Introduction to Provable Security
Introduction to Provable Security
Alejandro Hevia
- Dept. of Computer Science,
Universidad de Chile
Advanced Crypto School, Florian´
- polis
October 17, 2013
1/77
Introduction to Provable Security Alejandro Hevia Dept. of Computer - - PowerPoint PPT Presentation
Introduction to Provable Security Introduction to Provable Security Alejandro Hevia Dept. of Computer Science, Universidad de Chile Advanced Crypto School, Florian opolis October 17, 2013 1/77 Introduction to Cryptography Part I
Introduction to Provable Security
1/77
Introduction to Cryptography
2/77
Introduction to Cryptography What Cryptography is about Classic Goals
3/77
Introduction to Cryptography What Cryptography is about Classic Goals
4/77
Introduction to Cryptography What Cryptography is about Classic Goals
4/77
Introduction to Cryptography What Cryptography is about Classic Goals
5/77
Introduction to Cryptography What Cryptography is about Classic Goals
6/77
Introduction to Cryptography What Cryptography is about Classic Goals
7/77
Introduction to Cryptography What Cryptography is about Classic Goals
1 Store a document 2 Send a message
8/77
Introduction to Cryptography What Cryptography is about Classic Goals
9/77
Provable Security
10/77
Provable Security Provably Security: The Short Story The need for Provable Security
11/77
Provable Security Provably Security: The Short Story The need for Provable Security
1 Found an interesting cryptographic goal 2 Propose a solution 3 Search for an attack (ie. bug) 4 If one found, go back to step 2.
12/77
Provable Security Provably Security: The Short Story The need for Provable Security
1 Define goal of scheme (or adversary) 2 Define attack model 3 Give a protocol 4 Define complexity assumptions (or assumptions on the
5 Provide a proof by reduction 6 Verify proof 7 Interpret proof 13/77
Provable Security Provably Security: The Short Story The need for Provable Security
14/77
Provable Security Provably Security: The Short Story The need for Provable Security
15/77
Provable Security Provably Security: The Short Story The need for Provable Security
15/77
Provable Security Provably Security: The Short Story The need for Provable Security
$
Provable Security Provably Security: The Short Story The need for Provable Security
$
Provable Security Provably Security: The Short Story The need for Provable Security
18/77
Provable Security Provably Security: The Short Story The need for Provable Security
$
19/77
20/77
$
21/77
22/77
22/77
22/77
23/77
23/77
24/77
24/77
1 To make precise the algorithmic assumptions (some given) 2 To define the security notions to be guaranteed (next)
3 A reduction! 25/77
26/77
27/77
27/77
27/77
1 Trapdoor one-way permutations are enough for secure
2 One-way functions are enough for secure signatures
28/77
29/77
29/77
30/77
30/77
Security Notions
31/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
32/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
1 Security goal of the scheme (= Opposite to Adversary’s goal)
2 Attack model
32/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
33/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
34/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
$
35/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
36/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
36/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
36/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
37/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
1 Signature schemes: Full-Domain Hash [Bellare-Rogaway 96],
2 Encryption schemes: OAEP-based constructions
37/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
38/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
39/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
39/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
1 Define sequence of games G0,G1,. . . , G5 of games or
2 All games in the same probability space. 3 Rules on how the view of the game is computed differs. 4 Successive games are very similar, typically with slightly
5 G0 is the actual security game (EUF-CMA) 6 G5 is the game for the underlying assumption (OW). 7 We relate the probabilities of the events that define the
40/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
41/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
$
42/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
$
43/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
44/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
44/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
$
45/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
$
45/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
46/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
46/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
46/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
47/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
48/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
48/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
49/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
50/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
51/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
52/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
53/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
$
$
AS
54/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
$
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
56/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
57/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
57/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
58/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
59/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
59/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
60/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
61/77
Security Notions Security Notion for Signature Schemes Security Notion for Encryption Schemes
62/77
Concluding Remarks
63/77
Concluding Remarks
64/77
Concluding Remarks
65/77
Concluding Remarks
66/77
67/77
68/77
69/77
70/77
71/77
72/77
73/77
74/77
75/77
76/77
77/77