On the Origin of Trust: Struggle for Secure Cryptography - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

On the Origin of Trust: Struggle for Secure Cryptography

Anne Canteaut

Résumé

Cryptographic primitives, like encryption schemes, hash functions... are the core of most security applications. But the trust that users place in these algorithms has been repeatedly violated. There are many examples of attacks which exploit weaknesses of the underlying cryptographic primitives, like the recent Logjam and Sloth attacks against TLS. So when can we trust cryptography? It should be clear that we cannot trust algorithms which do not have public design rationale and which have not been thoroughly studied. Most notably, the primitives recommended by the cryptographic community are those which have been chosen after an international competition. Within such an open contest, like the AES and the SHA-3 selection processes, all proposals have been carefully analyzed by all participants; their security margins have been evaluated. This ongoing cryptanalytic effort is the only reliable security argument to consider when deciding which primitive to trust.
Fichier principal
Vignette du fichier
dotsecurity16.pdf (2.29 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-01401311 , version 1 (23-11-2016)

Identifiants

  • HAL Id : hal-01401311 , version 1

Citer

Anne Canteaut. On the Origin of Trust: Struggle for Secure Cryptography. Dot Security 2016, Apr 2016, Paris, France. ⟨hal-01401311⟩
130 Consultations
57 Téléchargements

Partager

Gmail Facebook X LinkedIn More