SlideShare a Scribd company logo
1 of 25
En status påkryptoalgoritmer- Forældedealgoritmerogfremtidssikrenøgler Jakob I. Pagter Forsknings- ogInnovationschef Center for it-sikkerhed Alexandra Instituttet A/S
Tak for idag…
Alexandra Instituttet A/S
Center for it-sikkerhed Kompetencer Secure Multiparty Computation Autentifikation Brugbarhed Sikkerkommunikation Forretningsforståelse Bagland Aarhus Universitet DTU Informatik IBM Logica Danske Bank Cryptomathic ÅrhusKommune KMD
CACE – Computer Aided Cryptographic Engineering (EU/FP7) NaCl High-speed crypto library No license Primært TU/e + Dan Bernstein nacl.cace-project.eu VIFF Secure Multiparty Computation GPL Primært AU, Alexandra, Haifa viff.dk
Planen Baggrund Algoritmer Nøgler
Baggrund: Egenskaber
Baggrund: One-time-pad ,[object Object]
Nøglen er n tilfældige bits.
i’te bit af Ek(m) = mici,[object Object]
Fundamentalt angreb: Exhaustivekeysearch
Gennemløb alle mulige nøgler,[object Object]
“class break” – chifretbrudt
“instance break” – instansdekrypteret
Stolaldrigpå et chifferhvoralgoritmenerhemmelig (WEP, GSM),[object Object]
Nøgle:=3, m=sikkerhed
c = E3(sikkerhed) = vlnnhukhg
D3(vlnnhukhg) = sikkerhed = m,[object Object]
Algoritmer: Symmetriskkrypto Egenskaber Afsenderogmodtagerdelernøgle God performance Block ciphers Stream ciphers State-of-the-art 3DES Kasumi Blowfish AES* (RC4) Snow 2.0 eStream Eg. Salsa20 www.ecrypt.eu.org/stream/ Block Stream *Måskehar den første rust vist sig – Shamir et al. 2009
Algoritmer: Brudtesymmetriskechifre DES WEP DES cracker (EFF)
Algoritmer: Asymmetriskkrypto Egenskaber Modtagerogafsenderharhver sin nøgle – offentligogprivat Relativtdårlig performance Matematikstruktur Sikkerhedbaseretpåantagelseomsværhed brute-force kanforbedres State-of-the-art RSA RSA-OAEP Elliptic Curve
Algoritmer: Brudteasymmetriskechifre Knapsack NTRU VarianterafMcEliece Detoprindeligechiffererikkebrudt, men ineffektivt
Algoritmer: Digital signatur – en reminder Baseretpåasymmetriskkrypto Fx RSA Uafviselighed Ineffektivogusikker (hvisbrugtdirekte) Løsning: hashfunktioner
Algoritmer: Hashfunktioner Egenskaber Vilkårliginputstørrelse Fast størrelse output Effektiv Kollisionersvære at finde x,y: h(x)=h(y) State-of-the-art (RIPEMD-128) RIPEMD-160 (SHA-1) SHA-224, SHA-256 SHA-384, SHA-512 Whirlpool SHA-3/NIST competion (2012) input x output h(x) y

More Related Content

Viewers also liked

110864103 adventures-in-bug-hunting
110864103 adventures-in-bug-hunting110864103 adventures-in-bug-hunting
110864103 adventures-in-bug-hunting
bob dobbs
 
Success Magazine
Success MagazineSuccess Magazine
Success Magazine
payitearly
 
ปลั๊กไฟฟ้า ประหยัดน้ำมันเสียบที่เบ้าจุดบุหรี่
ปลั๊กไฟฟ้า ประหยัดน้ำมันเสียบที่เบ้าจุดบุหรี่ปลั๊กไฟฟ้า ประหยัดน้ำมันเสียบที่เบ้าจุดบุหรี่
ปลั๊กไฟฟ้า ประหยัดน้ำมันเสียบที่เบ้าจุดบุหรี่
Pat Longsiri
 
Novo(a) apresentação do microsoft office power point
Novo(a) apresentação do microsoft office power pointNovo(a) apresentação do microsoft office power point
Novo(a) apresentação do microsoft office power point
Jefferson Willian
 
C:\Fakepath\Diderot Resumo Joias Indiscretas Teresa Genesini
C:\Fakepath\Diderot Resumo Joias Indiscretas Teresa GenesiniC:\Fakepath\Diderot Resumo Joias Indiscretas Teresa Genesini
C:\Fakepath\Diderot Resumo Joias Indiscretas Teresa Genesini
titicobotafogo
 

Viewers also liked (17)

110864103 adventures-in-bug-hunting
110864103 adventures-in-bug-hunting110864103 adventures-in-bug-hunting
110864103 adventures-in-bug-hunting
 
Success Magazine
Success MagazineSuccess Magazine
Success Magazine
 
Presentation1
Presentation1Presentation1
Presentation1
 
Debt Taxes
Debt TaxesDebt Taxes
Debt Taxes
 
Will you help kill your 30 year Mortgage?
Will you help kill your 30 year Mortgage?Will you help kill your 30 year Mortgage?
Will you help kill your 30 year Mortgage?
 
Nuevos anticoagulantes orales (NOA) en embolia pulmonar
Nuevos anticoagulantes orales (NOA) en embolia pulmonarNuevos anticoagulantes orales (NOA) en embolia pulmonar
Nuevos anticoagulantes orales (NOA) en embolia pulmonar
 
Port Folio March
Port Folio MarchPort Folio March
Port Folio March
 
DK CERT Trendrapport 2008
DK CERT Trendrapport 2008DK CERT Trendrapport 2008
DK CERT Trendrapport 2008
 
Information Quality and Metadata in Healthcare Management
Information Quality and Metadata in Healthcare ManagementInformation Quality and Metadata in Healthcare Management
Information Quality and Metadata in Healthcare Management
 
Secure Multiparty Computation - a technology with promises for privacy
Secure Multiparty Computation - a technology with promises for privacySecure Multiparty Computation - a technology with promises for privacy
Secure Multiparty Computation - a technology with promises for privacy
 
report writing
report writingreport writing
report writing
 
Secure Multiparty Computation or: How I learned to stop worrying and love the...
Secure Multiparty Computation or: How I learned to stop worrying and love the...Secure Multiparty Computation or: How I learned to stop worrying and love the...
Secure Multiparty Computation or: How I learned to stop worrying and love the...
 
ปลั๊กไฟฟ้า ประหยัดน้ำมันเสียบที่เบ้าจุดบุหรี่
ปลั๊กไฟฟ้า ประหยัดน้ำมันเสียบที่เบ้าจุดบุหรี่ปลั๊กไฟฟ้า ประหยัดน้ำมันเสียบที่เบ้าจุดบุหรี่
ปลั๊กไฟฟ้า ประหยัดน้ำมันเสียบที่เบ้าจุดบุหรี่
 
Novo(a) apresentação do microsoft office power point
Novo(a) apresentação do microsoft office power pointNovo(a) apresentação do microsoft office power point
Novo(a) apresentação do microsoft office power point
 
Guatemala
GuatemalaGuatemala
Guatemala
 
C:\Fakepath\Diderot Resumo Joias Indiscretas Teresa Genesini
C:\Fakepath\Diderot Resumo Joias Indiscretas Teresa GenesiniC:\Fakepath\Diderot Resumo Joias Indiscretas Teresa Genesini
C:\Fakepath\Diderot Resumo Joias Indiscretas Teresa Genesini
 
Ley de delitos informaticos 1273
Ley de delitos informaticos 1273Ley de delitos informaticos 1273
Ley de delitos informaticos 1273
 

En status på kryptoalgoritmer