(Press ? for help, n and p for next and previous slide; usage hints)
Mo, Yilin
Nov 2020




Stuxnet Incident
In FY 2016, ICS-CERT received 290 incidents. The scope of incidents includes:

A Successful attack on critical infrastructure can be devastating.



Supply Chain for Boeing 787
| Control Signal | Measurements | Software | |
| Confidentiality | Exposure of System Structure | Unauthorized Access | Piracy |
| Integrity | Changes of Control Command | Incorrect Data | Malicious Software |
| Availability | Inability to Control the Grid | Unavailability of Measurements | N/A |
1500 BC: clay tablets from Mesopotamia

“Scytale used by Spartans” by Luringen under GNU Free Document; from Wikipedia
| Plain | A | B | C |
| Cipher | Z | Y | X |
For a simple substitution cipher, there are \(26!\approx 4\times 10^26\) possible keys

“The first page of al-Kindi's manuscript 'On Deciphering Cryptographic Messages'” by sador under Public Domain; from Wikipedia
Appeared in Sherlock Holmes story
A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.
A secret diplomatic communication issued in January 1917 from German Foreign Office
The Enigma machine is an encryption device employed extensively by Nazi Germany during World War II

“The Enigma Machine” by Alessandro Nassiri under CC BY-SA 4.0; from Wikipedia
Developed by IBM in 1970s and became a standard in 1977

“Diagram of DES” by Matt Crypto under Public Domain; from Wikipedia
A brute-force attack using Nvidia GTX 1080 would require 15 days on average
In OTP, a plaintext is paired with a random secret key (also referred to as a one-time pad).

“One Time Pad used by NSA” by NSA under Public Domain; from Wikipedia
\[P=\left(1-\frac{0}{365}\right) \left(1-\frac{1}{365}\right)\dots\left(1-\frac{n-1}{365}\right)\]
\[P\approx\exp\left(-\frac{\sum_{i=0}^{n-1}i}{365}\right)=\exp\left(-\frac{n(n-1)}{730}\right).\]
MD5 was invented in 1991

\[HMAC(k,m)=H\left((k\oplus opad)\|H((k\oplus ipad)\|m)\right).\]
The receiver of the MAC can verify if the correct pre-share secret is used
MAC-then-Encrypt



Pros:
Cons:
Pros:
Cons:
Pros:
Cons:
Pros:
Cons:
\[a − b = kn.\]
\[xa+yn=1.\]
\[a^{\phi(n)}\equiv 1\; (mod\;n).\]
Named after Whitfield Diffie and Martin Hellman.

“Whitfield Diffie” by DuncanHull under CC BY-SA 4.0; from Wikipedia
The first public key exchange algorithm

“Martin Edward Hellman” by Ajvol under CC BY-SA 3.0; from Wikipedia
| Alice | Public Information | Bob |
| \(p, g , a\) | ||
| \(p, g , g^a(mod\;p)\) | ||
| \(p, g , g^a(mod\;p),b\) | ||
| \(p, g , g^a(mod\;p),g^b(mod\;p)\) | ||
| \(p, g , a, g^b(mod\;p)\) |
\[s \equiv g^{ab} \equiv (g^a)^b \equiv (g^b)^a \;(mod\;p).\]
| Alice | Eve | Bob |
| \(p, g , a\) | ||
| \(p, g , g^a(mod\;p), \alpha, \beta\) | ||
| \(p, g , g^\alpha(mod\;p),b\) | ||
| \(p, g , g^a(mod\;p),g^b(mod\;p),\alpha,\beta\) | ||
| \(p, g , a, g^\beta(mod\;p)\) |
All received Turing Award in 2002



| Protocol | Published | Status |
| SSL 1.0 | Unpublished | Unpublished |
| SSL 2.0 | 1995 | Deprecated in 2011 |
| SSL 3.0 | 1996 | Deprecated in 2015 |
| TLS 1.0 | 1999 | Deprecated in 2020 |
| TLS 1.1 | 2006 | Deprecated in 2020 |
| TLS 1.2 | 2008 | |
| TLS 1.3 | 2018 |
In TLS encryption, the process is as follows:
Defense in Depth

\[ u(k) = \text{Optimal LQG Control}+ \zeta(k).\]

Watermark

TEP Model

Detection Performance
\[\begin{bmatrix} y_1\\ \vdots\\ y_m \end{bmatrix} = Hx + noise + attack. \]
\[ \begin{align*} & \mathop{\textit{minimize}}\limits_{\hat x,a,w}& & \|w\|^2 \\ &\text{subject to}& &y = H \hat x + w + a,\\ && &\|a\|_0\leq p. \end{align*}\]
\[\hat x = \mathop{argmin}_{\hat x} f_i (y_i - H_i\hat x)\]

IEEE 14-Bus System

Stuxnet Incident