tremel slides
Download
Report
Transcript tremel slides
The Council of Shadows
Brown University
Presented by Edward Tremel, Computational
Archaeologist
A Mysterious
Disappearance
Setting: Providence,
two years ago
CS research group
vanishes without trace
Mysterious events
surround
disappearance
Rain of blood
Unexplainable
earthquake
Investigation Leads to Puzzling Discovery
Document Fell Behind File Cabinet in Disused CIT Basement
The Ill-Fated Group’s
Results?
Brown faculty deny
existence of Council of
Shadows
No such project ever
funded
Results appear
publishable
Search For Lost Archive Leads To LongAbandoned Tunnel
Reached Beneath Basement of University Hall
A Discovery of Ill Portent
Bricked up within
building’s walls
Bound in human skin
Aura of corruption
Obscure and forbidding
runes
The Problem With
Cryptography
Time to Sign (ms)
RSA Signature Cost
14
12
10
8
6
4
2
0
512
1024
2048
RSA Modulus Size (bits)
4096
SNARK Verification Time
12000
Time to Verify (ms)
Must sacrifice efficiency
for security
Often does not scale
Fundamental
operations involve
difficult computation
Optimizing math
libraries a thankless
task
10000
8000
6000
4000
2000
0
0
5000
10000 15000
Input Size (KB)
20000
25000
Black Magic: The
Solution?
Instead, sacrifice the
blood of the innocent
for both efficiency and
security
Often suggested in
theory, but impossible
in practice until book’s
discovery
Detailed instructions
for rituals
Gathering the Materials
3 human hearts
2 pounds flesh
Extract of Nightshade
Aura of Pestilence
Stone carved with Elder
Sign
Defiled altar of the
Elder Gods
1 goat
The Horrifying
Experiment
Unsuccessful attempts
Required additional
grave robbing
Accidentally summoned
disgusting tentacle
monster
Some incantations
granted power, but too
unstable to use
Exploiting the Dark Arts
Success: opened stable
portal to plane of Elder
Gods
Black magic used to
solve modular
exponentiation
Arcane forces allowed
impossibly fast
computation
Corruption-Based
Computation
Low-level math library
constructed with
diabolical forces
ModExp, Group ops,
Field ops, Elliptic Curve
pairings
Channel to Abyss used
for source of true
randomness
Group/Field
operations
Elliptic
Curve
operations
Impossibly
optimized assembly
arithmetic
RSA
encrypt &
decrypt
Source
of True
Random
Chaos of the
Abyss
Promising Results
Cryptography operations
12
Total time (ms)
10
8
Best current implementation
6
Prototype CBC implementation
4
2
0
RSA Sign
RSA Verify
Group multiply
Group pairing
But At What Cost?
Channel to Abyss may
not be as stable as
originally thought
Chaos leaking into
mortal plane
Increased incidence of
unholy monstrosities in
Providence area
He comes, oh god, he comes