Slide 1

Slide 1 text

Qeb Pqxqb lc Bkzovmqflk Rfc Qryrc md Clapwnrgml Sgd Rszsd ne Dmbqxoshnm The State of Encryption Uif Tubuf pg Fodszqujpo Vjg Uvcvg qh Gpetarvkqp Wkh Vwdwh ri Hqfubswlrq ! Cristiano Betta | @cbetta

Slide 2

Slide 2 text

Qeb Pqxqb lc Bkzovmqflk Rfc Qryrc md Clapwnrgml Sgd Rszsd ne Dmbqxoshnm The State of Encryption Uif Tubuf pg Fodszqujpo Vjg Uvcvg qh Gpetarvkqp Wkh Vwdwh ri Hqfubswlrq

Slide 3

Slide 3 text

1987

Slide 4

Slide 4 text

No content

Slide 5

Slide 5 text

The living Daylights "

Slide 6

Slide 6 text

The living Daylights "

Slide 7

Slide 7 text

No content

Slide 8

Slide 8 text

No content

Slide 9

Slide 9 text

The Real Spies #

Slide 10

Slide 10 text

No content

Slide 11

Slide 11 text

No content

Slide 12

Slide 12 text

No content

Slide 13

Slide 13 text

No content

Slide 14

Slide 14 text

 Hide

Slide 15

Slide 15 text

 Hide%

Slide 16

Slide 16 text

Microdot 

Slide 17

Slide 17 text

No content

Slide 18

Slide 18 text

1mm 1mm 1mm

Slide 19

Slide 19 text

MA-4450 '

Slide 20

Slide 20 text

MA-4450 '

Slide 21

Slide 21 text

Rotation Sheets (

Slide 22

Slide 22 text

Jackpot )))

Slide 23

Slide 23 text

Cristiano 
 Betta @cbetta

Slide 24

Slide 24 text

♥ security + virgilsecurity.com + betta.io

Slide 25

Slide 25 text

, security expert + virgilsecurity.com + betta.io

Slide 26

Slide 26 text

Encryption 101 %

Slide 27

Slide 27 text

Entropy -

Slide 28

Slide 28 text

No content

Slide 29

Slide 29 text

11111111111111111111 11111111111111111111 11111111111111111111 11111111111111111111 11111111111111111111 H = 0

Slide 30

Slide 30 text

11111111111111111111 11111111111111111111 11111111110000000000 00000000000000000000 00000000000000000000 H = 1

Slide 31

Slide 31 text

RAR(50x1+50x0) H ~= 5

Slide 32

Slide 32 text

TrueCrypt(RAR) H ~= 7.8

Slide 33

Slide 33 text

RC4 .

Slide 34

Slide 34 text

! ! /1 /1

Slide 35

Slide 35 text

1984 .

Slide 36

Slide 36 text

Certified Security 0

Slide 37

Slide 37 text

Diffie- Hellman 1

Slide 38

Slide 38 text

Color Exchange 2

Slide 39

Slide 39 text

A B

Slide 40

Slide 40 text

A B Common Common

Slide 41

Slide 41 text

A B Common Common Secret Secret

Slide 42

Slide 42 text

A B Public Mix Public Mix

Slide 43

Slide 43 text

Public Mix A B Public Mix

Slide 44

Slide 44 text

Public Mix A B Public Mix

Slide 45

Slide 45 text

Public Mix A B Public Mix Secret Secret

Slide 46

Slide 46 text

A B Common Secret Common Secret

Slide 47

Slide 47 text

1-way functions 3

Slide 48

Slide 48 text

X*Y = 143 X > 1 Y > 1 3

Slide 49

Slide 49 text

3 X*Y = 143 X = 11 Y = 13

Slide 50

Slide 50 text

X*Y = 10,967,535,067 X = 104723 Y = 104729

Slide 51

Slide 51 text

Public Key Encryption 1

Slide 52

Slide 52 text

Asymmetric Encryption 1

Slide 53

Slide 53 text

! / / Pub1 Priv1 ! / / Pub2 Priv2 1 2

Slide 54

Slide 54 text

! ! 4 1 2

Slide 55

Slide 55 text

! ! 4+/pub2 1 2

Slide 56

Slide 56 text

! ! 4 1 2 /

Slide 57

Slide 57 text

! ! 4 1 2 /

Slide 58

Slide 58 text

! ! 4+/priv2 1 2 /

Slide 59

Slide 59 text

! ! 1 2 4

Slide 60

Slide 60 text

Signatures 5

Slide 61

Slide 61 text

! ! 4+/priv1 1 2

Slide 62

Slide 62 text

! ! 1 2 4 0

Slide 63

Slide 63 text

! ! 1 2 4 0

Slide 64

Slide 64 text

! ! 4+/pub1 1 2 0

Slide 65

Slide 65 text

! ! 1 2 ○

Slide 66

Slide 66 text

Public Key Encryption 1

Slide 67

Slide 67 text

PGP SSH SSL TLS BitCoin …. 1

Slide 68

Slide 68 text

/ Pub1? / Pub2?

Slide 69

Slide 69 text

Digital Certificates International 0

Slide 70

Slide 70 text

Verisign

Slide 71

Slide 71 text

Certificate Authorities 0

Slide 72

Slide 72 text

0 0 / Pub1? / Pub2? 0 Root

Slide 73

Slide 73 text

LetsEncrypt 7

Slide 74

Slide 74 text

letsencrypt.org

Slide 75

Slide 75 text

Crypto Wars 8

Slide 76

Slide 76 text

Ammunition

Slide 77

Slide 77 text

Netscape 9

Slide 78

Slide 78 text

2000 MTOPS !

Slide 79

Slide 79 text

No content

Slide 80

Slide 80 text

No content

Slide 81

Slide 81 text

2017 :

Slide 82

Slide 82 text

Crypto Wars Round 2 ;

Slide 83

Slide 83 text

Snowden Manning Assange <

Slide 84

Slide 84 text

“…the N.S.A. has been deliberately weakening the international encryption standards adopted by developers. One goal … was to ‘influence policies, standards and specifications for commercial public key technologies’…” 76 - New York Times, 6 Sept 2013

Slide 85

Slide 85 text

Increased Law Enforcement =

Slide 86

Slide 86 text

http://www.dailymail.co.uk/wires/reuters/article-4350416/UK-minister-says- encryption-messaging-services-unacceptable.html

Slide 87

Slide 87 text

Chat Apps :

Slide 88

Slide 88 text

https://www.eff.org/node/82654

Slide 89

Slide 89 text

Virgil Security

Slide 90

Slide 90 text

Create private key & public Virgil Card

Slide 91

Slide 91 text

Push Virgil Card to server

Slide 92

Slide 92 text

Publish card to Virgil

Slide 93

Slide 93 text

Encrypt data

Slide 94

Slide 94 text

Decrypt data

Slide 95

Slide 95 text

Demo %

Slide 96

Slide 96 text

Virgil Security >

Slide 97

Slide 97 text

demo-ip-messaging.virgilsecurity.com

Slide 98

Slide 98 text

virgilsecurity.com %

Slide 99

Slide 99 text

Encryption 201 ?

Slide 100

Slide 100 text

2047 ?

Slide 101

Slide 101 text

Total Security @

Slide 102

Slide 102 text

Total Privacy %

Slide 103

Slide 103 text

Human Error A

Slide 104

Slide 104 text

Slingshot Security B

Slide 105

Slide 105 text

Quantum Entanglement -

Slide 106

Slide 106 text

Large Integer Factorization! ÷

Slide 107

Slide 107 text

Post-QC Encryption 7

Slide 108

Slide 108 text

Quantum Key Exchange -

Slide 109

Slide 109 text

Quantum Key Exchange -

Slide 110

Slide 110 text

2047 ?

Slide 111

Slide 111 text

2117 ?

Slide 112

Slide 112 text

Thank you! @cbetta betta.io Cristiano Betta @virgilsecurity virgilsecurity.com Virgil Security