SlideShare a Scribd company logo
1 of 14
Encryption now and in the future
Lars Ramkilde Knudsen
Professor @ DTU
Chief Cryptographer @ Dencrypt
20/03-2014Lars R. Knudsen www.dencrypt.dk2 DTU Compute, Technical University of Denmark
About me
• 2001 Professor, DTU, Denmark
• 1999 Professor, University of Bergen, Norway
• 1994 PhD in cryptography, Aarhus University
• Co-designer of Serpent, Grøstl, Present
• Many contributions in cryptanalysis
• Heavily involved in the AES process
20/03-2014Lars R. Knudsen www.dencrypt.dk3 DTU Compute, Technical University of Denmark
Outline
• Encryption
– AES
– RSA
• State of the art cryptanalysis
• “New” cryptanalysis
• Encryption in the future ?
20/03-2014Lars R. Knudsen www.dencrypt.dk4 DTU Compute, Technical University of Denmark
Symmetric encryption
20/03-2014Lars R. Knudsen www.dencrypt.dk5 DTU Compute, Technical University of Denmark
Symmetric encryption
Name Standard
since
Designed
around
DES: Data Encryption Standard 1977 1974 ?
AES: Advanced Encryption Standard 2001 1996
RC4 (not a
standard)
“Public”
since 1994
1987
SHA-1 1993 1991 ?
20/03-2014Lars R. Knudsen www.dencrypt.dk6 DTU Compute, Technical University of Denmark
Public-key encryption
Message MessageEncryption Decryption
Public-key encryption
%AC&@9^(
20/03-2014Lars R. Knudsen www.dencrypt.dk7 DTU Compute, Technical University of Denmark
Public-key encryption
Name Relying on
difficulty of
Designed
around
Comment
RSA Factoring 1977 De facto
standard
El-Gamal Discrete logarithm
in Zp
1985 Used for
signatures
Elliptic curves Discrete logarithm
in EC
1985 Attractive,
short keys
Diffie-Hellman DH-problem in Zp 1976 Classic
20/03-2014Lars R. Knudsen www.dencrypt.dk8 DTU Compute, Technical University of Denmark
State-of-the art cryptanalysis of AES
Algorithm Number of rounds
AES-128 10
AES-192 12
AES-256 14
Number of
rounds
Year Comment
6 1997 “Practical”
7 2000/2008 Not practical
8 2008 Not practical
9 2014 Not practical
( 10 2011 Biclique )
( 11 2009 Related keys)
20/03-2014Lars R. Knudsen www.dencrypt.dk9 DTU Compute, Technical University of Denmark
State-of-the-art, factoring RSA numbers
0
100
200
300
400
500
600
700
800
900
1985 1990 1995 2000 2005 2010 2015
Factoring RSA numbers
Factoring RSA
numbers
20/03-2014Lars R. Knudsen www.dencrypt.dk10 DTU Compute, Technical University of Denmark
RSA key sizes used now
www Public-key Hash Size of keys
SAS RSA SHA-1 2048
Facebook RSA SHA-1 2048
IACR RSA SHA-1 2048
EFF RSA SHA-1 4096
20/03-2014Lars R. Knudsen www.dencrypt.dk11 DTU Compute, Technical University of Denmark
RSA versus AES, effective key lengths
RSA modulo in bits Effective key length
1024 86
2048 116
4096 156
AES Effective key length
AES-128 128
AES-192 192
AES-256 256
20/03-2014Lars R. Knudsen www.dencrypt.dk12 DTU Compute, Technical University of Denmark
How much can “they” break ?
Traditional cryptanalysis
–AES: I don’t know, but design almost 20 years old..
–RSA: more is known about factoring than what is
publicly available
We have learned that practical breaks also include to
–Steal or find the key
–Exploit non-randomness in keys
–Exploit bad implementations (software and hardware)
20/03-2014Lars R. Knudsen www.dencrypt.dk13 DTU Compute, Technical University of Denmark
Cryptography in the future
Conventional crypto-security principles
• Kerckhoffs’ principle
• Standard algorithms, old algorithms….
• Public keys can be made public
New crypto-security principles
• Dynamic encryption, ignoring Kerckhoffs
• Trust the cryptographers, use newer systems
• Public keys do not have to be public
• Mind your random numbers
20/03-2014Lars R. Knudsen www.dencrypt.dk14 DTU Compute, Technical University of Denmark
Thank you for your attention

More Related Content

Similar to Encryption Past, Present and Future

Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelMohit Goel
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsAngelo Corsaro
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.Tuhin_Das
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsReza Rahimi
 
Detecting Mobile Malware with Apache Spark with David Pryce
Detecting Mobile Malware with Apache Spark with David PryceDetecting Mobile Malware with Apache Spark with David Pryce
Detecting Mobile Malware with Apache Spark with David PryceDatabricks
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxHardik Manocha
 
Cyclone DDS Unleashed: The Origins
Cyclone DDS Unleashed: The OriginsCyclone DDS Unleashed: The Origins
Cyclone DDS Unleashed: The OriginsZettaScaleTechnology
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 

Similar to Encryption Past, Present and Future (20)

Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
Nwc rsa
Nwc rsaNwc rsa
Nwc rsa
 
CV English
CV EnglishCV English
CV English
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
 
cv-frode-figenschou-en
cv-frode-figenschou-encv-frode-figenschou-en
cv-frode-figenschou-en
 
SMRUDAS
SMRUDAS SMRUDAS
SMRUDAS
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
Resume 2012 05
Resume 2012 05Resume 2012 05
Resume 2012 05
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
 
Detecting Mobile Malware with Apache Spark with David Pryce
Detecting Mobile Malware with Apache Spark with David PryceDetecting Mobile Malware with Apache Spark with David Pryce
Detecting Mobile Malware with Apache Spark with David Pryce
 
Presentation
PresentationPresentation
Presentation
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 
Cyclone DDS Unleashed: The Origins
Cyclone DDS Unleashed: The OriginsCyclone DDS Unleashed: The Origins
Cyclone DDS Unleashed: The Origins
 
SILECS/SLICES
SILECS/SLICESSILECS/SLICES
SILECS/SLICES
 
Curriculum Vitae It Oriented
Curriculum Vitae It OrientedCurriculum Vitae It Oriented
Curriculum Vitae It Oriented
 
H42054550
H42054550H42054550
H42054550
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 

More from InfinIT - Innovationsnetværket for it

More from InfinIT - Innovationsnetværket for it (20)

Erfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermarkErfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermark
 
Object orientering, test driven development og c
Object orientering, test driven development og cObject orientering, test driven development og c
Object orientering, test driven development og c
 
Embedded softwaredevelopment hcs
Embedded softwaredevelopment hcsEmbedded softwaredevelopment hcs
Embedded softwaredevelopment hcs
 
C og c++-jens lund jensen
C og c++-jens lund jensenC og c++-jens lund jensen
C og c++-jens lund jensen
 
201811xx foredrag c_cpp
201811xx foredrag c_cpp201811xx foredrag c_cpp
201811xx foredrag c_cpp
 
C som-programmeringssprog-bt
C som-programmeringssprog-btC som-programmeringssprog-bt
C som-programmeringssprog-bt
 
Infinit seminar 060918
Infinit seminar 060918Infinit seminar 060918
Infinit seminar 060918
 
DCR solutions
DCR solutionsDCR solutions
DCR solutions
 
Not your grandfathers BPM
Not your grandfathers BPMNot your grandfathers BPM
Not your grandfathers BPM
 
Kmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolutionKmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolution
 
EcoKnow - oplæg
EcoKnow - oplægEcoKnow - oplæg
EcoKnow - oplæg
 
Martin Wickins Chatbots i fronten
Martin Wickins Chatbots i frontenMartin Wickins Chatbots i fronten
Martin Wickins Chatbots i fronten
 
Marie Fenger ai kundeservice
Marie Fenger ai kundeserviceMarie Fenger ai kundeservice
Marie Fenger ai kundeservice
 
Mads Kaysen SupWiz
Mads Kaysen SupWizMads Kaysen SupWiz
Mads Kaysen SupWiz
 
Leif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support CenterLeif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support Center
 
Jan Neerbek NLP og Chatbots
Jan Neerbek NLP og ChatbotsJan Neerbek NLP og Chatbots
Jan Neerbek NLP og Chatbots
 
Anders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer SupportAnders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer Support
 
Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018
 
Innovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekterInnovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekter
 
Rokoko infin it presentation
Rokoko infin it presentation Rokoko infin it presentation
Rokoko infin it presentation
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Encryption Past, Present and Future

  • 1. Encryption now and in the future Lars Ramkilde Knudsen Professor @ DTU Chief Cryptographer @ Dencrypt
  • 2. 20/03-2014Lars R. Knudsen www.dencrypt.dk2 DTU Compute, Technical University of Denmark About me • 2001 Professor, DTU, Denmark • 1999 Professor, University of Bergen, Norway • 1994 PhD in cryptography, Aarhus University • Co-designer of Serpent, Grøstl, Present • Many contributions in cryptanalysis • Heavily involved in the AES process
  • 3. 20/03-2014Lars R. Knudsen www.dencrypt.dk3 DTU Compute, Technical University of Denmark Outline • Encryption – AES – RSA • State of the art cryptanalysis • “New” cryptanalysis • Encryption in the future ?
  • 4. 20/03-2014Lars R. Knudsen www.dencrypt.dk4 DTU Compute, Technical University of Denmark Symmetric encryption
  • 5. 20/03-2014Lars R. Knudsen www.dencrypt.dk5 DTU Compute, Technical University of Denmark Symmetric encryption Name Standard since Designed around DES: Data Encryption Standard 1977 1974 ? AES: Advanced Encryption Standard 2001 1996 RC4 (not a standard) “Public” since 1994 1987 SHA-1 1993 1991 ?
  • 6. 20/03-2014Lars R. Knudsen www.dencrypt.dk6 DTU Compute, Technical University of Denmark Public-key encryption Message MessageEncryption Decryption Public-key encryption %AC&@9^(
  • 7. 20/03-2014Lars R. Knudsen www.dencrypt.dk7 DTU Compute, Technical University of Denmark Public-key encryption Name Relying on difficulty of Designed around Comment RSA Factoring 1977 De facto standard El-Gamal Discrete logarithm in Zp 1985 Used for signatures Elliptic curves Discrete logarithm in EC 1985 Attractive, short keys Diffie-Hellman DH-problem in Zp 1976 Classic
  • 8. 20/03-2014Lars R. Knudsen www.dencrypt.dk8 DTU Compute, Technical University of Denmark State-of-the art cryptanalysis of AES Algorithm Number of rounds AES-128 10 AES-192 12 AES-256 14 Number of rounds Year Comment 6 1997 “Practical” 7 2000/2008 Not practical 8 2008 Not practical 9 2014 Not practical ( 10 2011 Biclique ) ( 11 2009 Related keys)
  • 9. 20/03-2014Lars R. Knudsen www.dencrypt.dk9 DTU Compute, Technical University of Denmark State-of-the-art, factoring RSA numbers 0 100 200 300 400 500 600 700 800 900 1985 1990 1995 2000 2005 2010 2015 Factoring RSA numbers Factoring RSA numbers
  • 10. 20/03-2014Lars R. Knudsen www.dencrypt.dk10 DTU Compute, Technical University of Denmark RSA key sizes used now www Public-key Hash Size of keys SAS RSA SHA-1 2048 Facebook RSA SHA-1 2048 IACR RSA SHA-1 2048 EFF RSA SHA-1 4096
  • 11. 20/03-2014Lars R. Knudsen www.dencrypt.dk11 DTU Compute, Technical University of Denmark RSA versus AES, effective key lengths RSA modulo in bits Effective key length 1024 86 2048 116 4096 156 AES Effective key length AES-128 128 AES-192 192 AES-256 256
  • 12. 20/03-2014Lars R. Knudsen www.dencrypt.dk12 DTU Compute, Technical University of Denmark How much can “they” break ? Traditional cryptanalysis –AES: I don’t know, but design almost 20 years old.. –RSA: more is known about factoring than what is publicly available We have learned that practical breaks also include to –Steal or find the key –Exploit non-randomness in keys –Exploit bad implementations (software and hardware)
  • 13. 20/03-2014Lars R. Knudsen www.dencrypt.dk13 DTU Compute, Technical University of Denmark Cryptography in the future Conventional crypto-security principles • Kerckhoffs’ principle • Standard algorithms, old algorithms…. • Public keys can be made public New crypto-security principles • Dynamic encryption, ignoring Kerckhoffs • Trust the cryptographers, use newer systems • Public keys do not have to be public • Mind your random numbers
  • 14. 20/03-2014Lars R. Knudsen www.dencrypt.dk14 DTU Compute, Technical University of Denmark Thank you for your attention