Top Banner
isilogo “In peace prepare for war, in war prepare for peace. The art of war is of vital importance to the state. It is matter of life and death, a road either to safety or to ruin. Hence under no circumstances can it be neglected.” – ‘The Art of War’, Sun Tzu (Spring and Autumn Period, 771 to 476 BCE) Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 1 / 33
80

“In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

Apr 23, 2018

Download

Documents

tranphuc
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

“In peace prepare for war, in war prepare for peace. Theart of war is of vital importance to the state. It is matter of lifeand death, a road either to safety or to ruin. Hence under nocircumstances can it be neglected.”

– ‘The Art of War’, Sun Tzu(Spring and Autumn Period, 771 to 476 BCE)

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 1 / 33

Page 2: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Cryptography: What Should Be Used?

Palash Sarkar

Applied Statistics UnitIndian Statistical Institute, Kolkata

[email protected]

International Conference on Security Aspects in InformationTechnology, High-Performance Computing and Networking

22nd October 2011

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 2 / 33

Page 3: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Book Ciphers

534 C2 13 127 36 31 4 17 21 41DOUGLAS 109 293 5 37 BIRLSTONE26 BIRLSTONE 9 47 171

– ‘Valley of Fear’, Arthur Conan Doyle

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 3 / 33

Page 4: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Book Ciphers

534 C2 13 127 36 31 4 17 21 41DOUGLAS 109 293 5 37 BIRLSTONE26 BIRLSTONE 9 47 171

– ‘Valley of Fear’, Arthur Conan Doyle

Secure?No generic attacks: Depends on whether the book (and otherparameters which constitute the key) can be guessed.Does not provide authentication: truncation, mix-n-match attacks.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 3 / 33

Page 5: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Book Ciphers

534 C2 13 127 36 31 4 17 21 41DOUGLAS 109 293 5 37 BIRLSTONE26 BIRLSTONE 9 47 171

– ‘Valley of Fear’, Arthur Conan Doyle

Secure?No generic attacks: Depends on whether the book (and otherparameters which constitute the key) can be guessed.Does not provide authentication: truncation, mix-n-match attacks.

Easy-to-use? No! Secretly carrying around large books is notconvenient.

Solution: Distribute the book digitally.Circularity: Should the digital copy be encrypted? With what?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 3 / 33

Page 6: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Book Ciphers

534 C2 13 127 36 31 4 17 21 41DOUGLAS 109 293 5 37 BIRLSTONE26 BIRLSTONE 9 47 171

– ‘Valley of Fear’, Arthur Conan Doyle

Secure?No generic attacks: Depends on whether the book (and otherparameters which constitute the key) can be guessed.Does not provide authentication: truncation, mix-n-match attacks.

Easy-to-use? No! Secretly carrying around large books is notconvenient.

Solution: Distribute the book digitally.Circularity: Should the digital copy be encrypted? With what?

Should book ciphers be used for serious cryptography in the modern age?Are there any advantages of book ciphers over one-time pad?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 3 / 33

Page 7: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Ciphers Up To WW-II

Pre-twentieth century: Substitution , Permutation , Vigenére ,...Evolution from mono-alphabetic to poly-alphabetic ciphers.Cumbersome: tedious and inconvenient to encrypt and decrypt.Cryptanalysis: from simple frequency analysis to moresophisticated statistical analysis.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 4 / 33

Page 8: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Ciphers Up To WW-II

Pre-twentieth century: Substitution , Permutation , Vigenére ,...Evolution from mono-alphabetic to poly-alphabetic ciphers.Cumbersome: tedious and inconvenient to encrypt and decrypt.Cryptanalysis: from simple frequency analysis to moresophisticated statistical analysis.

‘Mechanisation of secrecy’ (cf. Simon Singh): Enigma , Lorenz ,...Encrypting and decrypting became fast, reliable and convenient.The possibility of using machines also introduced the possibility ofadding security features which were previously unthinkable.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 4 / 33

Page 9: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Ciphers Up To WW-II

Pre-twentieth century: Substitution , Permutation , Vigenére ,...Evolution from mono-alphabetic to poly-alphabetic ciphers.Cumbersome: tedious and inconvenient to encrypt and decrypt.Cryptanalysis: from simple frequency analysis to moresophisticated statistical analysis.

‘Mechanisation of secrecy’ (cf. Simon Singh): Enigma , Lorenz ,...Encrypting and decrypting became fast, reliable and convenient.The possibility of using machines also introduced the possibility ofadding security features which were previously unthinkable.

‘Mechanisation of secrecy’ defeated by mechanisation ofcryptanalysis.

Enigma by Bombe ; Lorenz by Colossus .

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 4 / 33

Page 10: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Digitisation of Information

Ushered in a silent paradigm shift.All information (text, pictures, voices, ...) are bit sequences.

The linguistic connection to cryptology got severed.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 5 / 33

Page 11: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Digitisation of Information

Ushered in a silent paradigm shift.All information (text, pictures, voices, ...) are bit sequences.

The linguistic connection to cryptology got severed.

Pre-dominant role of computers.Major advances in computer/communication engineering.Miniaturisation and ubiquitousness of computing facilities.Each new segment of digitisation has brought with it associatedcryptographic problems.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 5 / 33

Page 12: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Digitisation of Information

Ushered in a silent paradigm shift.All information (text, pictures, voices, ...) are bit sequences.

The linguistic connection to cryptology got severed.

Pre-dominant role of computers.Major advances in computer/communication engineering.Miniaturisation and ubiquitousness of computing facilities.Each new segment of digitisation has brought with it associatedcryptographic problems.

Flow of mathematical ideas.Further development of ideas for statistical cryptanalysis.Use of discrete probability for defining and arguing about security.Application of computational complexity theory to quantifycryptanalytic effort.Machinery from algebra and number theory for buildingcryptographic systems.Concomitant development of coding theory.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 5 / 33

Page 13: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Overview of the Talk

Security requirements and cryptographic primitives.

Between proprietary and public-domain algorithms.

Crypto-technology development and deployment: asocio-economic model.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 6 / 33

Page 14: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Security Requirements and Cryptographic Primitives

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 7 / 33

Page 15: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

One-Time Pad and Authentication

One-time pad provides perfect secrecy.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 8 / 33

Page 16: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

One-Time Pad and Authentication

One-time pad provides perfect secrecy.

Consider message: attack at dawn .Let y1||y2 be the ciphertext under one-time pad where,

y1 is the encryption of attack .y2 is the encryption of at dawn .

Then y1 itself is a valid forgery.

If the adversary can successfully truncate the message, then afield unit may be lead into believing that the order is to attackimmediately.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 8 / 33

Page 17: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

One-Time Pad and Authentication

One-time pad provides perfect secrecy.

Consider message: attack at dawn .Let y1||y2 be the ciphertext under one-time pad where,

y1 is the encryption of attack .y2 is the encryption of at dawn .

Then y1 itself is a valid forgery.

If the adversary can successfully truncate the message, then afield unit may be lead into believing that the order is to attackimmediately.

One-time pad does not provide authentication.Moral: secure encryption does not imply secure authentication.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 8 / 33

Page 18: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Encrypting Short Fixed Length Strings

key K key K

msg blk

cpr blk

cpr blk

msg blk

Encrypt Decrypt

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 9 / 33

Page 19: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Encrypting Short Fixed Length Strings

key K key K

msg blk

cpr blk

cpr blk

msg blk

Encrypt Decrypt

How Far Does a Block Cipher Take You?

Assumption: the block cipher is “perfectly secure” (whatever that maymean).

Is that the end of the story?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 9 / 33

Page 20: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Encrypting Short Fixed Length Strings

key K key K

msg blk

cpr blk

cpr blk

msg blk

Encrypt Decrypt

How Far Does a Block Cipher Take You?

Assumption: the block cipher is “perfectly secure” (whatever that maymean).

Is that the end of the story?

No!

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 9 / 33

Page 21: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Block Cipher and Various Requirements

Message Requirements.

A block cipher handles n-bit blocks: typically, n = 128, 192 or 256.

Applications require handling “long” and/or “variable length”messages.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 10 / 33

Page 22: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Block Cipher and Various Requirements

Message Requirements.

A block cipher handles n-bit blocks: typically, n = 128, 192 or 256.

Applications require handling “long” and/or “variable length”messages.

Security Requirements.

A block cipher ensures strong security for n-bit blocks.Different Security Requirements.

Privacy.Authentication.Authenticated encryption.Authenticated encryption with associated data.Disk sector encryption.Deterministic authenticated encryption (key wrap problem).Format preserving encryption.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 10 / 33

Page 23: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Mode of Operation

Extends the capability of a block cipher to handle “long’ strings.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 11 / 33

Page 24: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Mode of Operation

Extends the capability of a block cipher to handle “long’ strings.

Basic modes.

Electronic codebook mode (ECB).

Counter mode (Ctr).

Cipher block chaining mode (CBC).

Output feedback mode (OFB).

Cipher feedback mode (CFB).

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 11 / 33

Page 25: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Insecurity of ECB Mode

Source: Wikipediahttp://en.wikipedia.org/wiki/Block_cipher_modes_of_operation.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 12 / 33

Page 26: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Things to Note

ECB does not provide privacy.

Ctr provides privacy but not authentication.

CBC provides authentication, but, not authenticated encryption.

Authenticated encryption (with associated data)?

Wide block encryption?

Disk encryption?

Other security requirements?

There is no single mode which can be used for all applications.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 13 / 33

Page 27: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Other Primitives

Stream Cipher:

Without IV: Modelled as a PRG.With IV: Modelled as a PRF.Questions:

How to achieve authentication?How to achieve authenticated encryption (with associated data), ...?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 14 / 33

Page 28: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Other Primitives

Stream Cipher:

Without IV: Modelled as a PRG.With IV: Modelled as a PRF.Questions:

How to achieve authentication?How to achieve authenticated encryption (with associated data), ...?

Hash Function:

What is the property that one requires for a particular application?Note: HMAC achieves authentication even withoutcollision-resistance.

General hash functions are often considered to be thecrypto-equivalent of swiss army knife. But, for any particularapplication, it is important to know exactly what assumption onerequires of a hash function.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 14 / 33

Page 29: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

To Be Or Not To Be Proprietary?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 15 / 33

Page 30: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Security-by-obscurity versus Kerckhoff’s principle

If you do not know it, you cannot break it.

Versus

“The enemy knows the system.” (Shannon)

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 16 / 33

Page 31: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Security-by-obscurity versus Kerckhoff’s principle

If you do not know it, you cannot break it.

Versus

“The enemy knows the system.” (Shannon)

Kerckhoff’s principle (1883): The only secret is the key.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 16 / 33

Page 32: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Security-by-obscurity versus Kerckhoff’s principle

One side of the argument:There are ‘incentives’ for the disclosure of a crypto-system.

Is it acceptable to use a system whose weaknesses may beexposed if the system becomes known?

Ostrich effect.Should one not use crypto tools developed by the general scientificcommunity?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 17 / 33

Page 33: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Security-by-obscurity versus Kerckhoff’s principle

One side of the argument:There are ‘incentives’ for the disclosure of a crypto-system.

Is it acceptable to use a system whose weaknesses may beexposed if the system becomes known?

Ostrich effect.Should one not use crypto tools developed by the general scientificcommunity?

The other side:Using public domain algorithms.

How does one know/verify that there are no ‘hidden’ weaknesses?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 17 / 33

Page 34: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Security-by-obscurity versus Kerckhoff’s principle

One side of the argument:There are ‘incentives’ for the disclosure of a crypto-system.

Is it acceptable to use a system whose weaknesses may beexposed if the system becomes known?

Ostrich effect.Should one not use crypto tools developed by the general scientificcommunity?

The other side:Using public domain algorithms.

How does one know/verify that there are no ‘hidden’ weaknesses?

“You can’t trust code that you did not create yourself.”‘Reflections on Trusting Trust’

– Ken Thompson’s Turing award lecture (1983).

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 17 / 33

Page 35: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Security-by-obscurity versus Kerckhoff’s principle

One side of the argument:There are ‘incentives’ for the disclosure of a crypto-system.

Is it acceptable to use a system whose weaknesses may beexposed if the system becomes known?

Ostrich effect.Should one not use crypto tools developed by the general scientificcommunity?

The other side:Using public domain algorithms.

How does one know/verify that there are no ‘hidden’ weaknesses?

“You can’t trust code that you did not create yourself.”‘Reflections on Trusting Trust’

– Ken Thompson’s Turing award lecture (1983).

The two sides are not necessarily contradictory; they may even becomplementary.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 17 / 33

Page 36: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Security-by-obscurity versus Kerckhoff’s principle

Symmetric-key ciphers: It is possible to use security-by-obscurityas a secondary security measure in the deployment ofcryptographic algorithms.

Pick a random secret cipher from a ‘large’ family of well-studiedciphers.Open-domain ‘third-party cryptanalysis’ verifies that all ciphers inthe family have the same security level.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 18 / 33

Page 37: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Security-by-obscurity versus Kerckhoff’s principle

Symmetric-key ciphers: It is possible to use security-by-obscurityas a secondary security measure in the deployment ofcryptographic algorithms.

Pick a random secret cipher from a ‘large’ family of well-studiedciphers.Open-domain ‘third-party cryptanalysis’ verifies that all ciphers inthe family have the same security level.

Trust in a crypto product cannot be stronger than the trust in thepeople who built it.

It is not possible to ‘buy’ trust from unknown/untrusted parties.Trust is linked to (economic) incentives and disincentives.There is need for a viable (dis)incentive-based trust model formulti-organisational development of crypto products.‘Trust-mapping’ of a crypto-product: trust in the organisations whichhave been involved in developing the product.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 18 / 33

Page 38: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Public-Key Cryptography

Evolution: Use of radio lead to a huge amount of communication.For any communication to be useful, it must be secure.It became very difficult to handle key management issues usingconventional cryptographic methods.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 19 / 33

Page 39: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Public-Key Cryptography

Evolution: Use of radio lead to a huge amount of communication.For any communication to be useful, it must be secure.It became very difficult to handle key management issues usingconventional cryptographic methods.

Birth of PKE: (‘Necessity is the mother of invention’ – Plato.)Concomitant ‘cultural revolution’ in the attitude to cryptology as ascience.Issues of trust-related pitfalls leading to public-key infrastructureevolving into the formulation of identity-based encryption.Proprietary PKE: The GCHQ story.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 19 / 33

Page 40: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Public-Key Cryptography

Evolution: Use of radio lead to a huge amount of communication.For any communication to be useful, it must be secure.It became very difficult to handle key management issues usingconventional cryptographic methods.

Birth of PKE: (‘Necessity is the mother of invention’ – Plato.)Concomitant ‘cultural revolution’ in the attitude to cryptology as ascience.Issues of trust-related pitfalls leading to public-key infrastructureevolving into the formulation of identity-based encryption.Proprietary PKE: The GCHQ story.

Policy issue: Should one use public-key cryptography?

Creation of secure channels between (hundreds of) thousands ofusers: How to handle the key management issue?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 19 / 33

Page 41: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Public-Key Cryptography

Evolution: Use of radio lead to a huge amount of communication.For any communication to be useful, it must be secure.It became very difficult to handle key management issues usingconventional cryptographic methods.

Birth of PKE: (‘Necessity is the mother of invention’ – Plato.)Concomitant ‘cultural revolution’ in the attitude to cryptology as ascience.Issues of trust-related pitfalls leading to public-key infrastructureevolving into the formulation of identity-based encryption.Proprietary PKE: The GCHQ story.

Policy issue: Should one use public-key cryptography?

Creation of secure channels between (hundreds of) thousands ofusers: How to handle the key management issue?

Digital Signatures, Information Technology Act, E-Commerce, ...(Another story).

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 19 / 33

Page 42: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Information-Theoretic Cryptography

One-time pad: provides perfect secrecy for encryption.Universal hash function:

Polynomial hash, multi-linear hash, UMAC, ...

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 20 / 33

Page 43: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Information-Theoretic Cryptography

One-time pad: provides perfect secrecy for encryption.Universal hash function:

Polynomial hash, multi-linear hash, UMAC, ...

Modes of operations of a block cipher:Assumes the underlying block cipher to be a ideal primitive.Provides a proof that a mode is secure in an appropriate sense.Works the same way irrespective of whether the underlying blockcipher is proprietary or public-domain.

Modes of operations of a hash function:Merkle-Damgärd structure.Indifferentiability analysis.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 20 / 33

Page 44: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Information-Theoretic Cryptography

One-time pad: provides perfect secrecy for encryption.Universal hash function:

Polynomial hash, multi-linear hash, UMAC, ...

Modes of operations of a block cipher:Assumes the underlying block cipher to be a ideal primitive.Provides a proof that a mode is secure in an appropriate sense.Works the same way irrespective of whether the underlying blockcipher is proprietary or public-domain.

Modes of operations of a hash function:Merkle-Damgärd structure.Indifferentiability analysis.

Should one avoid using information-theoretic cryptography simplybecause it is in the public domain?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 20 / 33

Page 45: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Crypto-Technology Development and Deployment:

A Socio-Economic Model

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 21 / 33

Page 46: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Stake-Holders and Activities: ‘Ideal Model’

Research

Development

Usage

Deployment

Policy

Industry

Academics

Government

Users

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 22 / 33

Page 47: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Missing Links: Indian Context

Research

Development

Usage

Deployment

Policy

IndustryGovernment

Academics

Users

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 23 / 33

Page 48: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Assets, Costs and Values

Assets requiring cryptographic protection.Information: privacy and/or integrity.Commitments, goodwill, ...Asset mapping: identify assets and their relationships.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 24 / 33

Page 49: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Assets, Costs and Values

Assets requiring cryptographic protection.Information: privacy and/or integrity.Commitments, goodwill, ...Asset mapping: identify assets and their relationships.

Costs.Cost of generating the asset.Value to adversaries; possibly varies with adversaries.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 24 / 33

Page 50: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Assets, Costs and Values

Assets requiring cryptographic protection.Information: privacy and/or integrity.Commitments, goodwill, ...Asset mapping: identify assets and their relationships.

Costs.Cost of generating the asset.Value to adversaries; possibly varies with adversaries.

Adversarial cost/value.Cost of a cryptanalytic attempt.The pay-off on success is the value to the adversary.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 24 / 33

Page 51: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Assets, Costs and Values

Assets requiring cryptographic protection.Information: privacy and/or integrity.Commitments, goodwill, ...Asset mapping: identify assets and their relationships.

Costs.Cost of generating the asset.Value to adversaries; possibly varies with adversaries.

Adversarial cost/value.Cost of a cryptanalytic attempt.The pay-off on success is the value to the adversary.

Cost of deployment of cryptographic measures.Depends on the (estimated) adversarial value of the resource.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 24 / 33

Page 52: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Assets, Costs and Values

Assets requiring cryptographic protection.Information: privacy and/or integrity.Commitments, goodwill, ...Asset mapping: identify assets and their relationships.

Costs.Cost of generating the asset.Value to adversaries; possibly varies with adversaries.

Adversarial cost/value.Cost of a cryptanalytic attempt.The pay-off on success is the value to the adversary.

Cost of deployment of cryptographic measures.Depends on the (estimated) adversarial value of the resource.

Cryptographic and cryptanalytic costs.Cost for attaining the immediate objective.Long-term cost for capability acquisition.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 24 / 33

Page 53: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Assets, Costs and Values

Assets requiring cryptographic protection.Information: privacy and/or integrity.Commitments, goodwill, ...Asset mapping: identify assets and their relationships.

Costs.Cost of generating the asset.Value to adversaries; possibly varies with adversaries.

Adversarial cost/value.Cost of a cryptanalytic attempt.The pay-off on success is the value to the adversary.

Cost of deployment of cryptographic measures.Depends on the (estimated) adversarial value of the resource.

Cryptographic and cryptanalytic costs.Cost for attaining the immediate objective.Long-term cost for capability acquisition.

All costs and values are time-dependent.Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 24 / 33

Page 54: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Do People Understand?

Example: Browsers flash a message about 128-bit security.

Do users understand what this is about?

A user will know a lot about his favourite film star: but, what abouthis requirements of cryptographic protection?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 25 / 33

Page 55: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Do People Understand?

Example: Browsers flash a message about 128-bit security.

Do users understand what this is about?

A user will know a lot about his favourite film star: but, what abouthis requirements of cryptographic protection?

Example: In India, digital certificates are required to be purchased byrailway ticketing agents.

Do the agents understand why they need a certificate?

Do the customers understand how the certificate is related to theirprotection?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 25 / 33

Page 56: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Do People Understand?

Example: Browsers flash a message about 128-bit security.

Do users understand what this is about?

A user will know a lot about his favourite film star: but, what abouthis requirements of cryptographic protection?

Example: In India, digital certificates are required to be purchased byrailway ticketing agents.

Do the agents understand why they need a certificate?

Do the customers understand how the certificate is related to theirprotection?

Civil liberties groups: Create user consciousness about cryptographicneeds.

In 1998, EFF built a DES cracker to underline the point that 56-bitkeys can be exhaustively searched.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 25 / 33

Page 57: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Who Needs Cryptography?

Government: To ensure common good, a government requirescryptography for different affairs of the state.

General public: The extent of cryptographic requirement isstrongly correlated to economic strata.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 26 / 33

Page 58: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Who Needs Cryptography?

Government: To ensure common good, a government requirescryptography for different affairs of the state.

General public: The extent of cryptographic requirement isstrongly correlated to economic strata.

Types of consumers of crypto-technology.Sensitised.

Cryptographic needs are directly assessed by the usersthemselves.Methods are pro-actively acquired and deployed by the usersthemselves.

Unsensitised.Cryptographic needs are assessed by others.Protective mechanisms are deployed on behalf of the user.‘Cryptographic Fool’s Paradise’:No knowledge or understanding of one’s cryptographic needs andprotection mechanisms that are deployed on one’s behalf.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 26 / 33

Page 59: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Attack Goals

Direct: Defeat strong cryptography deployed by knowledgeableusers/organisations.Indirect: Defeat users with poor understanding and/or poorcryptographic protection.

Vulnerability analysis identifies such weak points.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 27 / 33

Page 60: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Attack Goals

Direct: Defeat strong cryptography deployed by knowledgeableusers/organisations.Indirect: Defeat users with poor understanding and/or poorcryptographic protection.

Vulnerability analysis identifies such weak points.

Spread-Out: Defeat a large number of individuals having weak (orno) cryptographic protection.

Example: steal a small amount of money from a large number ofcredit cards.Maxim: Take little from many.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 27 / 33

Page 61: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Attack Goals

Direct: Defeat strong cryptography deployed by knowledgeableusers/organisations.Indirect: Defeat users with poor understanding and/or poorcryptographic protection.

Vulnerability analysis identifies such weak points.

Spread-Out: Defeat a large number of individuals having weak (orno) cryptographic protection.

Example: steal a small amount of money from a large number ofcredit cards.Maxim: Take little from many.

Trust structure of an organisation.How much cryptography is required by whom?What is the ripple effect of trust failure at a point?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 27 / 33

Page 62: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Attack Goals

Direct: Defeat strong cryptography deployed by knowledgeableusers/organisations.Indirect: Defeat users with poor understanding and/or poorcryptographic protection.

Vulnerability analysis identifies such weak points.

Spread-Out: Defeat a large number of individuals having weak (orno) cryptographic protection.

Example: steal a small amount of money from a large number ofcredit cards.Maxim: Take little from many.

Trust structure of an organisation.How much cryptography is required by whom?What is the ripple effect of trust failure at a point?

A cryptographer should be interested in everything (and only thosethings) that adversaries of the present and the future are interested in.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 27 / 33

Page 63: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Do Organisations Take Their Crypto Seriously?

Detailed descriptions of resources that require protection.Consideration of different aspects of data on the move, at rest, ...Modelling relationships among sensitive resources can be acomplex task.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 28 / 33

Page 64: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Do Organisations Take Their Crypto Seriously?

Detailed descriptions of resources that require protection.Consideration of different aspects of data on the move, at rest, ...Modelling relationships among sensitive resources can be acomplex task.

Adversarial mapping.Who/What are the adversaries and the value of different resourcesto different adversaries.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 28 / 33

Page 65: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Do Organisations Take Their Crypto Seriously?

Detailed descriptions of resources that require protection.Consideration of different aspects of data on the move, at rest, ...Modelling relationships among sensitive resources can be acomplex task.

Adversarial mapping.Who/What are the adversaries and the value of different resourcesto different adversaries.

Regular audit of deployed cryptographic mechanisms.

Consideration of active protection using cryptanalytic techniques.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 28 / 33

Page 66: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Do Organisations Take Their Crypto Seriously?

Detailed descriptions of resources that require protection.Consideration of different aspects of data on the move, at rest, ...Modelling relationships among sensitive resources can be acomplex task.

Adversarial mapping.Who/What are the adversaries and the value of different resourcesto different adversaries.

Regular audit of deployed cryptographic mechanisms.

Consideration of active protection using cryptanalytic techniques.

Finance is important enough to have a Chief Finance Office.Is Cryptology important enough to have a Chief Cryptology Officer?

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 28 / 33

Page 67: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Crypto-Technology: Industry Stimulus

Growth of crypto industry.Sensitised users clamour for cryptographic protection.Creates demand for crypto-technology.Industry expands to supply products.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 29 / 33

Page 68: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Crypto-Technology: Industry Stimulus

Growth of crypto industry.Sensitised users clamour for cryptographic protection.Creates demand for crypto-technology.Industry expands to supply products.

Acquiring cryptographic/cryptanalytic capability is a long-terminvestment.

Requires top-quality equipments.Requires highly skilled (and hence highly paid) human resources.For attaining depth in research, an organisation has to buildcryptanalytic capability along with cryptographic capability.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 29 / 33

Page 69: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Crypto-Technology: Industry Stimulus

Growth of crypto industry.Sensitised users clamour for cryptographic protection.Creates demand for crypto-technology.Industry expands to supply products.

Acquiring cryptographic/cryptanalytic capability is a long-terminvestment.

Requires top-quality equipments.Requires highly skilled (and hence highly paid) human resources.For attaining depth in research, an organisation has to buildcryptanalytic capability along with cryptographic capability.

Can industry take up classified work for the government?Policy issues: granting of licences; regular “trust audit” ofprocedures and people.Drawing the line: so far and no further.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 29 / 33

Page 70: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Crypto-Technology: Industry Stimulus

Growth of crypto industry.Sensitised users clamour for cryptographic protection.Creates demand for crypto-technology.Industry expands to supply products.

Acquiring cryptographic/cryptanalytic capability is a long-terminvestment.

Requires top-quality equipments.Requires highly skilled (and hence highly paid) human resources.For attaining depth in research, an organisation has to buildcryptanalytic capability along with cryptographic capability.

Can industry take up classified work for the government?Policy issues: granting of licences; regular “trust audit” ofprocedures and people.Drawing the line: so far and no further.

Crypto-industry in India is a sleeping giant.(Policy changes and user education required to awaken it.)

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 29 / 33

Page 71: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Need for a National Cryptologic Plan

Policy formulation with well-defined goals.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 30 / 33

Page 72: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Need for a National Cryptologic Plan

Policy formulation with well-defined goals.Based on current and evolving socio-economic reality.

Model of the sixties will not be successful today.

Based on inclusive discussion among all the stake-holders.Government, industry, users and academics.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 30 / 33

Page 73: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Need for a National Cryptologic Plan

Policy formulation with well-defined goals.Based on current and evolving socio-economic reality.

Model of the sixties will not be successful today.

Based on inclusive discussion among all the stake-holders.Government, industry, users and academics.

Ensure healthy interaction between different aspects of cryptoactivity.

Policy planning, research, development, deployment and usage.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 30 / 33

Page 74: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Need for a National Cryptologic Plan

Policy formulation with well-defined goals.Based on current and evolving socio-economic reality.

Model of the sixties will not be successful today.

Based on inclusive discussion among all the stake-holders.Government, industry, users and academics.

Ensure healthy interaction between different aspects of cryptoactivity.

Policy planning, research, development, deployment and usage.

Adopt with care public domain cryptography.Internationally, the genie (of public-domain cryptography) is out ofthe bottle and cannot be put back in.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 30 / 33

Page 75: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Need for a National Cryptologic Plan

Policy formulation with well-defined goals.Based on current and evolving socio-economic reality.

Model of the sixties will not be successful today.

Based on inclusive discussion among all the stake-holders.Government, industry, users and academics.

Ensure healthy interaction between different aspects of cryptoactivity.

Policy planning, research, development, deployment and usage.

Adopt with care public domain cryptography.Internationally, the genie (of public-domain cryptography) is out ofthe bottle and cannot be put back in.

Stimulate the growth of crypto-industry by adopting with care anappropriate public-private partnership model.

In today’s world, government activity alone is not enough fornational development of cryptology.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 30 / 33

Page 76: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Need for a National Cryptologic Plan

Policy formulation with well-defined goals.Based on current and evolving socio-economic reality.

Model of the sixties will not be successful today.

Based on inclusive discussion among all the stake-holders.Government, industry, users and academics.

Ensure healthy interaction between different aspects of cryptoactivity.

Policy planning, research, development, deployment and usage.

Adopt with care public domain cryptography.Internationally, the genie (of public-domain cryptography) is out ofthe bottle and cannot be put back in.

Stimulate the growth of crypto-industry by adopting with care anappropriate public-private partnership model.

In today’s world, government activity alone is not enough fornational development of cryptology.

National security is based on national trust network.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 30 / 33

Page 77: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Summary

Pre-modern cryptography.

Some questions regarding whether a particular cryptographicprimitive is suited for a particular task.

Some questions regarding the adoption of cryptographictechniques developed in the public domain.

A potpourri of broad issues which may affect the development of anational cryptologic plan.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 31 / 33

Page 78: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Summary

Pre-modern cryptography.

Some questions regarding whether a particular cryptographicprimitive is suited for a particular task.

Some questions regarding the adoption of cryptographictechniques developed in the public domain.

A potpourri of broad issues which may affect the development of anational cryptologic plan.

“But he isn’t wearing anything at all!”

– Emperor’s New ClothesHans Christian Andersen

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 31 / 33

Page 79: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

An Analogy To Sun Tzu’s Words

The science of cryptology is of vital importance to anation. Failure of cryptographic mechanisms can havedevastating consequences. Hence, no effort should bespared in acquiring the best possible cryptologic capability.

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 32 / 33

Page 80: “In peace prepare for war, in war prepare for peace. The ...palash/talks/InfoSecHiComNet.pdf · isilogo “In peace prepare for war, in war prepare for peace. The art of war is

isilogo

Thank you for your attention!

Palash Sarkar (ISI, Kolkata) cryptology: policy issues InfoSecHiComNet 2011 33 / 33