The Multi-User Security of Double Encryption Viet Tung Hoang - - PowerPoint PPT Presentation

the multi user security of
SMART_READER_LITE
LIVE PREVIEW

The Multi-User Security of Double Encryption Viet Tung Hoang - - PowerPoint PPT Presentation

The Multi-User Security of Double Encryption Viet Tung Hoang Stefano Tessaro Florida State University UC Santa Barbara EUROCRYPT 2017 May 3, 2017 1 Double Encryption Single Encryption: trivial E J key-recovery in O(2 k ) time. Double


slide-1
SLIDE 1

1

The Multi-User Security of Double Encryption

Viet Tung Hoang Florida State University Stefano Tessaro UC Santa Barbara EUROCRYPT 2017

May 3, 2017

slide-2
SLIDE 2

2

E J1 E J2 Double Encryption E J

Single Encryption: trivial key-recovery in O(2k) time. Double Encryption: use meet-in-the-middle attack to recover keys in O(2k) time.

slide-3
SLIDE 3

3

E J1 E J2 Double Encryption E J

Single Encryption: trivial key-recovery in O(2k) time. Double Encryption: use meet-in-the-middle attack to recover keys in O(2k) time.

Conventional wisdom: Double Encryption adds no security

slide-4
SLIDE 4

4

E J1 E J2 Double Encryption E J

Single Encryption: trivial key-recovery in O(2k) time. Double Encryption: use meet-in-the-middle attack to recover keys in O(2k) time.

Conventional wisdom: Double Encryption adds no security Today: Double Encryption adds some security, if we look at a broader angle

slide-5
SLIDE 5

5

Conventional Security Definition

A

$ $

Procedure Enc(x) Return Procedure Dec(x) Return Procedure Enc(x) Return Procedure Dec(x) Return

Enc Dec

$

slide-6
SLIDE 6

6

Conventional Security Definition

A

$ $

Procedure Enc(x) Return Procedure Dec(x) Return Procedure Enc(x) Return Procedure Dec(x) Return

Enc Dec

$

slide-7
SLIDE 7

7

Multi-user (mu) Security

$

Procedure Enc(x, i) Return Procedure Dec(x, i) Return Procedure Enc(x, i) Return Procedure Dec(x, i) Return

$

  • The conventional notion consider just single-user (su) security
  • In practice, adversary attacks multiple users, adaptively distributing its resources
slide-8
SLIDE 8

8

Multi-user (mu) Security

  • Mu security can be implicitly obtained via hybrid arguments:

$

Procedure Enc(x, i) Return Procedure Dec(x, i) Return Procedure Enc(x, i) Return Procedure Dec(x, i) Return

$

  • The conventional notion consider just single-user (su) security
  • In practice, adversary attacks multiple users, adaptively distributing its resources
slide-9
SLIDE 9

9

Double Encryption Improves Mu Security Claim: Double Encryption improves mu security

slide-10
SLIDE 10

10

Double Encryption Improves Mu Security Claim: Double Encryption improves mu security

  • AES has only 64-bit security in mu setting due to key-collision attack. [Biham 02]

Choose random keys

A

User #1 User #2 User #q Check for matching entries between two tables to recover some user’s key

slide-11
SLIDE 11

11

Double Encryption Improves Mu Security

  • Today: Mu security of DE(AES) ≈ Su security of AES

128-bit security

Claim: Double Encryption improves mu security

  • AES has only 64-bit security in mu setting due to key-collision attack. [Biham 02]

Choose random keys

A

User #1 User #2 User #q Check for matching entries between two tables to recover some user’s key

slide-12
SLIDE 12

12

History of Mu Analyses on SE/DE

Construction Advantage Security level SE: matching attack of hybrid argument by

[Biham 02]

DE: hybrid argument

  • n [ABDV98] bound

DE: dream bound k: key length, n: block length, q: # queries

Adv vanishes when q ≈

slide-13
SLIDE 13

13

Goals and Results

  • Give a generic technique for bounding information-theoretic mu security.

+ Our method can handle any indistinguishability games (PRF, AE, blockcipher), and

any ideal primitive (random oracle, ideal cipher, ideal permutation).

slide-14
SLIDE 14

14

Goals and Results

  • Give a generic technique for bounding information-theoretic mu security.

+ Our method can handle any indistinguishability games (PRF, AE, blockcipher), and

any ideal primitive (random oracle, ideal cipher, ideal permutation).

  • Showcase the method via Double Encryption

Advantage Security level if

slide-15
SLIDE 15

15

Results

Mu security of SE (tight) Mu security of DE (naïve analysis) Mu security of DE (our result) Su security of DE

Adv

log2 (#queries) Su security of DE Visualization of the mu and su bounds of Single Encryption (SE) and Double Encryption (DE) on AES parameters

slide-16
SLIDE 16

16

The Technique: Almost Proximity

Almost proximity: very general, but can be overly complex in some setting

slide-17
SLIDE 17

17

The Technique: Almost Proximity

Almost proximity: very general, but can be overly complex in some setting Simplified generic treatment: can handle many settings such as GCM, but not Double Encryption

slide-18
SLIDE 18

18

The Technique: Almost Proximity

Almost proximity: very general, but can be overly complex in some setting Simplified generic treatment: can handle many settings such as GCM, but not Double Encryption A treatment for blockcipher: tailored to DE

slide-19
SLIDE 19

19

Generalize the pointwise proximity technique of [Hoang, Tessaro 2016]

The Technique: Almost Proximity

Almost proximity: very general, but can be overly complex in some setting Simplified generic treatment: can handle many settings such as GCM, but not Double Encryption A treatment for blockcipher: tailored to DE

slide-20
SLIDE 20

20

Simplified Almost Proximity

S0

A

S1

  • Bound the distinguishing advantage of two randomized systems S0 and S1

X may encode (+, x) or (-, y), and Z may encode (+, K, z) or (-, K, z)

$

Cost metrics: q: # of construction queries p: # of primitive queries : data complexity, e.g. the total length of queries Assume that q queries of data complexity invoke primitive queries

slide-21
SLIDE 21

21

Simplified Almost Proximity

S0

A

S1

Transcript of the interaction Probability that Si behaves according to

Classify su transcripts to “good” and “bad” Classify mu transcripts to “nice” and “not nice” A mu transcript is nice if for any user, the induced su transcript is good Restriction: Involves

  • nly queries
slide-22
SLIDE 22

22

Simplified Almost Proximity

  • Classify mu transcripts by “nice” and “not nice”

Bound Random variable for transcript in S0 Mu analysis, but for the “ideal” system S0

slide-23
SLIDE 23

23

Simplified Almost Proximity

  • Classify mu transcripts by “nice” and “not nice”

Bound Random variable for transcript in S0 Mu analysis, but for the “ideal” system S0

slide-24
SLIDE 24

24

Simplified Almost Proximity

  • Classify mu transcripts by “nice” and “not nice”

Bound Random variable for transcript in S0

Area + Area Area + Area

1

Mu analysis, but for the “ideal” system S0

slide-25
SLIDE 25

25

Giving Bound on Nice Mu Transcripts

induced su transcripts are good

Goal: bound by analyses on su good transcripts

Area Area + Area

slide-26
SLIDE 26

26

Giving Bound on Nice Mu Transcripts

induced su transcripts are good

Goal: bound by analyses on su good transcripts

How: Establish a bound on any good su transcript of parameters super-additive Used in H-coefficient technique [Patarin 08] to establish su bound Area Area + Area

slide-27
SLIDE 27

27

Giving Bound on Nice Mu Transcripts

induced su transcripts are good

Goal: bound by analyses on su good transcripts

How: Establish a bound on any good su transcript of parameters super-additive Super-additivity: Example: is super-additive is not super-additive Used in H-coefficient technique [Patarin 08] to establish su bound Area Area + Area

slide-28
SLIDE 28

28

Totally, queries of data complexity and p queries

Non-adaptive

A

User 1 User 2 User 3 User 4

q1 queries of data complexity

Simplified Almost Proximity: From Su to Mu Security

Suppose that for any su adversary B of parameters Hybrid argument:

slide-29
SLIDE 29

29

Totally, queries of data complexity and p queries

Non-adaptive

A

User 1 User 2 User 3 User 4

q1 queries of data complexity

Simplified Almost Proximity: From Su to Mu Security

Suppose that for any su adversary B of parameters Hybrid argument: Accounting for simulated queries

slide-30
SLIDE 30

30

Totally, queries of data complexity and p queries

Non-adaptive

A

User 1 User 2 User 3 User 4

q1 queries of data complexity

Simplified Almost Proximity: From Su to Mu Security

Suppose that for any su adversary B of parameters Hybrid argument: Accounting for simulated queries Super-additivity

slide-31
SLIDE 31

31

Simplified Almost Proximity: From Su to Mu Security

Main problem in mu security: Adversary can adaptively distribute the resources across multiple users

slide-32
SLIDE 32

32

Simplified Almost Proximity: From Su to Mu Security

To avoid adaptivity, do hybrid argument at the transcript level

Main problem in mu security: Adversary can adaptively distribute the resources across multiple users

slide-33
SLIDE 33

33

Simplified Almost Proximity: From Su to Mu Security

To avoid adaptivity, do hybrid argument at the transcript level

Main problem in mu security: Adversary can adaptively distribute the resources across multiple users Area + Area

1

good su transcript

slide-34
SLIDE 34

34

Simplified Almost Proximity: From Su to Mu Security

To avoid adaptivity, do hybrid argument at the transcript level

Main problem in mu security: Adversary can adaptively distribute the resources across multiple users Area + Area

1

good su transcript Area +

slide-35
SLIDE 35

35

Technique for mu-CCA Security of Blockcipher

Blockcipher

Ideal cipher A call to makes t calls to E

S0

A

S1

$

Goal: Do only su analyses, but achieve mu results Accounting A’s resources via p and q only

slide-36
SLIDE 36

36

Technique for mu-CCA Security of Blockcipher

Blockcipher

Ideal cipher A call to makes t calls to E Classify su transcripts into “good” and “bad” No restriction

S0

A

S1

$

Goal: Do only su analyses, but achieve mu results Accounting A’s resources via p and q only

slide-37
SLIDE 37

37

Technique for mu-CCA Security of Blockcipher

Blockcipher

Ideal cipher A call to makes t calls to E Classify su transcripts into “good” and “bad” No restriction

S0

A

S1

$

Bound using q construction queries and p primitive queries Goal: Do only su analyses, but achieve mu results Accounting A’s resources via p and q only

slide-38
SLIDE 38

38

Giving Bound on Good Su Transcripts

Establish a bound on any good su transcript of parameters p and q

super-additive

slide-39
SLIDE 39

39

Giving Bound on Good Su Transcripts

Establish a bound on any good su transcript of parameters p and q

super-additive

Transcript:

x y

u v

# of primitive queries that have colliding construction queries

slide-40
SLIDE 40

40

From Su to Mu Security

Using transcript-level hybrid argument, when we move from su to mu: super-additivity

slide-41
SLIDE 41

41

From Su to Mu Security

Intuition: In a mu transcript obtained in the ideal world, each red arrow is unlikely to collide with more than blue ones. user1 user2 user3 user2 user4 Using transcript-level hybrid argument, when we move from su to mu: super-additivity

slide-42
SLIDE 42

42

From Su to Mu Security

Theorem: Assume the su conditions hold, Any function takes arguments p + qt and q Intuition: In a mu transcript obtained in the ideal world, each red arrow is unlikely to collide with more than blue ones. user1 user2 user3 user2 user4 Using transcript-level hybrid argument, when we move from su to mu: super-additivity

slide-43
SLIDE 43

43

Analyzing Double Encryption … …

x y

Su Transcript:

u v v u

Graphical representation of the transcript

slide-44
SLIDE 44

44

Analyzing Double Encryption … …

x y

Su Transcript:

u v v u

Graphical representation of the transcript Extend transcripts with keys: Real world: the real keys (revealed when finish querying) Ideal world: random strings, independent of anything else

slide-45
SLIDE 45

45

Analyzing Double Encryption … …

x y

Trivial to distinguish when “chains” appear

: revealed keys

slide-46
SLIDE 46

46

Analyzing Double Encryption … …

x y

Trivial to distinguish when “chains” appear

Want: Bound via

: revealed keys

slide-47
SLIDE 47

47

Analyzing Double Encryption … …

x y

Trivial to distinguish when “chains” appear

Want: Bound via Inferior bound if too many red arrows hit the same point.

: revealed keys

slide-48
SLIDE 48

48

Analyzing Double Encryption

Definition: A su transcript is bad if it has red arrows hitting the same point.

p: #primitive queries q: #construction queries k: key length n: block length

slide-49
SLIDE 49

49

Analyzing Double Encryption

Definition: A su transcript is bad if it has red arrows hitting the same point.

p: #primitive queries q: #construction queries k: key length n: block length

slide-50
SLIDE 50

50

Analyzing Double Encryption

Definition: A su transcript is bad if it has red arrows hitting the same point. No extension

p: #primitive queries q: #construction queries k: key length n: block length

Claim: For any good su transcript Probability that extending in the ideal world results in a chain

slide-51
SLIDE 51

51

Conclusion

  • The almost proximity method is very powerful in obtaining

strong mu security

+ The analysis here might be not tight: We can’t find matching attacks if

  • Contrary to conventional wisdom, Double Encryption does add

some security.