Cryptographic Reductions: Classification and Applications to Ideal Models
Paul Baecher
Cryptographic Reductions: Classification and Applications to Ideal - - PowerPoint PPT Presentation
Cryptographic Reductions: Classification and Applications to Ideal Models Paul Baecher Cryptographic Reductions: Classification and Applications to Ideal Models Paul Baecher Three Ways to Argue for Cryptographic Security Cryptanalysis
Paul Baecher
Paul Baecher
Cryptanalysis
Empirically evaluate real-world primitives
Information-theoretic arguments
Disregard any resource limitations
Provable security from assumptions
Efficient attackers only
1
Provable security from assumptions
Efficient attackers only
1
Construction “To encrypt with construction , take the message and. . . ”
2
Construction “To encrypt with construction , take the message and. . . ” Security proof Thm: If assumption , then construction secure.
2
Construction “To encrypt with construction , take the message and. . . ” Security proof Thm: If assumption , then construction secure in the ideal model .
2
Construction “To encrypt with construction , take the message and. . . ” Security proof Thm: If assumption , then construction secure in the ideal model . Idealized primitive
2
Ideal model Random oracle Ideal cipher Real life MD5, SHA3, . . . DES, AES, . . .
3
Ideal model Random oracle Ideal cipher Real life MD5, SHA3, . . . DES, AES, . . . Pick a random function from the set
3
If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model.
4
If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model. Idealized primitive
4
If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model. Idealized primitive constr1
4
If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model. Idealized primitive constr1 constr2
4
If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model. Idealized primitive constr1 constr2 AES
4
If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model. Idealized primitive constr1 constr2 DES
4
If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model. Idealized primitive constr1 constr2 DES
4
Can we compare constructions relative to each other? How do popular constructions compare?
5
Oracle reducibility enables sound comparisons
are in ideal models.
6
[BF11,BFFS13]
Oracle reducibility
A versatile comparison paradigm
Ideal-cipher comparisons
Blockcipher-based compression functions
Random-oracle comparisons
ElGamal-type encryption schemes
7
[BF11,BFFS13]
Oracle reducibility
A versatile comparison paradigm
Ideal-cipher comparisons
Blockcipher-based compression functions
Random-oracle comparisons
ElGamal-type encryption schemes
7
Idealized primitive constr1 constr2
8
Idealized primitive constr1 constr2 E
8
Idealized primitive constr1 constr2
9
Idealized primitive constr1 constr2 E
9
Idealized primitive constr1 constr2 E T(E)
9
[BF11,BFFS13]
Direct reducibility
Any oracle O that makes C O
1
secure also makes C O
2 secure
Free reducibility
There exists T s.t. any oracle that makes C O
1 secure also
makes C T O
2
secure
10
[BF11,BFFS13]
Direct reducibility
Any oracle O that makes C O
1
secure also makes C O
2 secure
Free reducibility
There exists T s.t. any oracle that makes C O
1 secure also
makes C T O
2
secure
10
Oracle reducibility
A versatile comparison paradigm [BFFS13]
Ideal-cipher comparisons
Blockcipher-based compression functions
Random-oracle comparisons
ElGamal-type encryption schemes
11
E M K E(K, M) ⊕ M
Building block for hash functions
2n-to-n compression
Built from a blockcipher
Design from [PGV93]
Collision resistant if E ideal
Proof due to [BRSS10]
12
1 2 3 4 5 6 7 8 9 10 11 12 13
[BFFS13]
1 4 2 3 5 8 6 7 9 12 10 11
direct reducibility within direct reducibility within
13
[BFFS13]
1 4 2 3 5 8 6 7 9 12 10 11
separation (direct)
(free)
13
[BFFS13]
1 4 2 3 5 8 6 7 9 12 10 11
separation (direct)
(free)
f r e e r e d u c t i
13
1
K M
2
K M
There exists T s.t. for any E: PGVE
1 secure ⇒ PGVT E 2
secure
E 14
1
K M
2
K M
There exists T s.t. for any E: PGVE
1 secure ⇒ PGVT E 2
secure
T E(K, M) := E(K, M) ⊕ K
E 14
1
K M
2
K M
There exists T s.t. for any E: PGVE
1 secure ⇒ PGVT E 2
secure
T E(K, M) := E(K, M) ⊕ K
E
E
M K
14
1
K M
2
K M
There exists T s.t. for any E: PGVE
1 secure ⇒ PGVT E 2
secure
T E(K, M) := E(K, M) ⊕ K
E
T M K
14
1
K M
2
K M
There exists T s.t. for any E: PGVE
1 secure ⇒ PGVT E 2
secure
T E(K, M) := E(K, M) ⊕ K
E
T M K
E
T M K
14
[BFFS13]
1 4 2 3 5 8 6 7 9 12 10 11
separation (direct)
(free)
15
No direct reducibility from #1 to #2
Or vice versa
Free reducibility “switches” group
But no simultaneous security for both
16
No direct reducibility from #1 to #2
Or vice versa
Free reducibility “switches” group
But no simultaneous security for both E s.t.
#2 ???
16
No direct reducibility from #1 to #2
Or vice versa
Free reducibility “switches” group
But no simultaneous security for both E s.t.
#2 ??? T(E) s.t.
#2 secure T
16
No direct reducibility from #1 to #2
Or vice versa
Free reducibility “switches” group
But no simultaneous security for both T(T(E)) s.t.
#2 ??? T(E) s.t.
#2 secure T
16
Oracle reducibility
A versatile comparison paradigm
Ideal-cipher comparisons
Blockcipher-based compression functions [BF11]
Random-oracle comparisons
ElGamal-type encryption schemes
17
Feasibility result
Not practical, but it works
Practical result
Simpler, tighter, faster, . . .
Further improvements
Milder or fewer assumptions
18
Further improvements
Milder or fewer assumptions
18
If a1 and a2 hold, then C is secure in ideal model. If a1 holds, then C ′ is secure in ideal model.
?
<
19
If a1 and a2 hold, then C is secure in ideal model. If a1 holds, then C ′ is secure in ideal model.
?
<
Idealized primitive
19
If a1 and a2 hold, then C is secure in ideal model. If a1 holds, then C ′ is secure in ideal model.
?
<
Idealized primitive C, a1, a2
19
If a1 and a2 hold, then C is secure in ideal model. If a1 holds, then C ′ is secure in ideal model.
?
<
Idealized primitive C, a1, a2 C ′, a1
19
If a1 and a2 hold, then C is secure in ideal model. If a1 holds, then C ′ is secure in ideal model.
?
<
Idealized primitive C, a1, a2 C ′, a1 H
19
If a1 and a2 hold, then C is secure in ideal model. If a1 holds, then C ′ is secure in ideal model.
?
<
Idealized primitive C, a1, a2 C ′, a1 T(H)
19
[BF11]
Strict reducibility
Definitely better
H C H, a1, a2
20
[BF11]
Strict reducibility
Definitely better
H C H, a1, a2 T(H) C ′T H , a1
20
[BF11]
Strict reducibility
Definitely better
H C H, a1, a2 T(H) C ′T H , a1
Weak reducibility
As good as
H T(H) C H, a1, a2 C ′T H , a1, a2
20
[BF11]
Strict reducibility
Definitely better
H C H, a1, a2 T(H) C ′T H , a1
Strong reducibility
As good as, possibly better
Weak reducibility
As good as
H T(H) C H, a1, a2 C ′T H , a1, a2
20
[BF11]
Strict reducibility
Definitely better
H C H, a1, a2 T(H) C ′T H , a1
Strong reducibility
As good as, possibly better
Weak reducibility
As good as
H T(H) C H, a1, a2 C ′T H , a1, a2
⇒
[BF11]
Hashed ElGamal encryption scheme
Improved scheme from [CKS09]
Milder assumption
[Strong] Diffie–Hellmann assumption
21
[BF11]
Hashed ElGamal encryption scheme
Improved scheme from [CKS09]
Milder assumption
[Strong] Diffie–Hellmann assumption
Strong reducibility
Possibly better, but not worse
21
22
Comparison technique
Relative security regarding primitives
23
Comparison technique
Relative security regarding primitives
Various compression-function designs
Two groups, incomparable, superior one∗
23
Comparison technique
Relative security regarding primitives
Various compression-function designs
Two groups, incomparable, superior one∗
E E A3 A1 B1 A2 B2
23
Comparison technique
Relative security regarding primitives
Various compression-function designs
Two groups, incomparable, superior one∗
E E A3 A1 B1 A2 B2
ElGamal-type encryption schemes
Construction in [CKS09] is possibly better
23
Comparison technique
Relative security regarding primitives
Various compression-function designs
Two groups, incomparable, superior one∗
E E A3 A1 B1 A2 B2
ElGamal-type encryption schemes
Construction in [CKS09] is possibly better
Results enable sound comparison
Guidance for implementors facing choices
23
[BBF13] Notions of Black-Box Reductions, Revisited. Paul Baecher, Christina Brzuska, Marc Fischlin. ASIACRYPT 2013. [BBM13] Reset Indifferentiability and its Consequences. Paul Baecher, Christina Brzuska, Arno Mittelbach. ASIACRYPT 2013. [BFFS13] Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam. EUROCRYPT 2013. [BF11] Random Oracle Reducibility. Paul Baecher, Marc Fis-
[BFS11] Expedient Non-Malleability Notions for Hash Func-
RSA 2011. [BBFM11] Breaking reCAPTCHA: A Holistic Approach via Shape Recognition. Paul Baecher, Niklas B¨ uscher, Marc Fis- chlin, Benjamin Milde. IFIP SEC 2011. [BFGLLS10] CAPTCHAs: The Good, the Bad, and the Ugly. Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Luetzow, Dominique Schr¨
[BKB09] PUF-Based Authentication Protocols – Revisited. Heike Busch, Stefan Katzenbeisser, Paul Baecher. WISA 2009. [ABFGH09] Massively-Parallel Simulation of Biochemical Sys- tems. Jens Ackermann, Paul Baecher, Thorsten Franzel, Michael Goesele, Kay Hamacher. LNI 2009. [BKHDF06] The Nepenthes Platform: An Efficient Approach to Collect Malware. Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling. RAID 2006. 24
[BBF13] Notions of Black-Box Reductions, Revisited. Paul Baecher, Christina Brzuska, Marc Fischlin. ASIACRYPT 2013. [BBM13] Reset Indifferentiability and its Consequences. Paul Baecher, Christina Brzuska, Arno Mittelbach. ASIACRYPT 2013. [BFFS13] Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam. EUROCRYPT 2013. [BF11] Random Oracle Reducibility. Paul Baecher, Marc Fis-
[BFS11] Expedient Non-Malleability Notions for Hash Func-
RSA 2011. [BBFM11] Breaking reCAPTCHA: A Holistic Approach via Shape Recognition. Paul Baecher, Niklas B¨ uscher, Marc Fis- chlin, Benjamin Milde. IFIP SEC 2011. [BFGLLS10] CAPTCHAs: The Good, the Bad, and the Ugly. Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Luetzow, Dominique Schr¨
[BKB09] PUF-Based Authentication Protocols – Revisited. Heike Busch, Stefan Katzenbeisser, Paul Baecher. WISA 2009. [ABFGH09] Massively-Parallel Simulation of Biochemical Sys- tems. Jens Ackermann, Paul Baecher, Thorsten Franzel, Michael Goesele, Kay Hamacher. LNI 2009. [BKHDF06] The Nepenthes Platform: An Efficient Approach to Collect Malware. Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling. RAID 2006. 24
[BBF13] Notions of Black-Box Reductions, Revisited. Paul Baecher, Christina Brzuska, Marc Fischlin. ASIACRYPT 2013. [BBM13] Reset Indifferentiability and its Consequences. Paul Baecher, Christina Brzuska, Arno Mittelbach. ASIACRYPT 2013. [BFFS13] Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam. EUROCRYPT 2013. [BF11] Random Oracle Reducibility. Paul Baecher, Marc Fis-
[BFS11] Expedient Non-Malleability Notions for Hash Func-
RSA 2011. [BBFM11] Breaking reCAPTCHA: A Holistic Approach via Shape Recognition. Paul Baecher, Niklas B¨ uscher, Marc Fis- chlin, Benjamin Milde. IFIP SEC 2011. [BFGLLS10] CAPTCHAs: The Good, the Bad, and the Ugly. Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Luetzow, Dominique Schr¨
[BKB09] PUF-Based Authentication Protocols – Revisited. Heike Busch, Stefan Katzenbeisser, Paul Baecher. WISA 2009. [ABFGH09] Massively-Parallel Simulation of Biochemical Sys- tems. Jens Ackermann, Paul Baecher, Thorsten Franzel, Michael Goesele, Kay Hamacher. LNI 2009. [BKHDF06] The Nepenthes Platform: An Efficient Approach to Collect Malware. Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling. RAID 2006. 24
26
[BF11]
Strict reducibility
Definitely better
H C H, a1, a2 T(H) C ′T H , a1
Strong reducibility
As good as, possibly better
Weak reducibility
As good as
H T(H) C H, a1, a2 C ′T H , a1, a2
⇒
[BF11]
Strict reducibility
Definitely better
H C H, a1, a2 T(H) C ′T H , a1
Strong reducibility
As good as, possibly better
H C H, a1, a2 C ′T H , a1, a2 T(H)
Weak reducibility
As good as
H T(H) C H, a1, a2 C ′T H , a1, a2
⇒
[BF11]
Strict reducibility
Definitely better
H C H, a1, a2 T(H) C ′T H , a1
Strong reducibility
As good as, possibly better
H C H, a1, a2 C ′T H , a1, a2 T(H) T(H′) C ′T H′ , a1
Weak reducibility
As good as
H T(H) C H, a1, a2 C ′T H , a1, a2
⇒