Provable insecurity
Where artifacts come from, and how constructive math may help Claus Diem and dreiwert
University of Leipzig
Provable insecurity Where artifacts come from, and how constructive - - PowerPoint PPT Presentation
Provable insecurity Where artifacts come from, and how constructive math may help Claus Diem and dreiwert University of Leipzig December 29, 2019 Hash functions in theory and practice Constructive logic Part I Problem Claus Diem and
University of Leipzig
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
1
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
1
2
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
1
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
1
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
s =
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
s =
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
s =
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
1 l(s)n
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
1 l(s)n
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
1 l(s)n
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
1 l(s)n
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
s,k =
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
s,k =
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
How's it going? We can prove that the new CPU works as specified, when the register width approaches infinity. Excellent, so let's go in production using 64 bit registers No point doing so. For every fixed register width, the proof does not say anything.
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
It can be shown that the new signature scheme has a weakness. But well-known cryptographers say that the weakness is not of practical relevance. At least we can prove the security of the encryption. But it is assumed that the proof methology does not allow conclusions about practical security.
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Hash functions in theory and practice Constructive logic
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity
Introduction Algorithmic content Hash collision, revisited
Claus Diem and dreiwert Provable insecurity