RSA: 1977--1997 and beyond
Download
Report
Transcript RSA: 1977--1997 and beyond
CRYPTOGRAPHY:
STATE OF THE SCIENCE
ASIACRYPT 2003 invited talk
Adi Shamir
Computer Science Dept
The Weizmann Institute
Israel
Cryptography: major trends
Cryptography: major trends
From secret to public
Cryptography is central
Com&info
theory
Math&
stat
Comp
science
crypto
Policy
issues
Computers
and chips
Hi-tech
industry
Cryptography is fun
Gets
lots of media attention
Attracts hackers
Is full of delightful ideas
Serves as an excellent educational tool
Cryptography: major trends
From secret to public
From national to international
The geography of cryptography
Publicly started in the US
The geography of cryptography
Publicly started in the US
Followed by Europe
The geography of cryptography
Publicly started in the US
Followed by Europe
Is rapidly expanding in Asia
Cryptography: major trends
From secret to public
From national to international
From art to science
Cryptography as a scientific discipline
Is thriving as a scientific area of research:
Taught at most major universities
Attracts many excellent students
Discussed at many conferences
(>25 in the next 6 months!)
Published in hundreds of papers (e.g., EPRINT)
Major conferences have >500 attendees
(Major trade shows have >10,000 attendees)
Received the ultimate seal of approval from the
general CS community (the Turing award…)
Should we rename the field?
Cryptography means “secret writing”
The official naming of the field:
Cryptology = Cryptography + cryptanalysis
Should we rename the field?
Cryptography means “secret writing”
The official naming of the field:
Cryptology = Cryptography + cryptanalysis
These terms have problematic conotations
Many research subfields do not deal with the
encryption or decryption of secret information
Should we rename the field?
Cryptography means “secret writing”
The official naming of the field:
Cryptology = Cryptography + cryptanalysis
These terms have problematic conotations
Many research subfields do not deal with the
encryption or decryption of secret information
I propose to call the broader field
Adversity Theory = cryptology + other areas
Cryptography: major trends
From secret to public
From national to international
From art to science
From math to physics
Related scientific fields:
OLD
COMBINATIONS:
Probability and statistics
Algebra
Number Theory
Related scientific fields:
OLD
COMBINATIONS:
Probability and statistics
Algebra
Number Theory
NEW
COMBINATIONS:
Signal processing (in steg, fingerprinting)
Electronics (in side channel attacks)
Physics (in quantum computers and crypto)
Cryptography: major trends
From secret to public
From national to international
From art to science
From math to physics
From theory to practice
Cryptography unites Theory & practice
Practical theory:
- using abstract math tools in cryptanalysis
- proving the security of real protocols
-developing new cryptographic schemes
Theoretical practice:
- developing new notions of security, complexity,
logics, and randomness
- turning cryptography from art to science
New challenges in cryptography
Payment
systems
Cellular telephony
Wi-Fi networks
RFID tags
DRM systems
Cryptography: major trends
From secret to public
From national to international
From art to science
From math to physics
From theory to practice
From political to legal issues
Cryptographic misconceptions
By policy makers: crypto is dangerous, but:
- weak crypto is not a solution
- controls can’t stop the inevitable
By researchers: A provably secure system is secure, but:
- proven false by indirect attacks
- can be based on false assumptions
- requires careful choice of parameters
By implementers: Cryptography solves everything, but:
- only basic ideas are successfully deployed
- only simple attacks are avoided
- bad crypto can provide a false sense of security
The three laws of security:
Absolutely
secure systems do not exist
To
halve your vulnerability, you have to
double your expenditure
Cryptography
penetrated
is typically bypassed, not
Cryptography: A rapidly moving field
Cryptography: A rapidly moving field
75-80: Public key cryptography, basic schemes
Cryptography: A rapidly moving field
75-80: Public key cryptography, basic schemes
80-85: Theoretical foundations, new protocols
Cryptography: A rapidly moving field
75-80: Public key cryptography, basic schemes
80-85: Theoretical foundations, new protocols
85-90: Zero Knowledge, secure computation
Cryptography: A rapidly moving field
75-80: Public key cryptography, basic schemes
80-85: Theoretical foundations, new protocols
85-90: Zero Knowledge, secure computation
90-95: Diff&lin cryptanalysis, quantum comp
Cryptography: A rapidly moving field
75-80: Public key cryptography, basic schemes
80-85: Theoretical foundations, new protocols
85-90: Zero Knowledge, secure computation
90-95: Diff&lin cryptanalysis, quantum comp
95-00: Side channel attacks, elliptic curves
Cryptography: A rapidly moving field
75-80: Public key cryptography, basic schemes
80-85: Theoretical foundations, new protocols
85-90: Zero Knowledge, secure computation
90-95: Diff&lin cryptanalysis, quantum comp
95-00: Side channel attacks, elliptic curves
00-05: ???
The basic schemes: Major trends
The basic schemes: Major trends
Secret key cryptography: DES out, AES in
The basic schemes: Major trends
Secret key cryptography: DES out, AES in
Public key cryptography: RSA steady, EC improving,
faster schemes increasingly risky and less appealing.
Should not be used for long term security.
The basic schemes: Major trends
Secret key cryptography: DES out, AES in
Public key cryptography: RSA steady, EC improving,
faster schemes increasingly risky and less appealing.
Should not be used for long term security.
Quantum schemes: the wild card
Some of my controvertial positions:
Some of my controvertial positions:
When applied in practice:
Some of my controvertial positions:
When applied in practice:
Security should not be overdone
Some of my controvertial positions:
When applied in practice:
Security should not be overdone
Security should not be overexposed
Some of my controvertial positions:
When applied in practice:
Security should not be overdone
Security should not be overexposed
Security should not be underregulated
Some of my controvertial positions:
When applied in practice:
Security should not be overdone
Security should not be overexposed
Security should not be underregulated
Security should be guided by an ethical code
Some of my controvertial positions:
When applied in practice:
Security should not be overdone
Security should not be overexposed
Security should not be underregulated
Security should be guided by an ethical code
Security should be complemented by legal measures
Cryptographic status report
In each of the six major subareas I’ll
summarize:
The
major achievements so far
Strong and weak points, major challenges
A 1-10 grade
Theory of cryptography
Well defined primitives & definitions of security
Well understood relationships between notions
Deep connections with randomness & complexity
Beautiful mathematical results
Highly developed theory
Excellent design tools
Challenge: reduce dependence on assumptions
Final grade: 9
Public key encryption and
signature schemes
RSA, DH, DSA
Based on modular arithmetic, EC, other ideas(?)
Vigorous cryptanalytic research
Excellent theory
Expanding applications
Challenges: Break a major scheme, make a new one
Final grade: 8
Secret key cryptography –
block ciphers
DES, AES, modes of operation
Differential and linear cryptanalysis
Good cryptanalytic tools
Reasonable choice of primitives
Many good schemes
Challenge: Connect strong theory with strong practice
Final grade: 7
Secret key cryptography –
stream ciphers
Linear feedback shift registers
Fast correlation attacks, algebraic attacks
Limited cryptanalytic tools
Narrow choice of primitives
Many insecure schemes
Challenge: Improve weak theory and weak practice
Final grade: 4
Theoretical Cryptographic protocols
Zero knowledge interactive proofs
Secure multiparty computations
Almost anything is doable and provable
Many gems
Theoretical protocols are too slow
Challenge: Make the strong theory practical
Final grade: 8
Practical Cryptographic protocols
Many ad-hoc ideas
Proofs in the random oracle model (ROM)
Rapidly expanding body of results
Lots of buggy protocols
Reasonable design primitives
Improving theory
Challenges: incorporate side channel attacks, ROM
Final grade: 5
Cryptographic predictions:
AES will remain secure for the forseeable future
Some PK schemes and key sizes will be
successfully attacked in the next few years
Crypto will be invisibly everywhere
Vulnerabilities will be visibly everywhere
Crypto research will remain vigorous, but only its
simplest ideas will become practically useful
Non-crypto security will remain a mess
Summary
It
was a thrilling 25 year journey
The
best is yet to come
Thanks
to everyone!