Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New cryptographic algorithms?

I was wondering about new trends in cryptography. Which algorithms are new ? Which are improved and which died beacuse of the time that past ? For example EEC ( Elliptic Curve Cryptography ) is quite new approach, but definitly not the only one. Could you name some of them ?

like image 461
redbull Avatar asked May 25 '10 11:05

redbull


People also ask

What are different cryptographic algorithms?

Cryptographic algorithms can be classified as follows: Encryption algorithms that are used to encrypt data and provide confidentiality. Signature algorithms that are used to digitally “sign” data to provide authentication. Hashing algorithms that are used to provide data integrity.


2 Answers

ECC actually originates from the 80's; it is not exactly new.

In the context of asymmetric encryption and digital signatures, there has been in the last few years much research on pairings. Pairings open up the next level. Conceptually: symmetric cryptography is for problems with one entity (all entities share a secret key, thus they are the "same" entity), asymmetric cryptography is for problems with two entities (the signer and the verifier), and pairings are a tool for protocols with three entities (for instance, electronic cash, where there are the bank, the merchant and the buyer). The only really practical pairings found so far use elliptic curves, but with a much higher dose of mathematics.

As for more classical asymmetric encryption and signatures, there has been some work on many other algorithms, such as HFE, which seems especially good with regards to signature sizes, or lattice-based cryptography. This is still quite new. It takes some time (say a dozen years or so) before a newly created algorithm becomes mature enough to be standardized.

Following work by Bellovin and Merritt in 1992, some Password Authenticated Key Exchange protocols have been described. These protocols are meant to allow for password-based mutual authentication immune to offline dictionary attacks (i.e. the protocols imply that an attacker, even if actively masquerading as one of the parties, cannot obtain enough information to test passwords at his leisure; each guess from the attacker must go through an interaction with one of the entities who knows the password). IEEE group P1363 is working on writing standards on that subject.

In the area of symmetric encryption, the AES has been a bit "final". A few stream ciphers have been designed afterwards (stream ciphers are supposed to provide better performance, at the cost of less generic applicability); some were analyzed by the eSTREAM project. There has been quite some work on encryption modes, which try to combine symmetric encryption and integrity checks in one efficient system (see for instance GCM and CWC).

Hash functions have been a hot subject lately. A bunch of old hash functions, including the famous MD5, were broken in 2004. There is an ongoing competition to determine the next American standard hash function, codenamed SHA-3.

An awful lot of work has been done on some implementation issues, in particular side-channel leaks (how secret data leaks through power consumption, timing, residual electro-magnetic emissions...) and how to block them.

like image 197
Thomas Pornin Avatar answered Nov 14 '22 14:11

Thomas Pornin


The main problem of contemporary cryptography is not finding algorithms but whole concepts and approaches for different situations (but of course the algorithms are continually improved too).

We have today

  • Symmetric algorithms (AES)
  • Asymmetric algorithms (RSA, ECC)
  • Key exchange (Diffie-Hellman-Key-Exchange, Shamir's no key protocol)
  • Secret sharing (intersection of n-dimensional planes)
  • Cryptographic hash functions (SHA)

Some have proven insecure and were improved

  • DES due to a much to small key-space
  • MD5

and some are broken

  • Merke/Hellman knapsack cryptosystem
  • Monoalphabetic subsitution
  • Naive Vigenère

Which particular algorithm is chosen is often a question of available resources (elliptic curves need smaller keys that RSA algorithm for comparable safety) or just of standardization (as tanascius pointed out, there are competitions for such algorithms). Totally new trends usually start when a whole class of cryptosystems has been shown vulnerable against a specific attack (man-in-the-middle, side-channel) or scientific progress is made (quantum cryptography).

Of course, there is also steganography which doesn't attempt so conceal the content but the existence of a secret message by hiding it in other documents.

like image 36
Dario Avatar answered Nov 14 '22 12:11

Dario