Post-Quantum Cryptography
a talk about problems… problems… problems
Andreas Hülsing TU Eindhoven
Post-Quantum Cryptography a talk about problems problems problems - - PowerPoint PPT Presentation
Post-Quantum Cryptography a talk about problems problems problems Andreas Hlsing TU Eindhoven The Problem 9/3/2018 Andreas Hlsing https://huelsing.net 2 Public-key cryptography 9/3/2018 Andreas Hlsing https://huelsing.net 3
Andreas Hülsing TU Eindhoven
9/3/2018 Andreas Hülsing https://huelsing.net 2
9/3/2018 Andreas Hülsing https://huelsing.net 3
Key encapsulation mechanism (KEM)
9/3/2018 Andreas Hülsing https://huelsing.net 4
9/3/2018 Andreas Hülsing https://huelsing.net 5
Hi pk, Cert(pk belongs to shop) PKC to establish shared secret sk SKC secured communication using sk
9/3/2018 Andreas Hülsing https://huelsing.net 6
(Computationally)
RSA DL QR DDH
RSA- OAEP ECDSA DH- KE
9/3/2018 Andreas Hülsing https://huelsing.net 7
computers can solve previously used problems (Factoring & DLog)
9/3/2018 Andreas Hülsing https://huelsing.net 8
9/3/2018 Andreas Hülsing https://huelsing.net 9
9/3/2018 Andreas Hülsing https://huelsing.net 10
„Cryptography based on problems that are conjectured to be hard even for quantum computers.“
... 1
3 1 4 2 3 2 2 3 2 3 4 1 2 1 2 1 1
y x x x x x x y x x x x x x y Lattice-based: SVP / CVP Hash-based: CR / SPR / ... Code-based: SD Multivariate: MQ
9/3/2018 Andreas Hülsing https://huelsing.net 11
„Users using cryptography on conventional computers facing quantum adversaries“ Adds questions like
9/3/2018 Andreas Hülsing https://huelsing.net 12
theoretically secure
problems
solving problems aka breaking systems
9/3/2018 Andreas Hülsing https://huelsing.net 13
Keccak-,... problem)
9/3/2018 Andreas Hülsing https://huelsing.net 14
9/3/2018 Andreas Hülsing https://huelsing.net 15
“We see our role as managing a process of achieving community consensus in a transparent and timely manner” NIST’s Dustin Moody 2018
9/3/2018 Andreas Hülsing https://huelsing.net 16
Type PKE/KEM Signature Signature & PKE/KEM Lattice 21 (-1 due to merge) 5 Code-based 18 (-1 withdrawn) 3 (-1 withdrawn) Hash-based 3 Multivariate 2 7 2 (-1 withdrawn) Braid group 1 Supersingular Elliptic Curve Isogeny 1 Satirical submission 1 Other 4 (-2 withdrawn)
9/3/2018 Andreas Hülsing https://huelsing.net 17
Submissions
theoretic constructions.
implemented Attacks
underlying hard problems)
new” or exploit implementation decisions
9/3/2018 Andreas Hülsing https://huelsing.net 18
9/3/2018 Andreas Hülsing https://huelsing.net 19
Let 𝒚 = (𝑦1, … , 𝑦𝑜) ∈ 𝔾 𝑟
𝑜 and MQ(𝑜, 𝑛, 𝔾𝑟) denote the family of vectorial
functions 𝑮: 𝔾 𝑟
𝑜 ⟶ 𝔾 𝑟 𝑛 of degree 2 over 𝔾𝑟:
MQ 𝑜, 𝑛, 𝔾𝑟 = 𝑮 𝒚 = 𝑔
1 𝒚 , … , 𝑔 𝑛 𝒚
𝑔
𝑡 𝒚 = 𝑗,𝑘
𝑏𝑗,𝑘𝑦𝑗𝑦𝑘 +
𝑗
𝑐𝑗𝑦𝑗 ,
9/3/2018 Andreas Hülsing https://huelsing.net 20
‘17, Faugère, Horan, Kahrobaei, Kaplan, Kashefi & Perret ‘17)
9/3/2018 Andreas Hülsing https://huelsing.net 21
Given a matrix 𝐻 ∈ 𝔾𝑟
𝑙×𝑜 of rank 𝑙, the set 𝐷 ≔ {𝑛𝐻 ∶ 𝑛 ∈ 𝔾𝑟 𝑙} is called a linear
code with generator matrix 𝐻. If 𝐷 = 𝑑 ∈ 𝔾𝑟
𝑜 ∶ 𝐼𝑑𝑢 = 0 we call 𝐼 the parity
check matrix. Syndrom Decoding Problem Given:
𝑜,
𝑙,
Return:
𝑜 of weight ≤ 𝑐 such that 𝐼𝑓𝑢 = 𝑡
Decision version is NP-hard (Berlekamp, McEliece & v.Tilborg ‘78; Barg ‘94)
9/3/2018 Andreas Hülsing https://huelsing.net 22
9/3/2018 Andreas Hülsing https://huelsing.net 23
Basis: 𝐶 = 𝑐1, 𝑐2 ∈ ℤ2×2; 𝑐1, 𝑐2 ∈ ℤ2 Lattice: Λ 𝐶 = 𝑦 = 𝐶𝑧 𝑧 ∈ ℤ2}
9/3/2018 Andreas Hülsing https://huelsing.net 24
9/3/2018 Andreas Hülsing https://huelsing.net 25
< 𝛽 times norm of shortest vector). Hardness depends on 𝛽 (for 𝛽 used in crypto not NP-hard).
(e.g. ℤ𝑜), find the closest lattice point. (Generalization of SVP, reduction from SVP)
9/3/2018 Andreas Hülsing https://huelsing.net 26
Ajtai (1996)?
/ module lattices)
Module lattices)
v.d.Pol ‘15; Aono, Nguyen & Shen '18)
9/3/2018 Andreas Hülsing https://huelsing.net 27
ℎ𝑙 {0,1}𝑛 𝑜 {0,1}𝑜
𝐼𝑜 ≔ ℎ𝑙: {0,1}𝑛 𝑜 → {0,1}𝑜 ℎ𝑙
$ 𝐼𝑜
𝑦
$ {0,1}𝑛 𝑜
𝑧𝑑 ℎ𝑙 𝑦 Success if ℎ𝑙 𝑦∗ = 𝑧𝑑
𝑧𝑑, 𝑙 𝑦∗
𝐼𝑜 ≔ ℎ𝑙: {0,1}𝑛 𝑜 → {0,1}𝑜 ℎ𝑙
$ 𝐼𝑜
Success if ℎ𝑙 𝑦1
∗ = ℎ𝑙 𝑦2 ∗ and
𝑦1
∗ ≠ 𝑦2 ∗
𝑙 (𝑦1
∗, 𝑦2 ∗)
𝐼𝑜 ≔ ℎ𝑙: {0,1}𝑛 𝑜 → {0,1}𝑜 ℎ𝑙
$ 𝐼𝑜
𝑦𝑑
$ {0,1}𝑛 𝑜
Success if ℎ𝑙 𝑦𝑑 = ℎ𝑙 𝑦∗ and 𝑦𝑑 ≠ 𝑦∗
𝑦𝑑, 𝑙 𝑦∗
Song & Rijneveld ‘16)
2𝑜), CR: Θ(𝑟3 2𝑜)
Banegas ‘17)
9/3/2018 Andreas Hülsing https://huelsing.net 32
9/3/2018 Andreas Hülsing https://huelsing.net 33
questions beyond selecting new DSIG / KEM / PKE schemes:
about indifferentiability [Zhandry ‘18, Carstens, Ebrahimi, Tabia & Unruh ‘18]
ideal setting
9/3/2018 Andreas Hülsing https://huelsing.net 34
https://2017.pqcrypto.org/school/index.html
https://csrc.nist.gov/Projects/Post-Quantum- Cryptography
9/3/2018 Andreas Hülsing https://huelsing.net 35
9/3/2018 Andreas Hülsing https://huelsing.net 36