Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th...

18
PostQuantum Cryptography and Japan CRYPTREC 6 th ETSI/IQC QuantumSafe Workshop Beijing, November 68, 2018 Session 1: World Tour Shiho Moriai Director Security Fundamentals Laboratory Cybersecurity Research Institute NICT 1

Transcript of Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th...

Page 1: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

Post‐Quantum Cryptographyand Japan CRYPTREC

6th ETSI/IQC Quantum‐Safe WorkshopBeijing, November 6‐8, 2018

Session 1: World Tour

Shiho MoriaiDirector

Security Fundamentals Laboratory Cybersecurity Research Institute

NICT

1

Page 2: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

If Large‐scale Quantum Computers are ever Built, …

2

» they will be able to break many of the public‐key cryptosystems currently in use…

Page 3: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

But…

3

»Will people willingly accept transition to post‐quantum cryptography? 

» Transition takes time and effort. It is not easy.

SHA‐1 SHA‐3

Page 4: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

The North wind and the Sun

4

“If Large‐scale Quantum 

Computers…”

“Privacy PreservingData Analysis” 

Which accelerates 

deployment of Post‐Quantum

Crypto?

Page 5: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

Why Post‐Quantum Crypto?

» Long‐term Security ˃ Rather than “quantum‐resistant” crypto

» Promising Functionalities e.g.˃ Privacy preserving data analytics by lattice‐based     homomorphic encryption  

5

Page 6: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

Big Data Integration:Key to the new growth strategy 

Medical

Agriculture

Finance/Economics

Space/Environment

Brain

Industrial systemsTransportation

Search Keywords

Purchase history

Trajectory data

One’s interest

6

Page 7: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

Security and Privacy:Key Issues for Datability

Medical

Agriculture

Finance/Economics

Space/Environment

Brain

Industrial systemsTransportation

Search Keywords

Purchase history

Trajectory data

One’s interest

7

Page 8: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

To Promote Big Data Integration across Sectors 

8

Create Value across SectorsInnovation, Productivity, Growth 

Data AnalyticsSecurity and Privacy Enhancing 

Technologies 

Data Leakage

Privacy

Confidentiality

While Encrypted/Preserving Privacy

Big Data Integration

Page 9: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

Privacy Preserving Data Analytics» Privacy‐Preserving Logistic Regression 

˃ powerful machine learning tool to classify confidential/personal data

˃ Proposed a secure system for protecting both the training and predicting datain logistic regression using lattice‐basedhomomorphic encryption. 

> Classify 100 million encrypted data in 30 min

9Y. Aono, T. Hayashi, L.T. Phong, L. Wang, “Privacy‐Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption”, IEICE Trans. Inf. & Syst., VOL.E99‐D, No.8 August 2016.

Page 10: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

» Many learning participants perform deep learning over a  combined dataset of all, without  revealing the participants’  local data.

» Using additively homomorphic encryption we improved the previous work by Shokri et al (ACM CCS 2015). 

10

Privacy Preserving Deep Learning

Company A Company B Company C

Data X Data Y Data Z Data X Data Y Data Z Data X Data Y Data Z

Training Training Training

gradients

Page 11: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

Japan CRYPTREC

Cryptography Research and Evaluation Committees˃ Project to evaluate and monitor the security of  cryptographic techniques used in Japanese  e‐Government systems

» Goal of the project˃ To ensure the security of Japanese e‐Government  systems by using  secure cryptographic techniques and  to realize a secure IT society.

11

Page 12: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

Three Lists in the CRYPTREC Ciphers List

˃ Recommended ciphers approved  by CRYPTREC in terms  of security and implementation aspects as well as current and future market deployment.

˃ Candidate recommended ciphers approved  by CRYPTREC in terms of security and implementation aspects.

˃ The ciphers are not‐recommended for use because of high risk of compromise while they are allowed to use      only for interoperability with legacy systems. 

12

e‐Government Recommended Ciphers List

Candidate Recommended Ciphers List

Monitored Ciphers List

Page 13: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

History of CRYPTREC

13

CRYPTREC launch, Call for cryptographic techniques

Publication of the e‐Government Recommended Ciphers List

Call for cryptographic techniques for the revision of the e‐Government Recommended Ciphers List

Publication of the CRYPTREC Ciphers List 

20092013

“Policy for the use of ciphers in information system procurement of each governmental agency” was approved

20002003

Page 14: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

14

Classification Cipher

Public key ciphers

Signature

DSAECDSARSA‐PSSRSASSA‐PKCS1‐v1_5

Confidentiality RSA‐OAEP

Key exchangeDHECDH

Symmetric key ciphers

64‐bit block ciphers N/A

128‐bit block ciphersAESCamellia

Stream ciphers KCipher‐2

Hash functionsSHA‐256SHA‐384SHA‐512

Modes of operation

Encryption modes

CBCCFBCTROFB

Authenticated encryptionmodes

CCM

GCM

Message authentication codesCMACHMAC

Authenticated encryption N/A

Entity authenticationISO/IEC 9798‐2ISO/IEC 9798 3

e Government Recommended CiphersList

e‐Government Recommended Ciphers List

Page 15: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

CRYPTREC Organization

15

Management Standards for Information Security Measures for the Central Government Computer Systems

Page 16: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

Cryptanalysis Evaluation WG

» Goal˃ Survey and research on the security of public‐key crypto‐ systems for current and future uses

» Recent Activities˃ Survey and research on post‐quantum cryptography

+ A report on PQC will be published in FY 2018.

˃ Update of the complexity required for Integer Factoring

» Chair˃ Prof. Tsuyoshi Takagi (Univ. of Tokyo)

16

Page 17: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

Complexity required for Integer Factoring

17

Page 18: Post Quantum Cryptography and Japan CRYPTREC · Post‐Quantum Cryptography and Japan CRYPTREC 6th ETSI/IQC Quantum‐Safe Workshop Beijing, November 6‐8, 2018 Session 1: World

18

PQC Standardization PlanInternational

Japan