Multi-Instance Security and its Application to Password- Based - - PowerPoint PPT Presentation
Multi-Instance Security and its Application to Password- Based - - PowerPoint PPT Presentation
Multi-Instance Security and its Application to Password- Based Cryptography Stefano Tessaro MIT Joint work with Mihir Bellare (UC San Diego) Thomas Ristenpart (Univ. of Wisconsin) Scenario: File encryption Want to store data in encrypted
Scenario: File encryption ο Want to store data in encrypted form using symmetric encryption.
Scenario: File encryption
- Keys need to be securely stored for later decryption
Want to store data in encrypted form using symmetric encryption.
Scenario: File encryption
- Keys need to be securely stored for later decryption
Want to store data in encrypted form using symmetric encryption. Alternative solution: Password-based cryptography.
Password-based encryption
Password-based encryption Used widely: Winzip, OpenOffice, Mac OS X FileVault,TrueCrypt, WiFi WPA (PBKDF), β¦
Password-based encryption
π³ = ππππππππ β¦ β¦ β¦ . . ππππππππππ
KDF
q1w2e3
Used widely: Winzip, OpenOffice, Mac OS X FileVault,TrueCrypt, WiFi WPA (PBKDF), β¦
Key-derivation function
Password-based encryption
π³ = ππππππππ β¦ β¦ β¦ . . ππππππππππ
KDF
q1w2e3
Used widely: Winzip, OpenOffice, Mac OS X FileVault,TrueCrypt, WiFi WPA (PBKDF), β¦
PB-Encrypt(ππ₯, π) πΏ ο KDF(ππ₯) π· ο ENC(πΏ, π) Return π·
Key-derivation function
Password-based encryption
ENC(π³, π)
π³ = ππππππππ β¦ β¦ β¦ . . ππππππππππ
KDF
q1w2e3
Used widely: Winzip, OpenOffice, Mac OS X FileVault,TrueCrypt, WiFi WPA (PBKDF), β¦
PB-Encrypt(ππ₯, π) πΏ ο KDF(ππ₯) π· ο ENC(πΏ, π) Return π·
Key-derivation function
Problem: Weak passwords are unavoidable
Problem: Weak passwords are unavoidable
Problem: Weak passwords are unavoidable
Mitigating dictionary attacks via iteration KDF = Hc
Mitigating dictionary attacks via iteration
β¦
ππ₯
πΏ
c times H H H KDF = Hc
Mitigating dictionary attacks via iteration
β¦
ππ₯
πΏ
c times H H H H βΆ {0,1}ββ {0,1}π is cryptographic hash function (e.g., SHA-256) KDF = Hc
Mitigating dictionary attacks via iteration
β¦
ππ₯
πΏ
c times H H H
PB-Encrypt(ππ₯, π) πΏ ο Hc(ππ₯) π· ο ENC(πΏ, π) Return π·
H βΆ {0,1}ββ {0,1}π is cryptographic hash function (e.g., SHA-256) KDF = Hc
Mitigating dictionary attacks via iteration
β¦
ππ₯
πΏ
c times H H H
PB-Encrypt(ππ₯, π) πΏ ο Hc(ππ₯) π· ο ENC(πΏ, π) Return π·
H βΆ {0,1}ββ {0,1}π is cryptographic hash function (e.g., SHA-256) Expectation: Work πΆ to guess ππ₯ ο Work π Γ πΆ to break PB-Encrypt KDF = Hc
Mitigating dictionary attacks via iteration
β¦
ππ₯
πΏ
c times H H H
PB-Encrypt(ππ₯, π) πΏ ο Hc(ππ₯) π· ο ENC(πΏ, π) Return π·
H βΆ {0,1}ββ {0,1}π is cryptographic hash function (e.g., SHA-256) Expectation: Work πΆ to guess ππ₯ ο Work π Γ πΆ to break PB-Encrypt
π = 232
KDF = Hc
Mitigating dictionary attacks via iteration
β¦
ππ₯
πΏ
c times H H H
PB-Encrypt(ππ₯, π) πΏ ο Hc(ππ₯) π· ο ENC(πΏ, π) Return π·
H βΆ {0,1}ββ {0,1}π is cryptographic hash function (e.g., SHA-256) Expectation: Work πΆ to guess ππ₯ ο Work π Γ πΆ to break PB-Encrypt
π = 232 π Γ π = 232 Γ 220 = 252
KDF = Hc
Mitigating dictionary attacks via iteration
β¦
ππ₯
πΏ
c times H H H
PB-Encrypt(ππ₯, π) πΏ ο Hc(ππ₯) π· ο ENC(πΏ, π) Return π·
H βΆ {0,1}ββ {0,1}π is cryptographic hash function (e.g., SHA-256) Expectation: Work πΆ to guess ππ₯ ο Work π Γ πΆ to break PB-Encrypt
π = 232 π Γ π = 232 Γ 220 = 252
KDF = Hc
Mitigating dictionary attacks via iteration
β¦
ππ₯
πΏ
c times H H H
PB-Encrypt(ππ₯, π) πΏ ο Hc(ππ₯) π· ο ENC(πΏ, π) Return π·
H βΆ {0,1}ββ {0,1}π is cryptographic hash function (e.g., SHA-256) Expectation: Work πΆ to guess ππ₯ ο Work π Γ πΆ to break PB-Encrypt
π = 232 π Γ π = 232 Γ 220 = 252
KDF = Hc
PB-Encryption in the multi-user setting Real world has multiple users:
PB-Encryption in the multi-user setting
π·1 β PBβEncrypt(ππ₯1, π1) π·2 β PBβEncrypt(ππ₯2, π2) π·3 β PBβEncrypt(ππ₯3, π3)
Real world has multiple users:
PB-Encryption in the multi-user setting
π·1 β PBβEncrypt(ππ₯1, π1) π·2 β PBβEncrypt(ππ₯2, π2) π·3 β PBβEncrypt(ππ₯3, π3)
Real world has multiple users:
PB-Encryption in the multi-user setting
π·1 β PBβEncrypt(ππ₯1, π1) π·2 β PBβEncrypt(ππ₯2, π2) π·3 β PBβEncrypt(ππ₯3, π3)
Real world has multiple users:
PB-Encryption in the multi-user setting Work π Γ πΆ to retrieve π1
π·1 β PBβEncrypt(ππ₯1, π1) π·2 β PBβEncrypt(ππ₯2, π2) π·3 β PBβEncrypt(ππ₯3, π3)
π1
Real world has multiple users:
PB-Encryption in the multi-user setting Work π Γ πΆ to retrieve π1
π·1 β PBβEncrypt(ππ₯1, π1) π·2 β PBβEncrypt(ππ₯2, π2) π·3 β PBβEncrypt(ππ₯3, π3)
π1
Real world has multiple users:
PB-Encryption in the multi-user setting Work π Γ πΆ to retrieve π1
π·1 β PBβEncrypt(ππ₯1, π1) π·2 β PBβEncrypt(ππ₯2, π2) π·3 β PBβEncrypt(ππ₯3, π3)
π1 π2
Additional work to retrieve π2? Real world has multiple users:
PB-Encryption in the multi-user setting Work π Γ πΆ to retrieve π1
π·1 β PBβEncrypt(ππ₯1, π1) π·2 β PBβEncrypt(ππ₯2, π2) π·3 β PBβEncrypt(ππ₯3, π3)
π1 π2
Additional work to retrieve π2? Ideally: Work π Γ π Γ πΆ to retrieve π plaintexts! Real world has multiple users:
Multi-instance security amplification Not true in general:
Multi-instance security amplification Not true in general:
Multi-instance security amplification c times
β¦
H H H ππ₯1 πΏ1 Not true in general:
Multi-instance security amplification c times
β¦
H H H ππ₯1 πΏ1
β¦
H H H ππ₯π πΏπ
β¦
Not true in general:
Multi-instance security amplification c times
β¦
H H H ππ₯1 πΏ1
β¦
H H H ππ₯π πΏπ
β¦
Work πΆ Γ π + Work πΆ / ciphertext = πΆ Γ π + π vs πΆ Γ π Γ π Not true in general:
Multi-instance security amplification c times
β¦
H H H ππ₯1 πΏ1
β¦
H H H ππ₯π πΏπ
β¦
Work πΆ Γ π + Work πΆ / ciphertext = πΆ Γ π + π vs πΆ Γ π Γ π Not true in general: New design goal: Multi-instance security amplification βHardness of breaking multiple instances must increase linearly in the number of instances.β
PKCS#5 β Password-based cryptography standard Salting as suggested in PKCS#5 prevents attack
PKCS#5 β Password-based cryptography standard
β¦
ππ₯||ππππ
πΏ
H H H Salting as suggested in PKCS#5 prevents attack KDF1:
PKCS#5 β Password-based cryptography standard
β¦
ππ₯||ππππ
πΏ
H H H Randomly chosen per KDF evaluation Salting as suggested in PKCS#5 prevents attack KDF1:
PKCS#5 β Password-based cryptography standard
β¦
ππ₯||ππππ
πΏ
H H H
PB-Encrypt(ππ₯, π) ππππ ο {0,1}π‘ πΏ ο Hc(ππ₯||ππππ) π· ο ENC(πΏ, π) Return π·||ππππ
Randomly chosen per KDF evaluation Salting as suggested in PKCS#5 prevents attack KDF1:
PKCS#5 β Password-based cryptography standard
β¦
ππ₯||ππππ
πΏ
H H H
PB-Encrypt(ππ₯, π) ππππ ο {0,1}π‘ πΏ ο Hc(ππ₯||ππππ) π· ο ENC(πΏ, π) Return π·||ππππ
Randomly chosen per KDF evaluation Salting as suggested in PKCS#5 prevents attack KDF1:
PKCS#5 β Password-based cryptography standard
β¦
ππ₯||ππππ
πΏ
H H H
PB-Encrypt(ππ₯, π) ππππ ο {0,1}π‘ πΏ ο Hc(ππ₯||ππππ) π· ο ENC(πΏ, π) Return π·||ππππ
Randomly chosen per KDF evaluation Salting as suggested in PKCS#5 prevents attack KDF1:
PKCS#5 β Password-based cryptography standard
β¦
ππ₯||ππππ
πΏ
H H H
PB-Encrypt(ππ₯, π) ππππ ο {0,1}π‘ πΏ ο Hc(ππ₯||ππππ) π· ο ENC(πΏ, π) Return π·||ππππ
Randomly chosen per KDF evaluation Allows decryption Salting as suggested in PKCS#5 prevents attack KDF1:
PKCS#5 β Password-based cryptography standard
β¦
ππ₯||ππππ
πΏ
H H H
PB-Encrypt(ππ₯, π) ππππ ο {0,1}π‘ πΏ ο Hc(ππ₯||ππππ) π· ο ENC(πΏ, π) Return π·||ππππ
Randomly chosen per KDF evaluation Allows decryption
Question: Does salting provably ensure multi- instance security amplification?
Salting as suggested in PKCS#5 prevents attack KDF1:
Iteration and salting in the real world No salting! No iteration!
Our results
Our results Question: Does salting provably ensure multi-instance security amplification?
Our results Question: Does salting provably ensure multi-instance security amplification? Answer: We do not really know!
Our results Question: Does salting provably ensure multi-instance security amplification? Answer: We do not really know! 1) No formal proof!
Our results Question: Does salting provably ensure multi-instance security amplification? Answer: We do not really know! 1) No formal proof! 2) No formal model!
Our results Our contributions: 1) General definitional framework for multi-instance security of arbitrary cryptographic primitives. 2) Case study: Security analysis of PKCS#5 within our framework. Question: Does salting provably ensure multi-instance security amplification? Answer: We do not really know! 1) No formal proof! 2) No formal model!
Outline
- 1. Multi-instance security
- 2. Security of PKCS#5 β A case study
Outline
- 1. Multi-instance security
- 2. Security of PKCS#5 β A case study
Single-instance security β PB-Encryption π β 0,1 ππ₯ β πππΈ LOR-Security
Single-instance security β PB-Encryption π β 0,1 ππ₯ β πππΈ π ππ(ππ, ππ) ππ, ππ |ππ| = |ππ| LOR-Security
Single-instance security β PB-Encryption π β 0,1 ππ₯ β πππΈ πβ² π ππ(ππ, ππ) ππ, ππ |ππ| = |ππ| LOR-Security
Single-instance security β PB-Encryption π β 0,1 ππ₯ β πππΈ πβ² π ππ(ππ, ππ) ππ, ππ |ππ| = |ππ| πππ°lor π΅ = 2 Γ [Pr π = πβ² β 1 2 ] LOR-Security
Single-instance security β PB-Encryption π β 0,1 ππ₯ β πππΈ πβ² π ππ(ππ, ππ) ππ, ππ |ππ| = |ππ| πππ°lor π΅ = 2 Γ [Pr π = πβ² β 1 2 ] LOR-Security
Single-instance security β PB-Encryption π β 0,1 ππ₯ β πππΈ πβ² π ππ(ππ, ππ) ππ, ππ |ππ| = |ππ| πππ°lor π΅ = 2 Γ [Pr π = πβ² β 1 2 ] LOR-Security ππ₯ β πππΈ PWR-Security
Single-instance security β PB-Encryption π β 0,1 ππ₯ β πππΈ πβ² π ππ(ππ, ππ) ππ, ππ |ππ| = |ππ| πππ°lor π΅ = 2 Γ [Pr π = πβ² β 1 2 ] π ππ(ππ, π) π LOR-Security ππ₯ β πππΈ PWR-Security
Single-instance security β PB-Encryption π β 0,1 ππ₯ β πππΈ πβ² π ππ(ππ, ππ) ππ, ππ |ππ| = |ππ| πππ°lor π΅ = 2 Γ [Pr π = πβ² β 1 2 ] ππβ² π ππ(ππ, π) π LOR-Security ππ₯ β πππΈ PWR-Security
Single-instance security β PB-Encryption π β 0,1 ππ₯ β πππΈ πβ² π ππ(ππ, ππ) ππ, ππ |ππ| = |ππ| πππ°lor π΅ = 2 Γ [Pr π = πβ² β 1 2 ] ππβ² π ππ(ππ, π) π LOR-Security ππ₯ β πππΈ PWR-Security πππ°pwr π΅ = Pr[ππβ² = ππ]
The multi-instance (mi) security vista Our goal: Define security metric for scheme S wrt property P to measure success of an adversary that:
- instances of the scheme concurrently.
- Corrupts up to π’ < π instances of the scheme (e.g.,
learns passwords).
- Wins if it breaks P for all uncorrupted instances.
The multi-instance (mi) security vista Our goal: Define security metric for scheme S wrt property P to measure success of an adversary that:
- Attacks π instances of the scheme concurrently.
- Corrupts up to π’ < π instances of the scheme (e.g.,
learns passwords).
- Wins if it breaks P for all uncorrupted instances.
The multi-instance (mi) security vista < ππ instances of the scheme (e.g., learns passwords). Our goal: Define security metric for scheme S wrt property P to measure success of an adversary that:
- Attacks π instances of the scheme concurrently.
- Corrupts up to π’ < π instances of the scheme (e.g.,
learns passwords).
- Wins if it breaks P for all uncorrupted instances.
The multi-instance (mi) security vista < ππ instances of the scheme (e.g., learns passwords). Our goal: Define security metric for scheme S wrt property P to measure success of an adversary that:
- Attacks π instances of the scheme concurrently.
- Wins if it breaks P for all uncorrupted instances.
- Wins if it breaks P for all uncorrupted instances.
PWR security
PWR security ππ₯3 β πππΈ ππ₯1 β πππΈ ππ₯2 β πππΈ
PWR security ππ₯3 β πππΈ ππ₯1 β πππΈ ππ₯2 β πππΈ
PWR security ππ₯3 β πππΈ ππ₯1 β πππΈ ππ₯2 β πππΈ
PWR security ππ₯3 β πππΈ ππ₯1 β πππΈ ππ₯2 β πππΈ
PWR security ππ₯3 β πππΈ ππ₯1 β πππΈ ππ₯2 β πππΈ (πππ
β² , πππ β² , πππ β² )
PWR security ππ₯3 β πππΈ ππ₯1 β πππΈ ππ₯2 β πππΈ (πππ
β² , πππ β² , πππ β² )
πππ°π§βπͺπ±π¬ π΅ = Pr[ππ1
β² = πππ, β¦ , πππ β² = πππ]
π3 β 0,1 ππ₯3 β πππΈ LOR security π1 β 0,1 ππ₯1 β πππΈ π2 β 0,1 ππ₯2 β πππΈ
π3 β 0,1 ππ₯3 β πππΈ LOR security π1 β 0,1 ππ₯1 β πππΈ π2 β 0,1 ππ₯2 β πππΈ
π3 β 0,1 ππ₯3 β πππΈ LOR security π1 β 0,1 ππ₯1 β πππΈ π2 β 0,1 ππ₯2 β πππΈ
π3 β 0,1 ππ₯3 β πππΈ LOR security π1 β 0,1 ππ₯1 β πππΈ π2 β 0,1 ππ₯2 β πππΈ πππ°π§βπ¦π©π¬ π΅ =?
Defining mi security for encryption Attempt #1: AND-advantage
Defining mi security for encryption Attempt #1: AND-advantage LORA-security: Advantage: πππ°π§βπ¦π©π¬π π΅ = ππ¬[ ππ, β¦ , ππ = ππ
β² , β¦ , ππ β²
] Output: ππ
β² , β¦ , ππ β²
Defining mi security for encryption Attempt #1: AND-advantage LORA-security: Advantage: πππ°π§βπ¦π©π¬π π΅ = ππ¬[ ππ, β¦ , ππ = ππ
β² , β¦ , ππ β²
] Output: ππ
β² , β¦ , ππ β²
Problem: Does not measure hardness of winning all uncorrupted instances.
Defining mi security for encryption Attempt #1: AND-advantage LORA-security: Advantage: πππ°π§βπ¦π©π¬π π΅ = ππ¬[ ππ, β¦ , ππ = ππ
β² , β¦ , ππ β²
] Output: ππ
β² , β¦ , ππ β²
Problem: Does not measure hardness of winning all uncorrupted instances.
Reason: If β adversary with ππ¬[ππ = ππ
β² ] > 3/4
Then β adversary guessing second bit at random, with ππ¬ ππ, ππ = ππ
β² , ππ β²
> 3 4 Γ 1 2 = 3/8
Defining mi security for encryption Attempt #1: AND-advantage LORA-security: Advantage: πππ°π§βπ¦π©π¬π π΅ = ππ¬[ ππ, β¦ , ππ = ππ
β² , β¦ , ππ β²
] Output: ππ
β² , β¦ , ππ β²
Problem: Does not measure hardness of winning all uncorrupted instances.
Reason: If β adversary with ππ¬[ππ = ππ
β² ] > 3/4
Then β adversary guessing second bit at random, with ππ¬ ππ, ππ = ππ
β² , ππ β²
> 3 4 Γ 1 2 = 3/8
Defining mi security for encryption Attempt #2: XOR-advantage
Defining mi security for encryption Attempt #2: XOR-advantage LORX-security: Advantage: πππ°π§βπ¦π©π¬π π΅ = 2 Γ ππ¬ πβ² = ππ β β― β ππ β 1/2 Output: πβ²
Defining mi security for encryption Attempt #2: XOR-advantage LORX-security: Advantage: πππ°π§βπ¦π©π¬π π΅ = 2 Γ ππ¬ πβ² = ππ β β― β ππ β 1/2 Output: πβ² Reason: If β adversary with ππ¬ πβ² = ππ > 1 + π 2 Then: Adversary guessing second bit has no advantage ππ¬ πβ² = ππ β ππ = 1 2
Mi security notions β Relations m-LORX m-LORA m-PWR
Mi security notions β Relations m-LORX m-LORA m-PWR (1)
Mi security notions β Relations m-LORX m-LORA m-PWR (1)
Mi security notions β Relations m-LORX m-LORA m-PWR (1) 1) Holds in most cases β proof relies on probabilistic lemma from [U09].
Mi security notions β Relations m-LORX m-LORA m-PWR (1) (2) 1) Holds in most cases β proof relies on probabilistic lemma from [U09].
Mi security notions β Relations m-LORX m-LORA m-PWR (1) (2) 1) Holds in most cases β proof relies on probabilistic lemma from [U09]. 2) Very loose asymptotic implication β based on Goldreich- Levin Theorem [GL89]
Relations β LOR vs ROR πβ²
ENC(ππ, ππ)
π β 0,1 ππ₯ β πππΈ ππ, ππ LOR-Security ROR-Security πβ²
ENC(ππ, ππ)
π β 0,1 π1 β π ππ₯ β πππΈ ππ
Relations β LOR vs ROR
Relations β LOR vs ROR
Classical textbook theorem. πππ°ror π β€ πππ°lor π β€ π Γ πππ°ror π
Relations β LOR vs ROR
Classical textbook theorem. πππ°ror π β€ πππ°lor π β€ π Γ πππ°ror π
Hybrid argument
Relations β LOR vs ROR
Classical textbook theorem. πππ°ror π β€ πππ°lor π β€ π Γ πππ°ror π
Hybrid argument L R L $ $ R + β€
Relations β LOR vs ROR
Classical textbook theorem. πππ°ror π β€ πππ°lor π β€ π Γ πππ°ror π
Hybrid argument
Mi setting with m instances:
πππ°mβrorx π β€ πππ°mβlorx π β€ ππ Γ πππ°mβrorx π
L R L $ $ R + β€
Relations β LOR vs ROR
Classical textbook theorem. πππ°ror π β€ πππ°lor π β€ π Γ πππ°ror π
Hybrid argument
Mi setting with m instances:
πππ°mβrorx π β€ πππ°mβlorx π β€ ππ Γ πππ°mβrorx π
L R L $ $ R + β€
L
R L $ $ R + β€ L R L $ L $ $ R $ R + L $ $ R +
Relations β LOR vs ROR
Classical textbook theorem. πππ°ror π β€ πππ°lor π β€ π Γ πππ°ror π
Hybrid argument
Mi setting with m instances:
πππ°mβrorx π β€ πππ°mβlorx π β€ ππ Γ πππ°mβrorx π
L R L $ $ R + β€
L
R L $ $ R + β€ L R L $ L $ $ R $ R + L $ $ R + Tight!
Outline
- 1. Multi-instance security
- 2. Security of PKCS#5 β A case study
Outline
- 1. Multi-instance security
- 2. Security of PKCS#5 β A case study
PKCS#5 β Defining KDF Security
PKCS#5 β Defining KDF Security
Question: Does salting provably ensures multi- instance security amplification? YES!
PKCS#5 β Defining KDF Security
Question: Does salting provably ensures multi- instance security amplification? YES!
β¦
ππ₯||ππππ
πΏ
H H H
PKCS#5 β Defining KDF Security
Question: Does salting provably ensures multi- instance security amplification? YES!
β¦
ππ₯||ππππ
πΏ
H H H Main step: Security analysis of KDF1 for case H = RO.
KDF Security in the ROM
RO
KDF1
ππ₯1||π‘π1, β¦ , ππ₯π||π‘ππ πΏ1, β¦ , πΏπ
KDF satisfies indifferentiability-like poperty [MRH04]
0/1
Sim
Test
ππ₯1||π‘π1, β¦ , ππ₯π||π‘ππ πΏ1, β¦ , πΏπ 0/1
βSim β password distributions: Left β Right
KDF Security in the ROM
RO
KDF1
ππ₯1||π‘π1, β¦ , ππ₯π||π‘ππ πΏ1, β¦ , πΏπ
KDF satisfies indifferentiability-like poperty [MRH04]
0/1
Sim
Test
ππ₯1||π‘π1, β¦ , ππ₯π||π‘ππ πΏ1, β¦ , πΏπ 0/1 π queries π queries
βSim β password distributions: Left β Right
KDF Security in the ROM
RO
KDF1
ππ₯1||π‘π1, β¦ , ππ₯π||π‘ππ πΏ1, β¦ , πΏπ
KDF satisfies indifferentiability-like poperty [MRH04]
0/1
Sim
Test
ππ₯1||π‘π1, β¦ , ππ₯π||π‘ππ πΏ1, β¦ , πΏπ 0/1 π queries π queries
βSim β password distributions: Left β Right
Final result: Security of PB-Encrypt
Question: Does salting deliver multi-instance security amplification for PKCS#5? PB-Encrypt(ππ₯, π)
ππππ ο {0,1}π‘ πΏ ο Hc(ππ₯||ππππ) π· ο ENC(πΏ, π) Return π·||ππππ
Theorem: βA making π RO queries, β B such that πππ°PBβEncrypt
π§βπ¬π©π¬π²
π΅ < π πππ + π β πππ°ENC
π¬π©π¬
πΆ + π2 2π
+
π2 2π‘
Final result: Security of PB-Encrypt
Question: Does salting deliver multi-instance security amplification for PKCS#5? PB-Encrypt(ππ₯, π)
ππππ ο {0,1}π‘ πΏ ο Hc(ππ₯||ππππ) π· ο ENC(πΏ, π) Return π·||ππππ
Theorem: βA making π RO queries, β B such that πππ°PBβEncrypt
π§βπ¬π©π¬π²
π΅ < π πππ + π β πππ°ENC
π¬π©π¬
πΆ + π2 2π
+
π2 2π‘
Work π Γ π Γ π to break encryption (RO queries)
Concluding Remarks Summary:
ο ο ο ο ο
Concluding Remarks Summary:
- The world has multiple users
ο ο ο ο
Concluding Remarks Summary:
- The world has multiple users
- Weak individual instances sometimes unavoidable
ο ο ο
Concluding Remarks Summary:
- The world has multiple users
- Weak individual instances sometimes unavoidable
- Mi security as a second line of defense
ο ο
Concluding Remarks Summary:
- The world has multiple users
- Weak individual instances sometimes unavoidable
- Mi security as a second line of defense
- Interesting technical questions
ο
Concluding Remarks Summary:
- The world has multiple users
- Weak individual instances sometimes unavoidable
- Mi security as a second line of defense
- Interesting technical questions
- First security analysis of PKCS#5 in the mi setting
Concluding Remarks Summary:
- The world has multiple users
- Weak individual instances sometimes unavoidable
- Mi security as a second line of defense
- Interesting technical questions
- First security analysis of PKCS#5 in the mi setting