Provable Security in Cryptography ----- DL-based Systems ECC - - - PDF document

provable security in cryptography dl based systems ecc
SMART_READER_LITE
LIVE PREVIEW

Provable Security in Cryptography ----- DL-based Systems ECC - - - PDF document

Provable Security in Cryptography ----- DL-based Systems ECC - Sept 24th 2002 - Essen David Pointcheval Ecole normale suprieure France Summary Summary The Methodology of Provable Security Complexity Assumptions


slide-1
SLIDE 1

Provable Security in Cryptography

  • DL-based Systems

David Pointcheval Ecole normale supérieure France

ECC - Sept 24th 2002 - Essen

Provable Security in Cryptography - 2 David Pointcheval

Summary Summary

  • The Methodology of “Provable Security”
  • Complexity Assumptions
  • Encryption
  • Signature
  • Conclusions
slide-2
SLIDE 2

Provable Security in Cryptography

  • DL-based Systems

David Pointcheval Ecole normale supérieure France

Provable Security

Provable Security in Cryptography - 4 David Pointcheval

Provable Provable Security Security: a : a Short Short Story Story

  • Originated in the late 80’s

– encryption [GM86] – signature [GMR88]

  • Increased applicability using ideal substitutes

– random oracles vs hash functions [FS86, BR93] – generic groups vs elliptic curves [Na94,Sh97] – ideal ciphers vs block ciphers [BPR EC’00]

  • Now requested to support emerging standards

(IEEE P1363, ISO, Cryptrec, NESSIE)

slide-3
SLIDE 3

Provable Security in Cryptography - 5 David Pointcheval

  • “Textbook” cryptosystems cannot

be used as such (homomorphic properties, …)

  • Practitioners need formatting rules

to ensure interoperability ⇒ Paddings are used in practice: heuristic

– PKCS#1 V 1.5 - Encrypt [Bl98] – PKCS#1 V 2.0 - Encrypt [Ma01] – ISO 9796-1 - Signature [CNS99, CHJ99]

The Need for Provable Security The Need for Provable Security

  • Provable Security in Cryptography - 6

David Pointcheval

The The Limits Limits of

  • f Provable

Provable Security Security

  • Provable security does not yield proofs

– proofs are relative (to computational assumptions) – proofs often use ideal models (ROM, ICM, GM) Meaning is debatable - ROM [CGH98]

  • GM [SPMS C’02]

– proofs are not formal objects Time is needed for acceptance.

  • Still, provable security is a means

to provide some form of guarantee that a scheme is not flawed

slide-4
SLIDE 4

Provable Security in Cryptography - 7 David Pointcheval

Provable Provable Security Security

1 - Define goal of adversary 2 - Define security model 3 - Define complexity assumptions 4 - Provide a proof by reduction 5 - Check proof 6 - Interpret proof

Provable Security in Cryptography - 8 David Pointcheval

Proof by Proof by Reduction Reduction

Reduction of a problem to an attack Atk:

  • Let be an adversary that breaks the scheme

then can be used to solve Instance

  • f

intractable ⇒ scheme unbreakable Solution

  • f
slide-5
SLIDE 5

Provable Security in Cryptography

  • DL-based Systems

David Pointcheval Ecole normale supérieure France

Assumptions

Provable Security in Cryptography - 10 David Pointcheval

Integer Factoring and RSA Integer Factoring and RSA

  • Multiplication/Factorization :

– p, q

  • n = p.q easy (quadratic)

– n = p.q

  • p, q difficult (super-polynomial)

One-Way Function trapdoor

  • RSA Function, from

n in n (with n=pq)

for a fixed exponent e

Rivest-Shamir-Adleman ‘78

– x

  • xe mod n easy (cubic)

– y=xe mod n

  • x difficult (without p or q)

x = yd mod n where d = e-1 mod ϕ(n)

[ ]

n x y x y

e x e n

n

mod ) ( Pr ) ( Succrsa

,

= = =

✁ ✂
slide-6
SLIDE 6

Provable Security in Cryptography - 11 David Pointcheval

The Discrete Logarithm The Discrete Logarithm

  • Let = (<g>, ×) be any finite cyclic group
  • For any y∈, one defines

Logg(y) = min{x ≥ 0 | y = gx}

  • One-way function

– x → y = gx easy (cubic) – y = gx → x difficult (super-polynomial)

[ ]

x x g

g y x y

q

= = =

) ( Pr ) ( Succdl

  • Provable Security in Cryptography - 12

David Pointcheval

Any Trapdoor …? Any Trapdoor …?

  • The Discrete Logarithm is difficult

and no information could help!

  • The Diffie-Hellman Problem (1976):
  • Given A=ga and B=gb
  • Compute DH(A,B) = C=gab

Clearly CDH ≤ DL: with a=LoggA, C=Ba

[ ]

ab b a b a g

g C g B g A C B A

q

= = = = =

, , ) , ( Pr ) ( Succ

, cdh

slide-7
SLIDE 7

Provable Security in Cryptography - 13 David Pointcheval

Other Other DL-based DL-based Problems Problems

The Decisional Diffie-Hellman Problem:

  • Given A, B and C in <g>
  • Decide whether C = DH(A,B)

Solve the computational problem, with access to a decisional oracle The Gap Diffie-Hellman Problem:

Okamoto-Pointcheval PKC‘01

Weak curves: DDH is easy, because of pairing, then GDH=CDH

Provable Security in Cryptography - 14 David Pointcheval

201 156 8192 149 104 4096 111 66 2048 80 35 1024 58 13 512 Operations

(en log2)

Mips-Year

(log2)

Modulus

(bits)

Complexity Estimates Complexity Estimates

Estimates for integer factoring [LV PKC’00] Can be used for RSA too Lower-bounds for DL in

* p

Mile-stone

slide-8
SLIDE 8

Provable Security in Cryptography

  • DL-based Systems

David Pointcheval Ecole normale supérieure France

Encryption

Provable Security in Cryptography - 16 David Pointcheval

Encryption Scheme Encryption Scheme

3 algorithms :

  • key generation
  • - encryption
  • - decryption

kd ke

r c m or ⊥ m

OW-Security: it is impossible to get back m just from c, ke, and (without kd)

slide-9
SLIDE 9

Provable Security in Cryptography - 17 David Pointcheval

Weaker Goals of Adversary Weaker Goals of Adversary

  • Perfect Secrecy:

the ciphertext and public data do not reveal any information about the plaintext (but maybe the size) Information Theoretical sense ⇒ Impossible

  • Semantic Security (Indistinguishability):

no polynomial adversary can learn any information about the plaintext from the ciphertext and public data (but the size)

IND

Provable Security in Cryptography - 18 David Pointcheval

Security Models Security Models

  • Chosen Plaintext: (basic scenario)

in the public-key setting, any adversary can get the encryption of any plaintext of his choice (by encrypting it by himself)

  • Chosen Ciphertext (adaptively):

the adversary has furthermore access to a decryption oracle which decrypts any ciphertext of his choice, but the specific challenge

CCA2 CPA

slide-10
SLIDE 10

Provable Security in Cryptography - 19 David Pointcheval

IND-CCA2 IND-CCA2

  • c

m or ⊥ m1 m0

kd ke

r mb c* b’ b∈{0,1} r random c ≠ c* m or ⊥

b’ = b

?

CCA2 CCA1

Provable Security in Cryptography - 20 David Pointcheval

Main Security Notions Main Security Notions

  • OW-CPA: (the weakest)

[ ]

) ( ) ( Pr

,

m;r c m c

r m

= =

  • IND-CCA2: (the strongest - [BDPR C’98])

1 Pr 2

) , ( ) ( ) , , ( ) , , , (

1 1 1 2 ,

      ← ← = r m c s m m b s c m m

b b r

  • e

k

= Success negligible = Advantage negligible

slide-11
SLIDE 11

Provable Security in Cryptography - 21 David Pointcheval

Practical Cryptosystems Practical Cryptosystems

  • Integer Factoring-based: RSA [RSA78]

– OW-CPA = RSA (modular e-th roots) – IND ? No, because of determinism – CCA2 ? No, because of multiplicativity

  • DL-based: El Gamal [EG85]

– OW-CPA = CDH – IND-CPA = DDH – CCA2 ? No, because of multiplicativity

Provable Security in Cryptography - 22 David Pointcheval

  • Any trapdoor one-way function

leads to a OW-CPA cryptosystem

  • But OW-CPA not enough
  • How to reach IND-CCA2 ?

⇒ generic conversions from weakly secure schemes to strongly secure cryptosystems

Generic Conversions Generic Conversions

slide-12
SLIDE 12

Provable Security in Cryptography - 23 David Pointcheval

OAEP OAEP

Bellare Bellare-

  • Rogaway

Rogaway EC‘ EC‘94 94

M r s t

G H M = m||0k r random

(m,r) : Compute s,t then return c=f (s||t) (c) : Compute s||t = f -1(c), invert OAEP, then check redundancy Let f be a trapdoor one-way permutation, with G → {0,1}n and H → {0,1}

  • Provable Security in Cryptography - 24

David Pointcheval

In 1994, Bellare and Rogaway proved that

  • the OAEP construction provides an IND-CPA

cryptosystem under the OW of f

  • it is plaintext-aware (PA94)

Widely believed: IND-CPA + PA94 ⇒ IND-CCA2 But IND-CPA + PA94 ⇒ IND-CCA1 only We improved PA94 into PA98 [BDPR C’98] IND-CPA + PA98 ⇒ IND-CCA2 But… PA98 of OAEP never studied

OAEP: Security Level OAEP: Security Level

slide-13
SLIDE 13

Provable Security in Cryptography - 25 David Pointcheval

Until 2000, OAEP was anyway believed to provide an IND-CCA2 cryptosystem under the OW of f But Shoup showed a counter-example [Sh C’01] A stronger assumption about f is required: under the partial-domain OW of f, OAEP provides an IND-CCA2 cryptosystem [FOPS C’01] OW: f (x) → x hard PD-OW: f (x,y) → x hard

OAEP: Security Level OAEP: Security Level

Provable Security in Cryptography - 26 David Pointcheval

Security bound: 275, and 255 hash queries If one can break the scheme within time T, one can invert RSA within time T’ ≤ 2 T + 2 qH (2qG + qH) k3 ≤ 2 × 275 + 6 × 2110 k3< 2113 k3 modulus: 1024 bits → 2143 (NFS: 280) ✕ 2048 bits → 2146 (NFS: 2111) ✕ 4096 bits → 2149 (NFS: 2149) ✓

RSA RSA-

  • OAEP: Interpretation

OAEP: Interpretation

( )

( )

3 rsa ,

2 2 Succ 2 ) ( Adv k q q q t t

H G H e n ind

+ + × ≤

slide-14
SLIDE 14

Provable Security in Cryptography - 27 David Pointcheval

REACT REACT

Okamoto Okamoto-

  • Pointcheval

Pointcheval RSA‘ RSA‘01 01

Let f be an injective function, which provides a Gap-Problem: OW even given access to a checking oracle (on input (x,y) answers whether x = f -1(y)) (m ; r) = (a, b, c) with a = f (r), b = EG(r)(m) and c = H(m,r,a,b) (a,b,c): compute r = f -1(a) and m = DG(r)(b) if c=H(m,r,a,b) then output m

  • therwise: ⊥ (reject)

Provable Security in Cryptography - 28 David Pointcheval

Security bound: 275, and 255 hash queries If one can break the scheme within time T, one can invert f within time T’ ≤ T + (qG + qH) Tcheck ≤ T + 255 Tcheck RSA small exponent: 1024 bits → Secure ElGamal: GDH → 160 bit order group PSEC-3 = REACT-EC-ElGamal

REACT: REACT: Security Result Security Result

k H G gap f ind ind

q q q t t t 2 4 ) , ( Succ 2 ) ( Adv ) ( Adv

  • +

+ + ≤

E

slide-15
SLIDE 15

Provable Security in Cryptography - 29 David Pointcheval

REACT-EC-EG REACT-EC-EG ≈ ≈ ≈ ≈ ≈ ≈ ≈ ≈ ECIES ECIES ABR RSA

ABR RSA’ ’01 01

  • G a MGF, M a MAC
  • E, D: symmetric encryption scheme

x : secret key Y= x.P : public key (m ; r): (A, B, C) where A ← r.P, K ← r.Y, k ← G(K), B ← Ek(m), C ← Mk(B) (A,B,C): K ← x.A,

k ← G(K), m ← Dk(B),

check whether C = Mk(B)

Provable Security in Cryptography - 30 David Pointcheval

Theoretical security result (from ABR):

  • relative to ODH assumption
  • or GDH + ROM (similar to REACT-EC-EG)

But in SEC1 description (Certicom) r ←R q, A ← r.P, K ← r.Y, k ← G(K) modified into k ← G(Kx) (A, B, C) = (-A, B, C): malleability!

  • Not a real security concern, gCCA2 model

Problem = partial encoding Kx of K

ECIES: ECIES: Security Result Security Result

slide-16
SLIDE 16

Provable Security in Cryptography

  • DL-based Systems

David Pointcheval Ecole normale supérieure France

Signature

Provable Security in Cryptography - 32 David Pointcheval

Signature Signature Scheme Scheme

  • Key Generation
  • Signature
  • Verification

kv ks

  • m

σ 0/1 m

Non-repudiation: impossible to forge valid σ without ks

slide-17
SLIDE 17

Provable Security in Cryptography - 33 David Pointcheval

Goal of the Goal of the Adversary Adversary

  • Existential Forgery:

Try to forge a valid message-signature pair without the private key Adversary is successful if the following probability is large

[ ]

) , ( ) ( 1 ) , ( Pr ) ( Succ m m

ef

= = =

v

k

Provable Security in Cryptography - 34 David Pointcheval

Security Security Models Models

  • No-Message Attacks: the adversary only

knows the verification (public) key

  • Known-Message Attacks (KMA): the

adversary has access to a list Λ of message/signature pairs

  • Chosen-Message Attacks (CMA): the

messages are adaptively chosen by the adversary ⇒ the strongest attack

slide-18
SLIDE 18

Provable Security in Cryptography - 35 David Pointcheval

Probabilistic Signatures - 1 Probabilistic Signatures - 1

  • In a probabilistic signature scheme, several

signatures may correspond to a message

  • In the usual definition for

Chosen-Message Attacks (CMA), the adversary can repeatedly submit a same message. Otherwise, weaker model :

  • Single-Occurrence Chosen-Message Attacks

(SO-CMA) - each message m can be submitted only once

Provable Security in Cryptography - 36 David Pointcheval

A signature scheme designed in the early 90ies and considered in IEEE P1363, Cryptrec NESSIE, together with a security proof

  • Proof holds only in SO-CMA scenario
  • Interpretation:

– ESIGN is not broken, but not provably UF-CMA – either give up CMA property… – or tweak ESIGN

ESIGN ESIGN

Fujioka-Okamoto-Miyaguchi EC’91 Fujioka-Okamoto-Miyaguchi EC’91

slide-19
SLIDE 19

Provable Security in Cryptography - 37 David Pointcheval

Probabilistic Signatures - 2 Probabilistic Signatures - 2

  • In the usual definition for

Existential Forgery, output forgery corresponds to a fresh message m. No pair (m σ) can be in the list Λ. Otherwise, weaker goal:

  • Malleability: produce a new pair (m,σ)∉Λ

possibly for a submitted message m. ((m,σ’) in Λ for some σ’ ≠ σ)

  • Non-malleability is a stronger demand than

resistance to existential forgeries

Provable Security in Cryptography - 38 David Pointcheval

Verifying (m,σ): u = gs ye ( = gk-xe gxe ) test if e=H(m,u)

Schnorr Schnorr Signature Signature

Schnorr EC ‘89 Schnorr EC ‘89

, g and q: common elements x: private key y=gx: public key Signing m: choose k∈

q and compute r=gk

as well as e=H(m,r) and s = k-xe mod q σ = (e,s)

slide-20
SLIDE 20

Provable Security in Cryptography - 39 David Pointcheval

Security Proof Security Proof Pointcheval

Pointcheval-Stern

  • Stern EC‘

EC‘96 96

Existential Forgery = DL problem Idea : forking lemma

Run once In case of success: run again One gets two successes with probability ≥ ε2 / 4 qH Improvement: two successes in qH / ε expected iterations

H(m,r) e e’ (e,s) (e’,s’)

gs ye = r = gs’ ye’ gs-s’ = ye’-e

Let α = (s-s’)/(e’-e) mod q Then y=gα

Provable Security in Cryptography - 40 David Pointcheval

Security bound: 275, and 255 hash queries If one can break the scheme within time T = t/ε,

  • ne can extract two tuples within time

T’ ≤ qH t/ε = qH T ≤ 2130 This is not a practical result:

  • 4096 bit moduli are required in
  • 260 bit order are required in EC

Comments: Forking Lemma Comments: Forking Lemma

* p

slide-21
SLIDE 21

Provable Security in Cryptography - 41 David Pointcheval

ECDSA ECDSA

Verifying (m,r,s): first 0 < r, s < q

  • compute R’ = e s-1.P + r s-1.Y test if r=f (R’)

=< P >, P an element of order q of EC, x: private key Y= x.P: public key Signing m:

  • choose k∈

q

  • compute R = k.P
  • compute r = f (R)
  • compute e = H(m), s= (e+xr)/k mod q

σ = (r,s)

Provable Security in Cryptography - 42 David Pointcheval

  • With almost-invertible functions f

In the Generic Model, non-malleability

  • f ECDSA cannot be broken

with probability significantly greater than 5(n+1)(n+q +1)/q q # of signing queries - n # of group operations In ECDSA, f (R) = first-coordinate(R) = xR, which is an almost-invertible function ⇒ In the Generic Model, ECDSA is NM

ECDSA: Security Result ECDSA: Security Result Brown ‘00

Brown ‘00

slide-22
SLIDE 22

Provable Security in Cryptography - 43 David Pointcheval

  • In ECDSA, f (R) = first-coordinate(R) = xR

Thus f (-R) = f (R) Given a valid signature (m,r,s),

  • ne obtains another as (m,r,-s mod q)

This is exactly malleability

  • Interpretation:

– ECDSA is not broken (provides non-repudiation) problem = partial encoding (again!) – to eliminate malleability need to tweak ECDSA

ECDSA: Malleability ECDSA: Malleability

Provable Security in Cryptography - 44 David Pointcheval

  • The security proof “proves” a property

that does not hold for the actual scheme

  • Interpretation:

– EC groups are not generic (they have automorphisms) – either change the model… – or tweak the scheme

ECDSA: Interpretation ECDSA: Interpretation

slide-23
SLIDE 23

Provable Security in Cryptography

  • DL-based Systems

David Pointcheval Ecole normale supérieure France

Conclusion

Provable Security in Cryptography - 46 David Pointcheval

Ideal models to be handled with care

– Random oracle model: seems correct in practice still not a security proof but a security argument – Generic model: less convincing still better than nothing. This model could be improved: taking care of automorphisms.

Ideal Models Ideal Models

slide-24
SLIDE 24

Provable Security in Cryptography - 47 David Pointcheval

Provable Provable Security Security

1 - Define goal of adversary 2 - Define security model 3 - Define complexity assumptions 4 - Provide a proof by reduction 5 - Check proof 6 - Interpret proof

Very few proofs are meaningful in pratice…

  • proofs to be improved?
  • schemes to be modified?

Shoup’s methodology makes it easier