skip to main content

This content will become publicly available on December 16, 2023

Title: Distributed Cyber-infrastructures and Artificial Intelligence in Hybrid Post-Quantum Era
Distributed cyber-infrastructures and Artificial Intelligence (AI) are transformative technologies that will play a pivotal role in the future of society and the scientific community. Internet of Things (IoT) applications harbor vast quantities of connected devices that collect a massive amount of sensitive information (e.g., medical, financial), which is usually analyzed either at the edge or federated cloud systems via AI/Machine Learning (ML) algorithms to make critical decisions (e.g., diagnosis). It is of paramount importance to ensure the security, privacy, and trustworthiness of data collection, analysis, and decision-making processes. However, system complexity and increased attack surfaces make these applications vulnerable to system breaches, single-point of failures, and various cyber-attacks. Moreover, the advances in quantum computing exacerbate the security and privacy challenges. That is, emerging quantum computers can break conventional cryptographic systems that offer cyber-security services, public key infrastructures, and privacy-enhancing technologies. Therefore, there is a vital need for new cyber-security paradigms that can address the resiliency, long-term security, and efficiency requirements of distributed cyber infrastructures. In this work, we propose a vision of distributed architecture and cyber-security framework that uniquely synergizes secure computation, Physical Quantum Key Distribution (PQKD), NIST PostQuantum Cryptography (PQC) efforts, and AI/ML algorithms to achieve breach-resilient, functional, and efficient more » cyber-security services. At the heart of our proposal lies a new Multi-Party Computation Quantum Network Core (MPC-QNC) that enables fast and yet quantum-safe execution of distributed computation protocols via integration of PQKD infrastructure and hardware acceleration elements. We showcase the capabilities of MPCQNC by instantiating it for Public Key Infrastructures (PKI) and federated ML in our HDQPKI and TPQ-ML, frameworks, respectively. HDQPKI (to the best of our knowledge) is the first hybrid and distributed post-quantum PKI that harnesses PQKD and NIST PQC standards to offer the highest level of quantum safety with a breach-resiliency against active adversaries. TPQ-ML presents a post-quantum secure and privacy-preserving federated ML infrastructure. « less
Authors:
; ; ; ;
Award ID(s):
1917627
Publication Date:
NSF-PAR ID:
10388349
Journal Name:
4th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS)
Sponsoring Org:
National Science Foundation
More Like this
  1. Public Key Infrastructure (PKI) generates and distributes digital certificates to provide the root of trust for securing digital networking systems. To continue securing digital networking in the quantum era, PKI should transition to use quantum-resistant cryptographic algorithms. The cryptography community is developing quantum-resistant primitives/algorithms, studying, and analyzing them for cryptanalysis and improvements. National Institute of Standards and Technology (NIST) selected finalist algorithms for the post-quantum digital signature cipher standardization, which are Dilithium, Falcon, and Rainbow. We study and analyze the feasibility and the processing performance of these algorithms in memory/size and time/speed when used for PKI, including the key generation from the PKI end entities (e.g., a HTTPS/TLS server), the signing, and the certificate generation by the certificate authority within the PKI. The transition to post-quantum from the classical ciphers incur changes in the parameters in the PKI, for example, Rainbow I significantly increases the certificate size by 163 times when compared with RSA 3072. Nevertheless, we learn that the current X.509 supports the NIST post-quantum digital signature ciphers and that the ciphers can be modularly adapted for PKI. According to our empirical implementations-based study, the post-quantum ciphers can increase the certificate verification time cost compared to the current classicalmore »cipher and therefore the verification overheads require careful considerations when using the post-quantum-cipher-based certificates.« less
  2. Lankes, R. David (Ed.)
    Resilience is often treated as a single-dimension system attribute, or various dimensions of resilience are studied separately without considering multi-dimensionality. The increasing frequency of catastrophic natural or man-made disasters affecting rural areas demands holistic assessments of community vulnerability and assessment. Disproportionate effects of disasters on minorities, low-income, hard-to-reach, and vulnerable populations demand a community-oriented planning approach to address the “resilience divide.” Rural areas have many advantages, but low population density, coupled with dispersed infrastructures and community support networks, make these areas more affected by natural disasters. This paper will catalyze three key learnings from our current work in public librarians’ roles in disaster resiliency: rural communities are composed of diverse sub-communities, each which experiences and responds to traumatic events differently, depending on micro-geographic and demographic drivers. Rural citizens tend to be very self-reliant and are committed to strengthening and sustaining community resiliency with local human capital and resources. Public libraries are central to rural life, providing a range of informational, educational, social, and personal services, especially in remote areas that lack reliable access to community resources during disasters. Public libraries and their librarian leaders are often a “crown jewel” of rural areas’ community infrastructure and this paper will present amore »community-based design and assessment process for resiliency hubs located in and operated through rural public libraries. The core technical and social science research questions explored in the proposed paper are: 1) Who were the key beneficiaries and what did they need? 2) What was the process of designing a resiliency hub? 3) What did library resiliency hubs provide and how can they be sustained? This resiliency hub study will detail co-production of solutions and involves an inclusive collaboration among researchers, librarians, and community members to address the effects of cascading impacts of natural disasters. The novel co-design process detailed in the paper reflects an in-depth understanding of the complex interactions among libraries, residents, governments, and other agencies by collecting sociotechnical hurricane-related data for Calhoun County, Florida, USA, a region devastated by Hurricane Michael (2018) and hard-hit by Covid-19. We analyzed data from newly developed fusing algorithms and incorporating multiple communities and developed a framework and process to co-design resiliency hubs sited in public libraries. This research leverages a unique opportunity to library-centered policies and technologies to establish a new paradigm for developing disaster resiliency in rural settings. Public libraries serve a diverse population who will directly benefit from practical support tailored to their needs. The project will inform efficient plans to ensure that high-need groups are not isolated in disasters. The knowledge and insight gained from the resiliency hub design process will not only improve our understanding of emergency response operations, but also will contribute to the development of new disaster related policies and plans for public libraries, with a broader application to rural communities in many settings.« less
  3. Lankes, R.David (Ed.)
    Resilience is often treated as a single-dimension system attribute, or various dimensions of resilience are studied separately without considering multi-dimensionality. The increasing frequency of catastrophic natural or man-made disasters affecting rural areas demands holistic assessments of community vulnerability and assessment. Disproportionate effects of disasters on minorities, low-income, hard-to-reach, and vulnerable populations demand a community-oriented planning approach to address the “resilience divide.” Rural areas have many advantages, but low population density, coupled with dispersed infrastructures and community support networks, make these areas more affected by natural disasters. This paper will catalyze three key learnings from our current work in public librarians’ roles in disaster resiliency: 1) rural communities are composed of diverse sub-communities, each which experiences and responds to traumatic events differently, depending on micro-geographic and demographic drivers; 2) public libraries are central to rural life, providing a range of informational, educational, social, and personal services, especially in remote areas that lack reliable access to community resources during disasters; and 3) rural citizens tend to be very self-reliant and are committed to strengthening and sustaining community resiliency with local human capital and resources. Public libraries and their librarian leaders are often a “crown jewel” of rural areas’ community infrastructure and thismore »paper will present a community-based design and assessment process for resiliency hubs located in and operated through rural public libraries. The core technical and social science research questions explored in the proposed paper are: 1) Who were the key beneficiaries and what did they need? 2) What was the process of designing a resiliency hub? 3) What did library resiliency hubs provide and how can they be sustained? This resiliency hub study will detail co-production of solutions and involves an inclusive collaboration among researchers, librarians, and community members to address the effects of cascading impacts of natural disasters. The novel co-design process detailed in the paper reflects 1) an in-depth understanding of the complex interactions among libraries, residents, governments, and other agencies by collecting sociotechnical hurricane-related data for Calhoun County, Florida, USA, a region devastated by Hurricane Michael (2018) and hard-hit by Covid-19; 2) analyzed data from newly-developed fusing algorithms and incorporating multiple communities; and 3) co-designed resiliency hubs sited in public libraries. This research leverages a unique opportunity for the co-development of integrated library-centered policies and technologies to establish a new paradigm for developing disaster resiliency in rural settings. Public libraries serve a diverse population who will directly benefit from practical support tailored to their needs. The project will inform efficient plans to ensure that high-need groups are not isolated in disasters. The knowledge and insight gained from disseminating the study’s results will not only improve our understanding of emergency response operations, but also will contribute to the development of new disaster-related policies and plans for public libraries, with a broader application to rural communities in many settings.« less
  4. Audit logs play a crucial role in the security of computer systems and are targeted by the attackers due to their forensic value. Digital signatures are essential tools to ensure the authentication/integrity of logs with public verifiability and nonrepudiation. Especially, forward-secure and aggregate signatures (FAS) offer compromise-resiliency and append-only features such that an active attacker compromising a computer cannot tamper or selectively delete the logs collected before the breach. Despite their high-security, existing FAS schemes can only sign a small pre-defined number (K) of logs, and their key-size/computation overhead grows linearly with K. These limitations prevent a practical adoption of FAS schemes for digital forensics. In this paper, we created new signatures named COmpact and REsilient (CORE) schemes, which are (to the best of our knowledge) the first FAS that can sign (practically) unbounded number of messages with only a sub-linear growth in the keysize/computation overhead. Central to CORE is the creation of a novel K-time signature COREKBase that has a small-constant key generation overhead and public key size. We then develop CORE-MMM that harnesses COREK Base via forward-secure transformations. We showed that CORE-MMM significantly outperforms its alternatives for essential metrics. For instance, CORE-MMM provides more than two and onemore »magnitudes faster key updates and smaller signatures, respectively, with smaller private keys. CORE-MMM also offers extra efficiency when the same messages are signed with evolving keys. We formally prove that CORE schemes are secure. Our analysis indicates that CORE schemes are ideal tools to enhance the trustworthiness of digital forensic applications.« less
  5. Many currently deployed public-key cryptosystems are based on the difficulty of the discrete logarithm and integer factorization problems. However, given an adequately sized quantum computer, these problems can be solved in polynomial time as a function of the key size. Due to the future threat of quantum computing to current cryptographic standards, alternative algorithms that remain secure under quantum computing are being evaluated for future use. One such algorithm is CRYSTALS-Dilithium, a lattice-based digital signature scheme, which is a finalist in the NIST Post Quantum Cryptography (PQC) competition. As a part of this evaluation, high-performance implementations of these algorithms must be investigated. This work presents a high-performance implementation of CRYSTALS-Dilithium targeting FPGAs. In particular, we present a design that achieves the best latency for an FPGA implementation to date. We also compare our results with the most-relevant previous work on hardware implementations of NIST Round 3 post-quantum digital signature candidates.