AWS re:Inforce 2024 - Explorations of cryptography research (SEC204-INT)

AWS Events
12 Jun 202438:43

Summary

TLDR在亚马逊网络服务(AWS)的一次活动中,Peter O'Donnell介绍了三位密码学专家:Hugo Krawczyk、Tal Rabin和Shai Halevi,他们分别在HMAC算法、同态加密和多方计算等领域有杰出贡献。他们分享了在AWS的工作经历,以及如何将先进的密码学技术应用于实践,提高云服务的安全性和隐私保护。讨论的主题包括阈下密码学、安全多方计算以及加密计算等前沿技术,并强调了这些技术在保护数据、提高系统安全性方面的重要性。

Takeaways

  • 😀 亚马逊网络服务(AWS)非常重视数据保护,其云服务的安全性和隐私性是客户最关心的问题之一。
  • 🔒 Peter O'Donnell作为AWS的主要解决方案架构师,强调了密码学在保护数据中的基础作用,包括数据静态和传输中的加密以及身份验证。
  • 🤖 AWS发明了Nitro系统,设计了耐用的S3服务,但这些并非Peter O'Donnell的工作,他强调了团队合作的重要性。
  • 🌟 Hugo Krawczyk、Tal Rabin和Shai Halevi三位密码学家加入了AWS,他们分别在HMAC算法、同态加密和多方计算等领域有着杰出的贡献。
  • 🔐 密码学家们希望将过去30年的先进密码学技术应用到实践中,提高AWS客户的安全和隐私保护水平。
  • 🛡️ 阈下密码学、安全多方计算和加密计算是AWS正在研究和应用的先进技术,它们可以增强云服务的安全性并启用新的服务。
  • 🔗 同态加密允许在加密数据上进行计算而无需解密,这为保护数据隐私提供了新的途径。
  • 🤝 安全多方计算允许多个参与者共同计算某个函数的结果,而不会暴露各自的输入数据,这对于广告分析等领域非常有用。
  • 🔑 阈下密码学通过将密钥分割存储在多个服务器上,消除了单点故障的风险,同时提高了系统的可用性和安全性。
  • 🔍 AWS正在考虑将阈下密码学应用于其身份访问管理(IAM)系统,以增强其安全性。
  • 🔄 密码学家们呼吁客户反馈,以了解他们的需求和痛点,从而更好地应用密码学技术解决实际问题。

Q & A

  • 什么是门限密码学?

    -门限密码学是一种高级技术,旨在消除与密钥相关的单点故障。例如,在签名方案中,密钥可以分成随机的两个数字分别存储在不同的服务器上,从而消除单点故障。这种技术提高了安全性,同时外部签名保持不变。

  • 什么是同态加密?

    -同态加密是一种允许在加密形式下处理数据的加密技术,无需解密数据或拥有解密密钥。它可以用于私密查询机器学习模型或私密集合交集等应用。

  • AWS的安全愿景是什么?

    -AWS的安全愿景是通过最新的密码学技术提高客户的安全性,包括硬化基础设施和启用新的服务。传统加密虽然在存储和传输数据时很好,但对于某些应用来说还不够,因此需要新的技术。

  • 为什么选择AWS?

    -AWS非常关注客户,并致力于提高安全性和隐私保护。AWS的规模和愿景使其成为将高级密码技术付诸实践的理想场所。

  • 什么是安全多方计算?

    -安全多方计算是一种允许多个参与方在不暴露自己数据的情况下,协作计算某些功能的协议。参与方只学习到计算结果而不会泄露输入数据的其他信息。

  • AWS在密码学研究中的贡献有哪些?

    -AWS参与了多个密码学项目,包括Kuiper卫星项目的密钥协商设计,以及端到端安全性系统的设计。这些项目旨在提高客户数据的安全性。

  • 为什么密码学证明重要?

    -设计密码学系统、协议并不容易,很容易设计错误。密码学系统的安全性通常通过数学证明来验证,而不是通过模拟或测试。这些证明确保了系统的安全性。

  • 量子计算对现有密码系统的影响是什么?

    -量子计算机可能破解现有基于因数分解或离散对数假设的密码系统。因此,需要发展基于不同假设的后量子密码学系统,以确保未来的安全性。

  • 什么是密码计算?

    -密码计算是指在不查看明文数据的情况下处理数据的能力。示例包括同态加密和分布式计算,每个参与方只能看到无意义的比特,但整体上可以处理数据。

  • 门限密码学如何提高系统可用性?

    -门限密码学通过将密钥分割成多个部分存储在不同服务器上,不仅消除了单点故障,还提高了系统的可用性。例如,如果密钥被分割成三部分,任何两部分就可以生成签名,从而增加了容错性和可用性。

Outlines

00:00

😀 欢迎致辞与数据保护讨论

Peter O’Donnell作为亚马逊网络服务(AWS)的首席解决方案架构师,欢迎与会者并强调了数据保护的重要性。他提到了加密技术的基础性作用,包括数据静态和传输中的保护,以及软件和服务器连接的认证。随后,他介绍了三位密码学家Hugo Krawczyk、Tal Rabin和Shai Halevi,他们在密码学领域有着数十年的合作经验,并且加入了AWS,带来了前沿的密码学研究成果。

05:02

🔐 密码学研究与AWS的合作愿景

三位密码学家分享了他们加入AWS的动机和愿景。他们曾在IBM研究院开始职业生涯,后共同创立了与加密货币Algorand相关的基金会。他们希望将30多年的研究成果转化为实践,提高安全性和隐私保护。AWS以其客户为中心的导向和影响力吸引了他们,他们相信AWS愿意并有远见将这些先进的技术应用起来。

10:02

🛡️ 先进密码技术的应用与展望

讨论了在AWS上应用先进密码技术的重要性,包括阈下密码学、安全多方计算和加密计算等。这些技术可以提高云服务的安全性,允许在数据加密的情况下进行数据处理,同时促进用户间的安全协作。特别提到了同态加密,允许在加密数据上进行计算而无需解密,以及分布式计算的概念。

15:04

🔑 阈下密码学与密钥管理

Tal Rabin解释了阈下密码学的目标是消除与密钥相关的单点故障。通过将密钥分割成多个部分并分布存储,即使部分密钥泄露,整个系统的安全性也不会受到影响。这种方法不仅提高了安全性,还增加了系统的可用性,允许在部分密钥丢失的情况下恢复或并行签名。

20:07

🔒 密码学在身份认证和广告领域的应用

讨论了密码学在身份认证和广告领域的应用。在身份认证方面,AWS的IAM系统将引入阈下密码学来增强安全性。在广告领域,介绍了安全多方计算的应用,允许广告商和发布者在不泄露各自数据的情况下,共同计算广告投放的效果。

25:08

🔎 同态加密与隐私保护

Shai Halevi讨论了同态加密技术,它允许在数据加密的情况下进行数据处理,提高了存储在数据库中的敏感数据的隐私保护。AWS正在与行业伙伴合作,评估这项技术的能力,并探索如何将其应用于现有的工作负载,例如图片匹配服务,以实现端到端的加密处理。

30:09

🚀 硬件加速与密码学的未来

讨论了硬件加速在密码学计算中的重要性,它有助于降低部署密码学工作负载的成本,使得客户可以在不牺牲性能或延迟的情况下部署这些工作负载。同时,提到了系统工程的重要性,包括如何将工作负载路由到具有加速器的主机上。

35:14

🌌 后量子密码学与亚马逊的前瞻性研究

讨论了后量子密码学(PQ)的重要性和当前的研究进展。强调了NIST举办的后量子加密签名方案竞赛,以及选定的候选方案。提到了量子计算机对现有加密算法的潜在威胁,以及如何通过混合方案结合传统密码学和后量子密码学来准备未来的安全挑战。

📢 客户反馈的重要性与未来展望

强调了客户反馈在AWS研究和产品开发中的重要性。鼓励客户分享他们在使用AWS服务时遇到的问题,以及他们希望密码学技术如何帮助解决这些问题。同时,提到了AWS的一些现有服务,如Amazon Clean Room,已经开始整合密码学技术,并邀请客户参与讨论和提供反馈。

Mindmap

Keywords

💡加密

加密是将数据转换为一种形式,以防止未授权的用户访问或理解的过程。在视频中,加密是保护数据的核心主题,涉及到数据存储和传输的安全性。例如,Peter O’Donnell提到了为AWS客户提供静态和传输中的加密服务,以及通过加密来识别和确保软件和服务器连接的安全。

💡解决方案架构师

解决方案架构师是一种专业角色,负责设计和实施解决方案以满足客户需求。在视频中,Peter O’Donnell自我介绍为AWS的首席解决方案架构师,他与一些最大和最具挑战性的客户合作,强调了他在提供加密和安全解决方案方面的专业知识。

💡Nitro系统

Nitro系统是AWS开发的一种技术,用于提高其云服务的性能和安全性。视频中提到'We invented the Nitro System',指的是AWS通过创新技术提升了其服务的安全性和效率,尽管这不是Peter O’Donnell个人的工作,但作为解决方案架构师,他是这些创新技术的一部分。

💡S3

S3是Amazon Web Services提供的一种可扩展的云存储服务。在视频中,Peter O’Donnell提到S3被设计为具有持久性,意味着它能够可靠地存储数据并确保数据的长期可用性。这与加密和数据保护的主题密切相关。

💡同态加密

同态加密是一种允许在加密数据上进行计算的加密形式,而不需要解密密钥。Shai Halevi在视频中讨论了同态加密,举例说明了即使数据被加密,也可以在不解密的情况下处理数据,这对于保护隐私和增强云计算服务的安全性具有重要意义。

💡多方计算

多方计算是一种安全协议,允许多个参与方在不暴露各自输入的情况下共同计算某个函数。Tal Rabin在视频中提到了她的多方计算工作,强调了这种技术在保护数据隐私和促进安全协作方面的潜力。

💡阈值密码学

阈值密码学是一种技术,旨在通过将密钥分割成多个部分来消除单一故障点,从而增强安全性。Tal Rabin在视频中解释了阈值密码学的概念,并通过一个简单的例子说明了如何通过分割密钥来提高安全性,同时保持签名的外部简单性。

💡后量子密码学

后量子密码学是一类密码学技术,旨在抵抗量子计算机的攻击。在视频中,Tal Rabin讨论了后量子密码学的重要性,解释了量子计算机如何可能破坏基于传统假设的密码系统,并提到了NIST正在进行的后量子密码学算法竞赛。

💡硬件加速器

硬件加速器是一种专用硬件,用于提高特定类型计算的性能,如加密和解密操作。在视频中,讨论了硬件加速器在使加密计算更加实用和高效方面的作用,尤其是在提高同态加密等技术的性能方面。

💡IAM

IAM是AWS的Identity and Access Management服务,负责管理用户访问AWS资源的权限。在视频中,提到了IAM将引入阈值密码学来增强其系统的安全性,这表明了AWS对提高现有服务安全性的持续关注。

💡TLS 1.3

TLS 1.3是传输层安全性协议的最新版本,提供了比前一版本更强的安全性和更好的性能。Hugo在视频中提到了TLS 1.3,并强调了采用这个协议作为准备后量子密码学未来的一种方式,因为TLS 1.3包含了Hugo设计的SIGMA协议,用于密钥协商。

Highlights

亚马逊网络服务(AWS)的首席解决方案架构师Peter O'Donnell强调了数据保护的重要性,并介绍了密码学在其中的基础作用。

三位密码学家Hugo Krawczyk、Tal Rabin和Shai Halevi加入AWS,他们分别在HMAC算法、同态加密和多方计算阈值密码学方面有杰出贡献。

AWS致力于将先进的密码学技术应用到实践中,以提高客户的数据安全性和隐私保护。

介绍了加密计算的概念,即在不解密的情况下处理加密数据,例如同态加密和安全多方计算。

同态加密允许在数据加密状态下进行处理,无需解密密钥,为保护隐私提供了新的可能。

阈值密码学旨在消除与密钥相关的单点故障,通过分散存储密钥片段来增强安全性。

AWS正在探索将阈值密码学应用于IAM系统,以增强后端密钥的安全性。

安全多方计算允许多方在不泄露各自数据的情况下,共同计算某个函数的输出。

广告行业中的多党计算应用,可以在不共享数据的情况下,统计广告投放的效果。

硬件加速器在密码学计算中至关重要,有助于提高性能,降低部署成本。

AWS正在研究如何将同态加密技术应用于现有服务,如图片匹配服务,以增强数据的端到端加密。

后量子密码学(PQ)是AWS关注的一个重点领域,旨在为量子计算机可能带来的威胁做好准备。

NIST的后量子密码学竞赛旨在选择能够抵抗量子计算机攻击的加密和签名方案。

AWS提供了TLS 1.3和混合加密方案,以帮助客户准备后量子时代的安全需求。

客户反馈对于AWS的产品和服务开发至关重要,特别是密码学技术的实践应用。

AWS鼓励客户分享他们的需求和痛点,以便更好地整合密码学技术解决实际问题。

AWS Clean Room集成了密码学技术,提供了一个安全的环境,使客户能够在保护隐私的同时分析和共享数据。

AWS强调客户至上的理念,并将其作为产品和服务开发的指导原则。

Transcripts

play00:00

Please welcome to the stage

play00:01

Principal SA, Security, AWS, Peter O’Donnell.

play00:05

[music playing]

play00:10

Hi.

play00:13

Really excited to have everybody here today.

play00:16

Working with customers for my nine years here at Amazon Web Services,

play00:20

I know very well that many of you, perhaps all of you,

play00:24

are very interested in protecting your data.

play00:27

And cryptography is at the basis of that for most of our customers,

play00:30

providing cryptography not only at rest but in transit

play00:33

but also to identify and assure software, connections to servers.

play00:40

My name is Peter O’Donnell.

play00:41

I’m a Principal Solutions Architect.

play00:42

I’ve been here for nine years working with some of our largest

play00:46

and most challenging customers.

play00:48

And what I know is that when I’m in the room with you,

play00:51

I’m the cryptography expert.

play00:53

But the truth is, as a Solutions Architect,

play00:56

I get to say we a lot.

play00:58

We invented the Nitro System.

play01:00

We have designed S3 to be durable.

play01:03

But of course that was never my work.

play01:06

So it is my great privilege and pleasure to bring to the stage

play01:10

three cryptographers that have worked together

play01:12

for decades on cutting-edge cryptographic research

play01:16

that is finally now becoming a reality.

play01:19

And we’re excited to bring this innovation to you

play01:22

and talk to you a little bit about their research,

play01:24

what can be done with it, what is being done with it,

play01:27

and what someday will be done with it.

play01:30

So, let me please introduce Hugo Krawczyk, Tal Rabin and Shai Halevi.

play01:39

Hugo is a cryptographer best known for co-creating the HMAC algorithm.

play01:45

Shai Halevi is a cryptographer

play01:48

working on advanced cryptographic techniques,

play01:51

including homomorphic encryption.

play01:54

And Tal Rabin is best known for her work

play01:56

with multi-party computation and threshold cryptography.

play02:00

All of them have received commendations and awards

play02:03

over the years and are members of all of the relevant bodies in the world.

play02:08

These are three of our most premier cryptographers,

play02:10

and they’ve come to Amazon Web Services as of last summer.

play02:13

So let’s get into it.

play02:14

Thank you all for being here.

play02:15

Thank you for having us.

play02:16

Thank you.

play02:18

All right, so let’s start at a high level,

play02:20

what brought you to Amazon Web Services?

play02:23

The three of us have been together for a long time, for over 20 years.

play02:28

We started our career together at IBM Research,

play02:33

where we mostly did theoretical work with some applications

play02:38

to more things that are being run in the internet,

play02:42

Hugo has a lot of work on these things.

play02:44

And from IBM Research, we decided to go on a little adventure together.

play02:52

Our WhatsApp group in fact is called The Adventure.

play02:55

And that adventure was to start a foundation

play03:03

related to a cryptocurrency called Algorand.

play03:06

And we were there for three years,

play03:09

but at some point we decided that we want to do something different,

play03:15

that we really want to take the advanced techniques

play03:17

which we’ve worked on and developed for over 30 years and to take them

play03:23

and to move them into practice, that people will actually use them.

play03:28

And we thought a lot of what would be a great place in order to do it,

play03:33

what would be a company that also it would have a lot of impact

play03:36

due to the size of the company

play03:38

but also that it would be a company that would be willing

play03:42

and have the vision in order to apply these things.

play03:47

And we decided about AWS.

play03:50

AWS is very customer-oriented and focused, and that’s the goal.

play03:56

And these techniques bring more security

play03:59

and more privacy for customers.

play04:01

So AWS seemed like a very great place to be.

play04:06

And luckily for us, AWS thought the same thing.

play04:10

So here we are.

play04:11

That’s right.

play04:13

So let’s talk a little bit more.

play04:14

We know that security is our top priority here at Amazon.

play04:17

Believe me, that is not a marketing slogan, that is how we operate.

play04:20

Hugo, can you tell me a little bit

play04:22

more about the vision for the future here?

play04:23

What are the outcomes you’re looking for?

play04:26

We are trying to bring state-of-the-art

play04:30

cryptographic techniques,

play04:32

those that have been invented in the last 30 years

play04:36

and hopefully new ones that we and others will invent.

play04:40

And the idea is to use these techniques to raise the bar

play04:44

for security, for our customers,

play04:48

both at the level of hardening the infrastructure

play04:50

but also enabling new services

play04:54

that these new techniques enable

play04:58

and before were not possible.

play05:01

Examples of such techniques

play05:03

are what we call threshold cryptography,

play05:05

that we may expand on it a little bit later,

play05:09

secure multi-party computation, and what we call crypto computing,

play05:16

you can think of it as a computing on encrypted data.

play05:21

These are technology that enables new ways

play05:26

for people to interact with the cloud

play05:29

and maybe most importantly to collaborate with each other.

play05:36

We bring this level of defense in depth

play05:41

and also helping customers

play05:44

to reach their requirements and responsibilities.

play05:51

Traditional encryption, while being very good

play05:54

for protecting data in storage or in transit,

play06:00

is not good enough for these kind of applications,

play06:03

so we need new techniques.

play06:05

So the idea is to bring this stuff to our customers in AWS.

play06:10

That’s awesome.

play06:11

Shai, Hugo mentioned this idea of cryptographic computing,

play06:15

computing over cryptographic data.

play06:16

Tell us more about that.

play06:18

Generally, cryptographic computing refers

play06:21

to the ability of processing data without ever seeing it in the clear.

play06:25

One example of that is homomorphic encryption,

play06:27

where data is encrypted and being processed in encrypted form

play06:32

without ever decrypting it,

play06:33

without even having the decryption key.

play06:35

Other forms of it are distributed computing,

play06:40

where each participant in that computation

play06:43

only sees bits that seems meaningless when you see them in their own

play06:48

but among all of them they still can process the data.

play06:54

This can be used, as Hugo was saying,

play06:56

both to do private outsourcing of customer’s data to the cloud,

play07:02

where the cloud can process it without seeing the data in the clear,

play07:07

or private collaboration, where there are multiple customers

play07:11

all want to pool their resources together,

play07:14

have the cloud do the processing for them,

play07:17

but they don’t trust each other or the cloud

play07:19

seeing their data in the clear.

play07:22

Some examples that you can think of are private queries to ML models.

play07:27

The cloud may have a model, you may want to query that model,

play07:32

well, you may not want the cloud to see what you’re querying for.

play07:35

So you can do that processing in this way.

play07:38

Other examples would be still in the realm of ML.

play07:44

You want to do federated learning

play07:46

where multiple parties there want to collaborate

play07:49

on establishing the model or on developing the model but again,

play07:54

each with their own data.

play07:55

Again, these techniques are useful there.

play07:59

And also, Tal, I know that a lot of your work

play08:01

has been around threshold cryptography.

play08:04

What is threshold cryptography?

play08:07

Threshold cryptography is one of these advanced techniques.

play08:11

The goal of threshold cryptography

play08:14

is to eliminate single points of failures in relation to keys.

play08:20

For example, if you have a signature scheme,

play08:24

you have a secret key which signs messages.

play08:28

And this key is very, very important.

play08:30

But if you store it on a single server,

play08:33

even if you secure that server,

play08:36

there would be a mistake that an operator does

play08:39

when they come to serve the server.

play08:42

And by mistake they do a memory dump.

play08:45

Now your key is in the clear.

play08:47

And this is what we refer to when we say a single point of failure.

play08:52

Threshold cryptography techniques come to eliminate this vulnerability.

play08:57

And how do they do it?

play08:59

Let’s say, just an example,

play09:01

that you’re signing key is the number 11.

play09:04

If you store it on the server, the number 11 is there.

play09:08

But, since we said we wanted to eliminate this point of failure,

play09:13

we will take the number 11

play09:14

and we’ll split it randomly into two numbers, seven and four.

play09:19

Seven and four equal 11.

play09:21

But these are random numbers.

play09:23

And we’ll put seven on one server

play09:25

and we’ll put the four on another server.

play09:28

Now you can see immediately

play09:30

that I’ve eliminated the single point of failure.

play09:32

Because if there is a memory dump,

play09:35

say on the server that has the number four, nothing has happened.

play09:39

This four has no connection to the number 11.

play09:42

Somebody who sees that value still does not know

play09:45

what the signing key is.

play09:47

But we’ve introduced a problem.

play09:50

Now we have a seven and we have a four.

play09:52

How do we sign?

play09:54

The purpose of this scheme was to sign.

play09:57

In fact, threshold crypto also offers

play10:01

the mechanism to sign from these distributed pieces.

play10:06

From the seven and from the four,

play10:09

each server acting on their own may be communicating somewhat.

play10:14

It can generate the signature.

play10:17

Now, the interesting thing is that we’ve raised the bar on security,

play10:23

yet for an outsider, the signature looks exactly the same.

play10:28

They don’t know what happened on the back end.

play10:32

So we really are offering something that improves the security

play10:38

for anybody who uses these systems,

play10:41

while preserving the external simplicity of the signature

play10:46

and not interrupting it.

play10:47

Such a scheme, as you say,

play10:49

not only would reduce the single point of failure

play10:51

were there to be a compromise of one of these instances

play10:54

but also there’s an availability angle to this as well, right?

play10:57

A hundred percent.

play10:58

I gave a very simple example

play11:01

because I wanted to be able to speak about it here.

play11:04

But the schemes in fact are more sophisticated.

play11:08

You can take, we call this splitting of the key, splitting it into shares.

play11:14

We can split these shares in a sophisticated manner.

play11:18

Maybe you want two out of three pieces to create the signature.

play11:24

You split it into three pieces, and any two can create the signature.

play11:30

You can set the parameters whichever way you want it.

play11:33

But I’m going with-

play11:34

You could scale it to a large number of servers.

play11:35

Whatever you want, whatever suits your system.

play11:38

But let’s say we do two out of three, it does increase availability also.

play11:43

Because even if one of the shares is lost, we can recover.

play11:48

But also, let’s say we did two out of five.

play11:52

Any two could sign in parallel.

play11:53

That also increases availability in that way as well.

play11:58

It’s a very versatile technique which can offer a lot of amazing features.

play12:03

And of course it depends on the application of what you need.

play12:07

So not just, say, disaster recovery but disaster tolerance in some way.

play12:11

A hundred percent.

play12:12

That’s awesome.

play12:14

So we know that this idea of crypto computing over a large body of data,

play12:20

but there’s also some theoretical background to this, is that right,

play12:23

Hugo, this idea of proof that you can actually know

play12:26

that the system is working correctly?

play12:29

Yes, designing a cryptographic schemes,

play12:32

systems, protocols, is not easy.

play12:37

Or what I always say, it’s not very hard

play12:39

but it’s much easier to design it wrong.

play12:44

When do we know that actually what we design is secure?

play12:49

In cryptography, there are no simulations or tests

play12:55

that you can do for the security.

play12:58

Actually, it’s only theoretical tools that we have.

play13:03

We refer to them usually as proofs.

play13:07

We proof mathematically that the system is secure,

play13:11

usually in cryptography under some assumptions.

play13:15

And there are ways of doing proofs by hand,

play13:20

as have been done for hundreds of years,

play13:23

but these days we also have automated proofs,

play13:26

having machines that help us reason about these systems.

play13:33

A cryptographic system that has not been proven

play13:39

in most cases is an insecure system.

play13:43

That’s right.

play13:46

Thinking about our long-term view,

play13:48

Amazon is a place for long-term thinking and long-term ownership,

play13:51

tell us more about what you’re working on

play13:54

right now to benefit our customers.

play13:57

Should I speak? Sure.

play13:58

Okay.

play14:00

This mechanism of threshold cryptography,

play14:06

we decided to look at various Amazon systems.

play14:12

And one of the first systems that we looked at is IAM,

play14:16

which is identity access management.

play14:20

We looked at the back end, which holds the keys

play14:26

used for authentication of all our customers.

play14:28

If you’re our customers, you are using this system,

play14:34

and it’s providing you assurance.

play14:36

A billion requests per second IAM, every day,

play14:40

doing trillions of authenticated requests.

play14:45

The question is, what could we do, of course.

play14:47

Amazon has an eye on security

play14:51

and the systems are secure as they are,

play14:54

but we wanted to offer defense in depth,

play14:57

to try and find how we harden the system.

play15:01

Because attackers are becoming more sophisticated,

play15:04

more things can happen,

play15:06

we want to really have more than one layer of security.

play15:10

So we approached IAM,

play15:16

and in fact they will be introducing

play15:20

this threshold cryptography into their system.

play15:25

They’re going to start building it soon

play15:28

and hopefully it’ll be available.

play15:30

And of course, again, as I said about threshold crypto, you as customers,

play15:35

you won’t even know that we have done this on your behalf

play15:39

and that the system really is more secure.

play15:42

For you, everything is going to stay the same,

play15:44

the speed, the availability, and so on.

play15:48

But the system will in fact, the security will have been hardened.

play15:53

And I want to say one more thing.

play15:55

We’re new, we just came, and we approached these people,

play16:00

but you could see the philosophy in AWS,

play16:05

the enthusiasm with which this group

play16:09

received what we were saying.

play16:13

And the interest in doing it were really, in fact, for us,

play16:16

quite amazing that it was so accepted and which was wonderful to see.

play16:22

That’s cool to hear.

play16:24

AWS IAM, obviously one of our oldest services,

play16:27

today operating at a bonkers scale.

play16:30

We’ve invested a lot in this service over time.

play16:33

Doctor Neha Rungta is giving a talk either later today

play16:36

or tomorrow about our innovations

play16:39

in proving the correctness of this system.

play16:43

And so I always want to emphasize to customers,

play16:45

even the old stuff, right?

play16:47

Obviously, we’re creating new services every day,

play16:49

really a lot of innovation there,

play16:51

but the level of innovation and investment in the old stuff,

play16:55

the things that will never change,

play16:57

is certainly one of our main focuses here at Amazon.

play17:01

Speaking about research, Hugo,

play17:04

I know we’d kind of talked about an application in the contemporary area,

play17:08

I know that advertisement is a critical area

play17:11

where multi-party computation comes to bear.

play17:13

Is that right? Yes, yes.

play17:16

First, this notion of secure multi-party computation

play17:20

is a type of solutions or protocols

play17:25

that allow a set of parties to compute in

play17:29

a collaborative way some function, and I’ll give some examples,

play17:37

in a way that everyone brings their own input, their own data,

play17:41

but the only thing that is learned is the output of the function.

play17:44

No one learns anything about the input

play17:46

except for what can be derived from the output of the function.

play17:51

The idea is similar to think that if you have a trusted third party

play17:55

where everyone gives their inputs

play17:56

and that trusted third party computes the function

play18:00

and gives out the output.

play18:03

But now you don’t have that trusted party,

play18:06

so you run this secure multi-party computation to achieve

play18:11

that form of functionality without the trusted party.

play18:17

One example, also something that we have been working in the last year,

play18:23

is in the area of advertisement.

play18:27

In advertisement, people run campaigns

play18:31

and then they have to measure the success of these campaigns.

play18:34

People have used for a long time third-party cookies,

play18:39

for example, for doing that at the level of web browser,

play18:44

but now it’s being discontinued.

play18:48

And the advertisers need to check with different publishers

play18:54

and publishers

play18:56

don’t want to give all the information that they have,

play18:58

and the advertisers also don’t want to give all their data.

play19:04

You want to build a protocol that all the providers bring the data

play19:08

and at the end you learn some statistics.

play19:11

In particular, we were working on the problem

play19:14

of computing two statistical functions,

play19:17

frequency rich is how many users have seen an ad and frequency

play19:23

is how many of them saw one time the ad, two times, three times, etc.

play19:31

We are building this together with the world federation of advertisers,

play19:38

which Amazon is part of it.

play19:42

It’s a project with different companies.

play19:45

But we built a multi-party solution for that problem

play19:49

that is being implemented.

play19:54

That’s an interesting angle there where,

play19:59

we are going to talk about some future stuff, it’s genuinely spooky,

play20:02

but this is an example of a system that’s been in place for a long time

play20:06

but prevailing culture and even some pressure from stakeholders

play20:10

that it really needs to become more private

play20:13

and that these techniques and this advanced research

play20:15

allows an existing computing capability to raise the bar

play20:19

not only on security but privacy.

play20:22

Shai, tell us about this idea of homomorphic encryption?

play20:26

What is homomorphic and why does that improve the overall privacy angle

play20:31

for things like storing sensitive data in a database?

play20:35

Homomorphic encryption is a somewhat new player

play20:38

in this secure computation game.

play20:42

Homomorphic encryption is a specific type of encryption

play20:45

that allows you to process data in an encrypted form,

play20:49

as I said before, without even having the decryption key.

play20:55

We speculated on the ability to do that for many years,

play20:58

but the first example of encryption scheme

play21:01

that actually enable that are only 15 years old.

play21:05

So it’s a relatively new technology,

play21:08

but it is coming into maturity these days.

play21:12

We expect to have hardware acceleration

play21:15

for homomorphic encryption coming up within the next year or so.

play21:19

In AWS, we’re trying to see where

play21:23

we can provide this technology

play21:26

to our customers to improve their security posture,

play21:31

to improve their privacy posture.

play21:35

Right now, the thing that we’re doing internally

play21:37

is a relatively large-scale study of capability together

play21:43

with many industry partners, for example,

play21:45

the producers of these future accelerators or parties

play21:50

that have their own technology.

play21:52

And we’re running studies to assess this technology

play21:55

and see what we can do with them.

play21:58

But again, it’s a 15-year-old technology.

play21:59

Imagine inventing the transistor 15 years ago

play22:04

and trying to come up with an idea of what it can do today.

play22:08

This is where we are right now.

play22:09

A few things that I believe are possible or will be possible soon,

play22:16

checking if two pictures are pictures of the same person

play22:20

when these pictures are encrypted.

play22:23

Or, as I said, doing private queries to certain machine learning models.

play22:29

Other things that you can do, private set intersection.

play22:32

Hugo talked about advertisers.

play22:34

The advertiser has a list, or the publisher has a list,

play22:37

they want to see if anybody that visited this publisher site

play22:40

actually bought something on the advertiser.

play22:43

So each of them have a list,

play22:45

they want to know who is in both lists

play22:47

without revealing the list to each other.

play22:50

Private information retrieval, I have a key value store,

play22:54

I want to fetch a value by key

play22:57

without the store being told what the key was,

play23:01

these kinds of things.

play23:03

Those are all possible with today’s technology,

play23:06

and we’re expecting a lot more things to be possible

play23:10

once these accelerators come.

play23:13

We’re currently in the process of trying to see

play23:18

what the technology can do and trying to take existing workloads

play23:24

that AWS currently has, for example,

play23:26

this picture matching service that we already have,

play23:30

and enable it on encrypted data

play23:33

so that the customer doesn’t need to do much.

play23:35

All you need is to check the box saying,

play23:36

“Well, I want this data to remain encrypted end to end”

play23:40

and then the process will be run on encrypted data

play23:43

instead of the plain text data.

play23:45

And this idea of a one-click adoption,

play23:47

of course it’s really important to our customers,

play23:49

and it’s also really important for how we design services.

play23:52

Make it easier to do the right thing and harder to do the wrong thing.

play23:56

Now, I want to quickly come back to this idea of hardware acceleration.

play23:59

I’m old enough to remember putting SSL accelerator cards

play24:02

in my web servers 20 years ago.

play24:04

Because some of this, most of this cryptography,

play24:07

is predicated on hard problems that involve a lot of math.

play24:10

Can you say more about the role of a hardware accelerator

play24:14

in enabling adoption without compromising performance or latency?

play24:20

One problem with cryptography computing,

play24:23

as with any other technology, it has a real cost.

play24:26

The hardware accelerator is crucial in making that cost tolerable

play24:31

so that customers can deploy these workloads with the added security

play24:36

or maybe deploy new workloads that were impossible before

play24:40

because of security or privacy concerns

play24:42

without having to pay too much.

play24:46

It’s crucial, and in addition to the cryptographic techniques

play24:51

that we bring there is of course

play24:54

always the system engineering part of it.

play24:57

Because once you have the accelerator,

play24:58

well, you need to route these workloads to these hosts

play25:02

that actually have the accelerator.

play25:04

So there are a lot of work in front of us, but we’re getting there.

play25:08

And I’m sort of optimistic that we will have news for you

play25:11

within the next few years about that.

play25:13

That’s awesome.

play25:15

Hugo, I know you’ve also been involved in some other cryptographic

play25:18

designs for other systems here at Amazon.

play25:20

Tell us about the constellation.

play25:23

We have been doing also work on the more traditional cryptography,

play25:28

bringing our knowledge and expertise to share with Amazon teams.

play25:35

We’ve been involved with problems

play25:39

related to key agreement,

play25:42

key management, even password protocols.

play25:49

One example is a design of key agreement

play25:52

for the Kuiper satellite project.

play25:58

Another thing is doing end-to-end security,

play26:02

where customers can back up their keys with AWS

play26:06

and still keep full ownership of these keys.

play26:10

And some other things, hopefully things that we will be able

play26:14

to talk more in future re:Inforce meetings.

play26:20

Yeah, we are doing the more advanced stuff

play26:25

but not forgetting also the core basis of [INDISCERNIBLE].

play26:30

And of course, if you’re a bunch of crypto nerds, as I assume you are,

play26:34

my people, obviously top of mind for a lot of folks

play26:37

these days is post-quantum cryptography.

play26:39

What does it mean that in a possible future

play26:44

that a sufficiently powerful quantum computer could come to existence,

play26:48

it means that some of the hard problems,

play26:50

this idea of the assumptions on which classical cryptography is predicated,

play26:54

maybe stop being hard problems.

play26:57

Tal, tell us about where we are with PQ?

play27:01

First of all, as you said, all our cryptography is based on assumptions.

play27:08

Except for a one-time pad, we don’t have a single system

play27:12

where there isn’t an underlying assumption.

play27:14

And if this underlying assumption is broken, then the system is broken.

play27:19

For example, RSA, if we figure out how to factor numbers

play27:25

on a classical machine, RSA will be broken.

play27:29

So we still don’t know how to factor on the classical machine.

play27:33

But we do know how to factor on a quantum computer.

play27:38

Now, just so you don’t run out of here immediately and say,

play27:42

“Okay, it’s broken,”

play27:44

in order to break a 1024-bit RSA modulus,

play27:51

which is the product of the two primes,

play27:53

you need a minimum of 1024 good qubits.

play27:58

Most likely you need even ten times more than that.

play28:02

And currently we are not there.

play28:05

I don’t want to say when we will there because I don’t know.

play28:08

But there are experts that range from ten years to never.

play28:15

It could be anywhere in that range.

play28:20

So, given that we know that

play28:24

if a quantum computer exists

play28:28

RSA will be broken, what do we do?

play28:31

NIST was very proactive and saw this coming

play28:35

and put a competition in place for which people

play28:40

designed post-quantum encryption signature schemes.

play28:48

There was a competition to decide which one is the best.

play28:51

What does it mean that it’s post-quantum?

play28:53

It’s based on different assumptions.

play28:56

It can’t be based on factoring, of course, it has to be based

play29:00

on what we call some lattice assumptions.

play29:03

And this competition ran for quite a few years,

play29:06

and candidates were chosen about a year ago,

play29:11

maybe, a little bit more.

play29:13

And these are the protocols

play29:18

which NSA is requiring to use,

play29:22

and they have some time timeline of when to deploy them.

play29:26

I want to say something, I said systems for signatures

play29:30

and for encryption.

play29:32

Signature and encryption are not the same

play29:35

as they relate to post-quantum.

play29:38

And why?

play29:40

If you encrypt something today with a class,

play29:47

old assumptions, factoring or discrete log,

play29:51

somebody might harvest your encryption from today,

play29:56

and later on when the quantum computer is available

play30:00

they would be able to decrypt your message.

play30:04

I don’t know, I’m not important,

play30:06

my messages probably are not being harvested,

play30:09

though if they would be people would be very interested at the end.

play30:14

But of course, big secrets that need to last for a long time

play30:18

might be harvested.

play30:20

Signatures, however, are not the same.

play30:23

Signatures, even if you harvest the signature

play30:28

now it doesn’t help you much that you’ll be able to break it later.

play30:32

So there’s a difference between encryption and signatures

play30:37

when it comes to when you should be deploying post-quantum.

play30:41

That’s interesting, and we of course have been investing in PQ

play30:44

for a very long time here at Amazon Web Services.

play30:47

Today, we have a hybrid scheme available on the TLS

play30:52

endpoints for KMS, Secrets Manager, and our file transfer products.

play30:57

This is important to understand the word hybrid.

play30:59

Because these are new algorithms, it would be terrible

play31:03

if these new algorithms introduced a classical vulnerability.

play31:07

So what we have today are hybrid schemes

play31:10

that use a mix of classical cryptography

play31:12

and post-quantum cryptography that you can experiment with today.

play31:16

Are they suitable for prod?

play31:18

Conceivably.

play31:19

Are they worth the latency trade off?

play31:20

Maybe not today because you likely

play31:23

don’t have that store and harvest threat model.

play31:26

And if you do, you’ve probably got a lot

play31:28

of defense and depth around that anyway.

play31:31

But you can search online, find our post-quantum website,

play31:34

and stay up to date with everything we’re doing.

play31:36

It’s a lot of really fascinating research.

play31:38

Hugo, can you tell us a little bit more about the store

play31:40

and harvest thing in the context of maybe the life cycle of the data?

play31:44

You could imagine that encrypting a quarterly earnings report,

play31:49

the durability of that cryptography has a timeline to it.

play31:53

So if you could break it in six months

play31:54

but it’s only secret for three months,

play31:56

well, then maybe that’s not a big deal.

play31:58

But you could imagine longer-term data

play32:00

sets like health data that need to be safe forever.

play32:06

Yes, it’s a very important point here about the post-quantum to understand

play32:12

that the encrypted data is not in danger today.

play32:18

We are talking about that it may be in danger in X years,

play32:21

and as Tal said, people have different guesses for what X is

play32:27

and how many years until we have a very powerful quantum computer

play32:33

to actually break cryptography.

play32:37

The data that is in danger is the data that is very sensitive

play32:42

for long term

play32:43

and such that the adversary is willing to harvest now.

play32:48

Because in order to break it in 30 years,

play32:51

you will need a ciphertext that was created now.

play32:55

Only data of that high sensitivity will probably be targeted.

play33:03

There is definitely a set of data that is important to protect already.

play33:08

What I always like to remind ourselves

play33:12

is that there are many other things that may be more risky for data

play33:17

if you don’t manage the security well enough.

play33:21

For example, there are voices in the industry

play33:25

that want to eliminate or at least have the option

play33:31

of eliminating forward security from TLS 1.3.

play33:36

Forward security is an element

play33:38

that provides a very, very high level of security.

play33:43

So the point is that you need to follow the best practices

play33:47

even with traditional cryptography not only with post-quantum.

play33:52

You mentioned TLS 1.3, which is interesting,

play33:54

and if I can embarrass Hugo for a second,

play33:56

your SIGMA protocol is at the heart of key agreement in TLS 1.3.

play34:01

But TLS 1.3, a lot of customers, I get the question a lot,

play34:04

“What do I need to do about PQ? What do I do?”

play34:08

The simplest answer is adopt 1.3.

play34:11

When NIST finally finalizes these standards,

play34:14

they’re not going to come to 1.2.

play34:17

The simplest, shortest answer I can give customers

play34:20

about preparing for a PQ future is adopt 1.3.

play34:25

Let me make that clear.

play34:27

We’ve talked a lot about our innovations

play34:29

and this incredible research from my colleagues here for the long term.

play34:34

But we need your help.

play34:35

Almost everything we’ve built here at Amazon Web Services,

play34:38

easily nine in ten, we’ve built because customers asked for it.

play34:43

That’s true for Elastic Transcoder a decade ago

play34:46

to things like SageMaker and Bedrock today.

play34:49

Customers asked us to solve some hard problems.

play34:52

Shai, tell our customers how they can help us help them.

play34:59

The short answer is come tell us where it hurts.

play35:05

This is a very good time to have an impact

play35:07

on where do these techniques come in, what kind of problems comes you,

play35:13

the customers, or maybe your customers,

play35:16

encounter that makes it hurt to bring data to the cloud?

play35:22

Because most likely there are cryptographic techniques

play35:26

that allow you to mitigate these pain points

play35:29

and do it with a reasonable price.

play35:31

But as we said, we are new to AWS,

play35:35

and this entire idea of crypto computing is maybe ten years old.

play35:40

It’s still getting in the process of making it to mainstream computing.

play35:46

So we really, really need your input on where these things have impact.

play35:53

In the examples of homomorphic encryption,

play35:57

what workloads do you really want to run on encrypted data?

play36:01

In the context of federated learning,

play36:06

where are the places where it really hurts to join the data

play36:12

in order to do the learning?

play36:14

All of these things, we really need your input on it.

play36:18

There’s one thing that I want to say about something that already exists.

play36:23

Tomorrow, there is a session in the developer session,

play36:26

BAT251 if I remember correctly,

play36:29

where there is one example

play36:31

that already is integrated into Amazon Clean Room.

play36:35

So if you want to go to that session, you’ll hear about it.

play36:38

These are things that slowly start to appear in production.

play36:43

But now it really is crucial for us to understand what do customers want.

play36:47

When are these techniques just good to have?

play36:50

When are these techniques a necessity in order

play36:53

to be able to process things in the cloud?

play36:55

So please find us outside here in the halls,

play36:59

or if you’re watching it online, through your AWS representative.

play37:03

Find us, give us feedback.

play37:05

This is the time to really make an impact

play37:07

on where these techniques are used.

play37:10

That’s right, at Amazon we use this very particular phrase,

play37:14

customer obsession.

play37:16

Tal at the beginning talked about why they came here.

play37:19

It’s because this is a place where we can build for our customers

play37:23

and on behalf of our customers.

play37:26

I want to add, in addition to the fully homomorphic, as Hugo described,

play37:31

there are also techniques that are multi-party

play37:34

that maybe you don’t want just to be processing on the cloud

play37:39

but you need to collaborate with other organizations.

play37:43

For example, maybe you’re a health organization

play37:46

and you need to share data with another health organization

play37:51

and you’re prohibited by HIPAA

play37:53

but you still want to do some processing on the data.

play37:56

These things, the multi-party computation techniques,

play38:00

also help with that.

play38:01

Of course, also the level of threshold cryptography,

play38:05

which we said hardens the security,

play38:08

gives you another layer of defense for your most sensitive keys.

play38:13

We can help with those techniques as well.

play38:16

That’s awesome.

play38:17

At Amazon we use this phrase, day one.

play38:19

We’re still just getting started.

play38:21

So this feedback that we need from our customers to influence

play38:23

the research and the product development,

play38:25

it’s foundational to what we do here.

play38:27

With that, really want to thank everybody for their time today.

play38:30

We’re going to wrap up here.

play38:31

Folks on the live stream, we’re going to transition to some

play38:33

Q&A in the room.

play38:35

But I really want to thank our panelists here.

play38:37

Thank you so much, let’s do some Q&A.

play38:39

[music playing]

Rate This

5.0 / 5 (0 votes)

Ähnliche Tags
密码学数据安全隐私保护AWS技术创新云服务HMAC算法多方计算阈值密码学同态加密量子计算
Benötigen Sie eine Zusammenfassung auf Englisch?