocols
- Even if factoring is hard,
- original RSA is insecure
68Do you want to marry me?
69Do you want to marry me?
c RSA(Answer)
70Do you want to marry me?
c RSA(Answer)
Oscar computes y RSA(yes) and n RSA(no)
71Do you want to marry me?
c RSA(Answer)
Oscar computes y RSA(yes) and n RSA(no) If c
y, then Answer yes. If c n, then Answer no.
72We need flexible security infrastructures
- Security solutuions are very complex
- Security primitives must be easily replacable
73FlexiPKI
74FlexiPKI
Java Cryptography Architecture
75FlexiPKI
CA
IS
FlexiTrust
RA
Java Cryptography Architecture
Provider
76FlexiPKI
Exchange
File-encryption
CA
pine
SSL/TLS
IS
S/MIMEHandler
Netscape
FlexiClients
FlexiTrust
Outlook
RA
Java Cryptography Architecture
77FlexiPKI
Exchange
File-encryption
CA
pine
SSL/TLS
IS
S/MIMEHandler
Netscape
FlexiClients
FlexiTrust
Outlook
RA
Java Cryptography Architecture
Provider
Random NumberGeneration
ECC
E2
NFC
AES
PKCS11
Mars
RSA/DSA
Safer
RC6
78We needexchange strategies
- What to do with PKI-software, certificates, and
long term encryptions and signatures
79We needexchange strategies
- What to do with PKI-software, certificates, and
long term encryptions and signatures - if a key is broken?
-
80We needexchange strategies
- What to do with PKI-software, certificates, and
long term encryptions and signatures - if a key is broken?
- if a crypto primitive becomes insecure?
-
81We needexchange strategies
- What to do with PKI-software, certificates, and
long term encryptions and signatures - if a key is broken?
- if a crypto primitive becomes insecure?
- if a protocol becomes insecure?
-
82Information www.cdc.informatik.tu-darmstadt.de