1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing.

Slides:



Advertisements
Similar presentations
1 Whither Nanotechnology Ralph C. Merkle Xerox PARC
Advertisements

CSC 774 Advanced Network Security
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Class 25: Security through Complexity? Karsten Nohl cs302: Theory of Computation University of Virginia, Computer Science PS6 is due today. Lorenz cipher.
Intermediate and long term objectives in nanotechnologynanotechnology Ralph C. Merkle Xerox PARC
The Literature Review in 3 Key Steps
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Great Theoretical Ideas in Computer Science.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
Molecular Nanotechnology By Kavitha, Boppana. Presentation Overview  Molecular Manufacturing  Positional Assembly  Self Replication  Visual Images.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Zyvex 1 Molecular Nanotechnology Ralph C. Merkle Principal Fellow, Zyvex
CSCD 555 Research Methods for Computer Science
Psychology 366 Research Project Jen St.Onge Kenny Building, Room #3506 Website:
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
By: Mike Neumiller & Brian Yarbrough
ELE 523E COMPUTATIONAL NANOELECTRONICS W1: Introduction, 8/9/2014 FALL 2014 Mustafa Altun Electronics & Communication Engineering Istanbul Technical University.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Lecture 11: Key Distribution
2 Nanotechnology and space Ralph C. Merkle Principal Fellow, Zyvex.
Introducing nanotechnology and energy Neil Coville School of Chemistry University of the Witwatersrand Media Round Table 3 rd March 2011.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
1 SCIENCE: A Way of Knowing I. The Role of Science: A. Making Choices 1. What gasoline to buy 2. What shampoo is best for my hair 3. What pain relievers.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
2 Systems Issues in the Development of Nanotechnology Ralph C. Merkle, Ph.D. Principal Fellow, Zyvex.
1 Medical nanorobots and their development Ralph C. Merkle Senior Fellow IMM.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Molecular Nanotechnology Ralph C. Merkle Principal Fellow, Zyvex
2 Nanotechnology, replication, and low cost manufacturing Ralph C. Merkle, Ph.D. Principal Fellow.
Small,...,Small World by Ralph C. Merkle Main Issues of Nanotechnology Molecular manufacturing system cosmetics. How to build such systems w/current technology.
1 Nanotechnology and Meaning Ralph C. Merkle
Great Theoretical Ideas in Computer Science.
NANOTECHNOLOGY Damian Borovac, 3.D Damian Borovac, 3.D.
Psy B07 Chapter 4Slide 1 SAMPLING DISTRIBUTIONS AND HYPOTHESIS TESTING.
1 There’s Nothing Small about Nanotechnology Ralph C. Merkle Xerox PARC
08/14/11 presentation by Nuwan Liyanage.  Introduction  Four Generations of Nanotechnology  Nanofactory  Nanoassembler  Did You Know?  Nanowires.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
2 Nanotechnology Ralph C. Merkle Principal Fellow, Zyvex.
2 Nanotechnology and its applications to healthcare Ralph C. Merkle, Ph.D. Principal Fellow.
1 Whither nanotechnology? Ralph C. Merkle Distinguished Professor of Computing Georgia Tech College of Computing.
Nanotechnology Thomas Abraham. “There’s plenty of room at the bottom” The physicist Richard Feynmann is credited with inspiring the field of nanotechology.
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Reviewing Papers© Dr. Ayman Abdel-Hamid, CS5014, Fall CS5014 Research Methods in CS Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech.
2 Nanotechnology Ralph C. Merkle Principal Fellow, Zyvex.
Lesson Overview Lesson Overview What Is Science? Lesson Overview 1.1 What Is Science?
Design Process for a Non- Majors Computing Course Mark Guzdial & Andrea Forte College of Computing/GVU Georgia Institute of Technology With thanks for.
Security in Computing Protection in General-Purpose Operating Systems.
Review of: All You Can Eat or Breaking a Real-World Contactless Payment System Timo Kasper, Michael Silbermann, and Christof Paar Financial Cryptography.
EHB 111E NANOELECTRONICS Nanoelectronics, 03/12/2013 FALL 2013 Mustafa Altun Electronics & Communication Engineering Istanbul Technical University Web:
2 Nanotechnology Ralph C. Merkle, Ph.D. Principal Fellow, Zyvex.
From Nanoscience to Nanomanufacturing STM manipulation of atoms 1989 AFM 1986 AFM manipulation of a SWNT 1999 Source: IBM Molecular logic gate 2002 Manipulation.
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
How does Science Work? Presented by : Sabar Nurohman, M.Pd.
Of Probability. 1.Chance has no memory. For repeated trials of a simple experiment, the outcomes of prior trials have no impact on the next trial. 2.The.
NANO TECHNOLOGY. Something to think about Imagine being able to cure cancer by drinking a medicine stirred into your favorite fruit juice. Imagine a supercomputer.
Nanotechnology By: Charles Peterson. What is Nanotechnology? Nano: It is a SI unit to denote “one billionth” Nano: It is a SI unit to denote “one billionth”
The future revolution By P.Ajay & M.SANTOSH. contents  What is nano-technology  Origin  Production  Tools of nano-technology  Applications  Disadvantages.
INCS 741: Cryptography Overview and Basic Concepts.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Outline The basic authentication problem
Lesson 2-18 AP Computer Science Principles
Topic 14: Random Oracle Model, Hashing Applications
Merkle Suggests that in not too many decades we should be able to build products with almost every atom in the right place, inexpensively, and consistent.
Protect Your Hardware from Hacking and Theft
Nanotechnology and Medicine
Overview of Networking
Presentation transcript:

1 The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

2 No terminology No understanding of problem Talking with people about the problem now called public key distribution produced confusion Fall 1974

3 Undergraduate at Berkeley Enrolled in CS 244, “Computer Security Engineering,” Lance Hoffman Required to submit two project proposals —One was data compression. —The other….

4 Fall 1974 One way functions could protect passwords even if system security were completely compromised But encryption keys, once compromised, required establishing new keys Could new keys (between e.g. a terminal and the system) be established over normal channels?

5 Fall 1974 This is the public key distribution problem. First thought: this must be impossible, let’s prove that it can’t be done Easy to prove that PKD is impossible if either communicant is fully deterministic and I/O is monitored.

6 Fall 1974 AB E PKD impossible if A or B is deterministic

7 Fall 1974 AB E But what if A and B both have random number generators? XZHEIA ADKFJK DK3IOF … KDWWO RWE3LV ZPOELF …

8 Fall 1974 AB E How do A and B differ from E? XZHEIA ADKFJK DK3IOF … KDWWO RWE3LV ZPOELF …

9 Fall 1974 Failed to prove PKD impossible if random numbers are provided Switched gears – how to do it Aha! A and B might generate the same random number by chance!

10 Fall 1974 AB E By chance, A and B might generate the same number XZHEIA ADKFJK DK3IOF … KDWWO RWE3LV ADKFJK …

11 Fall 1974 If A and B select N random numbers from a space of N 2 possible numbers, there is a good probability of a collision. So just keep picking random numbers until a collision occurs, which it will with high probability if A and B keep generating random numbers

12 Fall 1974 But how to detect a collision? Have A apply a one way function F to each random number r i, and send F(r i ) to B B applies the same one way function to his random numbers and looks for a collision. When B finds a collision, A and B are in possession of a common key

13 Fall 1974 The enemy, E, saw ~N values F(r i ) go from A to B, and saw one value F(r common ) returned from B to A. Total effort by both A and B was about N. Total effort by E to analyze r common will be about N 2.

14 Fall 1974 This was the method as first conceived, and best illustrates the development of the idea The method as published is different, using “puzzles” to minimize both A and B’s storage requirements (which in the simple method are ~N)

15 Puzzles Puzzles are created by selecting a random key from one of N possibilities, then encrypting a random puzzle id, a random cryptographic key, and some redundant information. A puzzle is broken by exhaustively searching the space of N possible keys

16 Puzzles A creates N puzzles and sends them to B B randomly selects one puzzle, discarding all the others B spends ~N effort to crack the chosen puzzle B sends the puzzle ID back to A

17 Puzzles AB E ID, Key … ID

18 Idea meets people New ideas are typically rejected, and so it was with this strange key distribution problem and CS 244: after repeated rejection I dropped the course But kept working on the idea.

19 Idea meets people Among others, I explained the puzzles method to Peter Blatman who, as it happened, knew Whit Diffie.

20 Idea meets people “I was convinced you couldn't do it [PKD] and I persuaded Blatman you couldn't do it. But I went back to thinking about the problem. And so I think Merkle plays a very critical role.” —Whitfield Diffie, circa 1974/1975

21 Idea meets people Sounding out faculty members at Berkeley produced mostly negative results (i.e., “No, I couldn’t supervise a thesis in this area because ”) Bob Fabry, however, read my draft paper and said “Publish, win fame and fortune!” So I submitted to CACM in August 1975

22 Idea meets people The response from CACM: “Enclosed is a referee report by an experienced cryptography expert on your manuscript…” “I am sorry to have to inform you that the paper is not in the main stream of present cryptography thinking and I would not recommend that it be published…”

23 Linking up February 7 th 1976: “About 3 days ago, a copy of your working paper, Multiuser Cryptographic Techniques, fell into my hands.” And the rest is history

24 Some thoughts on nanotechnology

25 Crypto and nano Today’s crypto systems must resist attack by tomorrow’s computers Nanotechnology explores the limits of what we can make Future computers will likely benefit decisively from nanotechnology

26 Arranging atoms Flexibility Precision Cost

27 Richard Feynman,1959 There’s plenty of room at the bottom

’s, 1990’s First STM By Binnig and Rohrer Experiment and theory

29 President Clinton, 2000 “Imagine the possibilities: materials with ten times the strength of steel and only a small fraction of the weight -- shrinking all the information housed at the Library of Congress into a device the size of a sugar cube -- detecting cancerous tumors when they are only a few cells in size.” The National Nanotechnology Initiative

30 Arrangements of atoms. Today The goal

31 The goal.

32 Core molecular manufacturing capabilities Today Products Many routes

33 A powerful method: positional assembly

34 Experimental Controlling the Dynamics of a Single Atom in Lateral Atom Manipulation Joseph A. Stroscio and Robert J. Celotta, Science, Vol 306, Issue 5694, , 8 October A 40-nanometer-wide NIST logo made with cobalt atoms on a copper surface

35 H. J. Lee and W. Ho, SCIENCE 286, p. 1719, NOVEMBER 1999 Experimental

36 Experimental Mechanical vertical manipulation of selected single atoms by soft nanoindentation using near contact atomic force microscopy, Noriaki Oyabu, Oscar Custance, Insook Yi, Yasuhiro Sugawara, Seizo Morita1, Phys. Rev. Lett. 90(2 May 2003):

37 Theoretical

38 Hydrocarbon machines

39 Molecular machines

40 Molecular robotics

41 PropertyDiamond’s valueComments Chemical reactivityExtremely low Hardness (kg/mm2)9000CBN: 4500 SiC: 4000 Thermal conductivity (W/cm-K)20Ag: 4.3 Cu: 4.0 Tensile strength (pascals)3.5 x 10 9 (natural)10 11 (theoretical) Compressive strength (pascals)10 11 (natural)5 x (theoretical) Band gap (ev)5.5Si: 1.1 GaAs: 1.4 Resistivity (W-cm)10 16 (natural) Density (gm/cm3)3.51 Thermal Expansion Coeff (K-1)0.8 x SiO2: 0.5 x Refractive 590 nmGlass: Coeff. of Friction0.05 (dry)Teflon: 0.05 Source: Crystallume Diamond physical properties What to make

42 Making diamond today Illustration courtesy of P1 Diamond Inc.

43 Hydrogen abstraction tool

44 Adding carbon Theoretical Analysis of Diamond Mechanosynthesis. Part II. C2 Mediated Growth of Diamond C(110) Surface via Si/Ge-Triadamantane Dimer Placement Tools, J. Comp. Theor. Nanosci. 1(March 2004). David J. Mann, Jingping Peng, Robert A. Freitas Jr., Ralph C. Merkle, In press.

45 Other molecular tools

46 Self replication A redwood tree (sequoia sempervirens) 112 meters tall Redwood National Park

47 Kinematic Self-Replicating Machines (Landes Bioscience, 2004)Landes Bioscience Reviews the voluminous theoretical and experimental literature about physical self- replicating systems. Self replication

48 Exponential assembly

49 Convergent assembly

50 Convergent assembly Making big things Illustration courtesy of Eric Drexler

51 Today: potatoes, lumber, wheat, etc. are all about a dollar per kilogram. Tomorrow: almost any product will be about a dollar per kilogram or less. (Design costs, licensing costs, etc. not included) Economics Manufacturing costs per kilogram will be low

52 The impact of a new manufacturing technology depends on what you make Impact

53 We’ll have more computing power in the volume of a sugar cube than the sum total of all the computer power that exists in the world today More than bits in the same volume Almost a billion Pentiums in parallel Powerful Computers Impact

54 High density memory Impact

55 Core molecular manufacturing capabilities Today Products Overview

56 Correct scientific answer: I don’t know Trends in computer hardware suggestive Beyond typical 3-5 year planning horizon Depends on what we do Babbage’s computer designed in 1830’s How long?

57 Nanotechnology offers... possibilities for health, wealth, and capabilities beyond most past imaginings. K. Eric Drexler