Cryptography in the Age of Quantum Computers Mark Zhandry MIT - - PowerPoint PPT Presentation

cryptography in the age of quantum computers
SMART_READER_LITE
LIVE PREVIEW

Cryptography in the Age of Quantum Computers Mark Zhandry MIT - - PowerPoint PPT Presentation

Cryptography in the Age of Quantum Computers Mark Zhandry MIT Based on joint works with: Dan Boneh, zgr Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner Typical Crypto Application m ! Solution: (Private Key) Encryption c ! c


slide-1
SLIDE 1

Cryptography in the Age

  • f Quantum Computers

Mark Zhandry – MIT

Based on joint works with: Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner

slide-2
SLIDE 2

Typical Crypto Application

m!

slide-3
SLIDE 3

Solution: (Private Key) Encryption

m = Dec( , c)! c = Enc( , m)! c! m! Major question: How is security defined? c!+!

slide-4
SLIDE 4

Definition 1: 1-time security

c0 = Enc( , m0)!

For any m0,m1:

c1 = Enc( , m1)!

≈!

Statistical security: statistical closeness

  • [Sha’49]: | | ≥ |m|!

Computational security: computational indistinguishability

  • Restrict adversaries running efficiently
  • Now possible to have | | << |m|!

Question: what if I encrypt a second message?

slide-5
SLIDE 5

Definition 2: CPA Security

Indistinguishability under chosen plaintext attack Challenger Adversary Def: CPA-Security efficient , | Pr[b’=b] – | < negl!

Random bit b, Random key

m0, m1! c = Enc( , mb)! c! b’!

slide-6
SLIDE 6

Definition 3: CCA Security

Indistinguishability under chosen ciphertext attack Challenger Adversary

Random bit b, Random key Empty table T!

m0, m1! c = Enc( , mb)! c! b’! Add c to T! c! m = Dec( , c)! m if cT! Def: CCA-Security efficient , | Pr[b’=b] – | < negl!

slide-7
SLIDE 7

Other Scenarios

Circular security: Side-channel attacks: Enc( , )! f( )! Takeaway: Models should give adversary as much power as possible!

slide-8
SLIDE 8

Quantum Computers

So far, assumed adversary obeys classical physics What about quantum physics? Quantum computing = using quantum physics to perform certain computations

  • Active research area
  • [Sho’94]: quantum computers can break lots of crypto
slide-9
SLIDE 9

Post-Quantum CCA Security

Challenger Adversary

Random bit b, Random key Empty table T!

m0, m1! c = Enc( , mb)! c! b’! Add c to T! c! m = Dec( , c)! m if cT! Def: CCA-Security efficient , | Pr[b’=b] – | < negl!

Interaction still classical

slide-10
SLIDE 10

Post-Quantum Security

All interaction is classical

Post-quantum = end-users are classical

slide-11
SLIDE 11

Full Quantum Security

Full quantum = end-users are quantum

Quantum messages

slide-12
SLIDE 12

Quantum Background

Quantum states: Measurement: Simulate classical ops in superposition:

m

= superposition of all messages = m|m⟩ (|m|2 = 1)!

m

m with probability |m|2!

m

F!

F(m)! = m|F(m)⟩

slide-13
SLIDE 13

Full Quantum CCA Security?

Challenger Adversary

Random bit b, Random key

b’! c! Def: CCA-Security efficient , | Pr[b’=b] – | < negl! c = Enc( , mb )! m0, m1! c! m! m = Dec( , c )!

slide-14
SLIDE 14

Are Full Quantum Attacks Plausible?

Objection: can always “classicalize” by sampling Reduce attack to post-quantum attack! Reasons to still use full quantum notions:

  • Classicalization is burden on hardware designer
  • What if adversary can bypass?
  • Classicalization amounts to a hardware assumption

m! m! c!

slide-15
SLIDE 15

This Work

[BDFLSZ’11,Zha’12a,Zha’13]: Quantum random oracle model [Zha’12b]: Pseudorandom functions [BZ’13a]: Message Authentication Codes [BZ’13b]: Digital signatures and encryption Theorem: Full-quantum security > Post-quantum security! Theorem (Informal): Full-quantum security can be obtained with “minimal” overhead w.r.t. post-quantum security!

slide-16
SLIDE 16

Efficient keyed functions that “look like” random functions

  • Fundamental building block in symmetric crypto

Example: Pseudorandom Functions

Func(X,Y)!

F!

Choose random bit b!

[GGM’84]

PRF! Classical security: b=1!

x!

Def: Security efficient , | Pr[b’=b] – | < negl! b’!

F(x)!

slide-17
SLIDE 17

Efficient keyed functions that “look like” random functions

  • Fundamental building block in symmetric crypto

Example: Pseudorandom Functions

Func(X,Y)!

F!

Choose random bit b!

[GGM’84]

PRF! Post-quantum security: b=1!

x!

Def: PQ-Security efficient , | Pr[b’=b] – | < negl! b’!

F(x)!

slide-18
SLIDE 18

Efficient keyed functions that “look like” random functions

  • Fundamental building block in symmetric crypto

Example: Pseudorandom Functions

Func(X,Y)!

F!

Choose random bit b!

[GGM’84]

PRF! Full-quantum security: b=1! Def: FQ-Security efficient , | Pr[b’=b] – | < negl! b’!

x! F(x)!

slide-19
SLIDE 19

How to build QPRFs?

Hope that existing PQ-secure PRFs are FQ secure Examples: GGM, NR, BPR Questions:

  • Do classical security analyses carry over?
  • If not, what new tools are needed?
slide-20
SLIDE 20

Pseudorandom Generators

s! y!

G!

G0(s)! G1(s)! S! Y!

≈!

Indistinguishable by efficient quantum adversaries

slide-21
SLIDE 21

The GGM Construction

x0 ⟶ k!

G

x1 ⟶

G G

x2 ⟶

G G G G

Fk(000)! Fk(001)! Fk(010)! Fk(011)! Fk(100)! Fk(101)! Fk(110)! Fk(111)!

S!

slide-22
SLIDE 22

The GGM Construction

x0 ⟶ k!

G

x1 ⟶

G G

x2 ⟶

G G G G

Fk(000)! Fk(001)! Fk(010)! Fk(011)! Fk(100)! Fk(101)! Fk(110)! Fk(111)!

S!

slide-23
SLIDE 23

The GGM Construction

x0 ⟶ k!

G

x1 ⟶

G G

x2 ⟶

G G G G

Fk(000)! Fk(001)! Fk(010)! Fk(011)! Fk(100)! Fk(101)! Fk(110)! Fk(111)!

S!

slide-24
SLIDE 24

The GGM Construction

x0 ⟶ k!

G

x1 ⟶

G G

x2 ⟶

G G G G

Fk(000)! Fk(001)! Fk(010)! Fk(011)! Fk(100)! Fk(101)! Fk(110)! Fk(111)!

S!

slide-25
SLIDE 25

The GGM Construction

x0 ⟶ k!

G

x1 ⟶

G G

x2 ⟶

G G G G

Fk(000)! Fk(001)! Fk(010)! Fk(011)! Fk(100)! Fk(101)! Fk(110)! Fk(111)!

S!

slide-26
SLIDE 26

The GGM Construction

x0 ⟶ k!

G

x1 ⟶

G G

x2 ⟶

G G G G

Fk(000)! Fk(001)! Fk(010)! Fk(011)! Fk(100)! Fk(101)! Fk(110)! Fk(111)!

S!

slide-27
SLIDE 27

Quantum Security Proof?

Idea: follow classical steps

  • Turn PRF distinguisher into PRG distinguisher

Step 1: Hybridize over levels of tree

slide-28
SLIDE 28

Hybridize Over Levels

Hybrid 0:

S!

slide-29
SLIDE 29

Hybridize Over Levels

Hybrid 1:

S! S!

slide-30
SLIDE 30

Hybridize Over Levels

Hybrid 2:

S! S! S! S!

slide-31
SLIDE 31

Hybridize Over Levels

Hybrid 3:

S! S! S! S! S! S! S! S!

slide-32
SLIDE 32

Hybridize Over Levels

Hybrid n:

S! S! S! S! S! S! S! S! S! S! S! S! S! S! S! S!

slide-33
SLIDE 33

Hybridize Over Levels

S! S! S! S! S! S! S! S!

S! S! S! S! S! S! S! S! S! S! S! S! S! S! S! S!

Distinguish PRF from Func(X,Y) with adv. ε Distinguish two adjacent hybrids with adv. ε/n! n polynomial acceptable loss

slide-34
SLIDE 34

Hybridize Over Levels

S! S! S! S! S! S! S! S! Y! Y! Y! Y! Y! Y! Y! Y!

Argument carries over to quantum setting unmodified

Distinguish PRF from Func(X,Y) with adv. ε Distinguish two adjacent hybrids with adv. ε/n! n polynomial acceptable loss

slide-35
SLIDE 35

Quantum Security Proof?

Idea: follow classical steps

  • Turn PRF distinguisher into PRG distinguisher

Step 1: Hybridize over levels of tree Step 2: Simulate hybrids using PRG/Random samples

slide-36
SLIDE 36

Simulating Hybrids

Y! Y! Y! Y! Y! Y! Y! Y! S! S! S! S! S! S! S! S! S! S! S! Y! Y! Y!

Hybrid distinguisher Distinguisher for several samples

slide-37
SLIDE 37

How It Was Done Classically

Adversary only queries polynomial number of points

Only need to fill active nodes Active node: value used to answer query need poly-many samples

slide-38
SLIDE 38

Quantum Simulation?

Adversary can query on all exponentially-many inputs

slide-39
SLIDE 39

Quantum Simulation?

Adversary can query on all exponentially-many inputs

Need exponentially many samples to simulate!

All nodes are active!

slide-40
SLIDE 40

Quantum Security Proof?

Idea: follow classical steps

  • Turn PRF distinguisher into PRG distinguisher

Step 1: Hybridize over levels of tree Step 2: Simulate hybrids using PRG/Random samples Step 3: Hybrid over samples

?

slide-41
SLIDE 41

Hybrid Over Samples

S! S! S! Y! Y! Y!

Distinguisher for t samples with advantage ε Distinguisher for 1 sample with advantage ε/t!

S! Y! Argument carries over to quantum setting unmodified

slide-42
SLIDE 42

Quantum Security Proof?

Idea: follow classical steps

  • Turn PRF distinguisher into PRG distinguisher

Step 1: Hybridize over levels of tree Step 2: Simulate hybrids using PRG/Random samples Step 3: Hybrid over samples

  • Exponential samples exponential security loss
  • Can only handle poly-many samples

?

slide-43
SLIDE 43

Quantum Security Proof?

Idea: follow classical steps

  • Turn PRF distinguisher into PRG distinguisher

Step 1: Hybridize over levels of tree Step 2: Simulate hybrids using PRG/Random samples Step 3: Hybrid over samples

  • Exponential samples exponential security loss
  • Can only handle poly-many samples

X

slide-44
SLIDE 44

A Distribution to Simulate

Distribution D on Y induces distribution on functions

For all xX: !yx ! D! !H(x) = yx

H:

H ! DX!

D D D D D D D D D D D D D D D D

Goal: simulate using poly-many samples

slide-45
SLIDE 45

Solution: Small-Range Distributions

D D …! D

y1! y2! yr! y4! y3!y1! y3!y2! y4!y4! y4!y1! y2!y2! y2!y2! y3!y3! y2! R ! Funcs(X, [r])! H(x) = yR(x)! H ! SRr

X(D)!

H:

slide-46
SLIDE 46

Small-Range Distributions

Theorem: SRr

X(D) is indistinguishable from DX by any q-

query quantum algorithm, except with advantage O(q3/r)! Notes:

  • Highly non-trivial
  • Distinguishing prob not negligible, but good enough
  • We get to choose r!
  • Random function R not efficiently constructible

Theorem: Can simulate R using k-wise independence

slide-47
SLIDE 47

Quantum GGM Proof

PRF distinguisher will distinguish two adjacent hybrids

S! S! S! S! S! S! S! S! Y! Y! Y! Y! Y! Y! Y! Y! Y! Y! Y! Y! S! S! S! S!

≈! ≈!

(SR distributions) (SR distributions) Poly-many samples

slide-48
SLIDE 48

Quantum Security Proof

Idea: follow classical steps

  • Turn PRF distinguisher into PRG distinguisher

Step 1: Hybridize over levels of tree Step 2: Approx. sim. hybrids using poly-many samples Step 3: Hybrid over samples Result: PRG distinguisher Impossible by assumption PRF distinguisher impossible

slide-49
SLIDE 49

Quantum Query Results

slide-50
SLIDE 50

Quantum Collision Finding

Y Y …! Y

y1! y2! yr! y4! y3!y1! y3!y2! y4!y4! y4!y1! y2!y2! y2!y2! y3!y3! y2! R ! Funcs(X, [r])! H(x) = yR(x)! H ! SRr

X(Y)!

Recall small-range distributions when D is uniform:

slide-51
SLIDE 51

Quantum Collision Finding

Another view: X! Y! [r]! R! S! H = SR Theorem: H is indistinguishable from random by any q- query quantum algorithm, except with advantage O(q3/r)! Corollary: If |Y|>>|X|2, impossible to find collision in H unless q≥Ω(r1/3)!

slide-52
SLIDE 52

Quantum Collision Finding

What about truly random functions with |Y| << |X|2 ? Previous r1/3 lower bounds known for different settings

  • E.g. k-to-1 functions [AS’01]
  • All prior settings required |Range| ≥ |Domain|!
  • Our works for all domain/range sizes

Bound is tight: [BHT’97] q=O(r1/3)! Corollary: If |Y|>>|X|2, impossible to find collision in H unless q≥O(r1/3)! Theorem: q≥Ω(r1/3) quantum queries are required to find collisions in a random function R:X"[r]

slide-53
SLIDE 53

Quantum Oracle Interrogation

Using q queries, determine function at k>q points Func(X,Y)!

F!

x! F(x)!

( x1, F(x1) ), ( x2, F(x2) ), … (xk, F(xk) )!

Important for MAC, signature security

slide-54
SLIDE 54

Quantum Oracle Interrogation

Classically: hard Adv = 1/|Y|k-q!

  • Large outputs: Adv = negl even for k=q+1!
  • Small outputs: Adv = negl for k = c q!

! Quantum: not so fast Also true for small ranges: Question: What about large range sizes? Theorem [vD’98]: For F:X"{0,1}, q quantum queries k = 1.9q points w.h.p ! Theorem: For F:X"{0,1}2, q quantum queries k = 1.3q points w.h.p !

slide-55
SLIDE 55

Quantum Oracle Interrogation

Theorem: For F:X"{0,1}n, q quantum queries Pr[k=q+1 points] ≤ (q+1)/2n! Highly'non*trivial' New quantum impossibility tool: The Rank Method Therefore:

  • Small range: Pr[q+1 points] large
  • Large range: Pr[q+1 points] small
slide-56
SLIDE 56

Quantum Polynomial Interpolation

Using q queries to a polynomial, determine polynomial Poly(d)!

F!

x! F(x)! F!

Classical: q=d+1 " easy Quantum: q=d/2 " hard [KK’10] q<d+1 " hard

Theorem: (quantum) q=d " easy! Theorem: (quantum) q=(d+1)/2, “large” d " hard!

slide-57
SLIDE 57

Conclusion

Studying full quantum security notions important

  • Quantum computers seem inevitable
  • Unclear what attacks are possible
  • Strive for strongest definitions
  • Bonus: quantum query complexity results

Future work: more advanced primitives

  • Identity-based encryption
  • Functional encryption
  • Fully homomorphic encryption
  • Other quantum query questions
slide-58
SLIDE 58

?