birthday bound in the ideal cipher model
play

Birthday Bound in the Ideal Cipher Model *Byeonghak Lee, Jooyoung - PowerPoint PPT Presentation

Tweakable Block Cipher Secure Beyond the Birthday Bound in the Ideal Cipher Model *Byeonghak Lee, Jooyoung Lee KAIST Outline Tweakable block ciphers Our contribution Proof overview Conclusion 2 Tweakable Block Ciphers (TBCs)


  1. Tweakable Block Cipher Secure Beyond the Birthday Bound in the Ideal Cipher Model *Byeonghak Lee, Jooyoung Lee KAIST

  2. Outline • Tweakable block ciphers • Our contribution • Proof overview • Conclusion 2

  3. Tweakable Block Ciphers (TBCs) 𝑳 𝑭 𝒀 𝒁 3

  4. Tweakable Block Ciphers (TBCs) 𝑳 𝑼 ෩ 𝑭 𝒀 𝒁  A tweakable block cipher ෨ 𝐹 accepts an additional input “ tweak ” - Tweaks are publicly used (like IVs in modes of operation) - Changing tweaks should be efficient (compared to changing keys) - Each tweak should give an independent permutation - Can be used to construct various cryptographic schemes

  5. Construction of TBCs  Dedicated construction - Hasty Pudding, Mercy, Threefish, TWEAKEY framework, etc.  Permutation-based construction - TEM, XPX, etc.  Block cipher-based construction - LRW, XEX, XHX, etc. 5

  6. Block cipher-based Construction  Using fixed keys (independent of tweaks) - Security is proved in the standard model - The underlying BC is replaced by an ideal random permutation (up to the security of TBC)  Using tweak-dependent keys - Suitable when the underlying block cipher 𝐹 uses a lightweight key schedule - Security is proved in the ideal cipher model - An adversary is allowed oracle access to 𝐹 6

  7. 𝑮 𝟐 , ෩ 𝑮 𝟑 (Mennink, FSE 2015) ෩ ෨ With 𝑜 -bit block cipher using 𝑜 -bit keys, 𝐺 1 𝐺 1 is secure up to 2 2𝑜/3 queries ෨  - BBB-secure with one BC call 𝐺[2] is secure up to 2 𝑜 queries ෨  ෨ 𝐺 2 - Fully secure with two BC calls 7

  8. 𝑮 𝟐 , ෩ 𝑮 𝟑 (Mennink, FSE 2015) ෩ ෨ With 𝑜 -bit block cipher using 𝑜 -bit keys, 𝐺 1 𝐺 1 is secure up to 2 2𝑜/3 queries ෨  - BBB-secure with one BC call 𝐺[2] is secure up to 2 𝑜 queries ෨  ෨ 𝐺 2 - Fully secure with two BC calls  Both uses tweak dependent keys 8

  9. 𝑭𝟒𝟑 (Wang, et. al., AC 2016) 𝑭𝟐, … , ෫ ෪ With 𝑜 -bit block cipher using 𝑜 -bit keys,  only xor operation is used  secure up to 2 𝑜 queries - Fully secure with two BC calls 9

  10. 𝑭𝟒𝟑 (Wang, et. al., AC 2016) 𝑭𝟐, … , ෫ ෪ With 𝑜 -bit block cipher using 𝑜 -bit keys,  only xor operation is used Can be precomputed and viewed as a subkey  secure up to 2 𝑜 queries - Fully secure with two BC calls - One call can be saved by precomputation 10

  11. XHX (Jha, et. al., Latincrypt 2017)  XHX uses two types of hash functions - 𝑕: 𝜀 -almost xor-universal and uniform hash function - ℎ: 𝜀′ -almost universal and uniform hash function - Accepts arbitrary length tweak  𝑕 and ℎ are keyed hash function generated from 𝑕(𝑢) ℎ(𝑢) the master key, but we omit the key and view them as secret key of the construction 𝑛  With 𝑜 -bit block cipher using 𝑛 -bit keys, 𝑜 𝑜+𝑛 XHX is secure up to 2 queries 𝑦 𝑧 2 𝐹 11

  12. Outline • Tweakable block ciphers • Our contribution • Proof overview • Conclusion 12

  13. Motivation  The input size of an 𝑜 -bit block cipher using 𝑛 -bit key is 𝑜 + 𝑛 bits  In the ideal cipher model, its information-theoretic security cannot go beyond 𝑜 + 𝑛 bits (due to key exhaustive search) 𝑜+𝑛  With respect to this size, the birthday bound should be 2 - If 𝑛 = 𝑜 , it become 𝑜 , so previous results are birthday bound in this view 13

  14. Motivation  The input size of an 𝑜 -bit block cipher using 𝑛 -bit key is 𝑜 + 𝑛 bits  In the ideal cipher model, its information-theoretic security cannot go beyond 𝑜 + 𝑛 bits (due to key exhaustive search) 𝑜+𝑛  With respect to this size, the birthday bound should be 2 - If 𝑛 = 𝑜 , it become 𝑜 , so previous results are birthday bound in this view  Can we go beyond the birthday bound? 14

  15. XHX2  Cascade of two independent copies of XHX - 𝐹 1 and 𝐹 2 are 𝑜 -bit block ciphers using 𝑛 -bit keys - 𝑕 1 and 𝑕 2 are 𝜀 -almost uniform and xor-universal functions, and - ℎ 1 and ℎ 2 are 𝜀 ′ -almost uniform and universal function - Accepts arbitrary length tweak ℎ 1 (𝑢) 𝑕 1 (𝑢) 𝑕 2 (𝑢) ℎ 2 (𝑢) 𝑦 𝑧 𝐹 1 𝐹 2

  16. XHX2  Cascade of two independent copies of XHX - 𝐹 1 and 𝐹 2 are 𝑜 -bit block ciphers using 𝑛 -bit keys ⨂ (finite field mult) can be used - 𝑕 1 and 𝑕 2 are 𝜀 -almost uniform and xor-universal functions, and - ℎ 1 and ℎ 2 are 𝜀 ′ -almost uniform and universal function - Accepts arbitrary length tweak ℎ 1 (𝑢) 𝑕 1 (𝑢) 𝑕 2 (𝑢) ℎ 2 (𝑢) 𝑦 𝑧 𝐹 1 𝐹 2

  17. XHX2  Cascade of two independent copies of XHX - 𝐹 1 and 𝐹 2 are 𝑜 -bit block ciphers using 𝑛 -bit keys If 𝑢 = 𝑛 , ⨁ can be used - 𝑕 1 and 𝑕 2 are 𝜀 -almost uniform and xor-universal functions, and else, ⨂ can be used - ℎ 1 and ℎ 2 are 𝜀 ′ -almost uniform and universal function - Accepts arbitrary length tweak ℎ 1 (𝑢) 𝑕 1 (𝑢) 𝑕 2 (𝑢) ℎ 2 (𝑢) 𝑦 𝑧 𝐹 1 𝐹 2

  18. XHX2  Cascade of two independent copies of XHX - 𝐹 1 and 𝐹 2 are 𝑜 -bit block ciphers using 𝑛 -bit keys - 𝑕 1 and 𝑕 2 are 𝜀 -almost uniform and xor-universal functions, and - ℎ 1 and ℎ 2 are 𝜀 ′ -almost uniform and universal function - Accepts arbitrary length tweak ℎ 1 (𝑢) 𝑕 1 (𝑢) 𝑕 2 (𝑢) ℎ 2 (𝑢) Secure up to 2 min 2 𝑜+𝑛 ,𝑜+ 𝑛  queries 3 2 𝑦 𝑧 𝐹 1 𝐹 2 2 𝑜+𝑛 𝑛 2 𝑜+𝑛  If 𝑛 ≤ 2𝑜 , min , 𝑜 + = 3 2 3

  19. Security of XHX2 When 𝑕 1 and 𝑕 2 are 𝑜 -bit 𝜀 -almost uniform and xor-universal hash functions, and ℎ 1 and ℎ 2 are 𝑛 -bit 𝜀′ -almost uniform and universal hash functions, one has 1 1 where 𝜀 ≈ 2 𝑜 , 𝜀′ ≈ 2 𝑛 , 𝑞 and 𝑟 are the number of queries to underlying block ciphers and construction 19

  20. Comparison Efficiency Construction Key size Security Ref. E ⨂ / H LRW 2𝑜 𝑜/2 1 1 [LRW02] LRW[2] 4𝑜 2𝑜/3 , (or 3𝑜/4 ) 2 2 [LST12, Men18] 2𝑡𝑜 𝑡𝑜/(𝑡 + 2) 𝑡 𝑡 LRW[s] [LS13] ෨ 𝑜 2𝑜/3 1 1 𝐺[1] [Men15] ෨ 𝐺[2] 𝑜 𝑜 2 0 [Men15] 𝐹1, ⋯ , ෪ ෪ 𝐹32 𝑜 𝑜 2 0 [Lei + 16] [Jha + 17] 𝑜 + 𝑛 (𝑜 + 𝑛)/2 1 1 XHX 2𝑜 + 2𝑛 𝑛𝑗𝑜(2(𝑜 + 𝑛)/3, 𝑜 + 𝑛/2) 2 2 XHX2 Our work 20

  21. Security of the 2-round XTX  XTX is a tweak-length extension scheme (Minematsu and Iwata, IMACC 2015) 𝑕(𝑢) ℎ(𝑢) ෨ 𝑦 𝐹 𝐿 𝑧  Without allowing block cipher queries ( 𝑞 = 0 ), we can prove beyond-birthday- bound security for the cascade of two independent XTX constructions. ℎ 1 (𝑢) 𝑕 1 (𝑢) 𝑕 2 (𝑢) ℎ 2 (𝑢) ෨ ෨ 𝑦 𝑧 𝐹 𝐿 1 𝐹 𝐿 2 21

  22. Outline • Tweakable block ciphers • Our contribution • Proof overview • Conclusion 22

  23. Distinguishing game 𝑕 1 (𝑢) ℎ 1 (𝑢) 𝑕 2 (𝑢) ℎ 2 (𝑢) Real? or Ideal? ෨ 𝑄 𝐹 1 /𝐹 2 𝐹 1 /𝐹 2 𝑦 𝐹 1 𝐹 2 𝑧 Real world Ideal world • Adversary tries to distinguish two worlds by making oracle queries • All the information obtained during the attack is represented by a transcript: 𝜐 = 𝑅 𝐷 = 𝑢 1 , 𝑦 1 , 𝑧 1 , ⋯ , 𝑢 𝑟 , 𝑦 𝑟 , 𝑧 𝑟 , 𝑅 𝐹 𝑘 = 𝑘, 𝑙 1 , 𝑣 1 , 𝑤 1 , ⋯ , 𝑘, 𝑙 𝑞 , 𝑣 𝑞 , 𝑤 𝑞 23

  24. Distinguishing game 𝑕 1 (𝑢) ℎ 1 (𝑢) 𝑕 2 (𝑢) ℎ 2 (𝑢) Real? or Ideal? ෨ 𝑄 𝐹 1 /𝐹 2 𝐹 1 /𝐹 2 𝑦 𝐹 1 𝐹 2 𝑧 Real world Ideal world Assume to be revealed • Adversary tries to distinguish two worlds by making oracle queries after the attack is finished • All the information obtained during the attack is represented by a transcript: 𝜐 = 𝑅 𝐷 = 𝑢 1 , 𝑦 1 , 𝑧 1 , ⋯ , 𝑢 𝑟 , 𝑦 𝑟 , 𝑧 𝑟 , 𝑅 𝐹 𝑘 = 𝑘, 𝑙 1 , 𝑣 1 , 𝑤 1 , ⋯ , 𝑘, 𝑙 𝑞 , 𝑣 𝑞 , 𝑤 𝑞 , 𝑕 1 , 𝑕 2 , ℎ 1 , ℎ 2 24

  25. Upper Bounding the Distinguishing Advantage  T id : Probability distribution of τ in the ideal world  T re : Probability distribution of τ in the real world 𝐁𝐞𝐰 ෨ 𝐹 𝒠 ≤ T id − T re Probability to appear 1 real ideal 0 Transcripts 25

  26. Proof technique We can use following lemma to upper bound the statistical distance Patarin’s H-coefficient lemma (informal) 1) Define bad transcripts Θ bad • Pr T id ∈ Θ bad ≤ ϵ 1 ∥ T id − T re ∥ ≤ ϵ 1 + ϵ 2 2) With 𝜐 ∉ Θ bad Pr T re =𝜐 • Pr T id =𝜐 ≥ 1 − ϵ 2 26

  27. Security Proof of XHX2 (Sketch) 1) Give free queries to the adversary 2) Define bad transcripts 3) Lower bound the ratio of probabilities of obtaining a good transcript in the real world and in the ideal world - Pr T id = 𝜐 is easy to compute, while Pr T re = 𝜐 is challenging 4) Apply the H-coefficient lemma 27

  28. Representation of Construction Queries ℎ 1 (𝑢) 𝑕 1 (𝑢) 𝑕 2 (𝑢) ℎ 2 (𝑢) 𝑦 𝑧 𝐹 1 𝐹 2  Reduced query: combine keys and construction queries 𝑢, 𝑦, 𝑧 ↦ ℎ 1 𝑢 , ℎ 2 𝑢 , 𝑦⨁𝑕 1 𝑢 , 𝑧⨁𝑕 2 𝑢 , 𝑕 1 (𝑢)⨁𝑕 2 𝑢 = (𝑙, 𝑚, 𝑣, 𝑤, Δ) 28

Recommend


More recommend