57
1 The development of The development of Public Key Cryptography Public Key Cryptography a personal view a personal view Ralph C. Merkle Georgia Tech College of Computing

1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

Embed Size (px)

Citation preview

Page 1: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

1

The development ofThe development ofPublic Key CryptographyPublic Key Cryptographya personal viewa personal view

Ralph C. MerkleGeorgia Tech College of Computing

Page 2: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

2

• No terminology

• No understanding of problem

• Talking with people about the problem now called public key distribution produced confusion

Fall 1974

Page 3: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

3

Fall 1974

• Undergraduate at Berkeley

• Enrolled in CS 244, “Computer Security Engineering,” Lance Hoffman

• Required to submit two project proposals

—One was data compression.

—The other….

Page 4: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

4

Fall 1974

• One way functions could protect passwords even if system security were completely compromised

• But encryption keys, once compromised, required establishing new keys

• Could new keys (between e.g. a terminal and the system) be established over normal channels?

Page 5: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

5

Fall 1974

• This is the public key distribution problem.

• First thought: this must be impossible, let’s prove that it can’t be done

• Easy to prove that PKD is impossible if either communicant is fully deterministic and I/O is monitored.

Page 6: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

6

Fall 1974

A B

E

PKD impossible ifA or B is deterministic

Page 7: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

7

Fall 1974

A B

E

But what if A and Bboth have random number generators?

XZHEIAADKFJKDK3IOF…

KDWWORWE3LVZPOELF…

Page 8: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

8

Fall 1974

A B

E

How do A and Bdiffer from E?

XZHEIAADKFJKDK3IOF…

KDWWORWE3LVZPOELF…

Page 9: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

9

Fall 1974

• Failed to prove PKD impossible if random numbers are provided

• Switched gears – how to do it

• Aha! A and B might generate the same random number by chance!

Page 10: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

10

Fall 1974

A B

E

By chance, A and Bmight generate the same number

XZHEIAADKFJKDK3IOF…

KDWWORWE3LVADKFJK…

Page 11: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

11

Fall 1974

• If A and B select N random numbers from a space of N2 possible numbers, there is a good probability of a collision.

• So just keep picking random numbers until a collision occurs, which it will with high probability if A and B keep generating random numbers

Page 12: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

12

Fall 1974

• But how to detect a collision?• Have A apply a one way function F to

each random number ri, and send F(ri) to B

• B applies the same one way function to his random numbers and looks for a collision.

• When B finds a collision, A and B are in possession of a common key

Page 13: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

13

Fall 1974

• The enemy, E, saw ~N values F(ri) go from A to B, and saw one value F(rcommon) returned from B to A.

• Total effort by both A and B was about N.

• Total effort by E to analyze rcommon will be about N2.

Page 14: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

14

Fall 1974

• This was the method as first conceived, and best illustrates the development of the idea

• The method as published is different, using “puzzles” to minimize both A and B’s storage requirements (which in the simple method are ~N)

Page 15: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

15

Puzzles

• Puzzles are created by selecting a random key from one of N possibilities, then encrypting a random puzzle id, a random cryptographic key, and some redundant information.

• A puzzle is broken by exhaustively searching the space of N possible keys

Page 16: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

16

Puzzles

• A creates N puzzles and sends them to B

• B randomly selects one puzzle, discarding all the others

• B spends ~N effort to crack the chosen puzzle

• B sends the puzzle ID back to A

Page 17: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

17

Puzzles

A B

E

ID, Key ID, KeyID, Key …

ID

Page 18: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

18

Idea meets people

• New ideas are typically rejected, and so it was with this strange key distribution problem and CS 244: after repeated rejection I dropped the course

• But kept working on the idea.

Page 19: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

19

Idea meets people

• Among others, I explained the puzzles method to Peter Blatman who, as it happened, knew Whit Diffie.

Page 20: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

20

Idea meets people

• “I was convinced you couldn't do it [PKD] and I persuaded Blatman you couldn't do it. But I went back to thinking about the problem. And so I think Merkle plays a very critical role.”

—Whitfield Diffie, circa 1974/1975

Page 21: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

21

Idea meets people

• Sounding out faculty members at Berkeley produced mostly negative results (i.e., “No, I couldn’t supervise a thesis in this area because <fill in blank>”)

• Bob Fabry, however, read my draft paper and said “Publish, win fame and fortune!”

• So I submitted to CACM in August 1975

Page 22: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

22

Idea meets people

• The response from CACM:• “Enclosed is a referee report by an

experienced cryptography expert on your manuscript…”

• “I am sorry to have to inform you that the paper is not in the main stream of present cryptography thinking and I would not recommend that it be published…”

Page 23: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

23

Linking up

• February 7th 1976: “About 3 days ago, a copy of your working paper, Multiuser Cryptographic Techniques, fell into my hands.”

• And the rest is history

Page 24: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

24

Some thoughts on nanotechnology

Page 25: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

25

Crypto and nano

Today’s crypto systems must resist attack by tomorrow’s computers

Nanotechnology explores the limits of what we can make

Future computers will likely benefit decisively from nanotechnology

Page 26: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

26

Arranging atoms

• Flexibility• Precision• Cost

Page 27: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

27

Richard Feynman,1959

There’s plenty of roomat the bottom

http://www.zyvex.com/nanotech/feynman.html

Page 28: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

28

1980’s, 1990’s

First STMBy Binnig and Rohrer

Experiment and theory

Page 29: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

29

President Clinton, 2000

“Imagine the possibilities: materials with ten times the strength of steel and only a small fraction of the weight -- shrinking all the information housed at the Library of Congress into a device the size of a sugar cube -- detecting cancerous tumors when they are only a few cells in size.”

The National Nanotechnology Initiative

Page 30: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

30

Arrangements of atoms

.

Today

The goal

Page 31: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

31

The goal

.

The goal

Page 32: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

32

Core molecularmanufacturingcapabilities

Today ProductsProducts

Products

Products

Products

Products

Products

Products

Products

ProductsProducts

Products

Products

ProductsProducts

Products

Products

Products

Products

Products

Products

ProductsProducts

Products

Products

Many routes

Page 33: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

33

A powerful method: positional assembly

Page 34: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

34

Experimental

Controlling the Dynamics of a Single Atom in Lateral Atom Manipulation Joseph A. Stroscio and Robert J. Celotta, Science, Vol 306, Issue 5694, 242-247, 8 October 2004http://www.nist.gov/public_affairs/releases/hiphopatoms.htm

A 40-nanometer-wide NIST logo made with cobalt atoms on a copper surface

Page 35: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

35

H. J. Lee and W. Ho, SCIENCE 286, p. 1719, NOVEMBER 1999

Experimental

Page 36: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

36

Experimental

Mechanical vertical manipulation of selected single atoms by soft nanoindentation using near contact atomic force microscopy, Noriaki Oyabu, Oscar Custance, Insook Yi, Yasuhiro Sugawara, Seizo Morita1, Phys. Rev. Lett. 90(2 May 2003):176102.

Page 37: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

37

Theoretical

Page 38: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

38

Hydrocarbon machines

Page 39: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

39

Molecular machines

Page 40: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

40

Molecular robotics

Page 41: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

41

Property Diamond’s value Comments

Chemical reactivity Extremely lowHardness (kg/mm2) 9000 CBN: 4500 SiC: 4000Thermal conductivity (W/cm-K) 20 Ag: 4.3 Cu: 4.0Tensile strength (pascals) 3.5 x 109 (natural) 1011 (theoretical)Compressive strength (pascals) 1011 (natural) 5 x 1011 (theoretical)Band gap (ev) 5.5 Si: 1.1 GaAs: 1.4Resistivity (W-cm) 1016 (natural)Density (gm/cm3) 3.51Thermal Expansion Coeff (K-1) 0.8 x 10-6 SiO2: 0.5 x 10-6

Refractive index 2.41 @ 590 nm Glass: 1.4 - 1.8Coeff. of Friction 0.05 (dry) Teflon: 0.05

Source: Crystallume

Diamond physical properties

What to make

Page 42: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

42

Making diamond today

Illustration courtesy of P1 Diamond Inc.

Page 43: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

43

Hydrogen abstraction tool

Page 44: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

44

Adding carbon

Theoretical Analysis of Diamond Mechanosynthesis. Part II. C2 Mediated Growth of Diamond C(110) Surface via Si/Ge-Triadamantane Dimer Placement Tools, J. Comp. Theor. Nanosci. 1(March 2004). David J. Mann, Jingping Peng, Robert A. Freitas Jr., Ralph C. Merkle, In press.

Page 45: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

45

Other molecular tools

Page 46: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

46

Self replication

A redwood tree(sequoia sempervirens)112 meters tallRedwood National Park

http://www.zyvex.com/nanotech/selfRep.html

Page 47: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

47

Kinematic Self-Replicating Machines(Landes Bioscience, 2004)

Reviews the voluminous theoretical and experimental literature about physical self-replicating systems.

Self replication

www.molecularassembler.com/KSRM.htm

Page 48: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

48

Exponential assembly

Page 49: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

49

Convergent assembly

Page 50: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

50

Convergent assembly

Making big things

http://www.zyvex.com/nanotech/convergent.html

Illus

trat

ion

cour

tesy

of E

ric D

rexl

er

Page 51: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

51

• Today: potatoes, lumber, wheat, etc. are all about a dollar per kilogram.

• Tomorrow: almost any product will be about a dollar per kilogram or less. (Design costs, licensing costs, etc. not included)

Economics

Manufacturing costsper kilogramwill be low

Page 52: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

52

The impactof a new manufacturing technologydepends on what you make

Impact

Page 53: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

53

• We’ll have more computing power in the volume of a sugar cube than the sum total of all the computer power that exists in the world today

• More than 1021 bits in the same volume• Almost a billion Pentiums in parallel

Powerful Computers

Impact

Page 54: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

54

High density memory

Impact

Page 55: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

55

Core molecularmanufacturingcapabilities

Today ProductsProducts

Products

Products

Products

Products

Products

Products

Products

ProductsProducts

Products

Products

ProductsProducts

Products

Products

Products

Products

Products

Products

ProductsProducts

Products

Products

Overview

Page 56: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

56

• Correct scientific answer: I don’t know• Trends in computer hardware suggestive• Beyond typical 3-5 year planning horizon• Depends on what we do• Babbage’s computer designed in 1830’s

How long?

Page 57: 1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

57

Nanotechnology offers ... possibilities for health, wealth, and capabilities beyond most past imaginings.

K. Eric Drexler