Combiners for Backdoored Random Oracles Balthazar Bauer, Pooya - - PowerPoint PPT Presentation

combiners for backdoored random oracles
SMART_READER_LITE
LIVE PREVIEW

Combiners for Backdoored Random Oracles Balthazar Bauer, Pooya - - PowerPoint PPT Presentation

Combiners for Backdoored Random Oracles Balthazar Bauer, Pooya Farshim, Sogol Mazaheri ENS, Paris TU Darmstadt Backdoors 1 Backdoors It makes more sense to address any security risks by developing intercept solutions during the design


slide-1
SLIDE 1

Combiners for Backdoored Random Oracles

Balthazar Bauer, Pooya Farshim, Sogol Mazaheri

ENS, Paris TU Darmstadt

slide-2
SLIDE 2

Backdoors

1

slide-3
SLIDE 3

Backdoors

It makes more sense to address any security risks by developing intercept solutions during the design phase, rather than resorting to a patchwork solution when law enforcement comes knocking after the fact.

James Comey (former FBI director, Oct. 2014)

1

slide-4
SLIDE 4

Hash Functions

✵✽❜❢❢✶❡✵❜✵✶✻✷

Hash Functions are Everywhere:

KDFs OWFs FDH MACs PoW

2

slide-5
SLIDE 5

Hash Functions

✵✽❜❢❢✶❡✵❜✵✶✻✷

Hash Functions are Everywhere:

KDFs OWFs FDH MACs PoW security proofs are not always possible...

2

slide-6
SLIDE 6

Random Oracles

✵✽❜❢❢✶❡✵❜✵✶✻✷

3

slide-7
SLIDE 7

Random Oracles = Ideal Hash Functions

ideal hash function ✵✽❜❢❢✶❡✵❜✵✶✻✷

3

slide-8
SLIDE 8

Random Oracles = Ideal Hash Functions

ideal hash function ✵✽❜❢❢✶❡✵❜✵✶✻✷

Random Oracles are Practical,

enabling proofs of many practical schemes: RSA-OAEP TLS Identification protocols FDH DSA PSS

3

slide-9
SLIDE 9

Backdoored Random Oracles (BROs)

H

x H(x)

4

slide-10
SLIDE 10

Backdoored Random Oracles (BROs)

H

x H(x)

4

slide-11
SLIDE 11

Backdoored Random Oracles (BROs)

H

random oracle x H(x)

4

slide-12
SLIDE 12

Backdoored Random Oracles (BROs)

H

random oracle x H(x)

BDH

backdoor oracle f f (H)

4

slide-13
SLIDE 13

Backdoored Random Oracles (BROs)

H

random oracle x H(x)

BDH

backdoor oracle f f (H)

adaptive and unrestricted access to the backdoor oracle

4

slide-14
SLIDE 14

Backdoor Capabilities

BDH

5

slide-15
SLIDE 15

Backdoor Capabilities

BDH

collisions? (x, x′)

5

slide-16
SLIDE 16

Backdoor Capabilities

BDH

collisions? (x, x′) H−(y)? x

5

slide-17
SLIDE 17

Backdoor Capabilities

BDH

collisions? (x, x′) H−(y)? x H−(y) starting with k zeros? 0k|x

5

slide-18
SLIDE 18

Backdoor Capabilities

BDH

collisions? (x, x′) H−(y)? x H−(y) starting with k zeros? 0k|x any f

f (H)

5

slide-19
SLIDE 19

Backdoor Capabilities

BDH

collisions? (x, x′) H−(y)? x H−(y) starting with k zeros? 0k|x any f

f (H)

no security is possible...

5

slide-20
SLIDE 20

Combining BROs

H

x H(x)

BDH

f f (H)

6

slide-21
SLIDE 21

Combining BROs

H

x H(x)

BDH

f f (H)

G

x G(x)

BDG

f f (G)

6

slide-22
SLIDE 22

Combining BROs

H

x H(x)

BDH

f f (H)

G

x G(x)

BDG

f f (G)

Can we combine two independent but backdoored hash functions to build one that is secure against adversaries with access to both backdoor oracles?

6

slide-23
SLIDE 23

Combiners

7

slide-24
SLIDE 24

Combiners

H

concatenation:

G

7

slide-25
SLIDE 25

Combiners

H

concatenation:

G H

xor:

G

7

slide-26
SLIDE 26

Combiners

H

concatenation:

G H

xor:

G H

cascade:

G

7

slide-27
SLIDE 27

Combiners

H

concatenation:

G H

xor:

G H

cascade:

G H

xor:

G H

cascade:

G

7

slide-28
SLIDE 28

Concatenation in 2-BRO

H G BDH BDG

8

slide-29
SLIDE 29

Concatenation in 2-BRO

H G BDH BDG

  • ne-way security?

8

slide-30
SLIDE 30

Concatenation in 2-BRO

H G BDH BDG

  • ne-way security?

pseudorandomness? collision-resistance?

8

slide-31
SLIDE 31

Concatenation in 2-BRO

H G BDH BDG

  • ne-way security?

pseudorandomness? collision-resistance? We need results from communication complexity...

8

slide-32
SLIDE 32

Communication Complexity

A B

t(A, B)

9

slide-33
SLIDE 33

Communication Complexity

A B

A B

9

slide-34
SLIDE 34

Communication Complexity

A B

A B

INT: find x ∈ A ∩ B. DISJ: decide A ∩ B = ∅

9

slide-35
SLIDE 35

Communication Complexity

A B

A B

INT: find x ∈ A ∩ B. DISJ: decide A ∩ B = ∅

Theorem ([Babai, Frankl, Simon 86]): For independent random sets A, B ⊆ [2n] of size 2n/2, and protocols with 99% correctness, it holds that CC(DISJ) ≥ Ω(2n/2).

9

slide-36
SLIDE 36

Communication Complexity - Generalized

|A|, |B| lower-bound problem by = 2n/2 Ω(2n/2) DISJ

[Babai, Frankl, Simon 86]

≈ 2n/2 Ω(2n/2) DISJ

[Moshkovitz, Barak 12], [Guruswami, Cheraghchi 13]

10

slide-37
SLIDE 37

Communication Complexity - Generalized

|A|, |B| lower-bound problem by = 2n/2 Ω(2n/2) DISJ

[Babai, Frankl, Simon 86]

≈ 2n/2 Ω(2n/2) DISJ

[Moshkovitz, Barak 12], [Guruswami, Cheraghchi 13]

Theorem: For independent random sets A, B ⊆ [2n] of expected sizes 2n(1−α) and 2n(1−β) respectively, CC(INT) ≥ Ω(2n(min(α,β)+α+β−1)), for (α, β) in the feasible region.

10

slide-38
SLIDE 38

Communication Complexity - Generalized

|A|, |B| lower-bound problem by = 2n/2 Ω(2n/2) DISJ

[Babai, Frankl, Simon 86]

≈ 2n/2 Ω(2n/2) DISJ

[Moshkovitz, Barak 12], [Guruswami, Cheraghchi 13]

Theorem: For independent random sets A, B ⊆ [2n] of expected sizes 2n(1−α) and 2n(1−β) respectively, CC(INT) ≥ Ω(2n(min(α,β)+α+β−1)), for (α, β) in the feasible region.

10

slide-39
SLIDE 39

One-Way Security of Concatenation Combiner

Theorem: Inverting a random value u|v under H|G in the 2-BRO model is as hard as the set-intersection problem.

11

slide-40
SLIDE 40

One-Way Security of Concatenation Combiner

Theorem: Inverting a random value u|v under H|G in the 2-BRO model is as hard as the set-intersection problem. Let A := H−(u) and B := G−(v). A B

11

slide-41
SLIDE 41

One-Way Security of Concatenation Combiner

Theorem: Inverting a random value u|v under H|G in the 2-BRO model is as hard as the set-intersection problem. Let A := H−(u) and B := G−(v). A B Then, for any pre-image x of u|v: x ∈ H−(u) and x ∈ G−(v)

11

slide-42
SLIDE 42

One-Way Security of Concatenation Combiner

Theorem: Inverting a random value u|v under H|G in the 2-BRO model is as hard as the set-intersection problem. Let A := H−(u) and B := G−(v). A B x Then, for any pre-image x of u|v: x ∈ H−(u) and x ∈ G−(v) Hence, x ∈ A ∩ B.

11

slide-43
SLIDE 43

Security of Concatenation in 2-BRO

One-Way Security

Inverting a random value u|v is as hard as the set-intersection problem.

12

slide-44
SLIDE 44

Security of Concatenation in 2-BRO

One-Way Security

Inverting a random value u|v is as hard as the set-intersection problem.

Pseudorandomness

Deciding whether a random value u|v has a pre-image is as hard as the set-disjointness problem.

12

slide-45
SLIDE 45

Security of Concatenation in 2-BRO

One-Way Security

Inverting a random value u|v is as hard as the set-intersection problem.

Pseudorandomness

Deciding whether a random value u|v has a pre-image is as hard as the set-disjointness problem.

Collision-Resistance

Finding a collision is as hard as ...

12

slide-46
SLIDE 46

Collision-Resistance of Concatenation

Theorem: Finding a collision under H|G in the 2-BRO model is as hard as finding 2 sets, given many, and 2 elements in their intersection.

13

slide-47
SLIDE 47

Collision-Resistance of Concatenation

Theorem: Finding a collision under H|G in the 2-BRO model is as hard as finding 2 sets, given many, and 2 elements in their intersection.

. .

13

slide-48
SLIDE 48

Collision-Resistance of Concatenation

Theorem: Finding a collision under H|G in the 2-BRO model is as hard as finding 2 sets, given many, and 2 elements in their intersection.

. .

Hardness of the above problem is open.

13

slide-49
SLIDE 49

Combiners and Security Notions

H G H

G H G

OW PRG CR

  • ??
  • ?

??

  • ??

14

slide-50
SLIDE 50

Open Problems

lower bound for the multi-INT problem extend parameters for DISJ and INT combiners for other backdoored primitives

π E

15

slide-51
SLIDE 51

16

slide-52
SLIDE 52

Thank You.

Thanks to Giorgia Marson for drawing Alice, Bob, and the sheet. 16