Improvement of Certain Encryption Approaches Based on the LPN - - PowerPoint PPT Presentation

improvement of certain encryption approaches
SMART_READER_LITE
LIVE PREVIEW

Improvement of Certain Encryption Approaches Based on the LPN - - PowerPoint PPT Presentation

Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem Miodrag Mihaljevic and Hideki Imai Research Center for Information Security (RCIS), National Institute AIST, Tokyo Symmetric Key


slide-1
SLIDE 1

1

Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem

Miodrag Mihaljevic and Hideki Imai Research Center for Information Security (RCIS), National Institute AIST, Tokyo Symmetric Key Encryption Workshop 2011 Copenhagen, 17 February 2011

slide-2
SLIDE 2

2

Abstract

  • This talk proposes an

improvement of certain encryption approaches designed based on hardness of the learning from parity with noise (LPN) problem.

  • The proposal employs a

dedicated homophonic coding and randomness resulting in a harder underlying LPN problem in comparison with the related source schemes without homophonic coding.

  • The proposed encryption is

compared with the related recently reported ones and it is pointed out that the novel scheme can provide an enhanced security, reduced communications

  • verhead and has

approximately the same implementation complexity.

slide-3
SLIDE 3

3

Roadmap

  • Introduction
  • Encryption Involving Homophonic Coding
  • Security Evaluation
  • Comparisons
  • A Step Forward
  • Concluding Remarks
slide-4
SLIDE 4

4

  • I. Introduction

Encryption Schemes Based on the LPN Problem

slide-5
SLIDE 5

5

Encryption Schemes Based on the LPN Problem

  • H. Gilbert, M.J.B. Robshaw, and Y. Seurin, “How

to Encrypt with the LPN Problem”, ICALP 2008, Part II, Lecture Notes in Computer Science,

  • vol. 5126, pp. 679-690, 2008.
  • B. Applebaum, D. Cash, C. Peikert and A. Sahai,

“Fast Cryptographic Primitives and Circular- Secure Encryption Based on Hard Learning Problems”, CRYPTO 2009, Lecture Notes in Computer Science, vol. 5677, pp. 595-618, Aug. 2009.

slide-6
SLIDE 6

6

LPN Problem Based Encryption

slide-7
SLIDE 7

7

Secret Key Matrix plaintext public random vector plaintext

Encryption Decryption

Source of Randomness Secret Key Matrix

a a {xi}

Error-Correction Encoding

+ +

Error-Correction Decoding

+

ciphertext ciphertext

LPN Problem Based Encryption

X X

u z z u

slide-8
SLIDE 8

8

  • II. Encryption Based on

Pseudo-Randomness, Randomness and Dedicated Coding

Pow

  • wer of
  • f Random
  • mness

ss for

  • r Enhancing

g Security and Low

  • w Im

Implementation

  • n

Com

  • mplexi

xity

slide-9
SLIDE 9

9

Design Motivations

  • Our goal is to design an

encryption scheme where, assuming the chosen plaintext attack, the randomness involved in homophonic encoding protects secret key as a consequence of the following:

  • Removing of the randomness,

i.e. decoding, without knowledge of the secret key becomes as complex as recovering the secret key employing the exhaustive search approach.

  • (The security evaluation given

shows how close the proposed design is to the above specified goal.)

  • Accordingly, this paper

proposes employment of the concatenation of dedicated homophonic encoding and error-correction coding instead of just the error- correction one as the approach for enhancing the security, as well as to provide additional implementation flexibility

  • f the encryption schemes

reported at ICALP2008 and CRYPTO2009.

slide-10
SLIDE 10

10

Power of Randomness for High Security and Low Implementation Complexity

Design Components:

  • Simple Finite State

Machine for the Pseudo-Randomness

  • Dedicated Coding:

Homophonic and Error-Correction Ones

  • Randomness

Effects:

  • Enhanced Security

Implied by Randomness

  • Low Implementation

Complexity

slide-11
SLIDE 11

11

+

f(k,u) k v z [a||r] G r a u u

slide-12
SLIDE 12

12

An Advanced LPN Problem Based Encryption Scheme Employing Homophonic Coding

Power of Randomness for Enhancing Security

slide-13
SLIDE 13

13

Secret Key Matrix plaintext public random vector plaintext

Encryption Decryption

Source of Randomness Secret Key Matrix

a a

Error-Correction Encoding

+ +

Error-Correction Decoding

+

ciphertext ciphertext

Homophonic Coding Based LPN Encryption X X

u z z u

Homophonic Encoding Homophonic Decoding

slide-14
SLIDE 14

14

slide-15
SLIDE 15

15

slide-16
SLIDE 16

16

Secret Key Matrix plaintext public random vector plaintext

Encryption Decryption

Source of Randomness Secret Key Matrix

a a

Error-Correction Encoding

+ +

Error-Correction Decoding

+

ciphertext ciphertext

Homophonic Coding Based LPN Encryption X X

u z z u

Homophonic Encoding Homophonic Decoding

slide-17
SLIDE 17

17

Groups of the codewords: Same symbol denote different codewords belonging to the same group

*

x Codewords and N-dim Sphere x x x x x

* * * * *

x

* *

x

*

x

* * *

x

* *

x

*

Homophonic Encoding

slide-18
SLIDE 18

18

Homophonic and Error-Correction Encoding

data rand Generator Matrix

  • f

Homophonic Code Generator Matrix

  • f

Error-Correcting Code = = codeword x x

slide-19
SLIDE 19

19

Origins of for the Enhanced Security

  • Effects of

involvement randomness.

  • Hardness of

decoding without secret key.

slide-20
SLIDE 20

20

  • III. Security Evaluation

Computational Complexity

slide-21
SLIDE 21

21

Algebraic Representation at

Bit-Level

slide-22
SLIDE 22

22

slide-23
SLIDE 23

23

Security Implied by Hardness of Recovering Secret Key Based on the Algebraic Representation of Encryption

  • The Computational Complexity -
slide-24
SLIDE 24

24

Basic System of Equations Related to a Single Word when the Plaintext Consists of all Zeros

slide-25
SLIDE 25

25

The Aggregated System with eliminated “purely random bits”

slide-26
SLIDE 26

26

LPN Problem (an equivalent formulation)

= + x

secret noise (unknown) known binary vector known binary matrix

slide-27
SLIDE 27

27

Underlying Problem of the LPN

linear-f1(x1, x2, …, xK)

= z1

linear-f2(x1, x2, …, xK)

= z2

linear-fN(x1, x2, …, xK)

= zN

O S V Y E S R T D E E M F I N E D

noisy variables

K << N

slide-28
SLIDE 28

28

The Corrupting Noise

slide-29
SLIDE 29

29

Security and LPN Problem

slide-30
SLIDE 30

30

A Claim on Security of the Proposed Encryption

slide-31
SLIDE 31

31

  • IV. Comparison with the

Schemes Reported at

ICALP2008 and CRYPTO2009

slide-32
SLIDE 32

32

A comparison of certain features of the proposed encryption and two related

  • nes recently reported at ICALP2008 and CRYPTO2009. (The "balanced

random bit" is one which takes values "0" and "1" withthe same probability equal to 1/2.)

slide-33
SLIDE 33

33

Comparison of Certain Implementation Features

slide-34
SLIDE 34

34

  • V. A Step Forward

Homophonic Coding Based Compact Stream Ciphers

slide-35
SLIDE 35

35

Randomized Stream Ciphers

Only Noisy Sample Available for Cryptanalysis

slide-36
SLIDE 36

36

Stream Cipher Approaches

  • One-Time Pad – pure

random approach (provable security)

  • Traditional

Keystream Generator – finite state machine: a deterministic approach (heuristic security) Randomized approach:

  • A stream cipher based
  • n employment of

Pseudorandomness, Randomness and Dedicated Coding

  • Towards provable

security implied by the dimension of secret key

slide-37
SLIDE 37

37

Power of Randomness for High Security and Low Implementation Complexity

Design Components:

  • Simple Finite State

Machine for the Pseudo-Randomness

  • Dedicated Coding:

Homophonic and Error-Correction Ones

  • Randomness

Effects:

  • Enhanced Security

Implied by Randomness

  • Low Implementation

Complexity

slide-38
SLIDE 38

38

Secret Key Matrix plaintext public random vector plaintext

Encryption Decryption

Source of Randomness Secret Key Matrix

a a

Error-Correction Encoding

+ +

Error-Correction Decoding

+

ciphertext ciphertext

Homophonic Coding Based LPN Encryption X X

u z z u

Homophonic Encoding Homophonic Decoding

slide-39
SLIDE 39

39

Homophonic Encoding Elementary Keystream Generator plaintext secret key plaintext secret key

Encryption Decryption

Source of Randomness Elementary Keystream Generator

{ai} {xi} {ui} {zi} {vi} {ai} {xi}

Error-Correction Encoding

+ +

Homophonic Decoding Error-Correction Decoding

+

ciphertext

{zi}

ciphertext

Framework for a Stream Ciphers Design

slide-40
SLIDE 40

40

  • VI. Concluding Remarks
slide-41
SLIDE 41

41

  • The homophonic coding

controlled by the randomness, provides that an attacker faces not only the traditional problems of cryptanalysis but also the problem of decoding without the secret key which appears as complex as the exhaustive search

  • ver the possible secret

keys.

  • The framework provides

computational-complexity security as hard as certain instantiations of the LPN problem.

  • Assuming availability of very

short keystream segments

  • nly, the encryption

framework provides certain level of information- theoretic security.

slide-42
SLIDE 42

42

Thank You Very Much for the Attention,

and QUESTIONS Please!