Non-uniform cracks in the concrete Daniel J. Bernstein University - - PDF document

non uniform cracks in the concrete daniel j bernstein
SMART_READER_LITE
LIVE PREVIEW

Non-uniform cracks in the concrete Daniel J. Bernstein University - - PDF document

Non-uniform cracks in the concrete Daniel J. Bernstein University of Illinois at Chicago Joint work with: Tanja Lange Technische Universiteit Eindhoven Paper coming soon, including detailed credits and historical discussion. Classic


slide-1
SLIDE 1

Non-uniform cracks in the concrete Daniel J. Bernstein University of Illinois at Chicago Joint work with: Tanja Lange Technische Universiteit Eindhoven Paper coming soon, including detailed credits and historical discussion.

slide-2
SLIDE 2

Classic “concrete security” metric for cipher insecurity: “The maximum,

  • ver all adversaries

restricted to q✵ input-output examples and execution time t✵,

  • f the ‘advantage’

that the adversary has in the game of distinguishing [the cipher for a secret key] from a random permutation.”

slide-3
SLIDE 3

Attractive theorems: e.g., “Advprf

CBC♠-❋ (q❀ t) ✔

Advprp

❋ (q✵❀ t✵) + q2♠2

2❧1 where q✵ = ♠q and t✵ = t + ❖(♠q❧).”

slide-4
SLIDE 4

Attractive theorems: e.g., “Advprf

CBC♠-❋ (q❀ t) ✔

Advprp

❋ (q✵❀ t✵) + q2♠2

2❧1 where q✵ = ♠q and t✵ = t + ❖(♠q❧).” Conjectured bounds on insecurity of specific ciphers that have survived cryptanalysis: e.g., “Advprpcpa

AES

(✁ ✁ ✁) ✔ ❝1 ✁ t❂❚AES 2128 + ❝2 ✁ q 2128 .”

slide-5
SLIDE 5

Similar public-key story. Define t-insecurity of RSA-1024 as maximum success probability

  • f all attacks that cost ✔ t.
slide-6
SLIDE 6

Similar public-key story. Define t-insecurity of RSA-1024 as maximum success probability

  • f all attacks that cost ✔ t.

Prove, e.g., that bounds

  • n insecurity of RSA-1024

imply similar bounds

  • n insecurity of RSA-1024-PSS.
slide-7
SLIDE 7

Similar public-key story. Define t-insecurity of RSA-1024 as maximum success probability

  • f all attacks that cost ✔ t.

Prove, e.g., that bounds

  • n insecurity of RSA-1024

imply similar bounds

  • n insecurity of RSA-1024-PSS.

Conjecture bounds

  • n insecurity of RSA-1024:

e.g., “it takes time ❈❡1✿923(log ◆)1❂3(log log ◆)2❂3 to invert RSA”.

slide-8
SLIDE 8

These conjectures are wrong. There exist algorithms breaking AES, RSA-3072, DSA-3072, and ECC-256 at cost far below 2128; e.g., time 285 to break ECC-256. (Assuming standard heuristics.)

slide-9
SLIDE 9

These conjectures are wrong. There exist algorithms breaking AES, RSA-3072, DSA-3072, and ECC-256 at cost far below 2128; e.g., time 285 to break ECC-256. (Assuming standard heuristics.) No actual security problem: Finding these algorithms costs more than 2128.

slide-10
SLIDE 10

These conjectures are wrong. There exist algorithms breaking AES, RSA-3072, DSA-3072, and ECC-256 at cost far below 2128; e.g., time 285 to break ECC-256. (Assuming standard heuristics.) No actual security problem: Finding these algorithms costs more than 2128. ✮ Very large separation between standard definition and actual insecurity.

slide-11
SLIDE 11

These conjectures are wrong. There exist algorithms breaking AES, RSA-3072, DSA-3072, and ECC-256 at cost far below 2128; e.g., time 285 to break ECC-256. (Assuming standard heuristics.) No actual security problem: Finding these algorithms costs more than 2128. ✮ Very large separation between standard definition and actual insecurity. Undermines concrete-security evaluations and comparisons.

slide-12
SLIDE 12

Several possible fixes, all causing trouble. Examples:

slide-13
SLIDE 13

Several possible fixes, all causing trouble. Examples:

  • 1. Add enough uniformity.

Clearly stops attacks. Requires massive rewrite

  • f theorems in literature.

Abandons goal of defining concrete security of AES.

slide-14
SLIDE 14

Several possible fixes, all causing trouble. Examples:

  • 1. Add enough uniformity.

Clearly stops attacks. Requires massive rewrite

  • f theorems in literature.

Abandons goal of defining concrete security of AES.

  • 2. Switch to ❆❚ metric.

Preserves goal of defining concrete security of AES. Seems to stop all attacks above reasonable Pr cutoff. Breaks more theorems.