The SimpleMatrix Encryption scheme Jintai Ding, Albrecht Petzoldt, - - PowerPoint PPT Presentation

the simplematrix encryption scheme
SMART_READER_LITE
LIVE PREVIEW

The SimpleMatrix Encryption scheme Jintai Ding, Albrecht Petzoldt, - - PowerPoint PPT Presentation

Multivariate Cryptography The basic Scheme Improvements Parameters The SimpleMatrix Encryption scheme Jintai Ding, Albrecht Petzoldt, Lih-Chung Wang DIMACS Workshop on The Mathematics of Post-Quantum Cryptography Rutgers University, New


slide-1
SLIDE 1

Multivariate Cryptography The basic Scheme Improvements Parameters

The SimpleMatrix Encryption scheme

Jintai Ding, Albrecht Petzoldt, Lih-Chung Wang DIMACS Workshop on The Mathematics of Post-Quantum Cryptography Rutgers University, New Jersey, USA 15.01.2015

slide-2
SLIDE 2

Multivariate Cryptography The basic Scheme Improvements Parameters

Outline

1 Multivariate Cryptography 2 The Simple Matrix Encryption Scheme 3 Improvements 1

Decreasing the probability of decryption failures

2

Increasing the security of the scheme

3

Reducing the blow up factor between plain and ciphertext size

4 Parameters 5 Conclusion

slide-3
SLIDE 3

Multivariate Cryptography The basic Scheme Improvements Parameters

Multivariate Cryptography

p(1)(x1, . . . , xn) =

n

  • i=1

n

  • j=i

p(1)

ij

· xixj +

n

  • i=1

p(1)

i

· xi + p(1) p(2)(x1, . . . , xn) =

n

  • i=1

n

  • j=i

p(2)

ij

· xixj +

n

  • i=1

p(2)

i

· xi + p(2) . . . p(m)(x1, . . . , xn) =

n

  • i=1

n

  • j=i

p(m)

ij

· xixj +

n

  • i=1

p(m)

i

· xi + p(m) The security of multivariate schemes is based on the Problem MQ: Given m multivariate quadratic polynomials p(1)(x), . . . , p(m)(x), find a vector ¯ x = (¯ x1, . . . , ¯ xn) such that p(1)(¯ x) = . . . = p(m)(¯ x) = 0.

slide-4
SLIDE 4

Multivariate Cryptography The basic Scheme Improvements Parameters

Multivariate Cryptography (2)

Advantages Resistant against attacks with quantum computers Very fast Modest computational requirements ⇒ can be implemented on low cost devices

slide-5
SLIDE 5

Multivariate Cryptography The basic Scheme Improvements Parameters

Multivariate Cryptography (3)

Drawbacks Relatively young field of research ⇒ Security is not so well understood No explicit parameter choices to meet given security levels known Large size of the public and private keys Many practical signature schemes (UOV, Rainbow, HFEv-, . . . ), but hardly any efficient and secure encryption schemes

slide-6
SLIDE 6

Multivariate Cryptography The basic Scheme Improvements Parameters

Multivariate Cryptography (4)

Construction Easily invertible quadratic map F : Fn → Fm Two invertible affine (or linear) maps S : Fm → Fm and T : Fn → Fn Public key: P = S ◦ F ◦ T supposed to look like a random system Private key: S, F, T allows to invert the public key

slide-7
SLIDE 7

Multivariate Cryptography The basic Scheme Improvements Parameters

Multivariate Cryptography (5)

Encryption Schemes d ∈ Fn

P c ∈ Fm

T −1 y ∈ Fn z ∈ Fm

✛ F−1 ❄

S−1 Encryption: Given: message d ∈ Fn. Compute c = P(d) ∈ Fm. Decryption: Given c ∈ Fm. Compute recursively z = S−1(c), y = F−1(z) and d = T −1(y).

slide-8
SLIDE 8

Multivariate Cryptography The basic Scheme Improvements Parameters

Key Generation

Three s × s matrices A, B and C A =

  • x1

... xs

. . . . . .

x(s−1)·s+1 ... xn

  • , B =

 

b1 ... bs

. . . . . .

b(s−1)·s+1 ... bn

  , C =

  • c1

... cs

. . . . . .

c(s−1)·s+1 ... cn

  • .

b1, . . . , bn and c1, . . . , cn: randomly chosen linear combinations of x1, . . . , xn. E1 = A · B, E2 = A · C. central map F: m components of E1 and E2. Public key : P = S ◦ F ◦ T : Fn → Fm Private key : B , C , S and T .

slide-9
SLIDE 9

Multivariate Cryptography The basic Scheme Improvements Parameters

Encryption

Given: message d ∈ Fn. Compute c = P(d) ∈ Fm.

slide-10
SLIDE 10

Multivariate Cryptography The basic Scheme Improvements Parameters

Decryption

Given: ciphertext c ∈ Fm. Step 1. Compute z = S−1(c) and define ¯ E1 =

  • z1

... zs

. . . . . .

z(s−1)·s+1 ... zn

  • , ¯

E2 =

  • zn+1

... zn+s

. . . . . .

zn+(s−1)·s+1 ... zm

  • .
slide-11
SLIDE 11

Multivariate Cryptography The basic Scheme Improvements Parameters

Decryption (cont.)

Step 2. Find a vector y = (y1, . . . , yn) such that F(y) = z. Assume ¯ A = A(y) to be invertible Consider the relations ¯ A−1 · ¯ E1 − B = 0 and ¯ A−1 · ¯ E2 − C = 0. Interpret the elements of ¯ A−1 as new variables w1, . . . , wn ⇒ m linear equations in the m variables w1, . . . , wn, y1, . . . , yn. Step 3. Compute the plaintext by d = T −1(y1, . . . , yn). The linear systems in step 2 of the decryption process often have multiple solutions. In this case one has to test which of the possible plaintexts corresponds to the given ciphertext.

slide-12
SLIDE 12

Multivariate Cryptography The basic Scheme Improvements Parameters

Decryption failure rate

If the matrix ¯ A from step 2 of the encryption process is not invertible, there occurs a decryption failure. pr(¯ A not invertible) = 1 − (1 − 1 qs )(1 − 1 qs−1 ) · · · (1 − 1 q ) ≈ 1 q . ⇒ pr(decryption failure) ≈ 1 q

slide-13
SLIDE 13

Multivariate Cryptography The basic Scheme Improvements Parameters

Improvements

1 Decreasing the probability of decryption failures

⇒ Rectangular Simple Matrix

2 Increasing the security of the scheme further

⇒ Cubic Simple Matrix

3 Reducing the blow up factor between plain and ciphertext size

⇒ Triangular Simple Matrix (work in progress)

slide-14
SLIDE 14

Multivariate Cryptography The basic Scheme Improvements Parameters

Decreasing the probability of decryption failures ⇒ Rectangular Simple Matrix

Parameters: finite field F with q elements integers n, r, s, u with r ≤ s set m = 2 · su

slide-15
SLIDE 15

Multivariate Cryptography The basic Scheme Improvements Parameters

Key Generation

Three rectangular matrices A, B and C of the form A =

 

a11 a12 ... a1s a21 a22 ... a2s

. . . . . . ... . . .

ar1 ar2 ... ars

  , B =  

b11 b12 ... b1u b21 b22 ... b2u

. . . . . . ... . . .

bs1 bs2 ... bsu

  , C =  

c11 c12 ... c1u c21 c22 ... c2u

. . . . . . ... . . .

cs1 cs2 ... csu

  .

The elements aij, bij and cij are randomly chosen linear combinations of x1, . . . , xn. E1 = A · B, E2 = A · C central map F: m components of E1 and E2. Choose randomly two invertible linear maps S : Fm → Fm and T : Fn → Fn. Public key : P = S ◦ F ◦ T : Fn → Fm Private key : A, B , C , S and T .

slide-16
SLIDE 16

Multivariate Cryptography The basic Scheme Improvements Parameters

Encryption

Given: message d ∈ Fn. Compute c = P(d) ∈ Fm.

slide-17
SLIDE 17

Multivariate Cryptography The basic Scheme Improvements Parameters

Decryption

Given: ciphertext c ∈ Fm. Step 1. Compute z = (z1, z2, . . . , zm) = S−1(c) and set ¯ E1 =

 

z1 z2 ... zu zu+1 zu+2 ... z2u

. . . . . . ... . . .

z(s−1)u+1 z(s−1)u+2 ... zsu

  ∈ Fs×u;

¯ E2 =

  

zsu+1 zsu+2 ... z(s+1)·u z(s+1)·u z(s+1)·u+2 ... z(s+3)·u

. . . . . . ... . . .

z(2s−1)·u+1 z(2s−1)·u+2 ... z2su

   ∈ Fs×u.

slide-18
SLIDE 18

Multivariate Cryptography The basic Scheme Improvements Parameters

Decryption (cont.)

Step 2. Find y ∈ Fn such that F(y) = z. Set ¯ A = A(y). Rank(¯ A) = r ⇒ ∃W ∈ Fr×s with W · ¯ A = I. Consider the relations W · ¯ E1 = B and W · ¯ E2 = C. Interpret the elements of W as new variables w1, . . . wrs. ⇒ 2ru linear equations in sr + n unknowns. ⇒ Eliminate the elements of W from the system ⇒ r · (2u − s) linear equations in the variables y1, y2, ..., yn ⇒ Substitute these equations into F ⇒ Quadratic system of m equations in a very small number of variables. ⇒ System can be solved by Relinearization

slide-19
SLIDE 19

Multivariate Cryptography The basic Scheme Improvements Parameters

Decryption (cont.)

Step 3. Compute the plaintext by d = T −1(y).

slide-20
SLIDE 20

Multivariate Cryptography The basic Scheme Improvements Parameters

Probability of decryption failures

Decryption failure occurs ⇔ Rank(¯ A) < r Pr(Rank(¯ A) < r) = 1−(1− 1 qs )(1− 1 qs−1 ) · · · (1− 1 qs−r+1 ) ≈ 1 qs−r+1 , ⇒ By choosing r and s in an appropriate way it is possible to decrease the probability of decryption failures to a negligible value.

slide-21
SLIDE 21

Multivariate Cryptography The basic Scheme Improvements Parameters

Reducing the probability of decryption failures

Other methods use a public bijective map Q over the ring Z/qZ encrypt messages d and Q(d) ⇒ Pr(decr. fails) ≈ 1

q2

use messages d of length n − 1 plus extra variable x ∈ F encrypt messages x1||d and x2||d ⇒ Pr(decr. fails) ≈ 1

q2

slide-22
SLIDE 22

Multivariate Cryptography The basic Scheme Improvements Parameters

Increasing the security ⇒ Cubic Simple Matrix

Parameters: finite field F with q elements integer s set n = s2 and m = 2 · n

slide-23
SLIDE 23

Multivariate Cryptography The basic Scheme Improvements Parameters

Key Generation

Three s × s matrices A, B and C A =

  • a1

... as

. . . . . .

a(s−1)·s+1 ... an

  • , B =

 

b1 ... bs

. . . . . .

b(s−1)·s+1 ... bn

  , C =

  • c1

... cs

. . . . . .

c(s−1)·s+1 ... cn

  • a1, . . . , an: random quadratic polynomials in x1, . . . , xn

b1, . . . , bn and c1, . . . , cn: randomly chosen linear combinations of x1, . . . , xn. E1 = A · B, E2 = A · C. central map F: m components of E1 and E2. Public key : P = S ◦ F ◦ T : Fn → Fm Private key : A, B , C , S and T .

slide-24
SLIDE 24

Multivariate Cryptography The basic Scheme Improvements Parameters

En- and Decryption

just as for the original scheme.

slide-25
SLIDE 25

Multivariate Cryptography The basic Scheme Improvements Parameters

Security

Rank attacks MinRank Problem: Given m n × n matrices Q1, . . . , Qm, find a linear combination ˜ Q =

m

  • i=1

λi · Qi

  • f minimal rank s.

The MinRank attack can be used to recover the central map from the public key. In our scheme, the polynomials of A are random polynomials

  • f degree 2

⇒ Rank is close to n ⇒ Rank attacks are not applicable

slide-26
SLIDE 26

Multivariate Cryptography The basic Scheme Improvements Parameters

Security (cont.)

Direct attacks Denote IA: ideal generated by the polynomials in A IE: ideal generated by the polynomials in E1 and E2 E1 = A · B, E2 = A · C ⇒ IE ⊂ IA ⇒ every nontrivial syzygy between the elements of IE should be a nontrivial syzygy between the elements of IA ⇒ solving the public system directly should be at least as hard as solving the system A

slide-27
SLIDE 27

Multivariate Cryptography The basic Scheme Improvements Parameters

Reducing the blow up factor between plain and ciphertext size ⇒ Triangular Simple Matrix (work in progress)

Basic idea: Use structured quadratic polynomials in the matrix A

slide-28
SLIDE 28

Multivariate Cryptography The basic Scheme Improvements Parameters

Benefits

blow up factor between plain and ciphertext size is minimized P is a nearly determined system ⇒ direct attacks become more complicated ⇒ possibility to decrease parameters and therefore key sizes?

slide-29
SLIDE 29

Multivariate Cryptography The basic Scheme Improvements Parameters

Problems to be solved

F is not bijective ⇒ restrict to messages from a subspace of Fm Security against Rank attacks

slide-30
SLIDE 30

Multivariate Cryptography The basic Scheme Improvements Parameters

Parameters and Key Sizes

80 bit security

plaintext ciphertext public key private key probability of scheme size (bit) size (bit) size (kB) size (kB) decryption failures SimpleMatrix(GF(28),8,64,128)

512 1,024 280.1 28.7 2−8

RSM(GF(28),8,11,12,128,264)

1,008 2,112 2,062 84.0 2−32

cubicSM(GF(28),7,49,98)

392 784 2,115 72.7 2−8

TSM(GF(28),5,48,50)

384 400 1,077 17.2 2−8

slide-31
SLIDE 31

Multivariate Cryptography The basic Scheme Improvements Parameters

Parameters and Key Sizes (cont.)

100 bit security

plaintext ciphertext public key private key probability of scheme size (bit) size (bit) size (kB) size (kB) decryption failures SimpleMatrix(GF(28),10,100,200)

800 1,600 1,030 70.0 2−8

RSM(GF(28),10,13,14,180,364)

1,408 2,912 5,537 160.0 2−32

cubicSM(GF(28),8,64,128)

512 1,024 5,988 154.0 2−8

TSM(GF(28),6,70,72)

560 576 4,552 45.0 2−8

slide-32
SLIDE 32

Multivariate Cryptography The basic Scheme Improvements Parameters

Conclusion

The Simple Matrix Encryption Scheme + resists all known attacks + has a very fast decryption process

  • decryption failures occur with non-negligible probability
  • large public key size

Improvements Decrease the probability of decryption failures Improve the security of the scheme further Reduce the blow up factor between plain and ciphertext size

slide-33
SLIDE 33

Multivariate Cryptography The basic Scheme Improvements Parameters

Future Work

Future work includes behavior of direct attacks against cubic Simple Matrix security issues of the triangular schemes analysis of different methods to decrease the probability of decryption failures cyclic version of the scheme ⇒ reduce key sizes white-box implementation of the scheme ⇒ eliminate decryption failures completely

slide-34
SLIDE 34

Multivariate Cryptography The basic Scheme Improvements Parameters

THANK YOU Questions?