post-quantum cryptography from lattices (6).pdf · post-quantum cryptography from lattices l´eo...

20
Post-Quantum Cryptography from Lattices eo Ducas 1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1 Funded by a PPP Grant, between NXP and CWI. eo Ducas (CWI) PQ-Crypto from Lattices

Upload: others

Post on 21-May-2020

9 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Post-Quantum Cryptography from Lattices

Leo Ducas1

CWI, Amsterdam, The Netherlands

CWI Scientific Meeting,November 2016.

1Funded by a PPP Grant, between NXP and CWI.Leo Ducas (CWI) PQ-Crypto from Lattices

Page 2: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Cryptography

Cryptography in everyday life and for critical applications

Banking Individual Industrial Journalism & Diplomacyprivacy secret Whistleblowing & Strategy

Modern CryptographyProvable confidentiality & integrity of communications . . .under an assumption, e.g. factoring large integers is intractable

CryptanalysisInvalidate the assumption ⇒ discard insecure schemesQuantify intractability ⇒ select key size for standards

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 3: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Cryptography

Cryptography in everyday life and for critical applications

Banking Individual Industrial Journalism & Diplomacyprivacy secret Whistleblowing & Strategy

Modern CryptographyProvable confidentiality & integrity of communications . . .under an assumption, e.g. factoring large integers is intractable

CryptanalysisInvalidate the assumption ⇒ discard insecure schemesQuantify intractability ⇒ select key size for standards

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 4: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

The assumptions underlying today’s cryptography

Cryptography from factoring

I Secret key: two large prime number p, qI Public key: the product N = p · q

Cryptography from Discrete Logarithm

Cryptography from Elliptic Curves Discrete Logarithm

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 5: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

The assumptions underlying today’s cryptography

Cryptography from factoring

I Secret key: two large prime number p, qI Public key: the product N = p · q

Cryptography from Discrete Logarithm

Cryptography from Elliptic Curves Discrete Logarithm

Leo Ducas (CWI) PQ-Crypto from Lattices

The Quantum CryptocalypseToday’s cryptography (Factoring, Discrete Log.) isbroken by Schor’s quantum algorithm

I Serious concerns expressed (NSA)I Call for Post-Quantum standards (NIST 2017-2020)

Page 6: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Quantum Crypto, Post-Quantum Crypto ?!

Users Attacker

Classical Crypto (Today)No Quantum computer exists

Post-Quantum Crypto2 (2030 ?)A few Quantum computers exist

Quantum Crypto (2060 ?)All computers andnetworks are Quantum

2

Also called Quantum-Safe Crypto

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 7: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Quantum Crypto, Post-Quantum Crypto ?!

Users Attacker

Classical Crypto (Today)No Quantum computer exists

Post-Quantum Crypto2 (2030 ?)A few Quantum computers exist

Quantum Crypto (2060 ?)All computers andnetworks are Quantum

2Also called Quantum-Safe CryptoLeo Ducas (CWI) PQ-Crypto from Lattices

Page 8: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Quantum Crypto, Post-Quantum Crypto ?!

Users Attacker

Classical Crypto (Today)No Quantum computer exists

Post-Quantum Crypto2 (2030 ?)A few Quantum computers exist

Quantum Crypto (2060 ?)All computers andnetworks are Quantum

2Also called Quantum-Safe CryptoLeo Ducas (CWI) PQ-Crypto from Lattices

Page 9: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Lattices: a cryptography for tomorrow

0

A lattice

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 10: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Lattices: a cryptography for tomorrow

0

The Shortest Vector Problem (SVP)

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 11: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Lattices: a cryptography for tomorrow

0

The Approximate Shortest Vector Problem (Approx-SVP)

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 12: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Lattices: a cryptography for tomorrow

0

t1

t2t2

The Bounded Distance Decoding Problem (BDD)

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 13: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Lattices: a cryptography for tomorrow

0

t1

t2t2

The Bounded Distance Decoding Problem (BDD)

Leo Ducas (CWI) PQ-Crypto from Lattices

Lattice-based CryptographyThose problems can be harnessed for cryptography.Many advantages:

I Hard against quantum computing as far as we knowI Based on worst-case problems, near NP-hard problemsI Unlocks unprecedented features

Page 14: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Lattice-based-crypto is as simple as Tetris

Cryptris: A video game to understand how it works, and why it issecure.

Developed in collaboration with Inria

http://inriamecsci.github.io/cryptris/In French only (for now ?)

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 15: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

A New Hope [Alkim, D., Poppelmann, Shwabe, 2016]Awarded the the Internet Defense Prize (Usenix & Facebook)

Many theoretical schemes proposed beforeno parameters, unrealistic constraints, . . .

NewHope: From Theory to Practice

I Proposed parameters with very strong Concrete securityI Countermeasure to Backdoors and Mass-Surveillance

attack scenario e.g. LogJam attackI Very Fast, Reasonably Compact, Simple . . .I Open-SourceI Integrated in Boring-SSL and Chrome Browser by Google.

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 16: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

“Soliloquy, A cautionary tail”, a warning from the GCHQ[Campbell-Groves-Shepherd 2014]

Algebraic structure greatly improve efficiency

but they may open the door the Shor-likes algorithm.Finding Generators using a quantum computer [Biasse-Song 2015]

Finding Mildly Short Generator [Cramer-D.-Peikert-Regev 2015]

Generalization to more ideal lattices [Cramer-D.-Wesolowski 2016]

www.quantamagazine.org/20150908-quantum-safe-encryption/

Some obstacle remainsI Midly short is not enough for attacksI (Most) Crypto use lattices with less structure

Cryptanalysis only gets betterMuch scrutiny is still needed.

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 17: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

“Soliloquy, A cautionary tail”, a warning from the GCHQ[Campbell-Groves-Shepherd 2014]

Algebraic structure greatly improve efficiencybut they may open the door the Shor-likes algorithm.

Finding Generators using a quantum computer [Biasse-Song 2015]

Finding Mildly Short Generator [Cramer-D.-Peikert-Regev 2015]

Generalization to more ideal lattices [Cramer-D.-Wesolowski 2016]

www.quantamagazine.org/20150908-quantum-safe-encryption/

Some obstacle remainsI Midly short is not enough for attacksI (Most) Crypto use lattices with less structure

Cryptanalysis only gets betterMuch scrutiny is still needed.

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 18: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

“Soliloquy, A cautionary tail”, a warning from the GCHQ[Campbell-Groves-Shepherd 2014]

Algebraic structure greatly improve efficiencybut they may open the door the Shor-likes algorithm.

Finding Generators using a quantum computer [Biasse-Song 2015]

Finding Mildly Short Generator [Cramer-D.-Peikert-Regev 2015]

Generalization to more ideal lattices [Cramer-D.-Wesolowski 2016]

www.quantamagazine.org/20150908-quantum-safe-encryption/

Some obstacle remainsI Midly short is not enough for attacksI (Most) Crypto use lattices with less structure

Cryptanalysis only gets betterMuch scrutiny is still needed.

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 19: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

“Soliloquy, A cautionary tail”, a warning from the GCHQ[Campbell-Groves-Shepherd 2014]

Algebraic structure greatly improve efficiencybut they may open the door the Shor-likes algorithm.

Finding Generators using a quantum computer [Biasse-Song 2015]

Finding Mildly Short Generator [Cramer-D.-Peikert-Regev 2015]

Generalization to more ideal lattices [Cramer-D.-Wesolowski 2016]

www.quantamagazine.org/20150908-quantum-safe-encryption/

Some obstacle remainsI Midly short is not enough for attacksI (Most) Crypto use lattices with less structure

Cryptanalysis only gets betterMuch scrutiny is still needed.

Leo Ducas (CWI) PQ-Crypto from Lattices

Page 20: Post-Quantum Cryptography from Lattices (6).pdf · Post-Quantum Cryptography from Lattices L´eo Ducas1 CWI, Amsterdam, The Netherlands CWI Scientific Meeting, November 2016. 1Funded

Thanks !

Questions ?

Leo Ducas (CWI) PQ-Crypto from Lattices