Blockchain solutions leading to better security practices

20
Blockchain technologies drive better security solutions Journée Blockchain SIF November 2016 Nicolas Bacca @btchip

Transcript of Blockchain solutions leading to better security practices

Page 1: Blockchain solutions leading to better security practices

Blockchain technologiesdrive better security solutions

Journée Blockchain SIFNovember 2016

Nicolas Bacca @btchip

Page 2: Blockchain solutions leading to better security practices

A trust layer between the blockchain and the physical world

For industrials, enterprises and consumers

Securing the first and last mile

LEDGER TECHNOLOGY

Page 3: Blockchain solutions leading to better security practices

Without trust, data has no actionable value

node

node

node

node

nodeCloud servers

User on a PC or a smartphone Industrial

sensor / IoT

node

node node

Connected object

Blockchain/ITtrusted zone

Physical worldabsence of trust

Is this really you?

Am I allowed to execute this transaction?

Critical temperature data

Did the driver got switched?

Page 4: Blockchain solutions leading to better security practices

Why ? Cryptocurrencies come with built-in bug bounties

#SFYL

CO 2.0

Page 5: Blockchain solutions leading to better security practices

The DAO timeline

The DAO

The DAO

Black DAO

The DAO

Black DAO

White DAO

The DAO

Black DAO

White DAO

DAO refund

ETH

ETC

ETH

Creation of a new currency

Hacker exit

Page 6: Blockchain solutions leading to better security practices

Security improvements

Aligned with the latest identity standards

Reducing dependencies on non deterministic events (randomness …)

Solving the user keyring problem

Innovating with internet-ready security devices

Page 7: Blockchain solutions leading to better security practices

The password is dead

Page 8: Blockchain solutions leading to better security practices

How can it be replaced ?

Hardware based cryptographic authentication for the webs

FIDO set of standards

Minimalist cryptography (one size fits all)

Multilple vendors

Slow but large traction (Google, Github)

The building block of modern security devices

Page 9: Blockchain solutions leading to better security practices

The problems with randomness

Hard (impossible) to fully get rid of randomness

Generating unbiased randomness is a hard problem

Proving that randomness is unbiased is an even harder problem

Modern cryptographic algorithms are brittle, making it an easy attack vector

Page 10: Blockchain solutions leading to better security practices

Attacks of the Five Eyes

No evil, omnipotent wizards

Have a lot of time

Have a lot of resources (crunching weak randoms is easy, see Logjam)

Can interfere with standards (see DUAL_EC_DRBG)

Attacks on randomness provides good plausible deniability

Page 11: Blockchain solutions leading to better security practices

Blockchain technologies solutions to randomness

Recognize the problem : make it easier to evaluate

Only depend on it when it’s absolutely necessary (key generation)

Promote deterministic signatures (ECDSA / RFC 6979)

Avoid catastrophic algorithm failure on signature (see PS3 27C3)

Page 12: Blockchain solutions leading to better security practices

The silent killer : side channel attacks

An unfortunate side effect of non deterministic code

Predict code parameters (such as private keys) given external events

Extremely powerful and not taken care of enough (see “CSI meets public wifi”)

Important work being done by the community on Bitcoin curve with libsecp256k1

Page 13: Blockchain solutions leading to better security practices

The user keyring problem

Too many keys, too many protocols

Hard to backup (additional weakness / hard to remember)

Too many devices

Page 14: Blockchain solutions leading to better security practices

Solving the user keyring

Deriving keys from a master key (BIP 32, Hierarchical Deterministic Wallets)

Using a nice property of Elliptic Curve keys Public(PrivateK + (%n)Scalar) = PublicK + (point)Scalar * Generator

Can be extended/abused to RSA (find next prime …)

Providing an easy way to remember the master key (BIP 39, Mnemonic Phrase)

Turning entropy into words, not the other way round (see Brainflyer)

Page 15: Blockchain solutions leading to better security practices

Why the Smartcard has to be reinvented

Not web-ready : designed to work in a trusted environment

Not user friendly (reader, drivers, middlewares)

Not developer friendly (Java Card if lucky)

Not customer audit friendly

Page 16: Blockchain solutions leading to better security practices

Challenges of improving the Smartcard

Tamperresistant

Developer friendly Auditable

Page 17: Blockchain solutions leading to better security practices

What has been accomplished so far

Multiple devices with different tamper resistance properties

Web integration, reusing FIDO work on U2F (Ledger with MyEtherWallet)

Web ready : malware resistant

<Ad> New paradigms for native multi application platforms </Ad>

Page 18: Blockchain solutions leading to better security practices

The exhaustive list of Blockchain security standards

<- (is not a security standard)

Page 19: Blockchain solutions leading to better security practices

Blockchain security ...

Moves at startup speed (ETH from EAL0 to EAL7 in 6 months, according to ETH)

Is battlefield tested (or assets are lost very quickly)

Bitcoin is a pretty good canary (see “Some SecureRandom thoughts” on Android)

Is interesting to look at for the general security / identity industry

On the other hand can also learn a lot from those industries wrt testing / evaluation

Page 20: Blockchain solutions leading to better security practices

Thank you @btchip

https://www.chaintech.fr/