Upgrade to PRO for Only $50/Year—Limited-Time Offer! 🔥

Cybersecurity Uses of Blockchains

Renaud Lifchitz
September 07, 2021

Cybersecurity Uses of Blockchains

« Blockchains are known for their financial applications, which unfortunately
often overshadows many of their other interests. We will focus here on the
principles, techniques and concrete blockchain projects that bring a real interest from a confidentiality, integrity, availability or authentication point of view. Thus, properly used blockchains allow to drastically reduce single points of failure ("SPoF"), to decrease our dependency on the cloud or to reduce our infrastructure costs, by relying on existing decentralized networks where costs are shared. Many techniques democratized by blockchains are also under-exploited in cybersecurity (security proofs, protocol proofs, "zero-knowledge" proofs, ...) and could see a boom in our next software developments. Blockchains can also be a great tool for digital sovereignty by allowing us to get away from centralized foreign actors that we permanently trust (certification authorities, DNS root servers, ICANN, RIPE ...) »

Renaud Lifchitz

September 07, 2021
Tweet

More Decks by Renaud Lifchitz

Other Decks in Research

Transcript

  1. Version 1.0 Classification Cybersecurity Uses of Blockchains Public CECyF CoRIIN

    – September, 7th 2021 Renaud Lifchitz, Chief Scientific Officer
  2. 2 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 Présentation de l’intervenant ➢ Expert en sécurité informatique, Directeur Scientifique chez Holiseum ➢ Principales activités: ➢ Tests d’intrusion & audits de sécurité ➢ Recherche ➢ Formations & sensibilisations ➢ Centres d’intérêt : ➢ Sécurité des protocoles (authentification, cryptographie, fuites d’information, preuves à divulgation nulle de connaissance...) ➢ Théorie des nombres (factorisation, tests de primalité, courbes elliptiques...)
  3. 3 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 Holiseum : une vision holistique de la Cybersécurité Gouvernance • RSSI Support / as a Service / Starter • Conformité Réglementaire (LPM / NIS) • Convergence Cybersécurité et Sûreté Audits • Audits 360° : organisation / technique / physique / humain • Audits et Pentests Innovation (R&D) • Recherche & Développement • Tests et qualifications de solutions (POC) Solutions • Intégrations de solutions de Cybersécurité • Ingénierie d’offres de services Opérations • Back-office opérationnel du RSSI • Réponse à incidents et forensics (CSIRT) • Exploitation et MCS de solutions Remédiation • Cadrage et pilotage de projets de sécurisation et/ou de mise en conformité • Sécurisation des SI de sûreté (vidéo surveillance, Contrôle d’Accès, Anti- intrusion, etc.) • Formations et Sensibilisations Ils nous font confiance Nos partenaires Notre approche globale de la sécurité vise à faire converger les disciplines connexes telles que la sécurité physique et l'intelligence économique afin de mettre en évidence leurs interdépendances et de proposer des réponses de sécurité adaptées aux métiers. Nous proposons des services sur l'ensemble de la chaîne de valeur des services de cybersécurité, de la gouvernance aux opérations.
  4. 4 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 Introduction « Blockchains are known for their financial applications, which unfortunately often overshadows many of their other interests. We will focus here on the principles, techniques and concrete blockchain projects that bring a real interest from a confidentiality, integrity, availability or authentication point of view. Thus, properly used blockchains allow to drastically reduce single points of failure ("SPoF"), to decrease our dependency on the cloud or to reduce our infrastructure costs, by relying on existing decentralized networks where costs are shared. Many techniques democratized by blockchains are also under-exploited in cybersecurity (security proofs, protocol proofs, "zero-knowledge" proofs, ...) and could see a boom in our next software developments. Blockchains can also be a great tool for digital sovereignty by allowing us to get away from centralized foreign actors that we permanently trust (certification authorities, DNS root servers, ICANN, RIPE ...) »
  5. 5 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 1. Why a blockchain? 2. Resilience 3. Electronic notary 4. Confidentiality Outline
  6. 7 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 01. Why a blockchain? (1/2) ➢The Web has been designed to be decentralized BUT… ➢ It’s more and more centralized: Google, Apple, Amazon, Microsoft, … ➢ That makes the spying and data leaks easier ➢ A single server is not enough even to serve a single popular Youtube video ➢ Hosting changes  URLs are broken ➢ A lot of DDoS attacks succeed ➢ Load balancing is complex, costly, depends on the web technologies involved: efficient DDoS protection is hard
  7. 8 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 01. Why a blockchain? (2/2) ➢ A blockchain is like a trusted third party, without requiring any trust! ➢ « Zero Trust » security model: avoid unnecessary trust ➢ Benefits of blockchain applications: ➢ Scalable since the beginning ➢ Redundant ➢ DoS & DDoS resistant ➢ No downtime ➢ Censorship resistant ➢ Fault tolerant
  8. 9 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 01. Examples of well-known everyday centralized actors ➢ Root DNS (DNS nameservers) ➢ ICANN (IP blocks and AS numbers) ➢ RIPE (EU based) ➢ Most SSL/TLS/PKI certification authorities  The USA controls almost the entire Internet: ➢ Absolutely no Internet sovereignty for other countries ➢ A lot of centralized Single Points of Failure (« SPoF ») ➢ « Cloud Act » gives USA the access to most data in the world ➢ Outstanding control of the CAs market share Top Certification Authorities (https://en.wikipedia.org/wiki/Certificate_authority ) Top 4 are US-based and account for more than 80% usage and 95% market share
  9. 10 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 01. Are fully decentralized application possible? (1/2) ➢ Are fully decentralized application possible? ➢ Several parts should be decentralized: ➢ Back end (core logic/app) ➢ Web front end (storage of HTML/JS/CSS) ➢ Domain name (storage and resolver) ➢ It is little known that full decentralized web applications already exist thanks to blockchains and Web 3.0!
  10. 11 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 01. Are fully decentralized application possible? (2/2) Requirements to use a decentralized application: ➢Network access: ➢ through P2P / blockchain node (can be a light node) ➢ or public gateway (HTTP/HTTPS) ➢Client application: ➢ Browser (native) or with extension ➢ or heavy client
  11. 13 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 02. Decentralized domain names ➢ Goal: provide both the storage of the registry and the resolver logic in a decentralized way ➢ A domain name is nothing more than a Non-Fungible Token (« NFT ») ➢ 2 main projects: ➢ Ethereum Name Service - ENS (https://ens.domains/): ➢ Oldest provider, works on Ethereum blockchain only (https://www.ethernodes.org/) ➢ Limited time ownership of domains ➢ Unstoppable Domains (https://unstoppabledomains.com/): ➢ Newest provider, adds some other blockchain support ➢ Lifetime ownership of domains ➢ Native support under browsers like Opera and Brave (Chrome-based), otherwise throught a web extension ➢ Domain names can be used for websites or individual crypto wallets ➢ Can work with IPFS decentralized storage (« InterPlanetary File System ») through IPNS ➢ Unlike normal domain names, ownership of domains can be transferred without any third party consent
  12. 14 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 02. Decentralized storage Key advantages compared to public cloud providers: ➢ Redundancy ➢ Cost up to 20x cheaper ➢ No SPoF ➢ Near 100% SLA (« Service Level Agreement ») ➢ May provide native confidentiality/encryption ➢ May provide permanent storage for a one-time fee
  13. 15 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 02. Decentralized storage: IPFS ➢ All content is adressed by a hash: no more broken URLs! ➢ Content is de-duplicated on a given hoster ➢ MPEG streaming over IPFS over HTTP/HTTPS is native in all browsers: music and video sharing is easy ➢ Content should be voluntarily « pinned » by nodes, can be incentivized (Filecoin) ➢ Example (same content, transparent HTTPS, different entry point): ➢ https://ipfs.io/ipfs/QmcniBv7UQ4gGPQQW2BwbD4ZZHzN3o3tPuNLZCbBchd1zh ➢ https://gateway.pinata.cloud/ipfs/QmcniBv7UQ4gGPQQW2BwbD4ZZHzN3o3tPuNLZCbBchd1zh ➢ http://ipfs.localhost:8080/ipfs/QmcniBv7UQ4gGPQQW2BwbD4ZZHzN3o3tPuNLZCbBchd1zh ➢ Some public gateways (Cloudflare officially hosts one): https://ipfs.github.io/public-gateway-checker/ ➢ Project page: https://ipfs.io/ ➢ Wikipedia page: https://en.wikipedia.org/wiki/InterPlanetary_File_System
  14. 16 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 02. Decentralized storage: Sia ➢ Peer-to-peer marketplace that provides storage for a custom duration and redundancy requirements ➢ Security by design: ➢ Everything is always encrypted, the space provider never knows what it hosts ➢ Data is redundant by default ➢ Multimedia streaming is possible ➢ As of September 2021: ➢ Storage Capacity: 4.0 PB ➢ Storage Providers: 649 ➢ Used Storage: 1698 TB ➢ Project page: https://sia.tech/ ➢ Even provides a decentralized public cloud storage: https://siasky.net/
  15. 17 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 02. Decentralized storage: Arweave (1/2) ➢ Unlimited time (permanent) storage for a onetime fee! ➢ Called « the permaweb » ➢ A browser extension is available to archive any web content ➢ Has its own blockchain and token ($AR), token can be mined ➢ Miners must provide a « Proof of Access » to old data in order to add new blocks
  16. 18 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 02. Decentralized storage: Arweave (2/2) ➢ Arweave gateways are able to enforce their own content policy ➢ Partners with the Internet Watch Foundation (https://www.iwf.org.uk/) to keep the permaweb safe from abusive material ➢ Public block explorer: https://viewblock.io/arweave ➢ A layer of encryption can be added for applications with privacy: ➢ Ardrive (https://ardrive.io/): fully private personal cloud storage ➢ Weavemail (https://github.com/ArweaveTeam/weavemail): fully private mail application ➢ Project page: https://www.arweave.org/
  17. 19 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 02. Decentralized storage: other projects Other similar and interesting projects: ➢ Filecoin (https://filecoin.io/): incentivized file storage ➢ StorJ (https://www.storj.io/) ➢ Aleph.im (https://aleph.im/): cross-blockchain storage
  18. 20 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 02. Decentralized computing (1/2) Two main projects: ➢ Golem (https://www.golem.network/) ➢ iExec (https://iex.ec/) ➢ Marketplaces with computing power sellers and buyers ➢ Provide a complete framework for contained execution: ➢ Containers (Docker) ➢ Webassembly (WASM) programs for portability ➢ Provides a TEE SDK for confidential computing on TEE enclaves
  19. 21 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 02. Decentralized computing (2/2) Golem network, as of September 7th, 2021
  20. 23 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 03. What is electronic notary? ➢ Digital Signature ➢ Thanks to blockchain block timestamping: ➢ Anchoring at a given time ➢ Electronic seals ➢ Proof of Existence ➢ Proof of Precedence: useful for Intellectual Property ➢ Fully scalable thanks to Merkle trees (https://en.wikipedia.org/wiki/Merkle_tree) ➢ Interesting project: Woleet (https://www.woleet.io/) ➢ Any file can be anchored (only the hash is anchored) on the Bitcoin blockchain ➢ Open specifications and file formats ➢ API available ➢ Anybody can verify a proof: https://auditor.woleet.io/
  21. 25 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 04. Zero-knowledge proofs (“ZKP”) ➢ One prover, one or several verifiers ➢ A goal: prove any computation of the prover with public and private parameters to the verifier ➢ 3 basic properties: ➢ Completeness: if the statement is true, the verifier will be convinced ➢ Soundness: Cheating is not possible, or with very small probability ➢ Zero-knowledge: the verifier doesn’t learn anything else than if the statement is true ➢ Many interests (« secure computation »): ➢ Data integrity ➢ Computation integrity ➢ Confidentiality ➢ May be used with homomorphic encryption ➢ Many kinds of ZKP: interactive/not interactive, with/without trusted setup, quantum resistant or not ➢ Can be used for electronic voting
  22. 26 Classification : Public « Cybersecurity Uses of Blockchains »,

    Renaud Lifchitz - CECyF CoRIIN – September, 7 2021 04. Confidentiality Interesting blockchain projects: ➢ Ocean (https://oceanprotocol.com/): Marketplace to buy, sell and manage data in a privacy-preserving way ➢ NuCypher (https://www.nucypher.com/): Provides a secure computation framework : Fully Homomorphic Encryption and dynamic access control through proxy re-encryption ➢ Secret Network (https://scrt.network/): brings privacy to smart contracts, asset transfers and associated business data ➢ Mina (https://minaprotocol.com/): fixed-size blockchain (22kB) thanks to recursive ZKP, private smart contracts
  23. Holiseum | SAS au capital de 10.000€ | RCS Paris

    841 088 024 | n°TVA FR 77 841088024 | 9-11 Allée de l’Arche | Tour Egée, 92400 Paris La Défense www.holiseum.com Faïz DJELLOULI Président & Co-Fondateur +33 6 69 72 29 64 | [email protected] An NGUYEN Directeur Général & Co-Fondateur +33 6 98 84 39 97 | [email protected] Nos savoir-faire blockchain & cybersécurité ➢ Accompagnement à la conception et mise en œuvre de solutions blockchain ➢ Evaluation des risques techniques et juridiques ➢ Formation aux technologies blockchain ➢ Développement de preuves de concept ➢ Audit de primitives cryptographiques ➢ Audits sécurité d’applications décentralisée et de smart contracts
  24. Holiseum | SAS au capital de 10.000€ | RCS Paris

    841 088 024 | n°TVA FR 77 841088024 | 9-11 Allée de l’Arche | Tour Egée, 92400 Paris La Défense www.holiseum.com Faïz DJELLOULI Président & Co-Fondateur +33 6 69 72 29 64 | [email protected] An NGUYEN Directeur Général & Co-Fondateur +33 6 98 84 39 97 | [email protected] Holiseum est membre de Hexatrust, groupement français de la Cybersécurité et du Cloud de confiance Questions & answers! [email protected]