The Need for Certainty
Total Page:16
File Type:pdf, Size:1020Kb
® TRUSTLEAP The Need For Certainty Mathematically-Proven Unbreakable Security www.trustleap.com This document is aimed at helping people to understand the TrustLeap technology. A cryptographic oracle (where users chose and submit the plaintext: an ASCII classic English book and a sentence that they type, an encryption key, the standard encryption algorithm to secure like AES or RC4, and get the ciphertext, with the sentence injected at a random position that they must guess to demonstrate that teir plaintext attack is successful) as well as further information regarding the internals of TWD Industries AG's technology are available under a proper NDA, to selected partners. TrustLeap 2 | Copyright © 2013, TWD Industries AG. All rights reserved. I. Definition, Promotion, Reality TrustLeap 3 | Copyright © 2013, TWD Industries AG. All rights reserved. The Oxford Dictionary Encryption: to convert (information or data) into a code, especially to prevent unauthorized access. Origin: 1950s (in the US), from English 'in' and Greek kruptos 'hidden'. TrustLeap 4 | Copyright © 2013, TWD Industries AG. All rights reserved. Promotion “no one ever lost money to an attack on a properly designed [standard] cryptosystem” – Peter Gutmann TrustLeap 5 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality 2007 – RC4 / WEP 802.11 wireless standard Used to Steal 45 millions of Credit-Card Numbers Legal Costs: $40,900,000 TrustLeap 6 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality 2010 – A5-1 / GSM Phones wireless standard Spy, Trace and Impersonate Billion of Mobile Phone Users. – Karsten Nohl TrustLeap 7 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality 2011 – GPRS / Web - Mail wireless standard Spy, Trace and Impersonate Billion of Mobile Phone Users. – Karsten Nohl TrustLeap 8 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality 2013 – 3DES / SIM Card Javacard standard Steal data, Spy, Trace and Impersonate Billion of Mobile Phone Users. – Karsten Nohl TrustLeap 9 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality 2013 – Design of $1.5 trillion F-35 Stolen From ...Pentagon TrustLeap 10 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality 2013 – 96-bit secret key RFID car transponder Steal VW, Audi, Bentley, Lamborghini & Porsche cars as Megamos Crypto is broken. – Flavio Garcia TrustLeap 11 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality 2013 – Switzerland e-VOTE Forgery They know since 2002 what they do wrong... but 2012 audits still certify a flawed system. – advtools.com TrustLeap 12 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality Standard Encryption Is Broken, Routinely. But Experts Keep Saying: “It's Very Safe” TrustLeap 13 | Copyright © 2013, TWD Industries AG. All rights reserved. Promotion “Cryptosystem failure is orders of magnitude below any other risk.” – Peter Gutmann TrustLeap 14 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality 2012 – X.509 Certificates “the Flame malware has been signed by forged PKI certificates to appear as if it was produced by... Microsoft.” TrustLeap 15 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality The FLAME Malware Active Since Year 2000 (!) Exploiting Hashing Collisions Breaking “Trusted” PKI Standard TrustLeap 16 | Copyright © 2013, TWD Industries AG. All rights reserved. Promotion “SSL Authenticate-then-encrypt is Provably-Secure.” – Hugo Krawczyk TrustLeap 17 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality SSL & TLS standards 2011 “BEAST exploits CBC IVs” 2012 “CRIME exploits compression” 2013 “LUCKY13 exploits decryption” TrustLeap 18 | Copyright © 2013, TWD Industries AG. All rights reserved. Promotion “AES 256-bit Is Safe Even For TOP-SECRET Information.” – U.S. Government TrustLeap 19 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality 2011 - AES standard “AES Broken 5x Faster Than By Brute Force; Cause: Small Key Space.” – Andrey Bogdanov TrustLeap 20 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality 2012 - AES standard “OpenSSL Uses AES Tables For Speed, Leaking Many Key Bits” – Fraunhofer Research TrustLeap 21 | Copyright © 2013, TWD Industries AG. All rights reserved. Promotion “It Would Take Millions Of Years To Break Standard Encryption.” TrustLeap 22 | Copyright © 2013, TWD Industries AG. All rights reserved. Reality 2012 – RSA SecurID “It Takes 13 Minutes To Extract A Secret Key From AES-based RSA SecurID 800 Dongles” – INRIA TrustLeap 23 | Copyright © 2013, TWD Industries AG. All rights reserved. II. Discussion TrustLeap 24 | Copyright © 2013, TWD Industries AG. All rights reserved. The Myth of “Strong” Security There Is No Such A Thing Like: ● “Strong Authentication” ● “Strong Encryption” ● “Strong Security” > Crypto Is Either SAFE or UNSAFE. TrustLeap 25 | Copyright © 2013, TWD Industries AG. All rights reserved. Why Standards Fail? Encryption Keys Are Generated By: ● PSEUDO-RANDOM Number Generators ● OSes Do It Wrong (a recurring issue) ● Developers Told To Trust OSes or CPUs. > Crypto Keys Are Known In Advance. TrustLeap 26 | Copyright © 2013, TWD Industries AG. All rights reserved. Why Standards Fail? File Formats & Network Protocols Use: ● “Magic Words” In File Headers, Protocols (“PDF%”, “%PNG”, “HTTP/1.1”, etc.) ● Padding (often NULL bytes) > Leading To Known Plaintext Attacks. TrustLeap 27 | Copyright © 2013, TWD Industries AG. All rights reserved. Why Standards Fail? AES(input, key) < 2256 (AES < Key Space) AES(iv, key) = System of Equations AES(in, key) = AES(AES(i(n-1), key), key) 2 AES BLOCKS ENOUGH TO FIND KEY > ARITHMETIC, NOT “RANDOM” data. TrustLeap 28 | Copyright © 2013, TWD Industries AG. All rights reserved. Why Standards Fail? Design: Standards Are Trying To Hide The Wood With A Single Tree: YOUR DEAR “Safe” KEY DATA TrustLeap 29 | Copyright © 2013, TWD Industries AG. All rights reserved. Claude Shannon's “Information Theory” Defined The Rules In The 1940s: 1011011000010110111100101111 I CAN SEE 0110110111010110010001111101 S YOU! 1000100010100101001001010010 1010010010100000101001111011K A 0111101 1001111111010011111010101010E 0011001 1110101001011011111001101010L 0101001 E1011000010010100011111111111Y LE 010010 K 1010010100101001010010010101A 0101100101001001010010010010K YOUR 1 S DEAR “Safe” KEY 1001001010010110100010101001DATA 0100101001010010010101010100 TrustLeap 30 | Copyright © 2013, TWD Industries AG. All rights reserved. What's The Problem? The “Information Theory” Says “Either Perfect Secrecy OR Convenience”: True Random Encryption Keys Applied On Data Larger Than The Key Leaks Key Patterns That Can Be Spotted & Used To Recover The “Secret” Key. TrustLeap 31 | Copyright © 2013, TWD Industries AG. All rights reserved. Solutions? 1 Use The One-Time Pad; Keys Must Be: (a) Random & Unique, (b) As Long As Data, (c) Safely Exchanged Before Encryption. Provably Safe If Safe Random Source & Key Exchange & No Key Reuse: Not Convenient. TrustLeap 32 | Copyright © 2013, TWD Industries AG. All rights reserved. Solutions? 2 Use A Very Strictly Defined Grammar (a) Does Not Suit All Uses (b) Requires High Crypto Skills (c) Any Usage Error Implies Failure. Can Be Made Provably Safe If Properly Done & Used, But Not General-Purpose. TrustLeap 33 | Copyright © 2013, TWD Industries AG. All rights reserved. Solutions? 3 Use Provably-Safe Mathematical Rules To Remove All Exploitable Key Leaks From Encryption Standard ciphertexts (making AES and others provably-safe). Provably SAFE & CONVENIENT. Getting The Best Of Both World! TrustLeap 34 | Copyright © 2013, TWD Industries AG. All rights reserved. III. The Solution TrustLeap 35 | Copyright © 2013, TWD Industries AG. All rights reserved. TrustLeap Game-Changing: - Delivers Provably-Safe Certainty - Reduces Surface Of Vulnerability TrustLeap 36 | Copyright © 2013, TWD Industries AG. All rights reserved. Secure By-Design HOW: Mathematically-Proven: Its Design Does Not Expose Leaked Key Patterns In Encrypted Data. TrustLeap 37 | Copyright © 2013, TWD Industries AG. All rights reserved. Secure Forever WHY: Without Correlations To Spot In Encrypted Data There Is Nothing To Target & Break. TrustLeap 38 | Copyright © 2013, TWD Industries AG. All rights reserved. Ubiquity WHERE: A Low Overhead Makes It Suitable For All Uses (Servers, Phones, Embedded). TrustLeap 39 | Copyright © 2013, TWD Industries AG. All rights reserved. Convenient WHY: Security Becomes Independent From Chosen Key Length And Involved Encryption Algorithm. TrustLeap 40 | Copyright © 2013, TWD Industries AG. All rights reserved. Desirable Side Effects WHERE: By Restricting Access To Known Users It Excludes All External Threats, Reducing The Surface Of Vulnerability. TrustLeap 41 | Copyright © 2013, TWD Industries AG. All rights reserved. IV. Adoption TrustLeap 42 | Copyright © 2013, TWD Industries AG. All rights reserved. Political Obstacles? Consensus Easy To Obtain: ● Plug & Play, Securing AES, DES... ● Visible Undisputable Benefits ● 70-Year-Old Established Theory ● Affordable Licensing Terms TrustLeap 43 | Copyright © 2013, TWD Industries AG. All rights reserved. V. Frequently Asked Questions TrustLeap 44 | Copyright © 2013, TWD Industries AG. All rights reserved. Quantum Computers Quantum Computers (used by the NSA since 1990) find instantly results of algorithms without having to run them. This is the death of security based on computational hardness. Only Mathematically-Proven TrustLeap Encryption can resist to Quantum Computers (as