Sobre el Dinámico y Salvaje Mundo de la Criptología Matemática

Transcription

Sobre el Dinámico y Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
Sobre el Dinámico y Salvaje Mundo de la
Criptología Matemática
Adler Rensso Chung Gonzalez
∗ Universidad
Nacional de Trujillo
IV FAST WORKSHOP ON APPLIED AND
COMPUTATIONAL MATHEMATICS
Trujillo-Perú
Enero 5-6, 2011
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
CRYPTOGRAPHY
Cryptography is the study of the processes of encryption
(mapping the original message, plaintext, into a secret form,
ciphertext, using the encryption key), and decryption (inverting
the ciphertext back to the plaintext, using the corresponding
decryption key).
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
CRYPTOGRAPHY
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
CRYPTOSYSTEMS
Modern cryptography is the study of the mathematical systems
of encryption and decryption.Such mathematical system is
called the cryptographic system, or cryptosystems for short.
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
CRYPTANALYSIS
Cryptanalysis is the study of breaking the encryptions without
the knowledge of the key, i.e., the study of the cryptanalytic
attacks on cryptosystems, aiming at breaking the
cryptosystems without using/knowing the keys.
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
THE KERCKHOFFS PRINCIPLE
A cryptosystem should be secure even if the attacker knows all
details about the system, with the exception of the secret key.
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
SHANNON’S MAXIM
The enemy knows the system being used.
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
Shift Cipher (or Caesar Cipher)
Encoding of letters for the shift cipher:
A ↔ 0, B ↔ 1, C ↔ 2, · · · , Z ↔ 25
Now, the ciphertext letters are now elements of the ring Z26
Let x, y , k ∈ Z26
Encryption: ek (x) = x + k mod 26.
Decryption: dk (y ) = y − k mod 26.
Example:
Let the key be k = 17, and the plaintext is:
ATTACK = x1 , x2 , · · · , x6 = 0, 19, 19, 0, 2, 10.
The ciphertext is then computed as:
y1 , y2 , · · · , y3 = 17, 10, 10, 17, 19, 1 =rkkrtb
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
Turing was a quite brilliant mathematician, most famous for his
work on breaking the German Enigma codes. It is no
exaggeration to say that, without his outstanding contribution,
the history of World War Two could well have been very
different.
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
Cryptography concentrates on three fundamental
paradigms:
Confidentiality. The information should not leak to any
unexpected party.
Integrity. The information must be protected against any
malicious modification.
Authentication. The information should make clear who the
author of it is.
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
Some modern cryptographic problems:
Nonrepudiation. In the case of a dispute on the origin of
the document, someone should be able to formally prove
that he is not the author. This repudiation proof should be
made impossible if he actually is the author.
Electronic payment. The notion of electronic coin should
be protected against, for instance, double spending,
because it is easy to copy digital information.
Anonymity. Privacy protection may require anonymity
enforcement.
Electronic votes. Democracy protection requires that
ballots should be anonymous, that a single person should
not vote more than once, and that people should not be
able to prove for whom they voted afterwards.
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
CRYPTOLOGY
EN BREF
def
Cryptography = Encryption
L
Decription
def
Cryptanalysis = Cryptanalytic Attacks on Encryption
def
Cryptology = Cryptography
UNT
L
Cryptanalysis
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
RSA
Rivest,Shamir,Adleman
RSA was invented in 1978 by Ron Rivest, Adi Shamir, and
Leonard Adleman, and takes its name from their initials.
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
Elliptic Curve Cryptography
The idea to use elliptic curves in cryptography was
independently proposed by Neil Koblitz and Victor Miller in the
mid 1980s.
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
On cryptanalytic attacks
It is impossible to foresee the consequences of being clever.
CHRISTOPHER STRACHEY
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
Ciphertext-only attack.Eve has the ability to obtain
ciphertexts.
Known-plaintext attack.Eve has the ability to obtain
plaintext-ciphertext pairs.
Chosen-plaintext attack.Eve has the ability to obtain
ciphertexts for plaintexts of her choosing.
Adaptively-chosen-plaintext attack. This is the same as the
previous attack, except now Eve may do some analysis on
the plaintext-ciphertext pairs, and subsequently get more
pairs.
Chosen- and adaptively-chosen-ciphertext attack.These
two attacks are similar to the above plaintext attacks.
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
A PLAINTEXT
ODQSOCL OW GIU BOEE QRROHOCS QV GIUR KIA QF Q
DQCQSLR WIR ICL IW CQFQF EIYQE YIDJUVLR FGFVLDF
GIU SLV OCVI GIUR IWWOYL IC VXQV DICPQG DIRCOCS
VI WOCP VXL JXICLF ROCSOCS LHLRG YQEELR OF Q
POFVRQUSXV YICWUFLP CQFQ BIRMLR QCP LHLRG
YQEELR QFFURLF GIU VXQV XOF IR XLR WOEL IR
QYYIUCVOCS RLYIRP IR RLFLQRYX JRIKLYV LHLRG ICL
IW BXOYX OF DOFFOCS WRID VXL YIDJUVLR FGFVLD OF
QAFIEUVLEG HOVQE
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
DISTRIBUTION OF THE CHARACTERS IN A
TYPICAL ENGLISH TEXT
Letter
A
B
C
D
E
F
G
H
I
Probability
8.2%
1.5%
2.8%
4.3%
12.7%
2.2 %
2.0%
6.1%
6.0%
Letter
J
K
L
M
N
O
P
Q
R
UNT
Probability
0.2 %
0.8 %
4.2 %
2.4%
6.7%
7.5%
1.9 %
0.1 %
6.0%
Letter
S
T
U
V
W
X
Y
Z
Probability
6.3%
9.1%
2.8%
1.0%
2.3%
0.1%
2.0%
0.1%
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
DECRYPTED SECRET
IMAGINE IF YOU WILL ARRIVING AT YOUR JOB AS A
MANAGER FOR ONE OF NASAS LOCAL COMPUTER
SYSTEMS YOU GET INTO YOUR OFFICE ON THAT
MONDAY MORNING TO FIND THE PHONES RINGING
EVERY CALLER IS A DISTRAUGHT CONFUSED NASA
WORKER AND EVERY CALLER ASSURES YOU THAT HIS
OR HER FILE OR ACCOUNTING RECORD OR RESEARCH
PROJECT EVERY ONE OF WHICH IS MISSING FROM THE
COMPUTER SYSTEM IS ABSOLUTELY VITAL
Imagine, if you will, arriving at your job as a manager for one of NASA’s local computer systems. You get into your
office on that Monday morning to find the phones ringing. Every caller is a distraught, confused NASA worker. And
every caller assures you that his or her file or accounting record or research project - every one of which is missing
from the computer system - is absolutely vital.
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
Social Engineering Attacks
For instance, forcing someone to reveal his/her secret key, e.g.,
by holding a gun to his/her head can be quite successful.
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
CRYPTANALYSIS
Classical cryptanalysis
1
2
Mathematical analysis
Brute-Force Attacks: which treat the encryption algorithm
as a black box and test all possible keys
Implementation Attacks: side-channel analysis can be
used to obtain a secret key, for instance, by measuring the
electrical power consumption of a processor which
operates on the secret key.
Social Engineering
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
QUANTUM CRYPTOGRAPHY
I think that it is safe to say that nobody understands quantum
mechanics.
Richard Feynman
UNT
...Salvaje Mundo de la Criptología Matemática
UNIVERSIDAD NACIONAL DE TRUJILLO - IV FAST WORKSHOP ON APPLIED AND COMPUTATIONAL MATHEMATICS
WIKILEAKS
The Chaos Computer Club (CCC)
UNT
...Salvaje Mundo de la Criptología Matemática