formally certifying the security of digital signature
play

Formally Certifying the Security of Digital Signature Schemes - PowerPoint PPT Presentation

Formally Certifying the Security of Digital Signature Schemes Santiago Zanella 1 , 2 Benjamin Grgoire 1 , 2 Gilles Barthe 3 Federico Olmedo 3 1 Microsoft Research - INRIA Joint Centre, France 2 INRIA Sophia Antipolis - Mditerrane, France 3


  1. Formally Certifying the Security of Digital Signature Schemes Santiago Zanella 1 , 2 Benjamin Grégoire 1 , 2 Gilles Barthe 3 Federico Olmedo 3 1 Microsoft Research - INRIA Joint Centre, France 2 INRIA Sophia Antipolis - Méditerranée, France 3 IMDEA Software, Madrid, Spain 30 th IEEE Symposium on Security & Privacy 2009.05.19

  2. Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come out with an attack

  3. Cryptanalysis-driven Security Propose a cryptographic scheme Attack found Patch the scheme Wait for someone to come out with an attack

  4. Cryptanalysis-driven Security Propose a cryptographic scheme Attack found Patch the scheme Wait for someone to come out with an attack Enough waiting Declare the scheme secure

  5. Cryptanalysis-driven Security Propose a cryptographic scheme Attack found Patch the scheme Wait for someone to come out with an attack Enough waiting Declare the scheme secure How much time is enough ?

  6. Cryptanalysis-driven Security Propose a cryptographic scheme Attack found Patch the scheme Wait for someone to come out with an attack Enough waiting Declare the scheme secure 6 months, 1 year, 2 years?

  7. Cryptanalysis-driven Security Propose a cryptographic scheme Attack found Patch the scheme Wait for someone to come out with an attack Enough waiting Declare the scheme secure It took 5 years to break the Merkle-Hellman cryptosystem

  8. Cryptanalysis-driven Security Propose a cryptographic scheme Attack found Patch the scheme Wait for someone to come out with an attack Enough waiting Declare the scheme secure Ok, let’s say 7 years to be on the safe side

  9. Cryptanalysis-driven Security Propose a cryptographic scheme Attack found Patch the scheme Wait for someone to come out with an attack Enough waiting Declare the scheme secure It took 10 years to break the Chor-Rivest cryptosystem

  10. Cryptanalysis-driven Security Propose a cryptographic scheme Attack found Patch the scheme Wait for someone to come out with an attack Enough waiting Declare the scheme secure Can’t we do better?

  11. Reductionist Cryptographic Proofs Define a security goal and an adversarial model 1 Propose a cryptographic scheme 2 Reduce security of the scheme to a cryptographic 3 assumption IF an adversary A can break the security of the scheme THEN the assumption can be broken with little extra effort Conversely, IF the security assumption holds THEN the scheme is secure

  12. Proof by Reduction Assume an efficient adversary A breaks the security of a scheme within time t Build an adversary B that uses A to solve a computational hard problem within time t + p ( t ) We are interested in efficient reductions, were p is a polynomial, so that IF the problem is intractable THEN the cryptographic scheme is asymptotically secure

  13. Practical interpretation Asymptotic Security As long as p ( t ) is polynomial, attacking the scheme is intractable provided the problem is intractable. The smaller p ( t ) , the tighter the reduction p ( t ) matters Exact Security What is the best known method to solve the problem? If the best method solves the problem in time t ′ , choose scheme parameters so that the reduction yields a better method, t + p ( t ) < t ′

  14. The Game-playing methodology Security proofs in cryptography may be organized as sequences of games [...] this can be a useful tool in taming the complexity of security proofs that might otherwise become so messy, complicated, and subtle as to be nearly impossible to verify V. Shoup

  15. The Game-playing methodology Game G η 0 : . . . . . . ← A ( . . . ); . . . 0 [ A 0 ] Pr G η

  16. The Game-playing methodology Game G η Game G η 0 : 1 : . . . . . . . . . ← A ( . . . ); . . . . . . . . . 0 [ A 0 ] h 1 ( Pr G η 1 [ A 1 ]) Pr G η ≤

  17. The Game-playing methodology Game G η Game G η Game G η 0 : 1 : n : . . . . . . . . . . . . ← A ( . . . ); . . . · · · . . . ← B ( . . . ); . . . . . . . . . 0 [ A 0 ] h 1 ( Pr G η 1 [ A 1 ]) h n ( Pr G η n [ A n ]) Pr G η ≤ ≤ . . . ≤

  18. The Game-playing methodology Game G η Game G η Game G η 0 : 1 : n : . . . . . . . . . . . . ← A ( . . . ); . . . · · · . . . ← B ( . . . ); . . . . . . . . . 0 [ A 0 ] h 1 ( Pr G η 1 [ A 1 ]) h n ( Pr G η n [ A n ]) Pr G η ≤ ≤ . . . ≤ B A Problem instance Solution

  19. CertiCrypt: language-based game-playing proofs Formalize security definitions, assumptions and games using a probabilistic programming language. P W HILE : a probabilistic programming language C ::= skip nop | C ; C sequence | V ← E assignment | V ← D random sampling $ | if E then C else C conditional | while E do C while loop | V ← P ( E , . . . , E ) procedure call x ← d : sample the value of x according to distribution d $ The language of expressions ( E ) and distribution expressions ( D ) admits user-defined extensions

  20. Computing probabilities 1 A � G η � : M → ( M → [ 0 , 1 ]) → [ 0 , 1 ] 1 x � = y = Interpret � G η � m as the expectation operator of the probability distribution induced by the game = � G � η m Probability: Pr G η , m [ A ] def Example. Let G def = x ← { 0 , 1 } ; y ← { 0 , 1 } $ $ Pr G η , m [ x � = y ] = � G � η m

  21. 1 A Computing probabilities � G η � : M → ( M → [ 0 , 1 ]) → [ 0 , 1 ] 1 x � = y = Interpret � G η � m as the expectation operator of the 1 x � = y ( m [ x �→ 0 , y �→ 0 ]) 1 x � = y ( m [ x �→ 0 , y �→ 1 ]) probability distribution induced by the game 1 x � = y ( m [ x �→ 1 , y �→ 0 ]) 1 x � = y ( m [ x �→ 1 , y �→ 1 ]) = � G � η m Probability: Pr G η , m [ A ] def Example. Let G def = x ← { 0 , 1 } ; y ← { 0 , 1 } $ $ Pr G η , m [ x � = y ] = � G � η m 1 1 + + 4 4 1 1 + 4 4

  22. 1 A Computing probabilities � G η � : M → ( M → [ 0 , 1 ]) → [ 0 , 1 ] 1 x � = y = Interpret � G η � m as the expectation operator of the probability distribution induced by the game = � G � η m Probability: Pr G η , m [ A ] def Example. Let G def = x ← { 0 , 1 } ; y ← { 0 , 1 } $ $ Pr G η , m [ x � = y ] = � G � η m 1 0 + + 4 1 + 0 4

  23. Computing probabilities 1 A � G η � : M → ( M → [ 0 , 1 ]) → [ 0 , 1 ] 1 x � = y = Interpret � G η � m as the expectation operator of the probability distribution induced by the game = � G � η m Probability: Pr G η , m [ A ] def Example. Let G def = x ← { 0 , 1 } ; y ← { 0 , 1 } $ $ Pr G η , m [ x � = y ] = � G � η m 1 2

  24. Program equivalence Observational equivalence def f = X g ∀ m 1 m 2 , m 1 = X m 2 = ⇒ f m 1 = g m 2 = def � G 1 ≃ I ∀ m 1 m 2 f g , m 1 = I m 2 ∧ f = O g = O G 2 ⇒ = � G 1 � m 1 f = � G 2 � m 2 g Only a Partial Equivalence Relation � G ≃ I O G not true in general Generalizes information flow security (take I = O = V low ) Eample ← { 0 , 1 } k ; y ← x ⊕ z ≃ { z } ← { 0 , 1 } k ; x ← y ⊕ z � x { x , y , z } y $ $

  25. Program equivalence Observational equivalence def f = X g ∀ m 1 m 2 , m 1 = X m 2 = ⇒ f m 1 = g m 2 = def � G 1 ≃ I ∀ m 1 m 2 f g , m 1 = I m 2 ∧ f = O g = O G 2 ⇒ = � G 1 � m 1 f = � G 2 � m 2 g Only a Partial Equivalence Relation � G ≃ I O G not true in general Generalizes information flow security (take I = O = V low ) Eample ← { 0 , 1 } k ; y ← x ⊕ z ≃ { z } ← { 0 , 1 } k ; x ← y ⊕ z � x { x , y , z } y $ $

  26. Using program equivalence to relate probabilities Let A be an event that depends only on variables in O To prove Pr G 1 , m 1 [ A ] = Pr G 2 , m 2 [ A ] it suffices to find a set of variables I such that m 1 = I m 2 � G 1 ≃ I O G 2

  27. Proving program equivalence Goal � G 1 ≃ I O G 2 A Relational Hoare Logic 2 : Φ ′ ⇒ Φ ′′ � c 1 ∼ c 2 : Φ ⇒ Φ ′ � c ′ 1 ∼ c ′ [ R-Seq ] � c 1 ; c ′ 1 ∼ c 2 ; c ′ 2 : Φ ⇒ Φ ′′ . . .

  28. Proving program equivalence Goal � G 1 ≃ I O G 2 Mechanized program transformations Transformation: T ( G 1 , G 2 , I , O ) = ( G ′ 2 , I ′ , O ′ ) 1 , G ′ Soundness theorem 1 ≃ I ′ T ( G 1 , G 2 , I , O ) = ( G ′ 2 , I ′ , O ′ ) 1 , G ′ � G ′ O ′ G ′ 2 � G 1 ≃ I O G 2 Reflection-based Coq tactic (replace reasoning by computation)

  29. Proving program equivalence Goal � G 1 ≃ I O G 2 Mechanized program transformations Dead code elimination ( deadcode ) Constant folding and propagation ( ep ) Procedure call inlining ( inline ) Code movement ( swap ) Common suffix/prefix elimination ( eqobs_hd , eqobs_tl )

  30. Proving program equivalence Goal � G ≃ I O G An –incomplete– tactic for self-equivalence ( eqobs_in ) Does � G ≃ I O G hold? Analyze dependencies to compute I ′ s.t. � G ≃ I ′ O G Check that I ′ ⊆ I Think about information flow security...

  31. The Fundamental Lemma of Game-Playing Fundamental lemma If two games G 1 and G 2 behave identically in an initial memory m unless a failure event “bad” fires, then | Pr G 1 , m [ A ] − Pr G 2 , m [ A ] | ≤ Pr G 1 , 2 [ bad ]

  32. The Fundamental Lemma of Game-Playing Syntactic criterion Game G 1 : Game G 2 : . . . . . . bad ← true ; c 1 bad ← true ; c 2 . . . . . . Pr G 1 , m [ A | ¬ bad ] = Pr G 2 , m [ A | ¬ bad ] Pr G 1 , m [ bad ] = Pr G 2 , m [ bad ] Corollary | Pr G 1 , m [ A ] − Pr G 2 , m [ A ] | ≤ Pr G 1 , 2 [ bad ]

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend