project ideas - courses.engr.illinois.edu

57
Project Ideas 1

Upload: others

Post on 14-May-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Project Ideas - courses.engr.illinois.edu

Project Ideas

1

Page 2: Project Ideas - courses.engr.illinois.edu

Project IdeasLecture 13

1

Page 3: Project Ideas - courses.engr.illinois.edu

Categories

2

Page 4: Project Ideas - courses.engr.illinois.edu

Categories

Implementations

2

Page 5: Project Ideas - courses.engr.illinois.edu

Categories

Implementations

Formalizing security of applied-crypto works

2

Page 6: Project Ideas - courses.engr.illinois.edu

Categories

Implementations

Formalizing security of applied-crypto works

Conceiving new applications

2

Page 7: Project Ideas - courses.engr.illinois.edu

Categories

Implementations

Formalizing security of applied-crypto works

Conceiving new applications

Surveys

2

Page 8: Project Ideas - courses.engr.illinois.edu

Categories

Implementations

Formalizing security of applied-crypto works

Conceiving new applications

Surveys

Theoretical research, cryptanalysis, ...

2

Page 9: Project Ideas - courses.engr.illinois.edu

Implementations

3

Page 10: Project Ideas - courses.engr.illinois.edu

ImplementationsSecurity first: don’t worry about efficiency

3

Page 11: Project Ideas - courses.engr.illinois.edu

ImplementationsSecurity first: don’t worry about efficiency

Build from scratch: no legacy concerns

3

Page 12: Project Ideas - courses.engr.illinois.edu

ImplementationsSecurity first: don’t worry about efficiency

Build from scratch: no legacy concerns

Base security on simple intractability assumptions

3

Page 13: Project Ideas - courses.engr.illinois.edu

ImplementationsSecurity first: don’t worry about efficiency

Build from scratch: no legacy concerns

Base security on simple intractability assumptions

Will have a security parameter

3

Page 14: Project Ideas - courses.engr.illinois.edu

ImplementationsSecurity first: don’t worry about efficiency

Build from scratch: no legacy concerns

Base security on simple intractability assumptions

Will have a security parameter

Modular: plug-and-play, with interfaces conforming to standard abstract notions (OWP, PRG, PRF, ...)

3

Page 15: Project Ideas - courses.engr.illinois.edu

ImplementationsSecurity first: don’t worry about efficiency

Build from scratch: no legacy concerns

Base security on simple intractability assumptions

Will have a security parameter

Modular: plug-and-play, with interfaces conforming to standard abstract notions (OWP, PRG, PRF, ...)

IVORY-CRYPT

3

Page 16: Project Ideas - courses.engr.illinois.edu

ImplementationsSecurity first: don’t worry about efficiency

Build from scratch: no legacy concerns

Base security on simple intractability assumptions

Will have a security parameter

Modular: plug-and-play, with interfaces conforming to standard abstract notions (OWP, PRG, PRF, ...)

IVORY-CRYPT

Cryptography from the ivory towers :-)

3

Page 17: Project Ideas - courses.engr.illinois.edu

Ivory-Crypt

4

Page 18: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPRF

4

Page 19: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPRF

Based on arbitrary PRG [Goldreich-Goldwasser-Micali]

4

Page 20: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPRF

Based on arbitrary PRG [Goldreich-Goldwasser-Micali]

In turn based on arbitrary OWP [Yao,Goldreich-Levin]

4

Page 21: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPRF

Based on arbitrary PRG [Goldreich-Goldwasser-Micali]

In turn based on arbitrary OWP [Yao,Goldreich-Levin]

Or based on DDH assumption [Naor-Reingold]

4

Page 22: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPRF

Based on arbitrary PRG [Goldreich-Goldwasser-Micali]

In turn based on arbitrary OWP [Yao,Goldreich-Levin]

Or based on DDH assumption [Naor-Reingold]

Use it for shared-key secure communication channels

4

Page 23: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPRF

Based on arbitrary PRG [Goldreich-Goldwasser-Micali]

In turn based on arbitrary OWP [Yao,Goldreich-Levin]

Or based on DDH assumption [Naor-Reingold]

Use it for shared-key secure communication channels

First, implement authenticated communication streams

4

Page 24: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPRF

Based on arbitrary PRG [Goldreich-Goldwasser-Micali]

In turn based on arbitrary OWP [Yao,Goldreich-Levin]

Or based on DDH assumption [Naor-Reingold]

Use it for shared-key secure communication channels

First, implement authenticated communication streams

Implement (CPA secure) encryption for each stream

4

Page 25: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPRF

Based on arbitrary PRG [Goldreich-Goldwasser-Micali]

In turn based on arbitrary OWP [Yao,Goldreich-Levin]

Or based on DDH assumption [Naor-Reingold]

Use it for shared-key secure communication channels

First, implement authenticated communication streams

Implement (CPA secure) encryption for each stream

Sketch formal security guarantees and proofs

4

Page 26: Project Ideas - courses.engr.illinois.edu

Ivory-Crypt

5

Page 27: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPublic-Key Secure communication

5

Page 28: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPublic-Key Secure communication

Most useful setting: Only server has public-key

5

Page 29: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPublic-Key Secure communication

Most useful setting: Only server has public-key

Design/analyze and build all components

5

Page 30: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPublic-Key Secure communication

Most useful setting: Only server has public-key

Design/analyze and build all components

Digital signatures and authenticated channel (using say OWF, and Discrete Log-based CRHF, or OWP-based UOWHF)

5

Page 31: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPublic-Key Secure communication

Most useful setting: Only server has public-key

Design/analyze and build all components

Digital signatures and authenticated channel (using say OWF, and Discrete Log-based CRHF, or OWP-based UOWHF)Key-agreement/PKE

5

Page 32: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPublic-Key Secure communication

Most useful setting: Only server has public-key

Design/analyze and build all components

Digital signatures and authenticated channel (using say OWF, and Discrete Log-based CRHF, or OWP-based UOWHF)Key-agreement/PKESecure communication given a shared key and authenticated channel (may use a shared-key secure communication channel module: could be implemented as a separate project)

5

Page 33: Project Ideas - courses.engr.illinois.edu

Ivory-CryptPublic-Key Secure communication

Most useful setting: Only server has public-key

Design/analyze and build all components

Digital signatures and authenticated channel (using say OWF, and Discrete Log-based CRHF, or OWP-based UOWHF)Key-agreement/PKESecure communication given a shared key and authenticated channel (may use a shared-key secure communication channel module: could be implemented as a separate project)

SSH: a candidate app for not-so-efficient crypto

5

Page 34: Project Ideas - courses.engr.illinois.edu

Ivory-Crypt

6

Page 35: Project Ideas - courses.engr.illinois.edu

Ivory-CryptAn Achilles Heel

6

Page 36: Project Ideas - courses.engr.illinois.edu

Ivory-CryptAn Achilles Heel

Source of randomness

6

Page 37: Project Ideas - courses.engr.illinois.edu

Ivory-CryptAn Achilles Heel

Source of randomness

Randomness extractors

6

Page 38: Project Ideas - courses.engr.illinois.edu

Ivory-CryptAn Achilles Heel

Source of randomness

Randomness extractors

Purify a “weak” random source (or multiple sources)

6

Page 39: Project Ideas - courses.engr.illinois.edu

Ivory-CryptAn Achilles Heel

Source of randomness

Randomness extractors

Purify a “weak” random source (or multiple sources)

May need a small amount of “seed randomness” as catalyst

6

Page 40: Project Ideas - courses.engr.illinois.edu

Ivory-CryptAn Achilles Heel

Source of randomness

Randomness extractors

Purify a “weak” random source (or multiple sources)

May need a small amount of “seed randomness” as catalyst

Implement different ones from the literature and compare performance for reasonable parameters

6

Page 41: Project Ideas - courses.engr.illinois.edu

Ivory-CryptAn Achilles Heel

Source of randomness

Randomness extractors

Purify a “weak” random source (or multiple sources)

May need a small amount of “seed randomness” as catalyst

Implement different ones from the literature and compare performance for reasonable parameters

(Another Achilles Heel: Side-channels. Handled by “Leakage-resilient cryptography”)

6

Page 42: Project Ideas - courses.engr.illinois.edu

Ivory-Crypt

7

Page 43: Project Ideas - courses.engr.illinois.edu

Ivory-CryptSecure Multi-Party Computation (SMC, or MPC)

7

Page 44: Project Ideas - courses.engr.illinois.edu

Ivory-CryptSecure Multi-Party Computation (SMC, or MPC)

(Will see next week, and later)

7

Page 45: Project Ideas - courses.engr.illinois.edu

Ivory-CryptSecure Multi-Party Computation (SMC, or MPC)

(Will see next week, and later)

Honest-but-curious setting: a few implementations already out there (as also, an “in-house” implementation)

7

Page 46: Project Ideas - courses.engr.illinois.edu

Ivory-CryptSecure Multi-Party Computation (SMC, or MPC)

(Will see next week, and later)

Honest-but-curious setting: a few implementations already out there (as also, an “in-house” implementation)

Add to them/Enhance them

7

Page 47: Project Ideas - courses.engr.illinois.edu

Ivory-CryptSecure Multi-Party Computation (SMC, or MPC)

(Will see next week, and later)

Honest-but-curious setting: a few implementations already out there (as also, an “in-house” implementation)

Add to them/Enhance them

Honest-majority setting: No “crypto” -- i.e., information theoretic security (except secure communication channels)

7

Page 48: Project Ideas - courses.engr.illinois.edu

Ivory-CryptSecure Multi-Party Computation (SMC, or MPC)

(Will see next week, and later)

Honest-but-curious setting: a few implementations already out there (as also, an “in-house” implementation)

Add to them/Enhance them

Honest-majority setting: No “crypto” -- i.e., information theoretic security (except secure communication channels)

No honesty setting. (Will take too long to implement?)

7

Page 49: Project Ideas - courses.engr.illinois.edu

Ivory-CryptSecure Multi-Party Computation (SMC, or MPC)

(Will see next week, and later)

Honest-but-curious setting: a few implementations already out there (as also, an “in-house” implementation)

Add to them/Enhance them

Honest-majority setting: No “crypto” -- i.e., information theoretic security (except secure communication channels)

No honesty setting. (Will take too long to implement?)

Stand-alone, and Composable

7

Page 50: Project Ideas - courses.engr.illinois.edu

New Applications

8

Page 51: Project Ideas - courses.engr.illinois.edu

New ApplicationsApplying crypto tools

8

Page 52: Project Ideas - courses.engr.illinois.edu

New ApplicationsApplying crypto tools

Conceive and design (on paper) new systems which can use tools that we will see in the remainder of the course

8

Page 53: Project Ideas - courses.engr.illinois.edu

New ApplicationsApplying crypto tools

Conceive and design (on paper) new systems which can use tools that we will see in the remainder of the course

e.g. Homomorphic encryption schemes

8

Page 54: Project Ideas - courses.engr.illinois.edu

New ApplicationsApplying crypto tools

Conceive and design (on paper) new systems which can use tools that we will see in the remainder of the course

e.g. Homomorphic encryption schemes

Non-malleable homomorphic encryption schemes?

8

Page 55: Project Ideas - courses.engr.illinois.edu

New ApplicationsApplying crypto tools

Conceive and design (on paper) new systems which can use tools that we will see in the remainder of the course

e.g. Homomorphic encryption schemes

Non-malleable homomorphic encryption schemes?

e.g. SMC concepts, Private Information Retrieval (PIR)

8

Page 56: Project Ideas - courses.engr.illinois.edu

New ApplicationsApplying crypto tools

Conceive and design (on paper) new systems which can use tools that we will see in the remainder of the course

e.g. Homomorphic encryption schemes

Non-malleable homomorphic encryption schemes?

e.g. SMC concepts, Private Information Retrieval (PIR)

For e.g., “distributed secure storage” using SMC or PIR ideas

8

Page 57: Project Ideas - courses.engr.illinois.edu

New ApplicationsApplying crypto tools

Conceive and design (on paper) new systems which can use tools that we will see in the remainder of the course

e.g. Homomorphic encryption schemes

Non-malleable homomorphic encryption schemes?

e.g. SMC concepts, Private Information Retrieval (PIR)

For e.g., “distributed secure storage” using SMC or PIR ideas

Must give a security analysis (definition and proof)

8