Galois geometries contributing to cryptography Leo Storme Ghent - - PowerPoint PPT Presentation

galois geometries contributing to cryptography
SMART_READER_LITE
LIVE PREVIEW

Galois geometries contributing to cryptography Leo Storme Ghent - - PowerPoint PPT Presentation

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES Galois geometries contributing to cryptography Leo Storme Ghent University Dept. of Mathematics Krijgslaan 281 - S22 9000 Ghent Belgium Opatija,


slide-1
SLIDE 1

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

Galois geometries contributing to cryptography

Leo Storme

Ghent University

  • Dept. of Mathematics

Krijgslaan 281 - S22 9000 Ghent Belgium

Opatija, 2010

Leo Storme Galois geometries contributing to cryptography

slide-2
SLIDE 2

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

OUTLINE

1 CRYPTOGRAPHY 2 SECRET SHARING SCHEME 3 MESSAGE AUTHENTICATION CODE (MAC) 4 LINEAR MDS CODE IN AES

Leo Storme Galois geometries contributing to cryptography

slide-3
SLIDE 3

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

OUTLINE

1 CRYPTOGRAPHY 2 SECRET SHARING SCHEME 3 MESSAGE AUTHENTICATION CODE (MAC) 4 LINEAR MDS CODE IN AES

Leo Storme Galois geometries contributing to cryptography

slide-4
SLIDE 4

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

CRYPTOGRAPHY

1

Transmit information in confidential way,

2

Split secret into shares,

3

Authentication.

Leo Storme Galois geometries contributing to cryptography

slide-5
SLIDE 5

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

OUTLINE

1 CRYPTOGRAPHY 2 SECRET SHARING SCHEME 3 MESSAGE AUTHENTICATION CODE (MAC) 4 LINEAR MDS CODE IN AES

Leo Storme Galois geometries contributing to cryptography

slide-6
SLIDE 6

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

SECRET SHARING SCHEME

1

Secret sharing scheme: cryptographic equivalent of vault that needs several keys to be opened.

2

Secret S divided into shares.

3

Authorised sets: have access to secret S by putting their shares together.

4

Unauthorised sets: have no access to secret S by putting their shares together.

Leo Storme Galois geometries contributing to cryptography

slide-7
SLIDE 7

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

(n, k)-THRESHOLD SCHEME

1

n participants.

2

Each group of k participants can reconstruct secret S, but less than k participants have no way to learn anything about secret S.

Leo Storme Galois geometries contributing to cryptography

slide-8
SLIDE 8

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

SHAMIR’S k-OUT-OF-n SECRET SHARING SCHEME

1

Fq = finite field of order q.

2

Dealer chooses polynomial f(X) = f0 + f1X + · · · + fk−1X k−1 ∈ Fq[X], and,

3

gives participant number i, point (xi, f(xi)) on graph of f (xi = 0).

4

Value f(0) = f0 is secret S.

Leo Storme Galois geometries contributing to cryptography

slide-9
SLIDE 9

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

SHAMIR’S k-OUT-OF-n SECRET SHARING SCHEME

1

Set of k participants can reconstruct f(X) = f0 + f1X + · · · + fk−1X k−1 by interpolating their shares (xi, f(xi)). Then they can compute secret f(0).

2

If k′ < k persons try to reconstruct secret, for every y ∈ Fq, there are exactly |Fq|k−k′−1 polynomials of degree at most k − 1 which pass through their shares and the point (0, y). Thus they gain no information about f(0).

Leo Storme Galois geometries contributing to cryptography

slide-10
SLIDE 10

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

REALISATION OF SHAMIR’S k-OUT-OF-n SECRET

SHARING SCHEME

ut ut ut ut ut

S1 S2 S3 S4 S5

rs

secret point

Leo Storme Galois geometries contributing to cryptography

slide-11
SLIDE 11

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

GEOMETRICAL REALISATION OF SHAMIR’S k-OUT-OF-n

SECRET SHARING SCHEME (BLAKLEY)

1

Secret S = point of PG(3, q).

2

Shares = planes of PG(3, q) such that exactly three of them only intersect in S.

Leo Storme Galois geometries contributing to cryptography

slide-12
SLIDE 12

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

GEOMETRICAL REALISATION OF SHAMIR’S k-OUT-OF-n

SECRET SHARING SCHEME (BLAKLEY)

Leo Storme Galois geometries contributing to cryptography

slide-13
SLIDE 13

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

GEOMETRICAL REALISATION OF SHAMIR’S k-OUT-OF-n

SECRET SHARING SCHEME

Leo Storme Galois geometries contributing to cryptography

slide-14
SLIDE 14

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

GEOMETRICAL REALISATION OF SHAMIR’S k-OUT-OF-n

SECRET SHARING SCHEME

Leo Storme Galois geometries contributing to cryptography

slide-15
SLIDE 15

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

CODING-THEORETICAL REALISATION OF SHAMIR’S k-OUT-OF-n SECRET SHARING SCHEME

(McEliece and Sarwate)

1

C : [n + 1, k, n − k + 2]q MDS code.

2

For secret c0 ∈ Fq, dealer creates codeword c = (c0, c1, . . . , cn) ∈ C. Share of participant number i is symbol ci.

3

Since C is MDS code with minimum distance n − k + 2, codeword c can be uniquely reconstructed if only k symbols are known.

4

So any set of k persons can compute secret c0.

5

On the other hand, less than k persons do not learn anything about secret, since for any possible secret c′, the same number of codewords that fit to secret c′ and their shares exist.

Leo Storme Galois geometries contributing to cryptography

slide-16
SLIDE 16

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

MORE GENERAL SECRET SHARING SCHEME

DEFINITION Support of c = (c1, . . . , cn) ∈ Fn

q :

sup(c) = {i | ci = 0}. Let C be linear code. Nonzero codeword c ∈ C is called minimal if ∀c′ ∈ C : sup(c′) ⊆ sup(c) = ⇒ c′ ∈ c .

Leo Storme Galois geometries contributing to cryptography

slide-17
SLIDE 17

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

MORE GENERAL SECRET SHARING SCHEME

LEMMA (MASSEY) Let C be an [n + 1, k]q-code. Secret sharing scheme is constructed from C by choosing codeword c = (c0, . . . , cn). Secret is c0 and shares of participants are coordinates ci (1 ≤ i ≤ n). Minimal authorized sets of secret sharing scheme correspond to minimal codewords of C⊥ with 0 in their supports.

Leo Storme Galois geometries contributing to cryptography

slide-18
SLIDE 18

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

MORE GENERAL SECRET SHARING SCHEME

Proof: Suppose set {1, . . . , k} is authorised set. This means that c0 can be determined from c1, . . . , ck, i.e. there exist constants a1, . . . , ak, with c0 = a1c1 + · · · + akck, (1) which means that (1, −a1, . . . , −ak, 0, . . . , 0) is codeword of C⊥ with 0 in its support.

Leo Storme Galois geometries contributing to cryptography

slide-19
SLIDE 19

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

OUTLINE

1 CRYPTOGRAPHY 2 SECRET SHARING SCHEME 3 MESSAGE AUTHENTICATION CODE (MAC) 4 LINEAR MDS CODE IN AES

Leo Storme Galois geometries contributing to cryptography

slide-20
SLIDE 20

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

PROBLEM OF AUTHENTICATION

1

Problem: Alice wants to send Bob a message m.

2

Attacker intercepts m and sends alternated message m′ to Bob.

Leo Storme Galois geometries contributing to cryptography

slide-21
SLIDE 21

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

PROBLEM OF AUTHENTICATION

How can Bob be sure that message he gets is correct? Introduce authentication!

Leo Storme Galois geometries contributing to cryptography

slide-22
SLIDE 22

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

EXAMPLE OF MESSAGE AUTHENTICATION CODE

1

l = line of PG(2, q).

2

Message m = point of l.

3

Authentication key K = point in PG(2, q)\l.

4

Authentication tag = line through message m and key K.

Leo Storme Galois geometries contributing to cryptography

slide-23
SLIDE 23

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES Leo Storme Galois geometries contributing to cryptography

slide-24
SLIDE 24

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

EXAMPLE OF AUTHENTICATION CODE

1

If attacker wants to create message (m, K) without knowing key K, he must guess an affine line through m. There are q possibilities, i.e. the chance for correct attack is 1

q.

2

If attacker already knows authenticated message (m, K), he knows that key K must lie on the line mK. But for every of q affine points on line mK, there exists line through m. So he cannot do better than guess the key which gives probability of 1

q for successful attack.

Leo Storme Galois geometries contributing to cryptography

slide-25
SLIDE 25

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

SECURITY OF AUTHENTICATION CODE

1

pi = probability of attacker to construct pair (m, K) without knowledge of key K, if he only knows i different pairs (mj, Kj).

2

Smallest value r for which pr+1 = 1 is called order of authentication code.

3

For r = 1, p0 = probability of impersonation attack and probability p1 = probability of substitution attack. THEOREM If MAC has attack probabilities pi = 1/ni (0 ≤ i ≤ r), then |K| ≥ n0 · · · nr. MAC that satisfies this theorem with equality is called perfect.

Leo Storme Galois geometries contributing to cryptography

slide-26
SLIDE 26

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

GEOMETRICAL CONSTRUCTION OF PERFECT MAC

DEFINITION Generalised dual arc D of order l with dimensions d1 > d2 > · · · > dl+1 of PG(n, q) is set of subspaces of dimension d1 such that:

1

each j subspaces intersect in subspace of dimension dj, 1 ≤ j ≤ l + 1,

2

each l + 2 subspaces have no common intersection. (n, d1, . . . , dl+1) = parameters of dual arc.

Leo Storme Galois geometries contributing to cryptography

slide-27
SLIDE 27

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

GENERALISED DUAL ARCS

THEOREM There exists generalised dual arc in PG( n+d+1

d+1

  • − 1, q), with

dimensions di = n+d+1−i

d+1−i

  • − 1, i = 0, . . . , d + 1.

1

Spaces have dimension d1 = n+d

d

  • − 1.

2

Two spaces intersect in space of dimension d2 = n+d−1

d−1

  • − 1.

3

Three spaces intersect in space of dimension d3 = n+d−2

d−2

  • − 1.

4

· · ·

Leo Storme Galois geometries contributing to cryptography

slide-28
SLIDE 28

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

LINK BETWEEN MAC AND GENERALISED DUAL ARC

1

π = hyperplane of PG(n + 1, q) and D = generalised dual arc of order l in π with parameters (n, d1, . . . , dl+1).

2

message m = element of D.

3

key K = point of PG(n + 1, q) not in π.

4

Authentication tag that belongs to message m and key K is generated (d1 + 1)-dimensional subspace.

5

Perfect MAC of order r = l + 1 with attack probabilities pi = qdi+1−di.

Leo Storme Galois geometries contributing to cryptography

slide-29
SLIDE 29

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES Leo Storme Galois geometries contributing to cryptography

slide-30
SLIDE 30

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES Leo Storme Galois geometries contributing to cryptography

slide-31
SLIDE 31

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES Leo Storme Galois geometries contributing to cryptography

slide-32
SLIDE 32

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

OUTLINE

1 CRYPTOGRAPHY 2 SECRET SHARING SCHEME 3 MESSAGE AUTHENTICATION CODE (MAC) 4 LINEAR MDS CODE IN AES

Leo Storme Galois geometries contributing to cryptography

slide-33
SLIDE 33

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

ADVANCED ENCRYPTION STANDARD (AES)

1

In 1997, American National Institute of Standards and Technology started competition to design a successor for Data Encryption Standard (DES).

2

In 2000, proposal of J. Daemen and V. Rijmen was selected as new Advanced Encryption Standard (AES).

Leo Storme Galois geometries contributing to cryptography

slide-34
SLIDE 34

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

SHORT DESCRIPTION OF AES

1

Clear text: 4 × 4 matrix over F256.

2

10 rounds of SubBytes, ShiftRows, MixColumns, and AddRoundKey.

Leo Storme Galois geometries contributing to cryptography

slide-35
SLIDE 35

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

SUBBYTES

Leo Storme Galois geometries contributing to cryptography

slide-36
SLIDE 36

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

SUBBYTES

1

First F256 → F256 : x → x−1, (x = 0 is mapped onto itself).

2

Secondly (represent x ∈ F256 by its 8 bits in additive notation)             y0 y1 y2 y3 y4 y5 y6 y7             =             1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1                         x0 x1 x2 x3 x4 x5 x6 x7             +             1 1 1 1             (2)

Leo Storme Galois geometries contributing to cryptography

slide-37
SLIDE 37

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

SHIFTROWS

Leo Storme Galois geometries contributing to cryptography

slide-38
SLIDE 38

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

MIXCOLUMNS

Leo Storme Galois geometries contributing to cryptography

slide-39
SLIDE 39

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

DIFFUSION IN CRYPTOGRAPHY

1

Small change in clear text must imply large change for cipher text.

2

Small change in cipher text must arise from large change in clear text. Question: how to realize diffusion?

Leo Storme Galois geometries contributing to cryptography

slide-40
SLIDE 40

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

MIXCOLUMNS

    b1 b2 b3 b4     =     α α + 1 1 1 1 α α + 1 1 1 1 α α + 1 α + 1 1 1 α         a1 a2 a3 a4     , where α8 + α4 + α3 + α + 1 = 0.

Leo Storme Galois geometries contributing to cryptography

slide-41
SLIDE 41

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

    1 α α + 1 1 1 1 1 α α + 1 1 1 1 1 α α + 1 1 α + 1 1 1 α     is generator matrix of an [8, 4, 5]-MDS code over F256.

Leo Storme Galois geometries contributing to cryptography

slide-42
SLIDE 42

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

DIFFUSION IN AES

Bytes changed Bytes changed in input in output 1 4 2 ≥ 3 3 ≥ 2 4 ≥ 1 Bytes changed Bytes changed in output in input 1 4 2 ≥ 3 3 ≥ 2 4 ≥ 1

Leo Storme Galois geometries contributing to cryptography

slide-43
SLIDE 43

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

ADDROUNDKEY

Leo Storme Galois geometries contributing to cryptography

slide-44
SLIDE 44

Cryptography Secret sharing scheme Message Authentication code (MAC) Linear MDS code in AES

Thank you very much for your attention!

Leo Storme Galois geometries contributing to cryptography