
NSF Org: |
CCF Division of Computing and Communication Foundations |
Recipient: |
|
Initial Amendment Date: | July 27, 2010 |
Latest Amendment Date: | July 27, 2010 |
Award Number: | 1018836 |
Award Instrument: | Standard Grant |
Program Manager: |
Nina Amla
CCF Division of Computing and Communication Foundations CSE Directorate for Computer and Information Science and Engineering |
Start Date: | September 1, 2010 |
End Date: | August 31, 2015 (Estimated) |
Total Intended Award Amount: | $436,203.00 |
Total Awarded Amount to Date: | $436,203.00 |
Funds Obligated to Date: |
|
History of Investigator: |
|
Recipient Sponsored Research Office: |
809 S MARSHFIELD AVE M/C 551 CHICAGO IL US 60612-4305 (312)996-2862 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
809 S MARSHFIELD AVE M/C 551 CHICAGO IL US 60612-4305 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | TRUSTWORTHY COMPUTING |
Primary Program Source: |
|
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
Internet users can now use https://www.google.com instead of http://www.google.com, protecting their text searches against espionage and sabotage by network attackers. However, Google still does not support encryption for high-volume data such as images and maps.
Other sites encrypt even less. More than 99% of Internet web pages and Internet mail messages remain unencrypted. Furthermore, most encryption used on the Internet is at a surprisingly low security level. For example, in June 2010, https://paypal.com was still using 1024-bit RSA, a key size easily breakable by the Conficker botnet. Government recommendations to move to at least 2048-bit RSA have triggered widespread objections.
The underlying problem is that cryptography is too slow. Even when the necessary cryptographic software has been written and installed, users are often forced to disable or limit the software, or compromise security, so that their computers are not overloaded.
This project directly addresses this problem by making cryptography faster---without compromising security. The research has a broad vertical scope spanning high-speed engineering of high-speed software, CPU-specific optimization, algorithm analysis and design, analysis and design of cryptographic functions, and optimization of cryptographic Internet protocols.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
PROJECT OUTCOMES REPORT
Disclaimer
This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.
The WhatsApp instant-messaging system was founded in 2009, was purchased by Facebook for $19 billion in 2014, and reached one billion users in February 2016. In April 2016 it announced that its latest update encrypted all messages from end to end by default to protect against "cybercriminals" and "hackers" and "oppressive regimes"; see https://blog.whatsapp.com/10000618/end-to-end-encryption. This encryption relies critically on Curve25519, a cryptographic system developed by the PI; see https://www.whatsapp.com/security/WhatsApp-Security-Whitepaper.pdf.
This is one of many examples of widespread deployment of high-speed high-security cryptographic systems produced within the PI's NSF-funded research. Today the most popular examples of these cryptographic systems are the PI's Salsa20 and ChaCha20 stream ciphers, the PI's Poly1305 message authenticator, the PI's X25519 public-key encryption system (using the PI's Curve25519 elliptic curve), and the PI's Ed25519 public-key signature system (also using Curve25519), covering the complete spectrum of core cryptographic functionality. It is reasonable to expect that post-quantum public-key systems designed by the PI, such as McBits and SPHINCS, will attract similar attention as the public becomes increasingly aware of the threat posed by future quantum computers.
The PI's research includes security analysis of a broad range of cryptographic systems, performance optimization for confidence-inspiring cryptographic systems, selection of systems in light of trends in computer hardware, and integration into real-world Internet applications. The PI's work on this topic began in earnest with NSF grant 9983950 ("CAREER: Computational number theory, cryptography, and computer security"), as a spinoff from his work under various DMS grants ("Algorithmic problems in number theory"); the work continued with 0716498 ("High-speed cryptography") and this grant 1018836 ("Higher-speed cryptography").
Further Curve25519/X25519/Ed25519 deployment examples include Apple's iOS (iPhone, iPad, etc.); the Signal (TextSecure) messaging system; the standard OpenSSH remote-login software; the Tor network; and Google's QUIC protocol. Salsa20/ChaCha20/Poly1305 deployment examples include DNSCrypt from OpenDNS, Chrome connections to Google (see https://security.googleblog.com/2014/04/speeding-up-and-strengthening-https.html), and Chrome connections to millions of Cloudflare sites (see https://blog.cloudflare.com/do-the-chacha-better-mobile-performance-with-cryptography). Nicolai Brown maintains lists of many more applications; see https://ianix.com/pub/curve25519-deployment.html, https://ianix.com/pub/ed25519-deployment.html, https://ianix.com/pub/salsa20-deployment.html, and https://ianix.com/pub/chacha-deployment.html.
Last Modified: 04/18/2016
Modified by: Daniel J Bernstein
Please report errors in award information by writing to: awardsearch@nsf.gov.