Real World Crypto 2017

Willy Vasquez

January 13th, 2017

I attended Real World Crypto at Columbia University in NYC, and it was an awesome three days of talks with topics from quantum computing to multi-party computation (MPC) to how as a reverse engineer I am affected by the Digital Millenium Copyright Act (DMCA). There was a great mix of industry and academia and some of the biggest stars in cryptography attended. Since this was my first cryptography conference, I may have been a little over excited, but it was a great experience and would recommend for folks to attend, if not for the talks but the opportunity to network with experts.

Overall, I learned that OpenSSL is the most popular real world crypto instantiation as many people are working to improve it, replace it, or implement their own crypto into it, and that Google has a HUGE presence in crypto, experimenting with all types of things: running MPC with their customers, testing out LWE and RLWE implementations in OpenSSL, replacing OpenSSL with their own BoringSSL, and working to achieve "quantum supremacy."

Below I've detailed talks that I found to be my favorite. I've chosen these talks because they either introduced me to a new topic, were well presented, or gave me a view of what real world crypto actually is.

Note that if you want to go deeper into the talks than what I've detailed, some of the slides located at https://www.realworldcrypto.com/rwc2017/program and videos of the talks should be posted up later.

Favorite Talks

Day 1: NSEC 5

Why favorite:

Day 1: White box cryptography

Why favorite:

Day 2: MPC at Google

Why favorite:

Day 2: Formal Analysis of Signal (Post Compromise Security)

Why favorite:

Day 3: Quantum Computing at Google

Why favorite:

Day 3: Attacks on Order Revealing Encryption

Why favorite:

All Talks

Material To Explore

The area that caught my most attention was whitebox cryptography, especially how it seems to take an engineering approach to the cryptographic question of obfuscation. Whitebox crypto seems to be an excellent combination of reverse engineering and cryptography, and I plan to explore the work in the field and maybe give a try to some of the CHES challenges this year.

The other areas I plan to explore and those I had not heard about before:

I plan to continue to understand the different post-quantum crypto techniques, and follow along in the conversation to understand the trade-offs between current candidates. Mostly, the goal is to understand what exactly the requirements are, aside from just "not currently broken with a quantum computer." If there are some complexity-theoretic papers that talk about this material that would be terribly useful.

Lessons Learned

Lessons I learned seem to be related to the way cryptography is used in the real world, and how the assumptions differ from the "ideal" world. Particularly, speakers emphasized that server non-collusion is not impossible, cost is usually a more important metric over speed, and there are currently no good PKIs for embedded and mobile devices.

I think these lessons are valuable as I do my masters thesis and then my PhD thesis. If I plan to truly transition whatever my research is into a real world project, I'll have to flush out the systems I create to be resilient against real world adversaries.