how to eat your entropy and have it too recovering from
play

How to Eat Your Entropy and Have It Too (Recovering from - PowerPoint PPT Presentation

How to Eat Your Entropy and Have It Too (Recovering from compromise) Yevgeniy Dodis Adi Shamir Noah Stephens-Davidowitz Daniel Wichs Our Goal Our Goal Our Goal Our Goal How Does TCC Build a PRG? How Does TCC Build a PRG? PRG S 0 S 1 R


  1. How to Eat Your Entropy and Have It Too (Recovering from compromise) Yevgeniy Dodis Adi Shamir Noah Stephens-Davidowitz Daniel Wichs

  2. Our Goal

  3. Our Goal

  4. Our Goal

  5. Our Goal

  6. How Does TCC Build a PRG?

  7. How Does TCC Build a PRG? PRG S 0 S 1 R 0

  8. How Does TCC Build a PRG? PRG PRG S 2 S 0 S 1 R 1 R 0

  9. How Does TCC Build a PRG? PRG PRG PRG S 2 S 3 S 0 S 1 R 1 R 2 R 0

  10. How Does TCC Build a PRG? PRG PRG PRG S 2 S 3 S 0 S 1 R 1 R 2 R 0 Perfect randomness…

  11. Developers Build “RNGs with Input”

  12. Developers Build “RNGs with Input” next S’,R S

  13. Developers Build “RNGs with Input” next S’,R S refresh S,I S’

  14. Developers Build “RNGs with Input” next S’,R S refresh S,I S’ Entropy?

  15. Developers Build “RNGs with Input” next S’,R S refresh S,I S’ Entropy? Accumulated entropy

  16. Developers Build “RNGs with Input” next S’,R S refresh S,I S’ Entropy? Accumulated entropy H(S’) ≈ H(S) + H(I)

  17. (Limited) Formal Analysis [BH05] [DPRVW13]

  18. (Limited) Formal Analysis [BH05] [DPRVW13] First formal model (In 2005!)

  19. (Limited) Formal Analysis [BH05] [DPRVW13] First formal model (In 2005!) Recover only after full-entropy input

  20. (Limited) Formal Analysis [BH05] [DPRVW13] Gathers entropy First formal model as it comes (In 2005!) Recover only after full-entropy input

  21. (Limited) Formal Analysis [BH05] [DPRVW13] Gathers entropy First formal model as it comes (In 2005!) Recover only after But…. full-entropy input

  22. Premature Next RNG with input

  23. Premature Next RNG with input

  24. Premature Next RNG with input I

  25. Premature Next RNG with input I

  26. Premature Next RNG with input I I

  27. Premature Next RNG with input I I

  28. Premature Next I … RNG with input I I

  29. Premature Next I … RNG with input I I

  30. Premature Next I … R RNG with input I I

  31. Premature Next I … R RNG with input I I

  32. Premature Next RNG with input

  33. Premature Next RNG with input

  34. Premature Next RNG with input I

  35. Premature Next RNG with input I R

  36. Premature Next S RNG with input I R

  37. Premature Next S RNG with input I R

  38. How do we deal with this?

  39. Option 1: Don’t Let The Adversary Look RNG with input

  40. Option 1: Don’t Let The Adversary Look RNG with input I

  41. Option 1: Don’t Let The Adversary Look RNG with input I

  42. Option 1: Don’t Let The Adversary Look RNG with input I I

  43. Option 1: Don’t Let The Adversary Look RNG with input I I

  44. Option 1: Don’t Let The Adversary Look I … RNG with input I I

  45. Option 1: Don’t Let The Adversary Look I … RNG with input I I

  46. Option 1: Don’t Let The Adversary Look I … R RNG with input I I

  47. Option 1: Don’t Let The Adversary Look I … R RNG with input I I

  48. Option 2: Estimate Entropy RNG with input

  49. Option 2: Estimate Entropy RNG with input

  50. Option 2: Estimate Entropy RNG with input I

  51. Option 2: Estimate Entropy RNG with input I I

  52. Option 2: Estimate Entropy RNG with input I I

  53. Option 2: Estimate Entropy RNG ? with input I I

  54. Option 2: Estimate Entropy ? RNG ? with input I I

  55. Option 2: Estimate Entropy ? I … RNG ? with input I I

  56. Option 2: Estimate Entropy ? I … RNG RNG ? with input with input I I

  57. Option 2: Estimate Entropy ? R I … RNG RNG ? with input with input I I

  58. Option 2: Estimate Entropy ? R I … RNG RNG ? with input with input I I

  59. Option 2: Estimate Entropy ? R I … RNG RNG ? with input with input I I But we can’t estimate entropy….

  60. Option 3: Prove Impossibility

  61. Option 3: Prove Impossibility But it’s possible….

  62. Option 4: Eat Your Entropy and Have It Too

  63. Option 4: Eat Your Entropy and Have It Too …

  64. Option 4: Eat Your Entropy and Have It Too …

  65. Option 4: Eat Your Entropy and Have It Too …

  66. Option 4: Eat Your Entropy and Have It Too Unknown amount …

  67. Option 4: Eat Your Entropy and Have It Too …

  68. Option 4: Eat Your Entropy and Have It Too …

  69. Option 4: Eat Your Entropy and Have It Too …

  70. Option 4: Eat Your Entropy and Have It Too …

  71. Option 4: Eat Your Entropy and Have It Too …

  72. Option 4: Eat Your Entropy and Have It Too …

  73. Option 4: Eat Your Entropy and Have It Too …

  74. Option 4: Eat Your Entropy and Have It Too …

  75. Option 4: Eat Your Entropy and Have It Too … Adi Shamir

  76. Idea Used in Practice (but not theory…) [KSF99]’s Yarrow [FS03]’s Fortuna

  77. Idea Used in Practice (but not theory…) Only two pools [KSF99]’s Yarrow [FS03]’s Fortuna

  78. Idea Used in Practice (but not theory…) Many pools with clever scheduling Only two pools [KSF99]’s Yarrow [FS03]’s Fortuna

  79. Idea Used in Practice (but not theory…) Many pools with clever scheduling Only two pools [KSF99]’s Yarrow [FS03]’s Fortuna

  80. Idea Used in Practice (but not theory…) Many pools with clever scheduling Only two pools [KSF99]’s Yarrow [FS03]’s Fortuna

  81. Our Work

  82. Our Work • Formal model (very strong security notion)

  83. Our Work • Formal model (very strong security notion) • Provably secure construction in this model • Inspired by Fortuna • Proof in standard model (from OWF)

  84. Our Work • Formal model (very strong security notion) • Provably secure construction in this model • Inspired by Fortuna • Proof in standard model (from OWF) • Attacks on prior constructions

  85. Our Work • Formal model (very strong security notion) • Provably secure construction in this model • Inspired by Fortuna • Proof in standard model (from OWF) • Attacks on prior constructions • Formal analysis of and improvement of Fortuna • Secure in limited setting • Doubled entropy e ffj ciency

  86. Thanks!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend