SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018
P.1
Cryptography Unchained
Cryptography
Unchained
10 min
Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018
P.2
Cryptography Unchained
In a world where the flow of information is
increasing exponentially, it becomes essential to have
powerful tools to ensure security features in terms of
data exchange and storage (such as authenticity,
integrity, confidentiality…). Among the available tools,
the "BlockChain" focuses today all the attention and
passions.
As a particularly complex mathematical
construction, and a subject of many articles and books,
BlockChain could deeply transform many sectors and
appears as an essential component of the development
of tomorrow’s communication network. Its "basic
bricks" are quite old and belong to the vast and
fascinating field of cryptography. In this article, we
propose to go back to the roots and explore this
science of secrecy.
Very early in the development of its energy
intelligence & automation solution, our company
BeeBryte got interested in the cryptographic processes
and technologies that lay the foundations of the
security of any information system (confidentiality,
authenticity and integrity). Used separately or in
combination, these technologies are already largely
integrated into our SaaS, especially to protect
communications between our IoT gateway (Box) and
our Cloud-based platform against cyber-attacks.
Cryptography is a discipline that aims at
protecting the integrity and authenticity of a message
as well as its privacy from third-party intrusions. Used
in a vast range of areas, cryptography covers many
features, on top of which the secure transmission of
data (encryption), the generation of secrets between
users, the authentication (or signature) of a message,
and even its protection against any alteration.
Our wish here is to present some functional
components, which are essential to the
implementation of cryptographic protocols, such as
those underlying the BlockChain.
We will not go into detail about the complex
mathematical theories underpinning the exposed
tools. Globally, they rely on operations, which are
relatively simple to perform but extremely difficult to
reverse, except resorting to "brute force", i.e. the
systematic exploration of wide combinations, limited
by the available computing power. We invite the
reader interested in exploring the underlying
mathematics to further his searches on his own.
KEY CONCEPTS
Symmetric Encryption – AES algorithm
Symmetric encryption’s basic concept relies on
the sharing of a common key between interlocutors.
This key is used by the sender to encrypt his message,
which can only be decrypted by using this same key,
that only the recipient and the sender of the message
are familiar with.
The encryption algorithm makes it possible to
transform plain text into blocks which remain
incomprehensible without the key. However, these
algorithms have the major disadvantage of requiring
the prior – confidential – sharing of a common key. This
drawback can however be overcome with the help of
techniques such as the Diffie-Hellman key exchange
protocol.
The most commonly used symmetric
encryption algorithm is the Advanced Encryption
Standard (AES), notably adopted by the NSA in the
United States. This algorithm defines a number of
transformations dedicated to be carried out on data
stored in a table. The length of the key (128, 192 or
256-bit) determines the strength of the encryption.
Illustration of a typical use case:
 Bob wants to send a message to Alice, with whom
he shares a secret that they will use as the
Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018
P.3
Cryptography Unchained
encryption key. They take good care not to
communicate this key to any other third party.
 Bob encrypts the message using the encryption key,
and then sends the encrypted message to Alice.
 By also using the encryption key, Alice is able to
decrypt the message she receives, and accesses
successfully to the initial message from Bob.
Asymmetric encryption - RSA Algorithm
In asymmetric encryption, each user has a pair
of keys: a public key, broadcasted to all users, and a
private key known only to him. Each message
encrypted by one of the two keys can only be
decrypted with the other key constituting the pair.
Because of the high computational complexity
of symmetric encryption algorithms, they are typically
used to encrypt small amounts of data. The asymmetric
encryption is mainly used in 2 situations:
 To certify the identity of the message sender
Let’s consider the case where Bob wants to
transmit a message and ensures to the recipient
that he is the author. By encrypting the message
with his private key, Bob creates a digital signature
that is specific to him. Anyone can decipher his
message using Bob’s public key and thus confirm
that the message is from Bob. Indeed, the use of
another public key would return a wrong message.
 To send protected content to a specific recipient
This time, Bob wants to send a message to
Alice while ensuring that she will be the only one
able to read it. By encrypting his message with the
public key of Alice, Bob ensures that only Alice, the
unique holder of the associated private key, will
decrypt and read it.
Hash Functions
In cryptography, hash functions are
mathematical functions that take as input any type of
data and generate a code (the hash) of fixed length,
representative of the input data.
A hash function has several unique properties
that make it a useful tool for diverse applications in
computer security:
 It is deterministic: for a given input value, the hash
function will always return the same output.
Therefore, the hash can be seen as a signature of
fixed size of a message… but a non-exclusive
signature.
 In fact, several different messages can have the
same hash, but the probability of collisions (i.e. the
probability that two different messages have the
same hash) is extremely low.
This property allows you to authenticate a message:
if one knows the hash (or signature) of a message
and that it receives independently a copy of this
message, after calculation of its hash and positive
comparison with the signature, the authenticity of
the received message is quasi certain.
 A hash function is generally very sensitive to initial
conditions: the slightest modification of the content
input produces a totally different hash. This
property allows – in addition to authentication – to
ensure the integrity of a message, since the smallest
alteration will dramatically invalid its hash.
Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018
P.4
Cryptography Unchained
 It is not directly invertible: calculating the hash
corresponding to a given message is easy, but the
opposite way, that is: to find a message that
corresponds to a hash, is not possible by any direct
calculation. The only solution is to ‘chop’ or hash, in
a systematic way, different messages until falling on
the expected hash, this method being physically
limited by available computing capacity.
Illustration of a typical use case:
 Bob wants to send a message to Alice and wants to
ensure that the content of his message is not
altered during the transmission.
 Alice, on the other hand, wants to ensure that the
message she receives is exactly what Bob wanted
to send her.
 Bob hashes the message that he wants to send to
Alice. He sends his message as well as the
corresponding hash.
 When she receives the message, Alice reads the
plain text message from Bob, and hashes it on her
side. By comparing this hash to the hash Bob
transmitted, she is able to determine whether or
not the message she just read has been corrupted
during the transmission.
Conclusion
The few elementary cryptographic techniques
that we have outlined in this article constitute the basic
components from which are developed more complex
systems such as the BlockChain but can (and must) also
be considered individually as means to address a large
number of features for securing data.
This perspective appeared to us as essential to
further dispassionately discuss the potential
applications of the BlockChain to the energy sector,
with their strengths and potentials but also their
constraints and relevance limits.
BeeBryte is using IoT, AI and BlockChain to get
commercial buildings, factories, EV charging stations or
entire eco-suburbs to consume electricity in a smarter,
more efficient and cheaper way while reducing carbon
footprint! BeeBryte is based in France and Singapore,
and is accelerated by Intel & TechFounders. Since its
creation in 2015, BeeBryte's solutions have been
awarded by prestigious organizations, such as EDF
Pulse, DENA Start-up Energy Transition award & Hello
Tomorrow Challenge.
If you want to participate in the energy revolution,
please contact us at:
contact@beebryte.com
www.twitter.com/BeeBryteGroup
www.beebryte.com

Contenu connexe

Tendances

Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric keyRajat Tripathi
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesCheapSSLsecurity
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionRapidSSLOnline.com
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Techniqueijsrd.com
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Cryptography
CryptographyCryptography
CryptographyJasim Jas
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismAmit Singh
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 

Tendances (20)

Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
 
Criptography
CriptographyCriptography
Criptography
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
Encryption
EncryptionEncryption
Encryption
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
Em24873876
Em24873876Em24873876
Em24873876
 
Encryption
EncryptionEncryption
Encryption
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
Asif
AsifAsif
Asif
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cryptography
CryptographyCryptography
Cryptography
 

Similaire à Cryptography Unchained - BeeBryte (White Paper)

Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxmydrynan
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...hemanthbbc
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptxHamnaMalik31
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modiMohit Modi
 
Lecture 02 - 05 Oct 21.pptx
Lecture 02 - 05 Oct 21.pptxLecture 02 - 05 Oct 21.pptx
Lecture 02 - 05 Oct 21.pptxHammadRao5
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 

Similaire à Cryptography Unchained - BeeBryte (White Paper) (20)

Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
 
Encryption
EncryptionEncryption
Encryption
 
cryptography
cryptographycryptography
cryptography
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
H42063743
H42063743H42063743
H42063743
 
Cryp Essay
Cryp EssayCryp Essay
Cryp Essay
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
s117
s117s117
s117
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
 
Week12
Week12Week12
Week12
 
Lecture 02 - 05 Oct 21.pptx
Lecture 02 - 05 Oct 21.pptxLecture 02 - 05 Oct 21.pptx
Lecture 02 - 05 Oct 21.pptx
 
Slavisa web stories
Slavisa web storiesSlavisa web stories
Slavisa web stories
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 

Dernier

Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...amitlee9823
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...amitlee9823
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxolyaivanovalion
 

Dernier (20)

Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptx
 

Cryptography Unchained - BeeBryte (White Paper)

  • 1. Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018 P.1 Cryptography Unchained Cryptography Unchained 10 min
  • 2. Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018 P.2 Cryptography Unchained In a world where the flow of information is increasing exponentially, it becomes essential to have powerful tools to ensure security features in terms of data exchange and storage (such as authenticity, integrity, confidentiality…). Among the available tools, the "BlockChain" focuses today all the attention and passions. As a particularly complex mathematical construction, and a subject of many articles and books, BlockChain could deeply transform many sectors and appears as an essential component of the development of tomorrow’s communication network. Its "basic bricks" are quite old and belong to the vast and fascinating field of cryptography. In this article, we propose to go back to the roots and explore this science of secrecy. Very early in the development of its energy intelligence & automation solution, our company BeeBryte got interested in the cryptographic processes and technologies that lay the foundations of the security of any information system (confidentiality, authenticity and integrity). Used separately or in combination, these technologies are already largely integrated into our SaaS, especially to protect communications between our IoT gateway (Box) and our Cloud-based platform against cyber-attacks. Cryptography is a discipline that aims at protecting the integrity and authenticity of a message as well as its privacy from third-party intrusions. Used in a vast range of areas, cryptography covers many features, on top of which the secure transmission of data (encryption), the generation of secrets between users, the authentication (or signature) of a message, and even its protection against any alteration. Our wish here is to present some functional components, which are essential to the implementation of cryptographic protocols, such as those underlying the BlockChain. We will not go into detail about the complex mathematical theories underpinning the exposed tools. Globally, they rely on operations, which are relatively simple to perform but extremely difficult to reverse, except resorting to "brute force", i.e. the systematic exploration of wide combinations, limited by the available computing power. We invite the reader interested in exploring the underlying mathematics to further his searches on his own. KEY CONCEPTS Symmetric Encryption – AES algorithm Symmetric encryption’s basic concept relies on the sharing of a common key between interlocutors. This key is used by the sender to encrypt his message, which can only be decrypted by using this same key, that only the recipient and the sender of the message are familiar with. The encryption algorithm makes it possible to transform plain text into blocks which remain incomprehensible without the key. However, these algorithms have the major disadvantage of requiring the prior – confidential – sharing of a common key. This drawback can however be overcome with the help of techniques such as the Diffie-Hellman key exchange protocol. The most commonly used symmetric encryption algorithm is the Advanced Encryption Standard (AES), notably adopted by the NSA in the United States. This algorithm defines a number of transformations dedicated to be carried out on data stored in a table. The length of the key (128, 192 or 256-bit) determines the strength of the encryption. Illustration of a typical use case:  Bob wants to send a message to Alice, with whom he shares a secret that they will use as the
  • 3. Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018 P.3 Cryptography Unchained encryption key. They take good care not to communicate this key to any other third party.  Bob encrypts the message using the encryption key, and then sends the encrypted message to Alice.  By also using the encryption key, Alice is able to decrypt the message she receives, and accesses successfully to the initial message from Bob. Asymmetric encryption - RSA Algorithm In asymmetric encryption, each user has a pair of keys: a public key, broadcasted to all users, and a private key known only to him. Each message encrypted by one of the two keys can only be decrypted with the other key constituting the pair. Because of the high computational complexity of symmetric encryption algorithms, they are typically used to encrypt small amounts of data. The asymmetric encryption is mainly used in 2 situations:  To certify the identity of the message sender Let’s consider the case where Bob wants to transmit a message and ensures to the recipient that he is the author. By encrypting the message with his private key, Bob creates a digital signature that is specific to him. Anyone can decipher his message using Bob’s public key and thus confirm that the message is from Bob. Indeed, the use of another public key would return a wrong message.  To send protected content to a specific recipient This time, Bob wants to send a message to Alice while ensuring that she will be the only one able to read it. By encrypting his message with the public key of Alice, Bob ensures that only Alice, the unique holder of the associated private key, will decrypt and read it. Hash Functions In cryptography, hash functions are mathematical functions that take as input any type of data and generate a code (the hash) of fixed length, representative of the input data. A hash function has several unique properties that make it a useful tool for diverse applications in computer security:  It is deterministic: for a given input value, the hash function will always return the same output. Therefore, the hash can be seen as a signature of fixed size of a message… but a non-exclusive signature.  In fact, several different messages can have the same hash, but the probability of collisions (i.e. the probability that two different messages have the same hash) is extremely low. This property allows you to authenticate a message: if one knows the hash (or signature) of a message and that it receives independently a copy of this message, after calculation of its hash and positive comparison with the signature, the authenticity of the received message is quasi certain.  A hash function is generally very sensitive to initial conditions: the slightest modification of the content input produces a totally different hash. This property allows – in addition to authentication – to ensure the integrity of a message, since the smallest alteration will dramatically invalid its hash.
  • 4. Maxime LAHARRAGUE, Pierre-Jean LARPIN, Johanna DREANO May 30, 2018 P.4 Cryptography Unchained  It is not directly invertible: calculating the hash corresponding to a given message is easy, but the opposite way, that is: to find a message that corresponds to a hash, is not possible by any direct calculation. The only solution is to ‘chop’ or hash, in a systematic way, different messages until falling on the expected hash, this method being physically limited by available computing capacity. Illustration of a typical use case:  Bob wants to send a message to Alice and wants to ensure that the content of his message is not altered during the transmission.  Alice, on the other hand, wants to ensure that the message she receives is exactly what Bob wanted to send her.  Bob hashes the message that he wants to send to Alice. He sends his message as well as the corresponding hash.  When she receives the message, Alice reads the plain text message from Bob, and hashes it on her side. By comparing this hash to the hash Bob transmitted, she is able to determine whether or not the message she just read has been corrupted during the transmission. Conclusion The few elementary cryptographic techniques that we have outlined in this article constitute the basic components from which are developed more complex systems such as the BlockChain but can (and must) also be considered individually as means to address a large number of features for securing data. This perspective appeared to us as essential to further dispassionately discuss the potential applications of the BlockChain to the energy sector, with their strengths and potentials but also their constraints and relevance limits. BeeBryte is using IoT, AI and BlockChain to get commercial buildings, factories, EV charging stations or entire eco-suburbs to consume electricity in a smarter, more efficient and cheaper way while reducing carbon footprint! BeeBryte is based in France and Singapore, and is accelerated by Intel & TechFounders. Since its creation in 2015, BeeBryte's solutions have been awarded by prestigious organizations, such as EDF Pulse, DENA Start-up Energy Transition award & Hello Tomorrow Challenge. If you want to participate in the energy revolution, please contact us at: contact@beebryte.com www.twitter.com/BeeBryteGroup www.beebryte.com