📜 ⬆️ ⬇️

Adi Shamir's birthday. Visual, geometric and neuro-cryptography

Shamir is S in R S A


Here he is so funny, with an accent, already 62 years old "patriarch of Israeli cryptography"

What is encrypted here?


Under the cut some achievements of the birthday

')
image
in 1977 , together with Ronald Rivest and Leonard Adleman, he developed the famous RSA public key cryptosystem

1979 Shamir secret sharing scheme

1984 ID-based encryption

1988 Fiat - Shamir Protocol

1990 Developed rekta differential cryptanalysis

1994 Visual cryptography that allows you to encrypt visual information (pictures, text) using mechanical actions that do not require a computer

still
image
The site with the implemented application here .

1996 Geometric cryptography based on the complexity of solving geometric problems (for example, trisection of an angle using a compass and a ruler). Article

1998 Steganographic file system
1998 Impossible differential cryptanalysis

2001 Ring signature

2002 T-function
image

2002 Analysis of Neuro-Cryptography

2006 Hacking RFID
“Using a directional antenna and a digital oscilloscope, Shamir took readings of the power consumption of RFID chips and found fluctuations characteristic of the correct and incorrect bits of the password. “We can track when the chip, figuratively speaking,“ turns out to be dissatisfied ”with the sending of the“ wrong ”bit - at such moments its power consumption increases,” says prof. Shamir. - "Creating a complete and complete picture of the reactions of chips on different signals, thus, is not such a difficult problem."

2008 Cubic attacks
The “cubic” attack can be successfully applied to pseudo-random number generators used in GSM telephones and Bluetooth devices. Cell phones and RFID devices using stream ciphers are also vulnerable. ”Bruce Schneier

2012 78% of the BTC earned remain on the wallets without movement and never enter circulation.
BTC transaction analysis
Quantitative analysis of the complete Bitcoin transaction graph

2013 Acoustic Hacking RSA
image
“Many computers make high-frequency sound during operation, due to vibrations in some electronic components,” explains Adi Shamir. “These acoustic emanations are more than annoying squeaks: they contain information about running software, including security-related calculations.”

RSA 2013 Conference
image
I definitely think that cryptography is becoming less important. In reality, even the most secure computer systems in the most isolated places were hacked in recent years using a series of APT (Advanced Persistent Threat) attacks or other advanced techniques. We need to rethink how we build protection. ”A note in Hacker

2014, the latest article from Adi Shamir: "Get your hands off my laptop: physical side-channel key extraction attacks on PCs"
Adi Shamir: “In addition to acoustics, a similar attack can be carried out by measuring the electrical potential of a computer case. To do this, a suitably equipped attacker simply touch the conductive parts of the case with his bare hand or connect to the ground contacts on the other end of the VGA, USB or Ethernet cable. "(2013)
What the article says we will find out in September 2014

RSA Conference 2014


PS

Source: https://habr.com/ru/post/228833/


All Articles