Cryptography: Bridging Theory and Practice

Lead Research Organisation: Royal Holloway University of London
Department Name: Information Security

Abstract

Cryptography is a discipline that has undergone rapid and extensive development in the last 30 years. It has become a rich academic subject in its own right, existing as a sub-discipline of theoretical computer science. It also has deep connections with areas of mathematics such as number theory and algebra. At the same time, cryptography is inherently an applied subject, underpinning the security of e-commerce, banking networks, mobile telecommunications, business-to-business collaboration on the Internet, and much more besides. This means that pragmatic, engineering aspects of cryptography are of vital importance.As the field has developed, so has it fragmented, to the point where potentially dangerous gulfs in understanding have opened up between theoreticians on the one side and practitioners on the other. Currently, few researchers are attempting to close the gaps between theory and practice in cryptography. Indeed, with only a small number of exceptions, researchers in academia largely work on theoretical topics, while practitioners are focussed on providing standards-compliant implementations.The principal aim of this Fellowship, then, is to make a systematic attempt to bridge the divide between theory and practice in cryptography, with the ultimate objectives being to create theory that is more useful and systems that are more secure. The means by which these aims will be achieved are both technical and organisational, and are grouped into three main themes:1. I will build on my previous work on globally deployed protocols such as IPsec and SSH, continuing to look for weaknesses in cryptographic specifications and implementations. I will also seek to understand how these weaknesses can be addressed in practical ways. 2. Using knowledge gained from the first activity, I will develop extensions of current theory that permit more realistic modeling of cryptographic primitives as they are used in fielded systems. 3. I will seek to engage with both the theoretical community and practitioners in an attempt to bring them back together again. This will be done by a variety of methods:* I will seek to establish a new series of workshops focussed on applied aspects of cryptography.* Through my position on the editorial board of the Journal of Cryptology, I will propose and guest-edit a special issue dedicated to applied cryptography. * I will continue to work with standardisation bodies such as ISO and the IETF.* I will work with industry through forums such as I4 and CPNI to keep practitioners informed of research developments. At the same time, I will maintain my contacts with the academic community, via collaboration, participation in the ECRYPT-II Network of Excellence, and conference attendance, bringing the needs of industry to their attention.* I will continue to engage with the wider public via magazine and press articles of the type engendered by my earlier work. This third activity will necessitate strengthening existing collaborations, developing new ones, and evangelising the general approach of reuniting theory and practice.
 
Description Research carried out in this project had a substantial impact on the way cryptography works on the Internet. For example, we showed significant security weaknesses in the SSL/TLS protocol in all its major cryptographic modes. This necessitated a switch to the worldwide use of more modern versions of the protocol. Since this protocol is used almost universally to protect communications on the Internet today, the impact of the research was very widespread, affecting all sectors, from Aerospace to Transport (in the ticklist given here).
First Year Of Impact 2013
Sector Aerospace, Defence and Marine,Chemicals,Communities and Social Services/Policy,Construction,Creative Economy,Digital/Communication/Information Technologies (including Software),Education,Electronics,Energy,Environment,Financial Services, and Management Consultancy,Healthcare,Leisure Activities, including Sports, Recreation and Tourism,Government, Democracy and Justice,Manufacturing, including Industrial Biotechology,Culture, Heritage, Museums and Collections,Pharmaceuticals and Medical Biotechn
Impact Types Societal,Economic

 
Description Impact on TLS protocol
Geographic Reach Multiple continents/international 
Policy Influence Type Citation in other policy documents
Impact Quoting from RFC 7465 RC4 is a stream cipher that is described in [SCH]; it is widely supported, and often preferred by TLS servers. However, RC4 has long been known to have a variety of cryptographic weaknesses, e.g., see [PAU], [MAN], and [FLU]. Recent cryptanalysis results [ALF] exploit biases in the RC4 keystream to recover repeatedly encrypted plaintexts. These recent results are on the verge of becoming practically exploitable; currently, they require 2^26 sessions or 13x2^30 encryptions. As a result, RC4 can no longer be seen as providing a sufficient level of security for TLS sessions. This document requires that TLS ([RFC5246] [RFC4346] [RFC2246]) clients and servers never negotiate the use of RC4 cipher suites.
URL https://tools.ietf.org/html/rfc7465
 
Description N/A
Amount £128,250 (GBP)
Organisation Huawei Technologies 
Sector Private
Country China
Start 07/2015 
End 07/2017