Hash function based on the SIS problem HEBANT Chlo e University of - - PowerPoint PPT Presentation

hash function based on the sis problem
SMART_READER_LITE
LIVE PREVIEW

Hash function based on the SIS problem HEBANT Chlo e University of - - PowerPoint PPT Presentation

Hash function based on the SIS problem HEBANT Chlo e University of Limoges Summer 2016 HEBANT Chlo e Hash function based on the SIS problem Summer 2016 1 / 19 Introduction Hash function 1 One-way collision-resistant Ajtai function


slide-1
SLIDE 1

Hash function based on the SIS problem

HEBANT Chlo´ e

University of Limoges

Summer 2016

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 1 / 19

slide-2
SLIDE 2

Introduction

1

Hash function

2

One-way collision-resistant Ajtai function

3

SIS problem Some observations about the SIS problem

4

Hardness proof

5

Hash function construction Merkle-Damg˚ ard construction HAIFA construction

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 2 / 19

slide-3
SLIDE 3

Hash function

Hash function

With a function f which have the properties:

  • ne-way

collision-resistant compression Iterating f trying to maintain: pre-image resistance second pre-image resistance collision resistance

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 3 / 19

slide-4
SLIDE 4

Hash function

Definition

Pre-image resistance: Given y = H(x) it is hard to find x′ such that H(x′) = y Second pre-image resistance: Given x it is hard to find x′ such that H(x) = H(x′) Collision resistance: It is hard to find x, x′ such that H(x) = H(x′)

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 4 / 19

slide-5
SLIDE 5

One-way collision-resistant Ajtai function

1

Hash function

2

One-way collision-resistant Ajtai function

3

SIS problem Some observations about the SIS problem

4

Hardness proof

5

Hash function construction Merkle-Damg˚ ard construction HAIFA construction

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 5 / 19

slide-6
SLIDE 6

One-way collision-resistant Ajtai function

One-way collision-resistant Ajtai function

Let a matrix A ∈ Zn×m

q

Let fA : {0, ±1}m → Zn

q

z → Az Theorem fA is a compression function if m n log q

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 6 / 19

slide-7
SLIDE 7

SIS problem

1

Hash function

2

One-way collision-resistant Ajtai function

3

SIS problem Some observations about the SIS problem

4

Hardness proof

5

Hash function construction Merkle-Damg˚ ard construction HAIFA construction

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 7 / 19

slide-8
SLIDE 8

SIS problem

Definition

Definition (SIS problem) Given m uniformly random vectors ai ∈ Zn

q

Find z = 0 ∈ {0, ±1}m such that: fA(z) := Az =

  • i

ai · zi = 0 ∈ Zn

q

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 8 / 19

slide-9
SLIDE 9

SIS problem

Definition

Definition (SIS problem) Given m uniformly random vectors ai ∈ Zn

q

Find z = 0 ∈ {0, ±1}m such that: fA(z) := Az =

  • i

ai · zi = 0 ∈ Zn

q

Theorem Assuming the hardness of the SIS problem, fA is one-way and collision-resistant

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 8 / 19

slide-10
SLIDE 10

SIS problem

Definition

Definition (SIS problem) Given m uniformly random vectors ai ∈ Zn

q

Find z = 0 ∈ {0, ±1}m such that: fA(z) := Az =

  • i

ai · zi = 0 ∈ Zn

q

Theorem Assuming the hardness of the SIS problem, fA is one-way and collision-resistant Remark Thanks to Ajtai and his hardness proof, it’s all Minicrypt that we can construct based on the SIS problem.

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 8 / 19

slide-11
SLIDE 11

SIS problem Some observations about the SIS problem

Some observations

Definition (General SIS problem) Given m uniformly random vectors ai ∈ Zn

q

Find z = 0 ∈ Zm of norm z β such that: fA(z) := Az =

  • i

ai · zi = 0 ∈ Zn

q

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 9 / 19

slide-12
SLIDE 12

SIS problem Some observations about the SIS problem

Some observations

Definition (General SIS problem) Given m uniformly random vectors ai ∈ Zn

q

Find z = 0 ∈ Zm of norm z β such that: fA(z) := Az =

  • i

ai · zi = 0 ∈ Zn

q

Remark Without the constraint on z, it is easy to find a solution: Gaussian elimination Must take β < q:

  • therwise z = (q, 0, · · · , 0) ∈ Z m is a trivial solution

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 9 / 19

slide-13
SLIDE 13

SIS problem Some observations about the SIS problem

Hermite normal form

Small but important optimization: Decompose A = [A1|A2] where A1 ∈ Zn×n

q

is invertible as a matrix over Zq. Let B = A−1

1

· A =

  • In| ¯

A

  • where ¯

A = A−1

1

· A2 Theorem A and B have exactly the same set of (short) SIS solutions

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 10 / 19

slide-14
SLIDE 14

Hardness proof

1

Hash function

2

One-way collision-resistant Ajtai function

3

SIS problem Some observations about the SIS problem

4

Hardness proof

5

Hash function construction Merkle-Damg˚ ard construction HAIFA construction

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 11 / 19

slide-15
SLIDE 15

Hardness proof

Reduction: average-case → worst-case

b b b b b b b b b b b

bp2 bp3

b

bp4

b b b b b

bp1

b b b b b b b b b b b b b b

bg1 bg3 bg2 bg4 b

pi ∈ Ln gi = pi + ei ∈ Rn where ei ∼ Ds(x) = 1 s n e

−πx2

s2

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 12 / 19

slide-16
SLIDE 16

Hash function construction

1

Hash function

2

One-way collision-resistant Ajtai function

3

SIS problem Some observations about the SIS problem

4

Hardness proof

5

Hash function construction Merkle-Damg˚ ard construction HAIFA construction

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 13 / 19

slide-17
SLIDE 17

Hash function construction Merkle-Damg˚ ard construction

Merkle-Damg˚ ard construction

Definition Method of building collision-resistant cryptographic hash functions from collision-resistant one-way IV H (m) m1 m2 mn f f f Theorem (Security proof) Collision in H ⇒ collision in f

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 14 / 19

slide-18
SLIDE 18

Hash function construction Merkle-Damg˚ ard construction

Merkle-Damg˚ ard construction

Definition Method of building collision-resistant cryptographic hash functions from collision-resistant one-way IV H (m) m1 m2 mn f f f Theorem (Security proof) Collision in H ⇒ collision in f Remark This is used for MD5, SHA1, SHA2

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 14 / 19

slide-19
SLIDE 19

Hash function construction Merkle-Damg˚ ard construction

Several undesirable properties

Length extension Given H(x) of an unknown input x, it’s easy to find the value of H(pad(x)||y) ⇒ possible to find hashes of inputs related to x even though x remains unknown

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 15 / 19

slide-20
SLIDE 20

Hash function construction Merkle-Damg˚ ard construction

Several undesirable properties

Length extension Given H(x) of an unknown input x, it’s easy to find the value of H(pad(x)||y) ⇒ possible to find hashes of inputs related to x even though x remains unknown Second pre-image Hyp: the security proof also apply to second pre-image attacks But: this is not true for long messages

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 15 / 19

slide-21
SLIDE 21

Hash function construction Merkle-Damg˚ ard construction

Several undesirable properties (2)

Fix-points: h = f (h, M) Multicollisions: many messages with the same hash 2004: (Joux) When iterative hash functions are used, finding multicollisions is almost as easy as finding a single collision Remark Joux also prove: The concatenation of hash function is as secure against pre-image attacks as the strongest of all the hash functions

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 16 / 19

slide-22
SLIDE 22

Hash function construction HAIFA construction

HAIFA

HAIFA has attractive properties: simplicity maintaining the collision resistance of the compression function increasing the security against second pre-image attacks prevention of esay-to-use fix points of the compression function

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 17 / 19

slide-23
SLIDE 23

Hash function construction HAIFA construction

HAIFA construction

IVm H (M) M1 M2 Mn f f f #bits, salt #bits, salt #bits, salt #bits = the number of bits hashed so far IVm = f (IV , m, 0, 0) where m is the hash output size Padding scheme: pad a single bit of 1 and as many 0 bits to have the good

  • size. Final length of:

M: congruent to (n − (t + r)) mod n length of M: t m: r

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 18 / 19

slide-24
SLIDE 24

Hash function construction HAIFA construction

HAIFA vs Merkle-Damg˚ ard

#bits: prevent the easy exploitation of fix-points Even if an attacker finds a fix-point h = f (h, M, #bits, salt) he cannot concatenate it to itself because #bits has changed

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 19 / 19

slide-25
SLIDE 25

Hash function construction HAIFA construction

HAIFA vs Merkle-Damg˚ ard

#bits: prevent the easy exploitation of fix-points Even if an attacker finds a fix-point h = f (h, M, #bits, salt) he cannot concatenate it to itself because #bits has changed salt:

all attacks are on-line → no precomputation increasing the security of digital signature

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 19 / 19

slide-26
SLIDE 26

Hash function construction HAIFA construction

HAIFA vs Merkle-Damg˚ ard

#bits: prevent the easy exploitation of fix-points Even if an attacker finds a fix-point h = f (h, M, #bits, salt) he cannot concatenate it to itself because #bits has changed salt:

all attacks are on-line → no precomputation increasing the security of digital signature

Multicollisions: this attacks works against all iterative hashing schemes, independent of their structure BUT: an attacker cannot precompute these multicollisions before the choosing of the salt value

HEBANT Chlo´ e Hash function based on the SIS problem Summer 2016 19 / 19