parallel cfs
play

Parallel-CFS Strengthening the CFS McEliece-Based Signature Scheme - PowerPoint PPT Presentation

Parallel-CFS Strengthening the CFS McEliece-Based Signature Scheme Matthieu Finiasz Digital Signatures The hash and sign paradigm m c slide 1/18 . Any public key encryption can be turned into a signature. Digital Signatures The hash and


  1. Parallel-CFS Strengthening the CFS McEliece-Based Signature Scheme Matthieu Finiasz

  2. Digital Signatures The hash and sign paradigm m c slide 1/18 . Any public key encryption can be turned into a signature.

  3. Digital Signatures The hash and sign paradigm plaintext�space ciphertext�space ic k e b l y u p c a f i t io ri n e v s h ' ? h n o i t c n u f D h s a h slide 1/18 . The document is simply hashed into a random ciphertext.

  4. The Niederreiter Cryptosystem c m mt m t H c mt slide 2/18 . H is a scrambled Goppa code parity check matrix.

  5. The Niederreiter Cryptosystem The signature problem c m mt m t H c mt slide 3/18 . Ciphertexts are always decodable syndromes...

  6. The Niederreiter Cryptosystem The signature problem plaintext�space ciphertext�space s ome r d n y s e l b a d o c e d mt h n o i t c n u f h D s a h slide 3/18 . Random syndromes are not decodable.

  7. The CFS Signature Scheme [Courtois-Finiasz-Sendrier 2001] h h i s , i h mt h D , i slide 4/18 . A counter i is appended to the document D .

  8. The CFS Signature Scheme [Courtois-Finiasz-Sendrier 2001] . Key generation works like for Niederreiter. . Signature repeats the following steps: . compute h i = h ( D, i ) , . try to decode the syndrome h i into s , success ∼ 1 t ! . the signature is ( s, i 0 ) for the first decodable h i 0 . . Verification is simple and fast: . compute h i 0 = h ( D, i 0 ) , . compute e s , the word of weight t corresponding to s , . compare h i 0 and H × e s . slide 4/18

  9. One out of Many Syndrome Decoding . When attacking Niederreiter, one has to find the error pattern corresponding to a given syndrome: Syndrome Decoding (SD) Input: A binary matrix H , a weight t and a target syndrome s . Problem: Find e of weight at most t such that H × e = s . . When attacking CFS, one has to find an error pattern corresponding to one of the h i : One out of Many Syndrome Decoding (OMSD) Input: A binary matrix H , a weight t and a set L of syndromes. Problem: Find e of weight at most t such that H × e ∈ L . slide 5/18

  10. Generalized Birthday Algorithm Bleichenbacher’s Attack on CFS . Build 4 lists H h . Merge them . zero some bits h h h h h h h h . Lists remain small slide 6/18

  11. Generalized Birthday Algorithm Bleichenbacher’s Attack on CFS . The size of the lists of low weight syndromes is limited . it is compensated by a larger list of hashes. . One obtains the following complexity formulas: Complexity = L log( L ) , with   √ 2 mt 2 mt  . L = min ) , ( 2 m  2 m ( ) t −⌊ t/ 3 ⌋ ⌊ t/ 3 ⌋ mt 3 instead of . Asymptotically the cost of an attack is 2 mt 2 for SD. 2 slide 7/18

  12. Parallel-CFS

  13. Parallel-CFS Description . Instead of signing one hash, one uses two (or i ) different hash functions and signs each hash. slide 8/18

  14. Parallel-CFS Description . Instead of signing one hash, one uses two (or i ) different hash functions and signs each hash. . Using a counter is no longer possible: . using different counters makes parallelism useless, . with one counter, the probability of having 2 decodable syndromes simultaneously is too small: � cost of signing would be t ! 2 instead of t ! , slide 8/18

  15. Parallel-CFS Description . Instead of signing one hash, one uses two (or i ) different hash functions and signs each hash. . Using a counter is no longer possible: . using different counters makes parallelism useless, . with one counter, the probability of having 2 decodable syndromes simultaneously is too small: � cost of signing would be t ! 2 instead of t ! , . We use a CFS variant based on complete decoding: . the signature is a word of weight t + δ , . δ positions are searched for exhaustively, slide 8/18 . cost/signature size are roughly the same

  16. Parallel-CFS Cost and gains . Using the CFS variant allows to sign almost every hash: . signing every hash requires to know the covering radius ( 2 m > 2 mt , ) . δ is chosen so that t + δ � mostly negligible probability of non signability. . Allowing t + δ errors makes OMSD attacks easier: . the first 3 lists can be larger, = 2 mt the attack costs exactly 2 ( 2 m mt ) 3 . . when t + δ ( 2 m = 2 mt , ) . To simplify computations we consider t + δ . in practice the 3 lists can be slightly larger, but the slide 9/18 gain in terms of attack cost is negligible.

  17. Attacking Parallel-CFS . There is not a unique way of attacking Parallel-CFS. . Using two independent SD attacks: . the cost of such an attack is well known [Finiasz, Sendrier - Asiacrypt 2009] mt 2 . . gives a reference security of the order of 2 . Using OMSD two strategies are possible: . attack both instances in parallel, . attack them sequentially. slide 10/18

  18. Attacking Parallel-CFS Parallelizing OMSD . This strategy considers one “double size” instance: H 0 h h h h 0 H h h h h 2 3 mt , . Here, the cost of the attack is of the order of 2 . this attack is more expensive than direct SD attacks. slide 11/18

  19. Attacking Parallel-CFS Chaining OMSD . One has to solve two instances with “linked” syndromes: H h h h h h h h h h H h h h h h h h h h . The forgeries must be for h i and h ′ i with the same i . slide 12/18

  20. Attacking Parallel-CFS Chaining OMSD . One has to solve two instances with “linked” syndromes: H h 1 h 2 h 3 h 4 h 5 h 6 h 7 h 8 h 9 H h ' h ' h ' h ' h ' 5 h ' 6 h ' 7 h ' 8 h ' 1 2 3 4 9 . Start by solving the first instance slide 13/18

  21. Attacking Parallel-CFS Chaining OMSD . One has to solve two instances with “linked” syndromes: H h h h H h h h h h h h h h . Start by solving the first instance . find several solutions, and keep them slide 13/18

  22. Attacking Parallel-CFS Chaining OMSD . One has to solve two instances with “linked” syndromes: H h h h H h h h h h h h h h . Start by solving the first instance . find several solutions, and keep them slide 13/18 . solve the second instance with the associated list.

  23. Attacking Parallel-CFS Chaining OMSD . One has to solve two instances with “linked” syndromes: H h 4 h 7 h 9 H h 1 h 2 h 3 h 4 h 5 h 6 h 8 . The same technique can be chained i times for order i parallel-CFS, slide 13/18 . each step will reduce the number of target syndromes.

  24. Attacking Parallel-CFS Chaining OMSD . The attack complexity depends on the costs of finding: . 2 c 1 solutions with unlimited target syndromes, . 2 c j +1 solutions given 2 c j target syndromes. . The cost of this attack is asymptotically: 2 i − 1 2 i +1 − 1 mt . Complexity = iL log( L ) , with L = 2 . The exponent follows the series 1 3 , 3 7 , 7 15 , 15 31 ... mt 2 , . asymptotic complexity can never reach 2 . i = 2 or 3 is already very close. slide 14/18

  25. Parameter Examples Fast signature parameters ISD security against sign. failure public key sign. sign. m t δ i security (chained) GBA probability size cost size 2 81 . 0 2 59 . 1 2 15 . 3 20 8 2 1 ∼ 0 20.0 MB 98 2 75 . 7 2 16 . 3 – – – 2 – ∼ 0 – 196 2 82 . 5 2 16 . 9 – – – 3 – ∼ 0 – 294 2 76 . 5 2 53 . 6 2 − 155 2 18 . 5 16 9 2 1 1.1 MB 81 2 68 . 7 2 − 154 2 19 . 5 – – – 2 – – 162 2 74 . 9 2 − 153 2 20 . 0 – – – 3 – – 243 2 84 . 5 2 59 . 8 2 − 1700 2 18 . 5 18 9 2 1 5.0 MB 96 2 76 . 5 2 − 1700 2 19 . 5 – – – 2 – – 192 2 83 . 4 2 − 1700 2 20 . 0 – – – 3 – – 288 2 88 . 5 2 62 . 8 2 18 . 5 19 9 2 1 ∼ 0 10.7 MB 103 2 80 . 5 2 19 . 5 – – – 2 – ∼ 0 – 206 2 87 . 7 2 20 . 0 – – – 3 – ∼ 0 – 309 2 76 . 2 2 55 . 6 2 21 . 8 15 10 3 1 ∼ 0 0.6 MB 90 2 71 . 3 2 22 . 8 – – – 2 – ∼ 0 – 180 2 77 . 7 2 23 . 4 – – – 3 – ∼ 0 – 270 2 86 . 2 2 59 . 1 2 − 13 2 21 . 8 16 10 2 1 1.2 MB 90 2 75 . 7 2 − 12 2 22 . 8 – – – 2 – – 180 2 82 . 5 2 − 11 . 3 2 23 . 4 – – – 3 – – 270 2 90 . 7 2 62 . 5 2 − 52 2 21 . 8 17 10 2 1 2.7 MB 98 slide 15/18 2 80 . 0 2 − 51 2 22 . 8 – – – 2 – – 196 2 87 . 2 2 − 50 2 23 . 4 – – – 3 – – 294

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend