Cryptographic Reductions: Classification and Applications to Ideal - - PowerPoint PPT Presentation

cryptographic reductions classification and applications
SMART_READER_LITE
LIVE PREVIEW

Cryptographic Reductions: Classification and Applications to Ideal - - PowerPoint PPT Presentation

Cryptographic Reductions: Classification and Applications to Ideal Models Paul Baecher Cryptographic Reductions: Classification and Applications to Ideal Models Paul Baecher Three Ways to Argue for Cryptographic Security Cryptanalysis


slide-1
SLIDE 1

Cryptographic Reductions: Classification and Applications to Ideal Models

Paul Baecher

slide-2
SLIDE 2

Cryptographic Reductions: Classification and Applications to Ideal Models

Paul Baecher

slide-3
SLIDE 3

Three Ways to Argue for Cryptographic Security

Cryptanalysis

Empirically evaluate real-world primitives

Information-theoretic arguments

Disregard any resource limitations

Provable security from assumptions

Efficient attackers only

1

slide-4
SLIDE 4

Three Ways to Argue for Cryptographic Security

Provable security from assumptions

Efficient attackers only

1

slide-5
SLIDE 5

Provable Security Follows a Common Structure

Construction “To encrypt with construction , take the message and. . . ”

2

slide-6
SLIDE 6

Provable Security Follows a Common Structure

Construction “To encrypt with construction , take the message and. . . ” Security proof Thm: If assumption , then construction secure.

2

slide-7
SLIDE 7

Provable Security Follows a Common Structure

Construction “To encrypt with construction , take the message and. . . ” Security proof Thm: If assumption , then construction secure in the ideal model .

2

slide-8
SLIDE 8

Provable Security Follows a Common Structure

Construction “To encrypt with construction , take the message and. . . ” Security proof Thm: If assumption , then construction secure in the ideal model . Idealized primitive

2

slide-9
SLIDE 9

Ideal Models Provide the “Best Possible” Primitive

Ideal model Random oracle Ideal cipher Real life MD5, SHA3, . . . DES, AES, . . .

3

slide-10
SLIDE 10

Ideal Models Provide the “Best Possible” Primitive

Ideal model Random oracle Ideal cipher Real life MD5, SHA3, . . . DES, AES, . . . Pick a random function from the set

  • f all functions from k to n bits.

3

slide-11
SLIDE 11

Comparing Two Constructions with Ideal-Model Proofs is Difficult

If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model.

4

slide-12
SLIDE 12

Comparing Two Constructions with Ideal-Model Proofs is Difficult

If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model. Idealized primitive

4

slide-13
SLIDE 13

Comparing Two Constructions with Ideal-Model Proofs is Difficult

If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model. Idealized primitive constr1

4

slide-14
SLIDE 14

Comparing Two Constructions with Ideal-Model Proofs is Difficult

If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model. Idealized primitive constr1 constr2

4

slide-15
SLIDE 15

Comparing Two Constructions with Ideal-Model Proofs is Difficult

If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model. Idealized primitive constr1 constr2 AES

4

slide-16
SLIDE 16

Comparing Two Constructions with Ideal-Model Proofs is Difficult

If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model. Idealized primitive constr1 constr2 DES

4

slide-17
SLIDE 17

Comparing Two Constructions with Ideal-Model Proofs is Difficult

If assump, then constr1 secure in the ideal model. If assump, then constr2 secure in the ideal model. Idealized primitive constr1 constr2 DES

?

4

slide-18
SLIDE 18

Comparisons Might Still Be Possible Without Fully Understanding Ideal Primitives

Can we compare constructions relative to each other? How do popular constructions compare?

5

slide-19
SLIDE 19

Oracle reducibility enables sound comparisons

  • f cryptographic constructions whose proofs

are in ideal models.

6

slide-20
SLIDE 20

Outline

[BF11,BFFS13]

Oracle reducibility

A versatile comparison paradigm

Ideal-cipher comparisons

Blockcipher-based compression functions

Random-oracle comparisons

ElGamal-type encryption schemes

7

slide-21
SLIDE 21

Outline

[BF11,BFFS13]

Oracle reducibility

A versatile comparison paradigm

Ideal-cipher comparisons

Blockcipher-based compression functions

Random-oracle comparisons

ElGamal-type encryption schemes

7

slide-22
SLIDE 22

What Makes constr1 Secure Also Makes constr2 Secure

Idealized primitive constr1 constr2

8

slide-23
SLIDE 23

What Makes constr1 Secure Also Makes constr2 Secure

Idealized primitive constr1 constr2 E

8

slide-24
SLIDE 24

What Makes constr1 Secure Can be Adjusted to Make constr2 Secure

Idealized primitive constr1 constr2

9

slide-25
SLIDE 25

What Makes constr1 Secure Can be Adjusted to Make constr2 Secure

Idealized primitive constr1 constr2 E

9

slide-26
SLIDE 26

What Makes constr1 Secure Can be Adjusted to Make constr2 Secure

Idealized primitive constr1 constr2 E T(E)

9

slide-27
SLIDE 27

Formally Defining Oracle Reducibility

[BF11,BFFS13]

Direct reducibility

Any oracle O that makes C O

1

secure also makes C O

2 secure

Free reducibility

There exists T s.t. any oracle that makes C O

1 secure also

makes C T O

2

secure

10

slide-28
SLIDE 28

Formally Defining Oracle Reducibility

[BF11,BFFS13]

Direct reducibility

Any oracle O that makes C O

1

secure also makes C O

2 secure

Free reducibility

There exists T s.t. any oracle that makes C O

1 secure also

makes C T O

2

secure

10

slide-29
SLIDE 29

Outline

Oracle reducibility

A versatile comparison paradigm [BFFS13]

Ideal-cipher comparisons

Blockcipher-based compression functions

Random-oracle comparisons

ElGamal-type encryption schemes

11

slide-30
SLIDE 30

Compression Functions Securely Shrink Their Input

E M K E(K, M) ⊕ M

Building block for hash functions

2n-to-n compression

Built from a blockcipher

Design from [PGV93]

Collision resistant if E ideal

Proof due to [BRSS10]

12

slide-31
SLIDE 31

PGV Functions

1 2 3 4 5 6 7 8 9 10 11 12 13

slide-32
SLIDE 32

PGV Functions Fall Into Two Groups

[BFFS13]

1 4 2 3 5 8 6 7 9 12 10 11

direct reducibility within direct reducibility within

13

slide-33
SLIDE 33

PGV Functions Fall Into Two Groups

[BFFS13]

1 4 2 3 5 8 6 7 9 12 10 11

separation (direct)

  • reducibility

(free)

13

slide-34
SLIDE 34

PGV Functions Fall Into Two Groups

[BFFS13]

1 4 2 3 5 8 6 7 9 12 10 11

separation (direct)

  • reducibility

(free)

f r e e r e d u c t i

  • n

13

slide-35
SLIDE 35

Free Reduction From PGV2 to PGV1

1

K M

2

K M

There exists T s.t. for any E: PGVE

1 secure ⇒ PGVT E 2

secure

E 14

slide-36
SLIDE 36

Free Reduction From PGV2 to PGV1

1

K M

2

K M

There exists T s.t. for any E: PGVE

1 secure ⇒ PGVT E 2

secure

T E(K, M) := E(K, M) ⊕ K

E 14

slide-37
SLIDE 37

Free Reduction From PGV2 to PGV1

1

K M

2

K M

There exists T s.t. for any E: PGVE

1 secure ⇒ PGVT E 2

secure

T E(K, M) := E(K, M) ⊕ K

E

E

M K

14

slide-38
SLIDE 38

Free Reduction From PGV2 to PGV1

1

K M

2

K M

There exists T s.t. for any E: PGVE

1 secure ⇒ PGVT E 2

secure

T E(K, M) := E(K, M) ⊕ K

E

T M K

14

slide-39
SLIDE 39

Free Reduction From PGV2 to PGV1

1

K M

2

K M

There exists T s.t. for any E: PGVE

1 secure ⇒ PGVT E 2

secure

T E(K, M) := E(K, M) ⊕ K

E

T M K

E

T M K

14

slide-40
SLIDE 40

PGV Functions Fall Into Two Groups

[BFFS13]

1 4 2 3 5 8 6 7 9 12 10 11

separation (direct)

  • reducibility

(free)

15

slide-41
SLIDE 41

Groups are Incomparable, No Clear Winner

No direct reducibility from #1 to #2

Or vice versa

Free reducibility “switches” group

But no simultaneous security for both

16

slide-42
SLIDE 42

Groups are Incomparable, No Clear Winner

No direct reducibility from #1 to #2

Or vice versa

Free reducibility “switches” group

But no simultaneous security for both E s.t.

  • #1 secure

#2 ???

16

slide-43
SLIDE 43

Groups are Incomparable, No Clear Winner

No direct reducibility from #1 to #2

Or vice versa

Free reducibility “switches” group

But no simultaneous security for both E s.t.

  • #1 secure

#2 ??? T(E) s.t.

  • #1 ???

#2 secure T

16

slide-44
SLIDE 44

Groups are Incomparable, No Clear Winner

No direct reducibility from #1 to #2

Or vice versa

Free reducibility “switches” group

But no simultaneous security for both T(T(E)) s.t.

  • #1 secure

#2 ??? T(E) s.t.

  • #1 ???

#2 secure T

16

slide-45
SLIDE 45

Outline

Oracle reducibility

A versatile comparison paradigm

Ideal-cipher comparisons

Blockcipher-based compression functions [BF11]

Random-oracle comparisons

ElGamal-type encryption schemes

17

slide-46
SLIDE 46

Cryptographic Constructions Often Undergo Iterative Improvements

Feasibility result

Not practical, but it works

Practical result

Simpler, tighter, faster, . . .

Further improvements

Milder or fewer assumptions

18

slide-47
SLIDE 47

Cryptographic Constructions Often Undergo Iterative Improvements

Further improvements

Milder or fewer assumptions

18

slide-48
SLIDE 48

An “Improved” Construction May be Worse in Other Ways

If a1 and a2 hold, then C is secure in ideal model. If a1 holds, then C ′ is secure in ideal model.

?

<

19

slide-49
SLIDE 49

An “Improved” Construction May be Worse in Other Ways

If a1 and a2 hold, then C is secure in ideal model. If a1 holds, then C ′ is secure in ideal model.

?

<

Idealized primitive

19

slide-50
SLIDE 50

An “Improved” Construction May be Worse in Other Ways

If a1 and a2 hold, then C is secure in ideal model. If a1 holds, then C ′ is secure in ideal model.

?

<

Idealized primitive C, a1, a2

19

slide-51
SLIDE 51

An “Improved” Construction May be Worse in Other Ways

If a1 and a2 hold, then C is secure in ideal model. If a1 holds, then C ′ is secure in ideal model.

?

<

Idealized primitive C, a1, a2 C ′, a1

19

slide-52
SLIDE 52

An “Improved” Construction May be Worse in Other Ways

If a1 and a2 hold, then C is secure in ideal model. If a1 holds, then C ′ is secure in ideal model.

?

<

Idealized primitive C, a1, a2 C ′, a1 H

19

slide-53
SLIDE 53

An “Improved” Construction May be Worse in Other Ways

If a1 and a2 hold, then C is secure in ideal model. If a1 holds, then C ′ is secure in ideal model.

?

<

Idealized primitive C, a1, a2 C ′, a1 T(H)

19

slide-54
SLIDE 54

For Assumptions a1, a2 Three Notions Emerge

[BF11]

Strict reducibility

Definitely better

H C H, a1, a2

20

slide-55
SLIDE 55

For Assumptions a1, a2 Three Notions Emerge

[BF11]

Strict reducibility

Definitely better

H C H, a1, a2 T(H) C ′T H , a1

20

slide-56
SLIDE 56

For Assumptions a1, a2 Three Notions Emerge

[BF11]

Strict reducibility

Definitely better

H C H, a1, a2 T(H) C ′T H , a1

Weak reducibility

As good as

H T(H) C H, a1, a2 C ′T H , a1, a2

20

slide-57
SLIDE 57

For Assumptions a1, a2 Three Notions Emerge

[BF11]

Strict reducibility

Definitely better

H C H, a1, a2 T(H) C ′T H , a1

Strong reducibility

As good as, possibly better

Weak reducibility

As good as

H T(H) C H, a1, a2 C ′T H , a1, a2

20

slide-58
SLIDE 58

For Assumptions a1, a2 Three Notions Emerge

[BF11]

Strict reducibility

Definitely better

H C H, a1, a2 T(H) C ′T H , a1

Strong reducibility

As good as, possibly better

Weak reducibility

As good as

H T(H) C H, a1, a2 C ′T H , a1, a2

  • 20
slide-59
SLIDE 59

An Example Where the Improved Construction is Indeed Better

[BF11]

Hashed ElGamal encryption scheme

Improved scheme from [CKS09]

Milder assumption

[Strong] Diffie–Hellmann assumption

21

slide-60
SLIDE 60

An Example Where the Improved Construction is Indeed Better

[BF11]

Hashed ElGamal encryption scheme

Improved scheme from [CKS09]

Milder assumption

[Strong] Diffie–Hellmann assumption

Strong reducibility

Possibly better, but not worse

21

slide-61
SLIDE 61

22

slide-62
SLIDE 62

Review and Conclusions

Comparison technique

Relative security regarding primitives

23

slide-63
SLIDE 63

Review and Conclusions

Comparison technique

Relative security regarding primitives

Various compression-function designs

Two groups, incomparable, superior one∗

23

slide-64
SLIDE 64

Review and Conclusions

Comparison technique

Relative security regarding primitives

Various compression-function designs

Two groups, incomparable, superior one∗

E E A3 A1 B1 A2 B2

23

slide-65
SLIDE 65

Review and Conclusions

Comparison technique

Relative security regarding primitives

Various compression-function designs

Two groups, incomparable, superior one∗

E E A3 A1 B1 A2 B2

ElGamal-type encryption schemes

Construction in [CKS09] is possibly better

23

slide-66
SLIDE 66

Review and Conclusions

Comparison technique

Relative security regarding primitives

Various compression-function designs

Two groups, incomparable, superior one∗

E E A3 A1 B1 A2 B2

ElGamal-type encryption schemes

Construction in [CKS09] is possibly better

Results enable sound comparison

Guidance for implementors facing choices

23

slide-67
SLIDE 67

List of Publications

[BBF13] Notions of Black-Box Reductions, Revisited. Paul Baecher, Christina Brzuska, Marc Fischlin. ASIACRYPT 2013. [BBM13] Reset Indifferentiability and its Consequences. Paul Baecher, Christina Brzuska, Arno Mittelbach. ASIACRYPT 2013. [BFFS13] Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam. EUROCRYPT 2013. [BF11] Random Oracle Reducibility. Paul Baecher, Marc Fis-

  • chlin. CRYPTO 2011.

[BFS11] Expedient Non-Malleability Notions for Hash Func-

  • tions. Paul Baecher, Marc Fischlin, Dominique Schr¨
  • der. CT-

RSA 2011. [BBFM11] Breaking reCAPTCHA: A Holistic Approach via Shape Recognition. Paul Baecher, Niklas B¨ uscher, Marc Fis- chlin, Benjamin Milde. IFIP SEC 2011. [BFGLLS10] CAPTCHAs: The Good, the Bad, and the Ugly. Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Luetzow, Dominique Schr¨

  • der. LNI 2010.

[BKB09] PUF-Based Authentication Protocols – Revisited. Heike Busch, Stefan Katzenbeisser, Paul Baecher. WISA 2009. [ABFGH09] Massively-Parallel Simulation of Biochemical Sys- tems. Jens Ackermann, Paul Baecher, Thorsten Franzel, Michael Goesele, Kay Hamacher. LNI 2009. [BKHDF06] The Nepenthes Platform: An Efficient Approach to Collect Malware. Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling. RAID 2006. 24

slide-68
SLIDE 68

List of Publications

[BBF13] Notions of Black-Box Reductions, Revisited. Paul Baecher, Christina Brzuska, Marc Fischlin. ASIACRYPT 2013. [BBM13] Reset Indifferentiability and its Consequences. Paul Baecher, Christina Brzuska, Arno Mittelbach. ASIACRYPT 2013. [BFFS13] Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam. EUROCRYPT 2013. [BF11] Random Oracle Reducibility. Paul Baecher, Marc Fis-

  • chlin. CRYPTO 2011.

[BFS11] Expedient Non-Malleability Notions for Hash Func-

  • tions. Paul Baecher, Marc Fischlin, Dominique Schr¨
  • der. CT-

RSA 2011. [BBFM11] Breaking reCAPTCHA: A Holistic Approach via Shape Recognition. Paul Baecher, Niklas B¨ uscher, Marc Fis- chlin, Benjamin Milde. IFIP SEC 2011. [BFGLLS10] CAPTCHAs: The Good, the Bad, and the Ugly. Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Luetzow, Dominique Schr¨

  • der. LNI 2010.

[BKB09] PUF-Based Authentication Protocols – Revisited. Heike Busch, Stefan Katzenbeisser, Paul Baecher. WISA 2009. [ABFGH09] Massively-Parallel Simulation of Biochemical Sys- tems. Jens Ackermann, Paul Baecher, Thorsten Franzel, Michael Goesele, Kay Hamacher. LNI 2009. [BKHDF06] The Nepenthes Platform: An Efficient Approach to Collect Malware. Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling. RAID 2006. 24

slide-69
SLIDE 69

List of Publications

[BBF13] Notions of Black-Box Reductions, Revisited. Paul Baecher, Christina Brzuska, Marc Fischlin. ASIACRYPT 2013. [BBM13] Reset Indifferentiability and its Consequences. Paul Baecher, Christina Brzuska, Arno Mittelbach. ASIACRYPT 2013. [BFFS13] Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam. EUROCRYPT 2013. [BF11] Random Oracle Reducibility. Paul Baecher, Marc Fis-

  • chlin. CRYPTO 2011.

[BFS11] Expedient Non-Malleability Notions for Hash Func-

  • tions. Paul Baecher, Marc Fischlin, Dominique Schr¨
  • der. CT-

RSA 2011. [BBFM11] Breaking reCAPTCHA: A Holistic Approach via Shape Recognition. Paul Baecher, Niklas B¨ uscher, Marc Fis- chlin, Benjamin Milde. IFIP SEC 2011. [BFGLLS10] CAPTCHAs: The Good, the Bad, and the Ugly. Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Luetzow, Dominique Schr¨

  • der. LNI 2010.

[BKB09] PUF-Based Authentication Protocols – Revisited. Heike Busch, Stefan Katzenbeisser, Paul Baecher. WISA 2009. [ABFGH09] Massively-Parallel Simulation of Biochemical Sys- tems. Jens Ackermann, Paul Baecher, Thorsten Franzel, Michael Goesele, Kay Hamacher. LNI 2009. [BKHDF06] The Nepenthes Platform: An Efficient Approach to Collect Malware. Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling. RAID 2006. 24

slide-70
SLIDE 70
slide-71
SLIDE 71

Thank you!

slide-72
SLIDE 72

26

slide-73
SLIDE 73

For Assumptions a1, a2 Three Notions Emerge

[BF11]

Strict reducibility

Definitely better

H C H, a1, a2 T(H) C ′T H , a1

Strong reducibility

As good as, possibly better

Weak reducibility

As good as

H T(H) C H, a1, a2 C ′T H , a1, a2

  • 27
slide-74
SLIDE 74

For Assumptions a1, a2 Three Notions Emerge

[BF11]

Strict reducibility

Definitely better

H C H, a1, a2 T(H) C ′T H , a1

Strong reducibility

As good as, possibly better

H C H, a1, a2 C ′T H , a1, a2 T(H)

Weak reducibility

As good as

H T(H) C H, a1, a2 C ′T H , a1, a2

  • 27
slide-75
SLIDE 75

For Assumptions a1, a2 Three Notions Emerge

[BF11]

Strict reducibility

Definitely better

H C H, a1, a2 T(H) C ′T H , a1

Strong reducibility

As good as, possibly better

H C H, a1, a2 C ′T H , a1, a2 T(H) T(H′) C ′T H′ , a1

Weak reducibility

As good as

H T(H) C H, a1, a2 C ′T H , a1, a2

  • 27