Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) - - PowerPoint PPT Presentation

elliptic curve hash and sign
SMART_READER_LITE
LIVE PREVIEW

Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) - - PowerPoint PPT Presentation

Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep 22-24 2008 Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 1 / 43 Outline ECOH 1 Background


slide-1
SLIDE 1

Elliptic Curve Hash (and Sign)

ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown

Certicom Research

ECC 2008, Utrecht, Sep 22-24 2008

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 1 / 43

slide-2
SLIDE 2

Outline

1

ECOH Background Evolution Implementation CFV

2

One-Up Problem for ECDSA

3

Conclusion

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 2 / 43

slide-3
SLIDE 3

ECOH

Elliptic Curve Only Hash

Definition (High level)

Pad message block Mi into a point Pi. T =

  • i

Pi (1) Do the same for T. Truncate to get hash H.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 3 / 43

slide-4
SLIDE 4

ECOH Background

Motivation: SHA-3

Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 269 collision algorithm for SHA-1 Wang, Yao, Yao: 263 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call “AHS”

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

slide-5
SLIDE 5

ECOH Background

Motivation: SHA-3

Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 269 collision algorithm for SHA-1 Wang, Yao, Yao: 263 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call “AHS”

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

slide-6
SLIDE 6

ECOH Background

Motivation: SHA-3

Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 269 collision algorithm for SHA-1 Wang, Yao, Yao: 263 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call “AHS”

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

slide-7
SLIDE 7

ECOH Background

Motivation: SHA-3

Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 269 collision algorithm for SHA-1 Wang, Yao, Yao: 263 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call “AHS”

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

slide-8
SLIDE 8

ECOH Background

Motivation: SHA-3

Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 269 collision algorithm for SHA-1 Wang, Yao, Yao: 263 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call “AHS”

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

slide-9
SLIDE 9

ECOH Background

Motivation: SHA-3

Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 269 collision algorithm for SHA-1 Wang, Yao, Yao: 263 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call “AHS”

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

slide-10
SLIDE 10

ECOH Background

Motivation: SHA-3

Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 269 collision algorithm for SHA-1 Wang, Yao, Yao: 263 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call “AHS”

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

slide-11
SLIDE 11

ECOH Background

Discrete Log Hash: CHP

Definition (Chaum, van Heijst, Pfitzmann (1991))

H(m, n) = mP + nQ

Theorem

A collision in H gives logP(Q).

Proof.

If H(a, b) = H(c, d), then aP + bQ = cP + dQ (2) and solving logP(Q) = a−c

d−b mod n.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 5 / 43

slide-12
SLIDE 12

ECOH Background

Discrete Log Hash: CHP

Definition (Chaum, van Heijst, Pfitzmann (1991))

H(m, n) = mP + nQ

Theorem

A collision in H gives logP(Q).

Proof.

If H(a, b) = H(c, d), then aP + bQ = cP + dQ (2) and solving logP(Q) = a−c

d−b mod n.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 5 / 43

slide-13
SLIDE 13

ECOH Background

Discrete Log Hash: CHP

Definition (Chaum, van Heijst, Pfitzmann (1991))

H(m, n) = mP + nQ

Theorem

A collision in H gives logP(Q).

Proof.

If H(a, b) = H(c, d), then aP + bQ = cP + dQ (2) and solving logP(Q) = a−c

d−b mod n.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 5 / 43

slide-14
SLIDE 14

ECOH Background

CHP Pros and Cons

Provably secure assuming ECDLP hard. 3m/2 EC adds per 2m bits. Compression factor 2, must be iterated.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 6 / 43

slide-15
SLIDE 15

ECOH Background

Discrete Log Hash 2: MuHASH

Definition (Bellare and Micciancio (1997))

Let Pi = F(iMi), where F is a “random oracle”. Let H =

  • i

Pi (3)

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 7 / 43

slide-16
SLIDE 16

ECOH Background

MuHASH Advantages

One EC add per m bits.

◮ E.g. 384 times faster than CHP.

Parallelizable. Incremental:

◮ H′ = H − Pi + P′

i

Provably secure, assuming ECDLP hard and F random oracle.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 8 / 43

slide-17
SLIDE 17

ECOH Background

MuHASH Disadvantages

Assumes F is a random oracle. Insecure if F insecure.

◮ Must already have a collision-resistant F. ◮ SHA-1? SHA-2? SHA-3? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 9 / 43

slide-18
SLIDE 18

ECOH Evolution

ECOH’s Design Rationale

Leverage from MuHASH:

◮ Speed. ◮ Parallelizability. ◮ Incrementality.

Avoid reliance on pre-existing F.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 10 / 43

slide-19
SLIDE 19

ECOH Evolution

EECH

Replace F by fixed key block cipher: H =

  • i

F(iMi) (4) Encrypted Elliptic Curve Hash (EECH) born. No collisions in F, guaranteed. Model F by ideal cipher. Rehash Bellare and Micciancio’s security proof.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 11 / 43

slide-20
SLIDE 20

ECOH Evolution

EECH

Replace F by fixed key block cipher: H =

  • i

F(iMi) (4) Encrypted Elliptic Curve Hash (EECH) born. No collisions in F, guaranteed. Model F by ideal cipher. Rehash Bellare and Micciancio’s security proof.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 11 / 43

slide-21
SLIDE 21

ECOH Evolution

EECH

Replace F by fixed key block cipher: H =

  • i

F(iMi) (4) Encrypted Elliptic Curve Hash (EECH) born. No collisions in F, guaranteed. Model F by ideal cipher. Rehash Bellare and Micciancio’s security proof.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 11 / 43

slide-22
SLIDE 22

ECOH Evolution

EECH

Replace F by fixed key block cipher: H =

  • i

F(iMi) (4) Encrypted Elliptic Curve Hash (EECH) born. No collisions in F, guaranteed. Model F by ideal cipher. Rehash Bellare and Micciancio’s security proof.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 11 / 43

slide-23
SLIDE 23

ECOH Evolution

EECH

Replace F by fixed key block cipher: H =

  • i

F(iMi) (4) Encrypted Elliptic Curve Hash (EECH) born. No collisions in F, guaranteed. Model F by ideal cipher. Rehash Bellare and Micciancio’s security proof.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 11 / 43

slide-24
SLIDE 24

ECOH Evolution

Oops: Not 1-way

Unlike MuHASH, F now invertible. If adversary knows M1 and M3 but not M2, then 2M2 = F −1(H(M1, M2, M3) − F(1M1) − F(3M3)) (5)

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 12 / 43

slide-25
SLIDE 25

ECOH Evolution

Oops: Not 1-way

Unlike MuHASH, F now invertible. If adversary knows M1 and M3 but not M2, then 2M2 = F −1(H(M1, M2, M3) − F(1M1) − F(3M3)) (5)

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 12 / 43

slide-26
SLIDE 26

ECOH Evolution

Fix it up.

Post-process with one-way function?

◮ Scalar multiply? ◮ EECH again? ◮ Pairing? ◮ Checksum in extra block?

Seems to thwart block inversion attack. Interferes with incrementality.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 13 / 43

slide-27
SLIDE 27

ECOH Evolution

Ouch: Not collision resistant!

Let 2D = F −1(F(1A) + F(2B) − F(1C)) (6) Probability of index 2 appearing depends its bit length. Try that many C values, until it works. Then F(1A) + F(2B) = F(1C) + F(2D), (7) i.e. a collision H(A, B) = H(C, D). Second preimage attack!

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 14 / 43

slide-28
SLIDE 28

ECOH Evolution

Fix it again.

Pad Mi, before applying F. If F random enough, inverting will not give requisite padding.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 15 / 43

slide-29
SLIDE 29

ECOH Evolution

ECOH

Now that EECH is all fixed ... just set F to the identity function. Elliptic Curve Only Hash.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 16 / 43

slide-30
SLIDE 30

ECOH Evolution

ECOH

Now that EECH is all fixed ... just set F to the identity function. Elliptic Curve Only Hash.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 16 / 43

slide-31
SLIDE 31

ECOH Evolution

ECOH

Now that EECH is all fixed ... just set F to the identity function. Elliptic Curve Only Hash.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 16 / 43

slide-32
SLIDE 32

ECOH Evolution

ECOH vs. EECH

Purity of ECOH. No dependence on ideal cipher model. No performance cost of enciphering.

◮ ECOH is already slow enough.

Is it more crazy to:

◮ encrypt with a fixed key, ◮ do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

slide-33
SLIDE 33

ECOH Evolution

ECOH vs. EECH

Purity of ECOH. No dependence on ideal cipher model. No performance cost of enciphering.

◮ ECOH is already slow enough.

Is it more crazy to:

◮ encrypt with a fixed key, ◮ do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

slide-34
SLIDE 34

ECOH Evolution

ECOH vs. EECH

Purity of ECOH. No dependence on ideal cipher model. No performance cost of enciphering.

◮ ECOH is already slow enough.

Is it more crazy to:

◮ encrypt with a fixed key, ◮ do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

slide-35
SLIDE 35

ECOH Evolution

ECOH vs. EECH

Purity of ECOH. No dependence on ideal cipher model. No performance cost of enciphering.

◮ ECOH is already slow enough.

Is it more crazy to:

◮ encrypt with a fixed key, ◮ do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

slide-36
SLIDE 36

ECOH Evolution

ECOH vs. EECH

Purity of ECOH. No dependence on ideal cipher model. No performance cost of enciphering.

◮ ECOH is already slow enough.

Is it more crazy to:

◮ encrypt with a fixed key, ◮ do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

slide-37
SLIDE 37

ECOH Evolution

ECOH vs. EECH

Purity of ECOH. No dependence on ideal cipher model. No performance cost of enciphering.

◮ ECOH is already slow enough.

Is it more crazy to:

◮ encrypt with a fixed key, ◮ do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

slide-38
SLIDE 38

ECOH Evolution

ECOH vs. EECH

Purity of ECOH. No dependence on ideal cipher model. No performance cost of enciphering.

◮ ECOH is already slow enough.

Is it more crazy to:

◮ encrypt with a fixed key, ◮ do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

slide-39
SLIDE 39

ECOH Evolution

ECOH Security Proof?

Generic group model!

◮ Detailed version in progress.

Big deal ...

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 18 / 43

slide-40
SLIDE 40

ECOH Evolution

ECOH Security Attack!?!

Semaev summation polynomial fn(X1, . . . , Xn) = 0 if and only if there exist Yi with (X1, Y1) + · · · + (Xn, Yn) = 0. Degree in each variable 2n−2

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 19 / 43

slide-41
SLIDE 41

ECOH Evolution

Second Preimage Attack on ECOH

Given X3 and X4. Find X1 and X2, such that (X1, Y1) + (X2, Y2) = (X3, Y3) + (X4, Y4) which implies f4(X1, X2, X3, X4) = 0 Total degree 2(24−2) = 4. Xi = ciZi + di, where Zi has low degree. g(Z1, Z2) = 0

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 20 / 43

slide-42
SLIDE 42

ECOH Evolution

Security Proof??????

Semaev: low degree solutions to Summation polynomials can be used to solve ECDLP. Contrapositive: if ECDLP hard, then hard to find low degree solutions. But: ECOH degrees much higher than Semaev degrees.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 21 / 43

slide-43
SLIDE 43

ECOH Evolution

Security Proof??????

Semaev: low degree solutions to Summation polynomials can be used to solve ECDLP. Contrapositive: if ECDLP hard, then hard to find low degree solutions. But: ECOH degrees much higher than Semaev degrees.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 21 / 43

slide-44
SLIDE 44

ECOH Evolution

Security Proof??????

Semaev: low degree solutions to Summation polynomials can be used to solve ECDLP. Contrapositive: if ECDLP hard, then hard to find low degree solutions. But: ECOH degrees much higher than Semaev degrees.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 21 / 43

slide-45
SLIDE 45

ECOH Implementation

Curve Choice

NIST recommended curves:

◮ B-283, ◮ B-409, ◮ B-571. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 22 / 43

slide-46
SLIDE 46

ECOH Implementation

Why Binary?

y solved by quadratic equation involving x containing padded message block. Quadratic equations faster in binary fields than in prime fields

◮ Use linear half-trace function (not square root) ◮ Use look up tables.

Bonus: Intel announced AVX will include binary polynomial multiplier.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 23 / 43

slide-47
SLIDE 47

ECOH Implementation

Why Binary?

y solved by quadratic equation involving x containing padded message block. Quadratic equations faster in binary fields than in prime fields

◮ Use linear half-trace function (not square root) ◮ Use look up tables.

Bonus: Intel announced AVX will include binary polynomial multiplier.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 23 / 43

slide-48
SLIDE 48

ECOH Implementation

Why Binary?

y solved by quadratic equation involving x containing padded message block. Quadratic equations faster in binary fields than in prime fields

◮ Use linear half-trace function (not square root) ◮ Use look up tables.

Bonus: Intel announced AVX will include binary polynomial multiplier.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 23 / 43

slide-49
SLIDE 49

ECOH Implementation

Why Binary?

y solved by quadratic equation involving x containing padded message block. Quadratic equations faster in binary fields than in prime fields

◮ Use linear half-trace function (not square root) ◮ Use look up tables.

Bonus: Intel announced AVX will include binary polynomial multiplier.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 23 / 43

slide-50
SLIDE 50

ECOH Implementation

Why Binary?

y solved by quadratic equation involving x containing padded message block. Quadratic equations faster in binary fields than in prime fields

◮ Use linear half-trace function (not square root) ◮ Use look up tables.

Bonus: Intel announced AVX will include binary polynomial multiplier.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 23 / 43

slide-51
SLIDE 51

ECOH Implementation

Reference implementation

Coded by Matt J. Campagna (who also helped with specification

  • f ECOH details)

Features:

◮ Bit lookups for trace function ◮ Table lookups for squaring and half-trace ◮ Basic shift-and-xor polynomial multiply ◮ Affine coordinates

Rate on a desktop: 0.14 MB/s

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 24 / 43

slide-52
SLIDE 52

ECOH Implementation

Possible optimizations

Other coordinates?

◮ Not predicted to help.

Better multiplication:

◮ Should help somewhat.

Simultaneous inversions:

◮ Each solving for y requires inversion. ◮ Each addition requires inversion. ◮ These can be replaced a few inversion and a corresponding

number of multiplies.

◮ Predicted speedup: maybe five times?

Parallelization

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 25 / 43

slide-53
SLIDE 53

ECOH Implementation

Hash with a Twist

Bernstein: x-only DH with “invalid” x thrown to the twist. EECH/ECOH: every x maps to a point on curve or its twist Get one total and twisted total Sum these on curve over quadratic extension.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 26 / 43

slide-54
SLIDE 54

ECOH Implementation

Dreaming doesn’t hurt

0.14 MB/s x 5 (simultaneous inversion, etc.) x 10 (Intel AVX) x 10 (ten CPU multicore) = 70 MB/s Faster than SHA-1?

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 27 / 43

slide-55
SLIDE 55

ECOH CFV

People who have helped me

Matt Campagna Ren´ e Struik

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 28 / 43

slide-56
SLIDE 56

ECOH CFV

Call for Volunteers

Implementers Cryptanalysis Security provers

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 29 / 43

slide-57
SLIDE 57

One-Up Problem for ECDSA

Convertible Group

Definition

A group G and a function f : G → Z. Use multiplicative notation for G. Call f the conversion function.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 30 / 43

slide-58
SLIDE 58

One-Up Problem for ECDSA

One-Up Problem

Definition

Given a, b ∈ G, find c such that c = abf (c) (8) One is up: a1. One c is up.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 31 / 43

slide-59
SLIDE 59

One-Up Problem for ECDSA

Convertible DSA

Definition

Let g ∈ G have order n. Let h : {0, 1}∗ → Z be a hash function. Then (r, s) is a valid signature on message m ∈ {0, 1}∗ under public key y ∈ G, only if gcd(s, n) = 1 and r = f

  • g h(m)y r1/s mod n

. (9) Includes DSA. Includes ECDSA.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 32 / 43

slide-60
SLIDE 60

One-Up Problem for ECDSA

So what’s up with this problem?

Theorem

If the one-up problem for (G, f ) is solvable, then Convertible DSA for (G, f , g, h) is forgeable.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 33 / 43

slide-61
SLIDE 61

One-Up Problem for ECDSA

Hard up?

Conjecture

For the (G, f ) in ECDSA, solving the 1-up problem costs about n group operations and converstions.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 34 / 43

slide-62
SLIDE 62

One-Up Problem for ECDSA

Up’s enough?

Conjecture

Convertible DSA resists universal forgery against key-only attacks (UF-KOA) if

1

Discrete logs hard in G.

2

One up hard in (G, f ).

3

Hash h mod n is rarely zero. More powerful forgery attacks resisted if hash has further security properties (e.g. collision resistance).

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 35 / 43

slide-63
SLIDE 63

One-Up Problem for ECDSA

Up over log?

If discrete logs easy, ... Can one-up problem be hard? Maybe, if f ... is random oracle.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 36 / 43

slide-64
SLIDE 64

One-Up Problem for ECDSA

Up under log?

In generic group model, If advesary gets access to one-up oracle, then Discrete logs still hard.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 37 / 43

slide-65
SLIDE 65

One-Up Problem for ECDSA

Semilog problem

Definition (ECC 2001, Advances in ECC)

A semilog of y is a pair (r, s) which would be valid signature under public key y if the message had hash equal to one.

Theorem (ECC 2001/Advances in ECC)

ECDSA resists UF-KOA if and only if semilog is hard and hash is rarely zero.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 38 / 43

slide-66
SLIDE 66

One-Up Problem for ECDSA

Semilog = Fork(Log, 1up)

Theorem

The semilog problem, with one component is fixed, is equivalent to the discrete log problem if r is fixed. the 1-up problem if s is fixed.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 39 / 43

slide-67
SLIDE 67

One-Up Problem for ECDSA

Diffie-Hellman Disguised as One-Up

If f (x) = logg(x), then One-up problem equivalent to DHP This f is impractial, so result is only theoretical.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 40 / 43

slide-68
SLIDE 68

One-Up Problem for ECDSA

One-Up as Obstacle

Pointcheval and Stern couldn’t prove ECDSA secure in random

  • racle model, assuming only hard log.

Paillier and Vergnaud argued ECDSA couldn’t be proved secure in the random oracle model, assuming hard log (unless one-more log problem was easy). Perhaps one-up problem was hidden obstacle. Not possible to prove ECDSA secure given only hard log, because one-up could be easy. In practice, though, one-up seems harder than log!

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 41 / 43

slide-69
SLIDE 69

One-Up Problem for ECDSA

One-Up as Obstacle

Pointcheval and Stern couldn’t prove ECDSA secure in random

  • racle model, assuming only hard log.

Paillier and Vergnaud argued ECDSA couldn’t be proved secure in the random oracle model, assuming hard log (unless one-more log problem was easy). Perhaps one-up problem was hidden obstacle. Not possible to prove ECDSA secure given only hard log, because one-up could be easy. In practice, though, one-up seems harder than log!

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 41 / 43

slide-70
SLIDE 70

One-Up Problem for ECDSA

One-Up as Obstacle

Pointcheval and Stern couldn’t prove ECDSA secure in random

  • racle model, assuming only hard log.

Paillier and Vergnaud argued ECDSA couldn’t be proved secure in the random oracle model, assuming hard log (unless one-more log problem was easy). Perhaps one-up problem was hidden obstacle. Not possible to prove ECDSA secure given only hard log, because one-up could be easy. In practice, though, one-up seems harder than log!

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 41 / 43

slide-71
SLIDE 71

One-Up Problem for ECDSA

One-Up as Obstacle

Pointcheval and Stern couldn’t prove ECDSA secure in random

  • racle model, assuming only hard log.

Paillier and Vergnaud argued ECDSA couldn’t be proved secure in the random oracle model, assuming hard log (unless one-more log problem was easy). Perhaps one-up problem was hidden obstacle. Not possible to prove ECDSA secure given only hard log, because one-up could be easy. In practice, though, one-up seems harder than log!

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 41 / 43

slide-72
SLIDE 72

One-Up Problem for ECDSA

One-Up as Obstacle

Pointcheval and Stern couldn’t prove ECDSA secure in random

  • racle model, assuming only hard log.

Paillier and Vergnaud argued ECDSA couldn’t be proved secure in the random oracle model, assuming hard log (unless one-more log problem was easy). Perhaps one-up problem was hidden obstacle. Not possible to prove ECDSA secure given only hard log, because one-up could be easy. In practice, though, one-up seems harder than log!

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 41 / 43

slide-73
SLIDE 73

One-Up Problem for ECDSA

ECDSA with ECOH

No bit twiddling — pure algebra. Use the same curve for both.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 42 / 43

slide-74
SLIDE 74

Conclusion

Conclusion

ECC: not just for PKC and RNGs, anymore! ECOH: who needs need bit twiddling, now? ECDSA: One-up? Okay.

Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 43 / 43