by prashant chugh c-dot, new delhi - itu · international standardization efforts etsi has issued a...

26
Copyright @ 2018, C-DoT, All rights reserved By Prashant Chugh C-DOT, New Delhi

Upload: others

Post on 19-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

Copyright @ 2018, C-DoT, All rights reserved

ByPrashant ChughC-DOT, New Delhi

Page 2: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

Background

Cryptography

Types of cryptography

Quantum Computing & algorithms

Threat to current cryptographic systems

International efforts in Standardization of PQC

Quantum-safe techniques

C-DOT’s CEM (Compact Encryptor Module)

A recall of M2M Architecture

Quantum-safe encryption in M2M

Agenda

Copyright @ 2018, C-DoT, All rights reserved1 November 2018 2

Page 3: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

Background Cryptography

Cryptography is a tool that is used by securitypractitioners everywhere to protect anything thatrelies on electronic communication and data storage

Cryptography is a foundational building block forsecure banking, e-commerce and securecommunications and is a prime area of NationalSecurity

Cryptography uses computational hardness as a meansto protect sensitive data. This is to say that there arecryptographic problems that are difficult or impossibleto solve using conventional computing

1 November 2018 3Copyright @ 2018, C-DoT, All rights reserved

Page 4: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

Background Types of Cryptography

Secret Key Cryptography (SKC)– Also referred to as Symmetric encryption.– Only one key is used for both encryption and decryption.– much faster than asymmetric algorithms

Public Key Cryptography (PKC)– Also called Asymmetric encryption– Two keys are used (public and private keys)– Sender encrypts the information using the receiver’s public key. The receiver decrypts the message using his/her private key

Hash Functions– No key / with key– Also called one-way encryption– mainly used to ensure that a file has remained unchanged.

1 November 2018 4Copyright @ 2018, C-DoT, All rights reserved

Page 5: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

Background Quantum Computing Quantum computing is a new branch of computing

in which fundamental unit of storage is qubits ratherthan bits in the conventional computer. A qubit canstore both 0 and 1 at the same time.

Quantum computers can perform very rapid parallelcomputations as compared to classical computers.

For certain classes of mathematical problems likeinteger factorization and discrete logarithms,quantum computers are able to perform much betterthan classical computers

1 November 2018 5Copyright @ 2018, C-DoT, All rights reserved

Page 6: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

Background Quantum Algorithms

Algorithms that run on Quantum computers are calledQuantum Algorithms

Some cryptographic problems, which are difficult or impossibleto solve using conventional computing, become fairly trivial tosolve using quantum algorithms

Two quantum algorithms- Shor’s algorithm and Grover'salgorithm are a threat to many currently widely usedcryptosystems

A lot of further research is happening in the field of QuantumComputers and Quantum Algorithms

A more than 50 qubit Quantum Computer is expected to bedeveloped any time in next 10 years and this is likely to be morepowerful than any of the supercomputers existing today.

1 November 2018 6Copyright @ 2018, C-DoT, All rights reserved

Page 7: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

Threat to Cryptographic Systems

Breaking a cryptographic algorithm can havecatastrophic repercussions for anyone using thatalgorithm who is ignorant of its compromise.

There is a great advantage for anyone who can breakadversary’s cryptographic algorithm.

Cryptographic Systems are increasingly vulnerable toquantum attacks as quantum computing matures andthe state of the art in computation and algorithmdesign is redefined.

1 November 2018 7Copyright @ 2018, C-DoT, All rights reserved

Page 8: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

…contd…

Threat to Cryptographic Systems Security practitioners today are giving early warning of

the wide scale security collapse of communicationsinfrastructure due to heavy reliance on Diffie-Hellman, RSA and ECC.

Almost all public key cryptography products beingused today rely on one or more of RSA, DSA, DH,ECDH or ECDSA & their variants.

Symmetric cryptography algorithms using AES are sofar considered safe from quantum computers.

However, most systems using AES rely on public keycryptography for key distribution which is vulnerable.

1 November 2018 8Copyright @ 2018, C-DoT, All rights reserved

Page 9: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

….contd…

Threat to Cryptographic Systems Secure Communication Protocols that are under threat

include: IPSecSSH and TLSVPNS/MIMEHTTPS

Even encrypted information sitting in a database for pastmany years will be subject to decryption by those havingaccess to quantum computing platforms

These include the possible misuse of the previouslyencrypted banking information, identity information anditems relating to state & military security secrets and othersensitive information.

1 November 2018 9Copyright @ 2018, C-DoT, All rights reserved

Page 10: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

….contd…

Threat to Cryptographic Systems

1 November 2018 10Copyright @ 2018, C-DoT, All rights reserved

Page 11: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

….contd…

Threat to Cryptographic SystemsComparison of conventional and Quantum Security levels of some popular ciphers

Reference: ETSI Quantum-safe Whitepaper- June 2015

1 November 2018 11

Algorithm Key Length Effective Key Strength / Security Level

Conventional Computing

Quantum Computing

RSA-1024 1024 bits 80 bits 0 bits

RSA-2048 2048 bits 112 bits 0 bits

ECC-256 256 bits 128 bits 0 bits

ECC-384 384 bits 256 bits 0 bits

AES-128 128 bits 128 bits 64 bits

AES-256 256 bits 256 bits 128 bits

Copyright @ 2018, C-DoT, All rights reserved

Page 12: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

DefinitionQuantum-safe cryptography: The field ofcryptography whose objective is to create public keycryptosystems that are expected to be secure against thethreat of quantum computers.

This is also called Quantum-resistant cryptographyor Post-Quantum cryptography

1 November 2018 12Copyright @ 2018, C-DoT, All rights reserved

Page 13: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

International Standardization Efforts ETSI has issued a whitepaper titled “Quantum Safe Cryptography and Security:

An introduction, benefits, enablers and challenges” and has launched an IndustrySpecification Group on Quantum Safe Cryptography (ISG-QSC) in 2015.

NIST has already started a process for standardizing the quantum-resistantcryptographic algorithms, for which first list of submissions were made public inJan’18 and first conference was held in April’18.

IETF has come up with an RFC draft in Oct 2016 on an extension of IKEv2 forquantum resistance.

10 years to maximum 15 years is the Time frame in which most experts predictthat quantum computers to break most current cryptographic standards shall beavailable. However, some experts feel it could be as early as 2025.

Besides known companies/ universities working in development of quantumcomputers, there may be top-secret projects by Governments/ large companiesfor Quantum Computers Development.

Considering time needed to bring out new cryptographic standards is usually 8-9years, ETSI says that we may already be late to start building Quantum-Safecryptography algorithms for critical sectors.

1 November 2018 13Copyright @ 2018, C-DoT, All rights reserved

Page 14: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

International Proprietary Efforts and Approach

Google- Tested a proprietary Post-quantum encryption algorithmcalled “New Hope” in Chrome Web browser.

Since the proprietary algorithm used in the above scenarios is not yetproven for security, hence the approach in Chrome’s testing isQuantum-safe hybrid.

In Quantum-safe hybrid approach, handshake is done using two keyexchange algorithms-one post quantum algorithm and one traditionalalgorithm. It allows early adopters to retain the current security oftraditional algorithms while experimenting with post quantumalgorithms and getting the post quantum algorithm & implementationverified through critical public reviews & cryptanalysis.

This hybrid approach has its performance cost but is going to be thelikely approach in introduction of any post quantum crypto algorithmin future.

1 November 2018 14Copyright @ 2018, C-DoT, All rights reserved

Page 15: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

Quantum-Safe Techniques QKD at physical layer

QKD or Quantum Key distribution has been proposedas one solution for key distribution problem

QKD is based on fundamental laws of quantumphysics and information is encoded in quantum statesof light

QKD is proven to be theoretically secure againstarbitrary attacks, including quantum attacks

1 November 2018 15Copyright @ 2018, C-DoT, All rights reserved

Page 16: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

Quantum-Safe Techniques Need for new algorithms

Many of the quantum safe algorithms based on hardproblems of mathematics have also been proposed,which are being discussed and evaluated in NIST &other international forums.

Unlike QKD approach, these algorithms are easy todeploy and replace the existing crypto systems.

Cryptographic algorithms usually require years ofpublic review & scrutiny before there security can beestablished.

1 November 2018 16Copyright @ 2018, C-DoT, All rights reserved

Page 17: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

1 November 2018 17

Many new algorithms have already been made publicby NIST in Jan’18.

There is a need to integrate new quantum-safealgorithms with existing cryptographic products suchthat new quantum-safe algorithms co-exist withexisting non-quantum-safe/classical algorithms.

Integration of a new quantum-safe algorithm shouldonly be done after thorough comparison of all thepopular algorithms in cryptographic community.

Need for cryptographic products integration with new quantum-safe algorithms

Copyright @ 2018, C-DoT, All rights reserved

Page 18: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

C-DOT’s CEM (Compact Encryption Module)

1 November 2018 18

Page 1

Copyright @ 2018, C-DoT, All rights reserved

Page 19: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

1 November 2018 19

Page 2

Contd…C-DOT’s CEM (Compact Encryptor Module)

Copyright @ 2018, C-DoT, All rights reserved

Page 20: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

PQC Use case (encrypted video streaming) using C-DOT’s CEM

C-DoT LAN

20.20.20.100

Video Terminal 1

Video Terminal 2

40.40.40.100

192.168.3.250192.168.104.213

Compact Encryption Module 1

20.20.20.140.40.40.1

Compact Encryption Module 2

PQC Key Exchange

Tunnel with DH 1040IKE INIT

IKE Response

PacketPacket

Packet

Copyright @ 2018, C-DoT, All rights reserved

Page 21: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

A recall of M2M Architecture

1 November 2018 Copyright © C-DOT 21

Reference Point

Common Services EntityApplication Entity

Network Services EntityNode

UnderlyingNetwork

UnderlyingNetwork

CSE

AE

NSE

CSE

AE

NSE

CSE

AE

NSENSE

Application Service Node Middle Node Infrastructure Node

ApplicationLayer

ServiceLayer

NetworkLayer

Mca

Mcn

Mca Mca

McnMcnMcnMcc Mcc

CSE

Mcc’

Inf. Node

Page 22: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

1 November 2018 Copyright © C-DOT 22

Configurations supported by oneM2M Architecture

Page 23: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

1 November 2018 Copyright © C-DOT 23

Description of Nodes in OneM2M Architecture

Application Dedicated Node (ADN):

An Application Dedicated Node is a Node that contains at least one Application Entity and does not contain a Common Services Entity.Example of physical mapping: an Application Dedicated Node could reside in a constrained M2M Device.

Application Services Node(ASN):

An Application Service Node is a Node that contains one CommonServices Entity and contains at least one Application Entity.

Example of physical mapping: an Application Service Node couldreside in an M2M Device.

Page 24: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

1 November 2018 24

Infrastructure Node (IN):

An Infrastructure Node is a Node that contains one Common Services Entity and contains zero or more Application Entities.

Example of physical mapping: an Infrastructure Node could reside in an M2M Server.

Middle Node (MN):A Middle Node is a Node that contains one Common Services Entity and contains zero or more Application Entities. Example of physical mapping: a Middle Node could reside in an M2M Gateway.

Description of Nodes in OneM2M Architecture

Copyright @ 2018, C-DoT, All rights reserved

Page 25: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

1 November 2018 25

Quantum-safe encryption in M2M

Quantum-safe-encryption offers future-proof security and may be used between various nodes in M2M architecture such as between: NSE and CSE AE and CSE

C-DOT based Compact Encryptor Module which offers Quantum-safe-hybrid implementation can be used for the same.

Copyright @ 2018, C-DoT, All rights reserved

Page 26: By Prashant Chugh C-DOT, New Delhi - ITU · International Standardization Efforts ETSI has issued a whitepaper titled “QuantumSafe Cryptography and Security: An introduction, benefits,

1 November 2018 26Copyright @ 2018, C-DoT, All rights reserved