combiners for backdoored random oracles
play

Combiners for Backdoored Random Oracles Balthazar Bauer, Pooya - PowerPoint PPT Presentation

Combiners for Backdoored Random Oracles Balthazar Bauer, Pooya Farshim, Sogol Mazaheri ENS, Paris TU Darmstadt Backdoors 1 Backdoors It makes more sense to address any security risks by developing intercept solutions during the design


  1. Combiners for Backdoored Random Oracles Balthazar Bauer, Pooya Farshim, Sogol Mazaheri ENS, Paris TU Darmstadt

  2. Backdoors 1

  3. Backdoors It makes more sense to address any security risks by developing intercept solutions during the design phase, rather than resorting to a patchwork solution when law enforcement comes knocking after the fact. James Comey (former FBI director, Oct. 2014) 1

  4. Hash Functions ✵✽❜❢❢✶❡✵❜✵✶✻✷ Hash Functions are Everywhere: KDFs OWFs FDH MACs PoW 2

  5. Hash Functions ✵✽❜❢❢✶❡✵❜✵✶✻✷ Hash Functions are Everywhere: KDFs OWFs FDH MACs PoW security proofs are not always possible... 2

  6. Random Oracles ✵✽❜❢❢✶❡✵❜✵✶✻✷ 3

  7. Random Oracles = Ideal Hash Functions ✵✽❜❢❢✶❡✵❜✵✶✻✷ ideal hash function 3

  8. Random Oracles = Ideal Hash Functions ✵✽❜❢❢✶❡✵❜✵✶✻✷ ideal hash function Random Oracles are Practical, enabling proofs of many practical schemes: RSA-OAEP TLS Identification protocols FDH DSA PSS 3

  9. Backdoored Random Oracles (BROs) H ( x ) x H 4

  10. Backdoored Random Oracles (BROs) H ( x ) x H 4

  11. Backdoored Random Oracles (BROs) H ( x ) x H random oracle 4

  12. Backdoored Random Oracles (BROs) H ( x ) x H random oracle f ( H ) f BD H backdoor oracle 4

  13. Backdoored Random Oracles (BROs) H ( x ) x H random oracle f ( H ) f BD H backdoor oracle adaptive and unrestricted access to the backdoor oracle 4

  14. Backdoor Capabilities BD H 5

  15. Backdoor Capabilities collisions? BD H ( x , x ′ ) 5

  16. Backdoor Capabilities collisions? H − ( y ) ? x BD H ( x , x ′ ) 5

  17. Backdoor Capabilities collisions? 0 k | x H − ( y ) ? x BD H H − ( y ) starting ( x , x ′ ) with k zeros? 5

  18. Backdoor Capabilities collisions? any f 0 k | x H − ( y ) ? x BD H H − ( y ) starting ( x , x ′ ) with k zeros? f ( H ) 5

  19. Backdoor Capabilities collisions? any f 0 k | x H − ( y ) ? x BD H H − ( y ) starting ( x , x ′ ) with k zeros? f ( H ) no security is possible... 5

  20. Combining BROs H ( x ) x H f ( H ) f BD H 6

  21. Combining BROs H ( x ) G ( x ) x x H G f ( H ) f ( G ) f f BD H BD G 6

  22. Combining BROs H ( x ) G ( x ) x x H G f ( H ) f ( G ) f f BD H BD G Can we combine two independent but backdoored hash functions to build one that is secure against adversaries with access to both backdoor oracles? 6

  23. Combiners 7

  24. Combiners concatenation: H G 7

  25. Combiners xor: concatenation: H H ⊕ G G 7

  26. Combiners xor: concatenation: H H ⊕ G G cascade: H G 7

  27. Combiners xor: xor: concatenation: H H H ⊕ ⊕ G G G cascade: cascade: H H G G 7

  28. Concatenation in 2-BRO BD H H BD G G 8

  29. Concatenation in 2-BRO BD H H BD G G one-way security? 8

  30. Concatenation in 2-BRO BD H H BD G G one-way security? pseudorandomness? collision-resistance? 8

  31. Concatenation in 2-BRO BD H H BD G G one-way security? pseudorandomness? collision-resistance? We need results from communication complexity ... 8

  32. Communication Complexity A t ( A , B ) B 9

  33. Communication Complexity A B A B 9

  34. Communication Complexity A B A B find x ∈ A ∩ B . decide A ∩ B = ∅ INT : DISJ : 9

  35. Communication Complexity A B A B find x ∈ A ∩ B . decide A ∩ B = ∅ INT : DISJ : Theorem ([Babai, Frankl, Simon 86]): For independent random sets A , B ⊆ [ 2 n ] of size 2 n / 2 , and protocols with 99% correctness, it holds that CC ( DISJ ) ≥ Ω( 2 n / 2 ) . 9

  36. Communication Complexity - Generalized | A | , | B | lower-bound problem by = 2 n / 2 Ω( 2 n / 2 ) DISJ [Babai, Frankl, Simon 86] [Moshkovitz, Barak 12], ≈ 2 n / 2 Ω( 2 n / 2 ) DISJ [Guruswami, Cheraghchi 13] 10

  37. Communication Complexity - Generalized | A | , | B | lower-bound problem by = 2 n / 2 Ω( 2 n / 2 ) DISJ [Babai, Frankl, Simon 86] [Moshkovitz, Barak 12], ≈ 2 n / 2 Ω( 2 n / 2 ) DISJ [Guruswami, Cheraghchi 13] Theorem : For independent random sets A , B ⊆ [ 2 n ] of expected sizes 2 n ( 1 − α ) and 2 n ( 1 − β ) respectively, CC ( INT ) ≥ Ω( 2 n ( min ( α,β )+ α + β − 1 ) ) , for ( α, β ) in the feasible region. 10

  38. Communication Complexity - Generalized | A | , | B | lower-bound problem by = 2 n / 2 Ω( 2 n / 2 ) DISJ [Babai, Frankl, Simon 86] [Moshkovitz, Barak 12], ≈ 2 n / 2 Ω( 2 n / 2 ) DISJ [Guruswami, Cheraghchi 13] Theorem : For independent random sets A , B ⊆ [ 2 n ] of expected sizes 2 n ( 1 − α ) and 2 n ( 1 − β ) respectively, CC ( INT ) ≥ Ω( 2 n ( min ( α,β )+ α + β − 1 ) ) , for ( α, β ) in the feasible region. 10

  39. One-Way Security of Concatenation Combiner Theorem : Inverting a random value u | v under H | G in the 2-BRO model is as hard as the set-intersection problem. 11

  40. One-Way Security of Concatenation Combiner Theorem : Inverting a random value u | v under H | G in the 2-BRO model is as hard as the set-intersection problem. Let A := H − ( u ) and B := G − ( v ) . A B 11

  41. One-Way Security of Concatenation Combiner Theorem : Inverting a random value u | v under H | G in the 2-BRO model is as hard as the set-intersection problem. Let A := H − ( u ) and B := G − ( v ) . A B Then, for any pre-image x of u | v : x ∈ H − ( u ) and x ∈ G − ( v ) 11

  42. One-Way Security of Concatenation Combiner Theorem : Inverting a random value u | v under H | G in the 2-BRO model is as hard as the set-intersection problem. Let A := H − ( u ) and B := G − ( v ) . A B x Then, for any pre-image x of u | v : x ∈ H − ( u ) and x ∈ G − ( v ) Hence, x ∈ A ∩ B . 11

  43. Security of Concatenation in 2-BRO One-Way Security Inverting a random value u | v is as hard as the set-intersection problem. 12

  44. Security of Concatenation in 2-BRO One-Way Security Inverting a random value u | v is as hard as the set-intersection problem. Pseudorandomness Deciding whether a random value u | v has a pre-image is as hard as the set-disjointness problem. 12

  45. Security of Concatenation in 2-BRO One-Way Security Inverting a random value u | v is as hard as the set-intersection problem. Pseudorandomness Deciding whether a random value u | v has a pre-image is as hard as the set-disjointness problem. Collision-Resistance Finding a collision is as hard as ... 12

  46. Collision-Resistance of Concatenation Theorem : Finding a collision under H | G in the 2-BRO model is as hard as finding 2 sets, given many, and 2 elements in their intersection. 13

  47. Collision-Resistance of Concatenation Theorem : Finding a collision under H | G in the 2-BRO model is as hard as finding 2 sets, given many, and 2 elements in their intersection. . . 13

  48. Collision-Resistance of Concatenation Theorem : Finding a collision under H | G in the 2-BRO model is as hard as finding 2 sets, given many, and 2 elements in their intersection. . . Hardness of the above problem is open. 13

  49. Combiners and Security Notions OW PRG CR H ?? � � G H ? ?? ⊕ � G ?? � � H G 14

  50. Open Problems lower bound for the multi-INT problem extend parameters for DISJ and INT E π combiners for other backdoored primitives 15

  51. 16

  52. Thank You. Thanks to Giorgia Marson for drawing Alice, Bob, and the sheet. 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend