SLIDE 1
Non-uniform cracks in the concrete Daniel J. Bernstein University of Illinois at Chicago Joint work with: Tanja Lange Technische Universiteit Eindhoven Paper coming soon, including detailed credits and historical discussion.
SLIDE 2 Classic “concrete security” metric for cipher insecurity: “The maximum,
restricted to q✵ input-output examples and execution time t✵,
that the adversary has in the game of distinguishing [the cipher for a secret key] from a random permutation.”
SLIDE 3
Attractive theorems: e.g., “Advprf
CBC♠-❋ (q❀ t) ✔
Advprp
❋ (q✵❀ t✵) + q2♠2
2❧1 where q✵ = ♠q and t✵ = t + ❖(♠q❧).”
SLIDE 4
Attractive theorems: e.g., “Advprf
CBC♠-❋ (q❀ t) ✔
Advprp
❋ (q✵❀ t✵) + q2♠2
2❧1 where q✵ = ♠q and t✵ = t + ❖(♠q❧).” Conjectured bounds on insecurity of specific ciphers that have survived cryptanalysis: e.g., “Advprpcpa
AES
(✁ ✁ ✁) ✔ ❝1 ✁ t❂❚AES 2128 + ❝2 ✁ q 2128 .”
SLIDE 5 Similar public-key story. Define t-insecurity of RSA-1024 as maximum success probability
- f all attacks that cost ✔ t.
SLIDE 6 Similar public-key story. Define t-insecurity of RSA-1024 as maximum success probability
- f all attacks that cost ✔ t.
Prove, e.g., that bounds
imply similar bounds
- n insecurity of RSA-1024-PSS.
SLIDE 7 Similar public-key story. Define t-insecurity of RSA-1024 as maximum success probability
- f all attacks that cost ✔ t.
Prove, e.g., that bounds
imply similar bounds
- n insecurity of RSA-1024-PSS.
Conjecture bounds
- n insecurity of RSA-1024:
e.g., “it takes time ❈❡1✿923(log ◆)1❂3(log log ◆)2❂3 to invert RSA”.
SLIDE 8
These conjectures are wrong. There exist algorithms breaking AES, RSA-3072, DSA-3072, and ECC-256 at cost far below 2128; e.g., time 285 to break ECC-256. (Assuming standard heuristics.)
SLIDE 9
These conjectures are wrong. There exist algorithms breaking AES, RSA-3072, DSA-3072, and ECC-256 at cost far below 2128; e.g., time 285 to break ECC-256. (Assuming standard heuristics.) No actual security problem: Finding these algorithms costs more than 2128.
SLIDE 10
These conjectures are wrong. There exist algorithms breaking AES, RSA-3072, DSA-3072, and ECC-256 at cost far below 2128; e.g., time 285 to break ECC-256. (Assuming standard heuristics.) No actual security problem: Finding these algorithms costs more than 2128. ✮ Very large separation between standard definition and actual insecurity.
SLIDE 11
These conjectures are wrong. There exist algorithms breaking AES, RSA-3072, DSA-3072, and ECC-256 at cost far below 2128; e.g., time 285 to break ECC-256. (Assuming standard heuristics.) No actual security problem: Finding these algorithms costs more than 2128. ✮ Very large separation between standard definition and actual insecurity. Undermines concrete-security evaluations and comparisons.
SLIDE 12
Several possible fixes, all causing trouble. Examples:
SLIDE 13 Several possible fixes, all causing trouble. Examples:
- 1. Add enough uniformity.
Clearly stops attacks. Requires massive rewrite
- f theorems in literature.
Abandons goal of defining concrete security of AES.
SLIDE 14 Several possible fixes, all causing trouble. Examples:
- 1. Add enough uniformity.
Clearly stops attacks. Requires massive rewrite
- f theorems in literature.
Abandons goal of defining concrete security of AES.
Preserves goal of defining concrete security of AES. Seems to stop all attacks above reasonable Pr cutoff. Breaks more theorems.