Title: What are the limits of security
1What are the limits of security?
- Johannes Buchmann
- Informatik und Mathematik
- TU Darmstadt
2Crypto primitives
3Encryption
4Digital signature
?
5Digital signature
?
6RSA 1979
7General RSA
8General RSA
- G finite group
- we can efficiently compute
- product
-
9General RSA
- G finite group
- we can efficiently compute
- product
- power
-
10General RSA
- If group order unknown
- then extracting eth roots
-
- is intractable
11General RSA
- If group order unknown
- then extracting eth roots
-
- is intractable
12General RSA
- If group order k is known
- and gcd(e,k) 1, then
-
- computing eth roots is easy
13General RSA
- If group order k is known
- and gcd(e,k) 1, then
-
- computing eth roots is easy
14General RSA
- Public key group G, exponent e
-
15General RSA
- Public key group G, exponent e
- Private key order k of G
- exponent d with
- dek 1
-
16General RSA
- Public key group G, exponent e
- Private key order k of G
- exponent d with
- dek 1
- enables to extract eth roots
17Encryption
Bob
Alice
Secret message m
18Encryption
Bob
Alice
Plaintext m Bobs public key (G,e)
19Encryption
Bob
Alice
Plaintext m Bobs public key (G,e) Ciphertext
c
20Encryption
Bob
Alice
Plaintext m Bobs public key (G,e) Ciphertext
c
Bobs private key d
21Encryption
Bob
Alice
Plaintext m Bobs public key (G,e) Ciphertext
c
Bobs private key d Plaintext
22Digital signature
?
23Digital signature
?
Message m Alicess secret key d
24Digital signature
?
Message m Alicess secret key d Signature
25Digital signature
?
Message m Alicess secret key d Signature
Alices public key (e,G)
26Digital signature
?
Message m Alicess secret key d Signature
Alices public key (e,G) Verification
27Find a group G
- Finite.
- Computing in G is possible for anybody.
- Order of G can be kept secret.
28Original RSAMultiplicative group of residues
29RSA security based onfactoring problem
30RSA-155, 512 Bitstill used
n 1094173864157052742180970732204035761 2003732
9454492059909138421314763499842 889347847179972578
91267332497625752899 78183379707653724402714674353
159335433 3897
31RSA challenge numbers
- Year n Algorithm
MIPS Years - 1991 RSA-100 QS 7
- 1992 RSA-110 QS 75
- 1993 RSA-120 QS 830
- 1994 RSA-129 QS 5000
32Number Field Sieve NFS
- Invented by John Pollard 1989
- using old 8-bit computer
- Improved by many mathematicians.
33RSA challenge numbers
- Year n Algorithm
MIPS Years - 1991 RSA-100 QS 7
- 1992 RSA-110 QS 75
- 1993 RSA-120 QS 830
- 1994 RSA-129 QS 5000
- 1996 RSA-130 NFS 500
- 1999 RSA-140 NFS 2000
- 1999 RSA-155 NFS 8000
34How difficult is factoring?How secure is RSA?
- Lenstra Verheul 1999
- 1024-bit RSA secure until 2002
- 2048-bit RSA secure until 2023
35How difficult is factoring?How secure is RSA?
- Lenstra Verheul 1999
- 1024-bit RSA secure until 2002
- 2048-bit RSA secure until 2023
- but
- mathematical progress cannot be predicted
- Quantum computers?
36Why is this a problem?
- Most public key products RSA based
37RSA
38If factoring becomes easy
39If factoring becomes easy
- How to maintain security infrastructures?
40If factoring becomes easy
- How to maintain security infrastructures?
- What happens to long term encryptions?
41If factoring becomes easy
- How to maintain security infrastructures?
- What happens to long term encryptions?
- What happens to long term signatures?
42We need alternatives
- Develop new crypto primitives
- Study their security
- and efficiency
43Alternative
- Discrete logarithm problem in
- Multiplicative group of finite fields
- Point group of elliptic curve over finite field
- Class group of number field
44Alternative
- Shortest vector problem
- NTRU (Silverman)
- Goldwasser-Kilian-Halevi
45We need flexible security infrastructures
- Security solutions are very complex
- Security primitives must be easy to replace
46FlexiPKIDFG SPP SicherheitBMWi Fairpay
47FlexiPKI
Java Cryptography Architecture
48FlexiPKI
CA
IS
FlexiTrust
RA
Java Cryptography Architecture
Provider
49FlexiPKI
Exchange
File-encryption
CA
pine
SSL/TLS
IS
S/MIMEHandler
Netscape
FlexiClients
FlexiTrust
Outlook
RA
Java Cryptography Architecture
50FlexiPKI
Exchange
File-encryption
CA
pine
SSL/TLS
IS
S/MIMEHandler
Netscape
FlexiClients
FlexiTrust
Outlook
RA
Java Cryptography Architecture
Provider
Random NumberGeneration
ECC
E2
NFC
AES
PKCS11
Mars
RSA/DSA
Safer
RC6
51We needexchange strategies
- What to do with PKI-software, certificates, and
long term encryptions and signatures - if a key is broken?
- if a crypto primitive becomes insecure?
- if a protocol becomes insecure?
-
52Today implementation at Badenia
Bausparkasse. www.castforum.de www.cdc.informatik.
tu-darmstadt.de