16.01.2015 | 1
Johannes Buchmann and Nina Bindel
Post-Quantum Cryptography
Post-Quantum Cryptography Johannes Buchmann and Nina Bindel - - PowerPoint PPT Presentation
Post-Quantum Cryptography Johannes Buchmann and Nina Bindel 16.01.2015 | 1 Public-key cryptography 16.01.2015 | 2 Public-key encryption plaintext plaintext encrypt decrypt ciphertext public secret 16.01.2015 | 3 Digital signatures
16.01.2015 | 1
Johannes Buchmann and Nina Bindel
Post-Quantum Cryptography
16.01.2015 | 2
16.01.2015 | 3
Public-key encryption
ciphertext
secret decrypt encrypt public plaintext plaintext
16.01.2015 | 4
Digital signatures
document signature valid / invalid
public verify sign secret
16.01.2015 | 5
16.01.2015 | 6
TLS
TLS
public-key encryption digital signatures
16.01.2015 | 7
Software downloads
digital signatures
16.01.2015 | 8
Number of worldwide downloads from Apple App Store July 2008 - October 2014 (in billions)
0,01 0,1 1 1,5 3 4 5 6,5 7 10 14 15 18 25 30 35 40 50 60 70 75 85 10 20 30 40 50 60 70 80 90 Jul '08 Sep '08 Apr '09 Jul '09 Jan '10 April '10 June '10 Sep '10 Oct '10 Jan '11 Jun '11 Jul '11 Okt '11 Mar '12 Jun '12 Oct '12 Jan '13 May '13 Oct '13 Apr '14 Jun '14 Oct '14 Downloads (in billions)
Source: Apple
16.01.2015 | 9
16.01.2015 | 10
“Generic” RSA Public key: finite Group G, exponent e, gcd e, G 1 Secret key: |G| Allows to compute: g
16.01.2015 | 11
“Generic” RSA encryption Public key: finite Group G, exponent e, gcd e, G 1 Secret key: |G| Allows to compute: g
decrypt ciphertext s g s
g encrypt s g
plaintext g
16.01.2015 | 12
“Generic” RSA signature Public key: finite Group G, exponent e, gcd e, G 1 Secret key: |G| Allows to compute: g
Hash function h: 0,1∗→ G
verify signature s s ? hd document d sign s hd
invalid
16.01.2015 | 13
RSA: How to keep || secret? Public key: e, p, q primes, n pq, G /n∗ Secret key: G p 1 q 1 relies on hardness of integer factorization
16.01.2015 | 14
Factorization complexity
n v n n
u u
(log ) (log log )(
)
1
16.01.2015 | 15
Factorization progress
Elliptic Curve Method
1985
Quadratic Sieve L1/2,1 o 1
1984
Number Field Sieve L1/3, 64/9
1988
RSA-120 (QS)
1993
RSA-130 (NFS)
1996
RSA-576 (NFS)
2003
RSA-768 (NFS)
2009 1994
Shor algorithm L0, v] 21061 − 1 (NFS)
2012
16.01.2015 | 16
ElGamal encryption and signatures
Rely on Discrete Logarithm Problem: Given: Group G g , h ∈ G Find: x ∈ with h g Choices for G: -GFp∗
16.01.2015 | 17
Algorithms for solving ∗-DL
Pollard Rho L_n1, v]
1975 1994
Number Field Sieve L1/3, 64/9
2014
Shor algorithm L0, v]
1992 2013
GF(2·)
GF(3·) GF(3·)
2012
Joux
L_n1/4, v]
16.01.2015 | 18
Algorithms for solving EC-DL
1975
ECC-p-79
1997 1994
ECC-2-109
2004
ECC-p-109
2002
Secp112r1
2009
Pollard Rho L1, v] Shor algorithm L0, v] ECC2K-113
2014
ECC2K-108
2000
16.01.2015 | 19
16.01.2015 | 20
Shor’s algorithm 1997
16.01.2015 | 21
Quantum computer realistic?
16.01.2015 | 22
Quantum computer realistic
16.01.2015 | 23
16.01.2015 | 24
16.01.2015 | 25
Performance requirements
Secure until Security level RSA modulus/finite field size Elliptic curve 2015 80 1248 160 2025 96 1776 192 2030 112 2493 224 2040 128 3248 256
Ecrypt recommendations
16.01.2015 | 26
Post-quantum problems?
No provable quantum resistence
NP‐complete
Factoring
Bounded-Error Quantum Polynomial-Time
We must look here
16.01.2015 | 27
Candidates
finite fields
functions
NP‐complete
Factoring
16.01.2015 | 28
Strategy
Crypto scheme Quantum resistant problem parameter set instance hardness Security level Assess Optimize performance 1 2 3 4
16.01.2015 | 29
16.01.2015 | 30
MQ problem
4x x yz ≡ 1 mod 13 7y 2xz ≡ 12 mod 13 x y 12xz ≡ 4 mod 13 Solution: x 15, y 29, z 45
16.01.2015 | 31
MQ-Problem
Given:
n, m, p, … , p ∈ F x, … , x quadratic, F finite field
Find:
y, … , y ∈ F, such that p y, … , y … p y, … , y 0
MP is NP-complete (Garey, Johnson 1979) (decision version)
16.01.2015 | 32
Multivariate signatures
P: F → F, easily invertible non-linear S: F → F, T: F → F, affine linear Public key: G S◦P◦T, hard to invert Secret Key: S, P,T allows to compute G T◦P◦S Signing: s T◦P◦Sm Verifying: Gs ? m Forging signature: Solve G s m 0
Fast Large keys: 100 kBit for 100 bit security Compared to 1776 bit RSA modulus
16.01.2015 | 33
16.01.2015 | 34
BDD is NP-complete (Berlekamp et al. 1978) (Decisional version)
Bounded distance decoding problem
Given: Find:
16.01.2015 | 35
McEliece cryptosystem (1978)
S, G, P matrices over F G generator matrix for Goppa code Public key: G′ S◦G◦P, t Secret Key: P, S, G Encryption: c mG z ∈ F Decryption: x cP mSG zP solve BDD to get y mSG decode to obtain m
Allows to solve BDD Fast Large public keys! 500 kBits for 100 bit security Compared to 1776 bit RSA modulus IND-CPA secure version
16.01.2015 | 36
16.01.2015 | 37
Why lattice-based cryptography?
16.01.2015 | 38
Lattice problems
n ∈ , L b ⋯ b ⊆ n lattice; B = (b1, …, bn) basis
Given: α 1, lattice L LB basis B Find: v ∈ L nonzero such that | v | αλL
Given: α 1, lattice L LB basis B, t Find: v ∈ L such that t v α min∈| t w |
16.01.2015 | 39
2-dimensional αCVP
b2 b1 t CVt
Given: B b, b , t, α Find: CV t ∈ L B : t CV t α min ||t w||
w ∈ L
16.01.2015 | 40
Complexity of -CVP
n
Arora et al. (1997):
c n
c
all for hard
is CVP
hard
Goldreich, Goldwasser (2000):
AM AM coNP coNP
hard
not is CVP
/ n n
hard
not
16.01.2015 | 41
Practical complexity http://www.latticechallenge.org/
16.01.2015 | 42
The idea of lattice-based cryptography
16.01.2015 | 43
b b 1 2 b
16.01.2015 | 44
, reduced ⇒ CVP easy
b2 b1
t xb xb CV t x1b x2 b
CVt t
16.01.2015 | 45
, not reduced ⇒ CVP hard
L = 2, B = ( 1 0 , 0 1 , t 3.4 2.3 , CVPt 3 2 Another basis B’ = ( 100 99 , 99 98 ) t = 3.4 2.3 = −560.9 · 100 99 + 566.6 · 99 98 −561 · 100 99 + 567 · 99 98 = 33 27 3 2 = CVPt
16.01.2015 | 46
Key generation
Key generation: n ∈ , L ⊆ n lattice Secret key: „reduced“ basis B of L. (Allows to efficiently solve CVP.) Public key: „bad” basis B’ of L. (Does not.)
16.01.2015 | 47
Public-key encryption
Plaintext v ∈ L Encryption(public key, v)
Decryption(secret key, w): ‐ v CVw
w e v
16.01.2015 | 48
Public: Cryptographic hash function h: 0,1 → n
Digital signature
w v
w hd Sign(secret key, document d): v CVw Verify(public key, v, w): v close to w ?
16.01.2015 | 49
Learning the secret key
Nguyen and Regev 2006 NTRU-251 broken using ≈ 400 signatures GGH-400 broken using ≈ 160.000 signatures
s2 s1 s1 s3 s4
16.01.2015 | 50
Performance
The provable schemes to be studied more
improvements of Bindel: fast but large signatures
Göpfert: fast but ciphertext expansion
16.01.2015 | 51
16.01.2015 | 52
Trapdoor one-way function Digital signature scheme Collision resistant hash function
Typical construction
16.01.2015 | 53
One-way FF
Naor, Yung 1989 Rompel 1990
Digital signature scheme
16.01.2015 | 54
XMSS signature
JB, Coronado, Dahmen, Hülsing
One-way FF XMSS Pseudorandom FF Second-preimage resistant HFF
16.01.2015 | 55
Cryptographic HFF XMSS Pseudorandom FF Second-preimage resistant HFF
XMSS in practice
Trapdoor one-way function DL RSA MP-Sign Block Cipher
16.01.2015 | 56
AES Blowfish 3DES Twofish Threefish Serpent IDEA RC5 RC6 …
SHA-2 SHA-3 BLAKE Grøstl JH Keccak Skein VSH MCH MSCQ SWIFFTX RFSB …
16.01.2015 | 57
XMSS performance
16.01.2015 | 58
XMSS transfer project
Denis Butin, Stefan Gazdag
http://www.square-up.org/
16.01.2015 | 59
16.01.2015 | 60
Todos
Encrypt/McEliece
http://www.crossing.tu-darmstadt.de
16.01.2015 | 61