38
Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1[at]gmail[dot]com

Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Protecting Passwords & DataIn a Post-Quantum Computing Era Using Military-Grade Crypto

Carlos A. Villegascv127.0.0.1[at]gmail[dot]com

Page 2: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

● Northrop Grumman employee for 20 years

● Programming since age 13, professionally for 25 years

● Master of Science in Computer Science, Cybersecurity – NYU, 2016

● Master of Science in Computer Science, Artificial Intelligence – USC

● Designing cyber resilient military drones (current job)

About Me

https://github.com/CarlosVilleags/CryptographicSecureMessagingSteganographyhttps://github.com/CarlosVilleags/Linux-Logs

Open Source Contributions:

Page 3: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

About Me (cont.)

● Participated in five Capture The Flag (CTF) cyber offensive competitions

● Nationally ranked 37th place in National Cyber League 2014, silver brkt

● CompTIA Security+ certification

● Mentoring ~50 high school students since 2014 in CyberPatriot

● Attended U.S. Cyber Challenge 2014 in San Jose, California

● Attended U.S. Cyber Challenge 2015 in Cedar City, Utah

● Honorary Girl Scout Member, GenCyber 2015/2016 @ CSUSB

Page 4: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

● Ideal Job: Designing cyber resilient military drones (current job!)

● Technical Interests:

○ Active Defense

○ Evading Anti-Viruses

○ Cracking Passwords

○ Intersection of Cybersecurity and Artificial Intelligence

● Favorite Programming Language: Go

● Non-Technical Interests:

○ Rueda de Casino

Interests

Page 5: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

● Fanless PC, 4GB RAM, 1TB SSD, 2GBit Ethernet ports

● pfSense = industrial firewall/router/proxy

● FreeBSD - best network stack implementation

Latest Project:

Page 6: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

The Cybersecurity Problem

Page 7: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

● Cybersecurity has become a global threat and a global challenge

● Cybersecurity cuts across every segment of the United States

● Cybersecurity is not a just a military problem

Drug-Dispensing-Robots Education RetailHealth CareBanking

Cities Homes Electrical Grid Entertainment Transportation H20 Sanitation

The Cybersecurity Problem

Page 8: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Most Recently Targeted: Medical Equipment

"Enriquez says his team found malware planted on several types of medical devices including an x-ray printer, an oncology unit's MRI scanner, a surgical center's blood gas analyzer and a health care provider's PACS-picture archiving and communication system."

src: http://abc7news.com/technology/san-mateo-cyber-security-firm-uncovers-malware-on-medical-devices/1757268/

Page 9: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

● Cybercrime damage costs to hit $6 trillion annually by 2021 worldwide

● Cybersecurity spending to exceed $1 trillion from 2017 to 2021

● Unfilled cybersecurity jobs will reach 1.5 million by 2019

● Human attack surface to reach 4 billion people by 2020

● Up to 200 billion IoT devices will need securing by 2020

Cybersecurity - Why Is It a Big Deal?

Page 10: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Answer the question correctly and this YubiKey 4 is yours (a $40 value)

I am not associated in any way with Yubico. I just picked-up an extra one of these from Yubico's booth at BlackHat USA.

Page 11: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

src: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

World's Biggest Data Breaches - Visualization

Page 12: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

New Era of Quantum Computing

Page 13: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Quantum ComputingA quantum computer (QC) uses qubits instead of classic binary digits, and each qubit is in a quantum state between zero and

one. QCs can perform a huge number of calculations simultaneously by harnessing this superposition phenomenon

along with quantum entanglement.

src: https://www.theregister.co.uk/2017/02/13/quantum_computer_billions_of_times_faster_than_todays_binary_computers/

Page 14: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Quantum Computer Chips

IBM’s five qubit processor uses a lattice architecture that scale to create larger, more powerful quantum computers.

A quantum computing chip made by Rigetti Computing with three quantum bits.

Page 15: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Moore's Law"Mr. Gordon Moore made a prediction in 1965 that every 18 months for the next 10 years, the number

of components on a integrated circuit doubles."

src: https://en.wikipedia.org/wiki/Moore's_law

His prediction continues to hold after 52 years.

Page 16: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

src: http://hexus.net/tech/news/cpu/97468-d-wave-systems-previews-2000-qubit-quantum-processor/

Quantum Computing and Moore's Law ?

Page 17: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Quantum Computing's Threat To Encryption

● As of Jan 2016, NSA realized that popular forms of Asymmetric Encryption can be brute forced by powerful Quantum Computers (QC) by 2030.

● Shor's algorithm can efficiently factor numbers, breaking RSA. ● A Shor's algorithm variant can break Diffie-Hellman and other discrete

log-based cryptosystems, including those that use elliptic curves.● Some leading cryptographers disagree with NSA on the timespace, far

beyond 2030.● Secrets run risk of being recorded today and decrypted later by QC

src: https://www.schneier.com/blog/archives/2015/08/nsa_plans_for_a.html

https://www.iad.gov/iad/library/ia-guidance/ia-solutions-for-classified/algorithm-guidance/cnsa-suite-and-quantum-computing-faq.cfm

https://threatpost.com/cryptographers-dismiss-ai-quantum-computing-threats/123723/

Page 18: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Passwords

Page 19: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

A) D0g........

B) r*<d2Gs%Er

Which Password is Harder to Brute Force?

Page 20: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Which Password is Harder to Brute Force?

Page 21: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

● Passwords are encoded using Cryptographic functions

● Cryptographic functions are special mathematical functions that

cannot be reversed ( one-way functions )

● Properties

○ One-way functions (mathematically irreversible)

○ Collision free

Mechanics of Passwords

Page 22: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Src: https://hashcat.net/wiki/doku.php?id=example_hashes

Plethora of cryptographic hash function

this

is a

par

tial l

ist.

..

Page 23: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

● Automate Authentication

○ Identify privileges with passwords

○ i.e. "Can I read this or write that?"

● Integrity Protection

○ Detect if anyone tampered with this data or program

Passwords, What Are They Good For?

Page 24: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

● Passwords should never be stored in plaintext

● New guidelines: NIST Special Pub 800-63b

○ Make password policies user friendly; put the burden on verifier.

○ Size matters, allow long passphrases with all printable ASCII chars.

○ Check new passwords against a dictionary of known-bad choices.

● Should be individually salted (next slide) when stored on

the server side

Passwords - Best Practices

Src: https://pages.nist.gov/800-63-3/sp800-63b.html

Page 25: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Salt, What is it?

● Salt makes hashed password more complex○ Imagine a single password file that contains hundreds of usernames and passwords. Without a salt, I could

compute "md5(attempt[0])", and then scan through the file to see if that hash shows up anywhere. If salts are present, then I have to compute "md5(salt[a] . attempt[0])", compare against entry A, then "md5(salt[b] . attempt[0])", compare against entry B, etc. Now I have n times as much work to do, where n is the number of usernames and passwords contained in the file.

● Salt makes more resilient against rainbow table attacks○ A rainbow table is a large list of pre-computed hashes for commonly-used passwords. Imagine again the

password file without salts. All I have to do is go through each line of the file, pull out the hashed password, and look it up in the rainbow table. I never have to compute a single hash. If the look-up is considerably faster than the hash function (which it probably is), this will considerably speed up cracking the file.

Page 26: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

UNSAFE a) ECDH and ECDSA with NIST P-256

UNSAFE b) RSA with 2048-bit keys

UNSAFE c) Diffie-Hellman with 2048-bit keys

UNSAFE d) SHA-256

UNSAFE e) AES-128

Quantum Computing Threat to Encryption

src: https://www.iad.gov/iad/library/ia-guidance/ia-solutions-for-classified/algorithm-guidance/cnsa-suite-and-quantum-computing-faq.cfm

Page 27: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

a) Symmetric Encryption short rotating key schedule

b) RSA 3072-bit or larger

2) Diffie-Hellman (DH) 3072-Bit or larger

3) ECDH with NIST P-384

4) ECDSA with NIST P-384

5) SHA-384

6) AES-256

NSA Recommended Cryptographic Algorithms

src: https://www.iad.gov/iad/library/ia-guidance/ia-solutions-for-classified/algorithm-guidance/cnsa-suite-and-quantum-computing-faq.cfm

Page 28: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

NSA NIST Quantum docs + Paper

● NIST Report on Post-Quantum Cryptography April2016 http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8105.pdf

● CNSA Quantum Computing FAQhttps://drive.google.com/open?id=0BwMw6ipu4nPzVmNFQ3pPTnpnSDA

● Commercial National Security Algorithm (CNSA) Suite Factsheet by NSAhttps://drive.google.com/open?id=0BwMw6ipu4nPzMWlKaVZTTUt5clU

● A Riddle Wrapped in an Enigma by Neal Koblits and Alfred J. Menenzeshttps://drive.google.com/open?id=0BwMw6ipu4nPzRW9zd09lMC14eTA

Page 29: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Sample Quantum-Proof Messaging App Here's why this app is Quantum Proof:

● CCA is regarded as the most lethal attack against a cryptosystem.

● It consists in that the adversary can choose an arbitrary ciphertext and obtain the corresponding plaintext using a decryption oracle.

● This application uses AES-256 in CBC mode. AES is an encryption algorithm (aka Rijndael) approved by NIST as U.S. FIPS PUB 197 on November 26, 2001.

● AES-256 in CBC mode uses an Initialization Vector (IV) of 128-bits pseudo-random data suitable for cryptographic purposes, created by Python’s os.urandom() properly seeded with time to a precision of microseconds (1 millionth of a second). It also uses 64-bits of salt which is pseudo-random data also to the microsecond precision.

● Each message is encrypted with a unique IV and salt, therefore, it is virtually impossible for the same plaintext to yield the same ciphertext.

https://github.com/CarlosVilleags/CryptographicSecureMessagingSteganography

Page 30: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Make Your Passwords Uncrackable!

a. Not be in any dictionary of any language

b. If using compound words, make sure to use at least 4 words

c. Contain at least 1 of each of the four character sets: upper, lower,

number, symbol

d. At least 12 in length

e. Use a computationally expensive cryptographic hash algorithm, such as

those that use 64-bit logic because (GPUs are 32 bit based)

f. Know nothing about the semantic format of the password. Anything goes.

Page 31: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Bruteforcing a Password

Page 32: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Password Cracking Box - Favorite Past ProjectAMD Radeon HD 7990

amd.com/en-us/products/graphics/desktop/7000/7990

Page 33: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Raw computing power

Page 34: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Creating a strong cryptographic hash value using ‘mkpasswd’ via command line interface (CLI)

Page 35: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Demo

Page 36: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

● U.S. Cyber Challenge (deadline 04/23/17 11:59pm EDT)○ http://uscc.cyberquests.org/

● CTFs (“Capture The Flag”) hacking competitions

● Security+, SSCP, CEH, CISSP, GISP, GSEC, GCFE, CEH○ https://niccs.us-cert.gov/featured-stories/cybersecurity-certifications

● Cybersecurity degree? Online vs. In-person

● What to Expect in an Online Cybersecurity Degree Program○ http://www.usnews.com/education/online-education/articles/2016-11-28/what-to-expect-in-an-online-cybersecurity-degree-program

How to get into Cybersecurity?

Page 37: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

https://github.com/CarlosVilleags/Linux-Logs https://github.com/CarlosVilleags/CryptographicSecureMessagingSteganography https://www.youtube.com/watch?v=uxaSTZv5k-8 https://youtu.be/tnGKRfJhlYkhttp://dx.doi.org/10.6028/NIST.IR.8105 http://www.usnews.com/education/online-education/articles/2016-11-28/what-to-expect-in-an-online-cybersecurity-degree-program http://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ http://www.csoonline.com/article/3083798/security/cybersecurity-spending-outlook-1-trillion-from-2017-to-2021.html http://www.cybersecurityventures.com/jobs http://blogs.microsoft.com/microsoftsecure/2016/01/27/the-emerging-era-of-cyber-defense-and-cybercrime/%20target=http://www.fool.com/investing/2016/11/23/iot-stocks-what-to-watch-in-2017.aspx http://abc7news.com/technology/san-mateo-cyber-security-firm-uncovers-malware-on-medical-devices/1757268/ http://www.uscyberchallenge.org/ https://en.wikipedia.org/wiki/Moore's_law http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ http://www.digitaltrends.com/features/dt10-quantum-computing-will-make-your-pc-look-like-a-graphing-calculator/ http://www.globalfuturist.org/2017/02/scientists-publish-a-breakthrough-architecture-for-the-worlds-first-quantum-computer/ https://www.theregister.co.uk/2017/02/13/quantum_computer_billions_of_times_faster_than_todays_binary_computers/ https://www.newscientist.com/article/mg23130894-000-revealed-googles-plan-for-quantum-computer-supremacy/ https://www.technologyreview.com/s/600711/the-tiny-startup-racing-google-to-build-a-quantum-computing-chip/ https://www.washingtonpost.com/news/the-switch/wp/2014/01/10/this-company-sold-google-a-quantum-computer-heres-how-it-works/?utm_term=.b76a4450ef60 http://hexus.net/tech/news/cpu/97468-d-wave-systems-previews-2000-qubit-quantum-processor/ http://www.nbcnews.com/id/8985989/#.WKjOYld74_t https://pages.nist.gov/800-63-3/sp800-63b.html https://threatpost.com/cryptographers-dismiss-ai-quantum-computing-threats/123723/

References

Page 38: Protecting Passwords & Data - IEEE · 2017-02-24 · Protecting Passwords & Data In a Post-Quantum Computing Era Using Military-Grade Crypto Carlos A. Villegas cv127.0.0.1 ... an

Thank You for

Your Time and Attention

Carlos A. Villegascv127.0.0.1[at]gmail[dot]com