15
Arcane Rituals for Cryptography Performance Optimization The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

Embed Size (px)

Citation preview

Page 1: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

Arcane Rituals for Cryptography Performance Optimization

The Council of ShadowsBrown University

Presented by Edward Tremel, Computational Archaeologist

Page 2: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

A Mysterious Disappearance

Setting: Providence, two years ago

CS research group vanishes without trace

Mysterious events surround disappearance Rain of blood Unexplainable

earthquake

Page 3: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

Investigation Leads to Puzzling DiscoveryDocument Fell Behind File Cabinet in Disused CIT Basement

Page 4: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

The Ill-Fated Group’s Results?

Brown faculty deny existence of Council of Shadows

No such project ever funded

Results appear publishable

Page 5: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

Search For Lost Archive Leads To Long-Abandoned Tunnel

Reached Beneath Basement of University Hall

Page 6: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

A Discovery of Ill Portent

Bricked up within building’s walls

Bound in human skin Aura of corruption Obscure and

forbidding runes

Page 7: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

The Problem With Cryptography

Must sacrifice efficiency for security

Often does not scale Fundamental

operations involve difficult computation

Optimizing math libraries a thankless task

512 1024 2048 409602468

101214

RSA Signature Cost

RSA Modulus Size (bits)

Tim

e t

o S

ign (

ms)

0

2000

4000

6000

8000

10000

12000SNARK Verification Time

Input Size (KB)

Tim

e t

o V

eri

fy (

ms)

Page 8: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

Black Magic: The Solution?

Instead, sacrifice the blood of the innocent for both efficiency and security

Often suggested in theory, but impossible in practice until book’s discovery Detailed

instructions for rituals

Page 9: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

Gathering the Materials

3 human hearts 2 pounds flesh Extract of

Nightshade Aura of Pestilence Stone carved with

Elder Sign Defiled altar of the

Elder Gods 1 goat

Page 10: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

The Horrifying Experiment

Unsuccessful attempts Required additional

grave robbing Accidentally

summoned disgusting tentacle monster

Some incantations granted power, but too unstable to use

Page 11: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

Exploiting the Dark Arts

Success: opened stable portal to plane of Elder Gods

Black magic used to solve modular exponentiation

Arcane forces allowed impossibly fast computation

Page 12: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

Corruption-Based Computation

Low-level math library constructed with diabolical forces

ModExp, Group ops, Field ops, Elliptic Curve pairings

Channel to Abyss used for source of true randomness

Chaos of the Abyss

Impossibly optimized assembly arithmetic

Group/Field operations

Elliptic Curve

operations

Source of True Rando

m

RSA encrypt & decrypt

Page 13: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

Promising Results

RSA Sign RSA Verify Group multiply Group pairing0

2

4

6

8

10

12

Cryptography operations

Best current implementationPrototype CBC implementation

Tota

l ti

me (

ms)

Page 14: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

But At What Cost?

Channel to Abyss may not be as stable as originally thought

Chaos leaking into mortal plane

Increased incidence of unholy monstrosities in Providence area

Page 15: The Council of Shadows Brown University Presented by Edward Tremel, Computational Archaeologist

He comes, oh god, he comes