Birthday Bound in the Ideal Cipher Model *Byeonghak Lee, Jooyoung - - PowerPoint PPT Presentation

โ–ถ
birthday bound in the ideal cipher model
SMART_READER_LITE
LIVE PREVIEW

Birthday Bound in the Ideal Cipher Model *Byeonghak Lee, Jooyoung - - PowerPoint PPT Presentation

Tweakable Block Cipher Secure Beyond the Birthday Bound in the Ideal Cipher Model *Byeonghak Lee, Jooyoung Lee KAIST Outline Tweakable block ciphers Our contribution Proof overview Conclusion 2 Tweakable Block Ciphers (TBCs)


slide-1
SLIDE 1

Tweakable Block Cipher Secure Beyond the Birthday Bound in the Ideal Cipher Model

*Byeonghak Lee, Jooyoung Lee

KAIST

slide-2
SLIDE 2

Outline

  • Tweakable block ciphers
  • Our contribution
  • Proof overview
  • Conclusion

2

slide-3
SLIDE 3

Tweakable Block Ciphers (TBCs)

๐‘ญ

๐‘ณ ๐’€ ๐’

3

slide-4
SLIDE 4

Tweakable Block Ciphers (TBCs)

๏‚– A tweakable block cipher เทจ ๐น accepts an additional input โ€œtweakโ€

  • Tweaks are publicly used (like IVs in modes of operation)
  • Changing tweaks should be efficient (compared to changing keys)
  • Each tweak should give an independent permutation
  • Can be used to construct various cryptographic schemes

เทฉ ๐‘ญ

๐‘ณ ๐‘ผ ๐’€ ๐’

slide-5
SLIDE 5

Construction of TBCs

๏‚– Dedicated construction

  • Hasty Pudding, Mercy, Threefish,

TWEAKEY framework, etc.

๏‚– Permutation-based construction

  • TEM, XPX, etc.

๏‚– Block cipher-based construction

  • LRW, XEX, XHX, etc.

5

slide-6
SLIDE 6

Block cipher-based Construction

๏‚– Using fixed keys (independent of tweaks)

  • Security is proved in the standard model
  • The underlying BC is replaced by an ideal

random permutation (up to the security of TBC)

๏‚– Using tweak-dependent keys

  • Suitable when the underlying block cipher ๐น

uses a lightweight key schedule

  • Security is proved in the ideal cipher model
  • An adversary is allowed oracle access to ๐น

6

slide-7
SLIDE 7

เทฉ ๐‘ฎ ๐Ÿ , เทฉ ๐‘ฎ ๐Ÿ‘ (Mennink, FSE 2015)

With ๐‘œ-bit block cipher using ๐‘œ-bit keys, ๏‚– เทจ ๐บ 1 is secure up to 22๐‘œ/3 queries

  • BBB-secure with one BC call

๏‚– เทจ ๐บ[2] is secure up to 2๐‘œ queries

  • Fully secure with two BC calls

เทจ ๐บ 1 เทจ ๐บ 2

7

slide-8
SLIDE 8

เทฉ ๐‘ฎ ๐Ÿ , เทฉ ๐‘ฎ ๐Ÿ‘ (Mennink, FSE 2015)

With ๐‘œ-bit block cipher using ๐‘œ-bit keys, ๏‚– เทจ ๐บ 1 is secure up to 22๐‘œ/3 queries

  • BBB-secure with one BC call

๏‚– เทจ ๐บ[2] is secure up to 2๐‘œ queries

  • Fully secure with two BC calls

๏‚– Both uses tweak dependent keys

เทจ ๐บ 1 เทจ ๐บ 2

8

slide-9
SLIDE 9

เทช ๐‘ญ๐Ÿ, โ€ฆ , เทซ ๐‘ญ๐Ÿ’๐Ÿ‘ (Wang, et. al., AC 2016)

With ๐‘œ-bit block cipher using ๐‘œ-bit keys, ๏‚– only xor operation is used ๏‚– secure up to 2๐‘œ queries

  • Fully secure with two BC calls

9

slide-10
SLIDE 10

เทช ๐‘ญ๐Ÿ, โ€ฆ , เทซ ๐‘ญ๐Ÿ’๐Ÿ‘ (Wang, et. al., AC 2016)

With ๐‘œ-bit block cipher using ๐‘œ-bit keys, ๏‚– only xor operation is used ๏‚– secure up to 2๐‘œ queries

  • Fully secure with two BC calls
  • One call can be saved by precomputation

10

Can be precomputed and viewed as a subkey

slide-11
SLIDE 11

XHX (Jha, et. al., Latincrypt 2017)

๏‚– XHX uses two types of hash functions

  • ๐‘•: ๐œ€-almost xor-universal and uniform hash function
  • โ„Ž: ๐œ€โ€ฒ-almost universal and uniform hash function
  • Accepts arbitrary length tweak

๏‚– ๐‘• and โ„Ž are keyed hash function generated from the master key, but we omit the key and view them as secret key of the construction ๏‚– With ๐‘œ-bit block cipher using ๐‘›-bit keys, XHX is secure up to 2

๐‘œ+๐‘› 2

queries

๐น ๐‘•(๐‘ข) ๐‘ฆ โ„Ž(๐‘ข) ๐‘ง

๐‘œ ๐‘›

11

slide-12
SLIDE 12

Outline

  • Tweakable block ciphers
  • Our contribution
  • Proof overview
  • Conclusion

12

slide-13
SLIDE 13

Motivation

๏‚– The input size of an ๐‘œ-bit block cipher using ๐‘›-bit key is ๐‘œ + ๐‘› bits ๏‚– In the ideal cipher model, its information-theoretic security cannot go beyond ๐‘œ + ๐‘› bits (due to key exhaustive search) ๏‚– With respect to this size, the birthday bound should be

๐‘œ+๐‘› 2

  • If ๐‘› = ๐‘œ, it become ๐‘œ, so previous results are birthday bound in this view

13

slide-14
SLIDE 14

Motivation

๏‚– The input size of an ๐‘œ-bit block cipher using ๐‘›-bit key is ๐‘œ + ๐‘› bits ๏‚– In the ideal cipher model, its information-theoretic security cannot go beyond ๐‘œ + ๐‘› bits (due to key exhaustive search) ๏‚– With respect to this size, the birthday bound should be

๐‘œ+๐‘› 2

  • If ๐‘› = ๐‘œ, it become ๐‘œ, so previous results are birthday bound in this view

๏‚– Can we go beyond the birthday bound?

14

slide-15
SLIDE 15

XHX2

๏‚– Cascade of two independent copies of XHX

  • ๐น1 and ๐น2 are ๐‘œ-bit block ciphers using ๐‘›-bit keys
  • ๐‘•1 and ๐‘•2 are ๐œ€-almost uniform and xor-universal functions, and
  • โ„Ž1 and โ„Ž2 are ๐œ€โ€ฒ-almost uniform and universal function
  • Accepts arbitrary length tweak

๐น1 ๐‘•1(๐‘ข) ๐‘ฆ โ„Ž1(๐‘ข) ๐น2 ๐‘•2(๐‘ข) โ„Ž2(๐‘ข) ๐‘ง

slide-16
SLIDE 16

XHX2

๏‚– Cascade of two independent copies of XHX

  • ๐น1 and ๐น2 are ๐‘œ-bit block ciphers using ๐‘›-bit keys
  • ๐‘•1 and ๐‘•2 are ๐œ€-almost uniform and xor-universal functions, and
  • โ„Ž1 and โ„Ž2 are ๐œ€โ€ฒ-almost uniform and universal function
  • Accepts arbitrary length tweak

๐น1 ๐‘•1(๐‘ข) ๐‘ฆ โ„Ž1(๐‘ข) ๐น2 ๐‘•2(๐‘ข) โ„Ž2(๐‘ข) ๐‘ง

โจ‚ (finite field mult) can be used

slide-17
SLIDE 17

XHX2

๏‚– Cascade of two independent copies of XHX

  • ๐น1 and ๐น2 are ๐‘œ-bit block ciphers using ๐‘›-bit keys
  • ๐‘•1 and ๐‘•2 are ๐œ€-almost uniform and xor-universal functions, and
  • โ„Ž1 and โ„Ž2 are ๐œ€โ€ฒ-almost uniform and universal function
  • Accepts arbitrary length tweak

๐น1 ๐‘•1(๐‘ข) ๐‘ฆ โ„Ž1(๐‘ข) ๐น2 ๐‘•2(๐‘ข) โ„Ž2(๐‘ข) ๐‘ง

If ๐‘ข = ๐‘›, โจ can be used else, โจ‚ can be used

slide-18
SLIDE 18

XHX2

๏‚– Cascade of two independent copies of XHX

  • ๐น1 and ๐น2 are ๐‘œ-bit block ciphers using ๐‘›-bit keys
  • ๐‘•1 and ๐‘•2 are ๐œ€-almost uniform and xor-universal functions, and
  • โ„Ž1 and โ„Ž2 are ๐œ€โ€ฒ-almost uniform and universal function
  • Accepts arbitrary length tweak

๏‚– Secure up to 2min 2 ๐‘œ+๐‘›

3

,๐‘œ+๐‘›

2

queries

๏‚– If ๐‘› โ‰ค 2๐‘œ, min

2 ๐‘œ+๐‘› 3

, ๐‘œ +

๐‘› 2

=

2 ๐‘œ+๐‘› 3

๐น1 ๐‘•1(๐‘ข) ๐‘ฆ โ„Ž1(๐‘ข) ๐น2 ๐‘•2(๐‘ข) โ„Ž2(๐‘ข) ๐‘ง

slide-19
SLIDE 19

Security of XHX2

When ๐‘•1 and ๐‘•2 are ๐‘œ-bit ๐œ€-almost uniform and xor-universal hash functions, and โ„Ž1 and โ„Ž2 are ๐‘›-bit ๐œ€โ€ฒ-almost uniform and universal hash functions, one has where ๐œ€ โ‰ˆ

1 2๐‘œ , ๐œ€โ€ฒ โ‰ˆ 1 2๐‘›, ๐‘ž and ๐‘Ÿ are the number of queries to underlying

block ciphers and construction

19

slide-20
SLIDE 20

Comparison

Construction Key size Security Efficiency Ref. E โจ‚/H LRW 2๐‘œ ๐‘œ/2 1 1 [LRW02] LRW[2] 4๐‘œ 2๐‘œ/3, (or 3๐‘œ/4) 2 2 [LST12, Men18] LRW[s] 2๐‘ก๐‘œ ๐‘ก๐‘œ/(๐‘ก + 2) ๐‘ก ๐‘ก [LS13] เทจ ๐บ[1] ๐‘œ 2๐‘œ/3 1 1 [Men15] เทจ ๐บ[2] ๐‘œ ๐‘œ 2 [Men15] เทช ๐น1, โ‹ฏ , เทช ๐น32 ๐‘œ ๐‘œ 2 [Lei+16] XHX ๐‘œ + ๐‘› (๐‘œ + ๐‘›)/2 1 1 [Jha+ 17] XHX2 2๐‘œ + 2๐‘› ๐‘›๐‘—๐‘œ(2(๐‘œ + ๐‘›)/3, ๐‘œ + ๐‘›/2) 2 2 Our work

20

slide-21
SLIDE 21

Security of the 2-round XTX

๏‚– XTX is a tweak-length extension scheme (Minematsu and Iwata, IMACC 2015) ๏‚– Without allowing block cipher queries (๐‘ž = 0), we can prove beyond-birthday- bound security for the cascade of two independent XTX constructions.

เทจ ๐น๐ฟ1 ๐‘•1(๐‘ข) ๐‘ฆ โ„Ž1(๐‘ข) เทจ ๐น๐ฟ2 ๐‘•2(๐‘ข) โ„Ž2(๐‘ข) ๐‘ง

เทจ ๐น๐ฟ

๐‘•(๐‘ข) ๐‘ฆ โ„Ž(๐‘ข) ๐‘ง

21

slide-22
SLIDE 22

Outline

  • Tweakable block ciphers
  • Our contribution
  • Proof overview
  • Conclusion

22

slide-23
SLIDE 23

Distinguishing game

  • Adversary tries to distinguish two worlds by making oracle queries
  • All the information obtained during the attack is represented by a transcript:

๐œ = ๐‘…๐ท = ๐‘ข1, ๐‘ฆ1, ๐‘ง1 , โ‹ฏ , ๐‘ข๐‘Ÿ, ๐‘ฆ๐‘Ÿ, ๐‘ง๐‘Ÿ , ๐‘…๐น๐‘˜ = ๐‘˜, ๐‘™1, ๐‘ฃ1, ๐‘ค1 , โ‹ฏ , ๐‘˜, ๐‘™๐‘ž, ๐‘ฃ๐‘ž, ๐‘ค๐‘ž

23

๐น1/๐น2

เทจ ๐‘„

๐น1/๐น2

Real world Ideal world Real? or Ideal?

๐น1

๐‘•1(๐‘ข)

๐‘ฆ

โ„Ž1(๐‘ข)

๐น2

๐‘•2(๐‘ข) โ„Ž2(๐‘ข)

๐‘ง

slide-24
SLIDE 24

Distinguishing game

  • Adversary tries to distinguish two worlds by making oracle queries
  • All the information obtained during the attack is represented by a transcript:

๐œ = ๐‘…๐ท = ๐‘ข1, ๐‘ฆ1, ๐‘ง1 , โ‹ฏ , ๐‘ข๐‘Ÿ, ๐‘ฆ๐‘Ÿ, ๐‘ง๐‘Ÿ , ๐‘…๐น๐‘˜ = ๐‘˜, ๐‘™1, ๐‘ฃ1, ๐‘ค1 , โ‹ฏ , ๐‘˜, ๐‘™๐‘ž, ๐‘ฃ๐‘ž, ๐‘ค๐‘ž , ๐‘•1, ๐‘•2, โ„Ž1, โ„Ž2

24

๐น1/๐น2

เทจ ๐‘„

๐น1/๐น2

Real world Ideal world Real? or Ideal?

๐น1

๐‘•1(๐‘ข)

๐‘ฆ

โ„Ž1(๐‘ข)

๐น2

๐‘•2(๐‘ข) โ„Ž2(๐‘ข)

๐‘ง

Assume to be revealed after the attack is finished

slide-25
SLIDE 25

Upper Bounding the Distinguishing Advantage

๏‚– Tid : Probability distribution of ฯ„ in the ideal world ๏‚– Tre : Probability distribution of ฯ„ in the real world ๐๐ž๐ฐ เทจ

๐น ๐’  โ‰ค

Tid โˆ’ Tre

Transcripts 1 Probability to appear real ideal

25

slide-26
SLIDE 26

Proof technique

We can use following lemma to upper bound the statistical distance Patarinโ€™s H-coefficient lemma (informal) 1) Define bad transcripts ฮ˜bad

  • Pr Tid โˆˆ ฮ˜bad โ‰ค ฯต1

2) With ๐œ โˆ‰ ฮ˜bad

  • Pr Tre=๐œ

Pr Tid=๐œ โ‰ฅ 1 โˆ’ ฯต2

26

โˆฅ Tid โˆ’ Tre โˆฅ โ‰ค ฯต1 + ฯต2

slide-27
SLIDE 27

Security Proof of XHX2 (Sketch)

1) Give free queries to the adversary 2) Define bad transcripts 3) Lower bound the ratio of probabilities of obtaining a good transcript in the real world and in the ideal world

  • Pr Tid = ๐œ is easy to compute, while Pr Tre = ๐œ is challenging

4) Apply the H-coefficient lemma

27

slide-28
SLIDE 28

Representation of Construction Queries

๏‚– Reduced query: combine keys and construction queries

๐‘ข, ๐‘ฆ, ๐‘ง โ†ฆ โ„Ž1 ๐‘ข , โ„Ž2 ๐‘ข , ๐‘ฆโจ๐‘•1 ๐‘ข , ๐‘งโจ๐‘•2 ๐‘ข , ๐‘•1(๐‘ข)โจ๐‘•2 ๐‘ข = (๐‘™, ๐‘š, ๐‘ฃ, ๐‘ค, ฮ”)

28

๐น1 ๐‘•1(๐‘ข) ๐‘ฆ โ„Ž1(๐‘ข) ๐น2 ๐‘•2(๐‘ข) โ„Ž2(๐‘ข) ๐‘ง

slide-29
SLIDE 29

Representation of Construction Queries

๏‚– Black dots represent values fixed by block cipher queries, while white dots are โ€œfreeโ€

29

๐‘™, ๐‘ฃ, ๐‘ค โˆˆ ๐‘…๐น๐‘— ๐‘™, ๐‘ฃ,โˆ— โˆ‰ ๐‘…๐น๐‘—

slide-30
SLIDE 30

Free additional queries

๏‚– To avoid the extreme cases;

  • if there exists 2๐‘œ/4 or more queries to ๐น๐‘— with same key,

give full evaluation of the block cipher with that key

  • if there exists 2๐‘œ/16 or more queries to the construction with same tweak,

give full evaluation of the construction with that tweak

๏‚– This increases the advantage by a constant factor, but it helps the computation of probability

30

slide-31
SLIDE 31

Bad Transcripts (1/2)

๏‚– Avoid revealing any colliding internal path

  • If two query collides in all internal path, (white or black dots)

it will fix the choice of remaining values (red dots)

31

slide-32
SLIDE 32

โ‰ค ๐‘Ÿ2 2๐‘œ+2๐‘›

Bad Transcripts (2/2)

๏‚– Avoid large number of collisions

  • Upper bound the number of colliding pairs
  • Avoid a multi-collision with a large multiplicity
  • Otherwise, too large proportion of ๐น1 and ๐น2 become incompatible

32

โ‰ค 2๐‘œ/4

slide-33
SLIDE 33

Analyzing Good Transcripts

๏‚– Classify good queries into 5 classes ๏‚– Estimate the probability of completing the queries in each class ๏‚– In this way, we can lower bound Pr Tre = ๐œ

33

slide-34
SLIDE 34

Conclusion

๏‚– XHX2 is a TBC that is based on an ๐‘œ-bit block cipher using ๐‘›-bit key providing min

2 ๐‘œ+๐‘› 3

, ๐‘œ +

๐‘› 2 -bit security in the ideal cipher model

As open problems; ๏‚– Can we improve our security bound using an alternative approach (e.g., the expectation method)? ๏‚– What is the security of the 3-round XHX? ๏‚– Is our bound tight? (Generic attacks matching the provable security?)

34

slide-35
SLIDE 35

Thank You Q&A

35