cryptographic reductions classification and applications
play

Cryptographic Reductions: Classification and Applications to Ideal - PowerPoint PPT Presentation

Cryptographic Reductions: Classification and Applications to Ideal Models Paul Baecher Cryptographic Reductions: Classification and Applications to Ideal Models Paul Baecher Three Ways to Argue for Cryptographic Security Cryptanalysis


  1. Cryptographic Reductions: Classification and Applications to Ideal Models Paul Baecher

  2. Cryptographic Reductions: Classification and Applications to Ideal Models Paul Baecher

  3. Three Ways to Argue for Cryptographic Security Cryptanalysis Empirically evaluate real-world primitives Information-theoretic arguments Disregard any resource limitations Provable security from assumptions Efficient attackers only 1

  4. Three Ways to Argue for Cryptographic Security Provable security from assumptions Efficient attackers only 1

  5. Provable Security Follows a Common Structure Construction “To encrypt with � construction � , take the message and. . . ” 2

  6. Provable Security Follows a Common Structure Construction “To encrypt with � construction � , take the message and. . . ” Security proof Thm: If � assumption � , then � construction � secure. 2

  7. Provable Security Follows a Common Structure Construction “To encrypt with � construction � , take the message and. . . ” Security proof Thm: If � assumption � , then � construction � secure in the � ideal model � . 2

  8. Provable Security Follows a Common Structure Construction “To encrypt with � construction � , take the message and. . . ” Security proof Thm: If � assumption � , then � construction � secure in the � ideal model � . Idealized primitive 2

  9. Ideal Models Provide the “Best Possible” Primitive Ideal model Real life Random oracle MD5, SHA3, . . . Ideal cipher DES, AES, . . . 3

  10. Ideal Models Provide the “Best Possible” Primitive Ideal model Real life Random oracle MD5, SHA3, . . . Ideal cipher DES, AES, . . . Pick a random function from the set of all functions from k to n bits. 3

  11. Comparing Two Constructions with Ideal-Model Proofs is Difficult If � assump � , then � constr 1 � If � assump � , then � constr 2 � secure in the � ideal model � . secure in the � ideal model � . 4

  12. Comparing Two Constructions with Ideal-Model Proofs is Difficult If � assump � , then � constr 1 � If � assump � , then � constr 2 � secure in the � ideal model � . secure in the � ideal model � . Idealized primitive 4

  13. Comparing Two Constructions with Ideal-Model Proofs is Difficult If � assump � , then � constr 1 � If � assump � , then � constr 2 � secure in the � ideal model � . secure in the � ideal model � . Idealized primitive � constr 1 � 4

  14. Comparing Two Constructions with Ideal-Model Proofs is Difficult If � assump � , then � constr 1 � If � assump � , then � constr 2 � secure in the � ideal model � . secure in the � ideal model � . Idealized primitive � constr 1 � � constr 2 � 4

  15. Comparing Two Constructions with Ideal-Model Proofs is Difficult If � assump � , then � constr 1 � If � assump � , then � constr 2 � secure in the � ideal model � . secure in the � ideal model � . Idealized primitive � constr 1 � � constr 2 � AES 4

  16. Comparing Two Constructions with Ideal-Model Proofs is Difficult If � assump � , then � constr 1 � If � assump � , then � constr 2 � secure in the � ideal model � . secure in the � ideal model � . Idealized primitive � constr 1 � � constr 2 � DES 4

  17. Comparing Two Constructions with Ideal-Model Proofs is Difficult If � assump � , then � constr 1 � If � assump � , then � constr 2 � secure in the � ideal model � . secure in the � ideal model � . Idealized primitive � constr 1 � ? � constr 2 � DES 4

  18. Comparisons Might Still Be Possible Without Fully Understanding Ideal Primitives Can we compare constructions relative to each other? How do popular constructions compare? 5

  19. Oracle reducibility enables sound comparisons of cryptographic constructions whose proofs are in ideal models. 6

  20. Outline [BF11,BFFS13] Oracle reducibility A versatile comparison paradigm Ideal-cipher comparisons Blockcipher-based compression functions Random-oracle comparisons ElGamal-type encryption schemes 7

  21. Outline [BF11,BFFS13] Oracle reducibility A versatile comparison paradigm Ideal-cipher comparisons Blockcipher-based compression functions Random-oracle comparisons ElGamal-type encryption schemes 7

  22. What Makes � constr 1 � Secure Also Makes � constr 2 � Secure Idealized primitive � constr 1 � � constr 2 � 8

  23. What Makes � constr 1 � Secure Also Makes � constr 2 � Secure Idealized primitive � constr 1 � � constr 2 � E 8

  24. What Makes � constr 1 � Secure Can be Adjusted to Make � constr 2 � Secure Idealized primitive � constr 2 � � constr 1 � 9

  25. What Makes � constr 1 � Secure Can be Adjusted to Make � constr 2 � Secure Idealized primitive � constr 2 � � constr 1 � E 9

  26. What Makes � constr 1 � Secure Can be Adjusted to Make � constr 2 � Secure Idealized primitive � constr 2 � � constr 1 � E T ( E ) 9

  27. Formally Defining [ B F11, B FFS13] Oracle Reducibility Direct reducibility Free reducibility Any oracle O that makes C O There exists T s.t. any oracle 1 secure also makes C O that makes C O 2 secure 1 secure also makes C T O secure 2 10

  28. Formally Defining [ B F11, B FFS13] Oracle Reducibility Direct reducibility Free reducibility Any oracle O that makes C O There exists T s.t. any oracle ⇒ 1 secure also makes C O that makes C O 2 secure 1 secure also makes C T O secure 2 10

  29. Outline Oracle reducibility A versatile comparison paradigm Ideal-cipher comparisons [BFFS13] Blockcipher-based compression functions Random-oracle comparisons ElGamal-type encryption schemes 11

  30. Compression Functions Securely Shrink Their Input Building block for hash functions K 2 n -to- n compression Built from a blockcipher M E Design from [PGV93] Collision resistant if E ideal E ( K , M ) ⊕ M Proof due to [BRSS10] 12

  31. PGV Functions 1 2 3 4 5 6 7 8 9 10 11 12 13

  32. PGV Functions [ B FFS13] Fall Into Two Groups 1 4 2 3 5 8 6 7 9 12 10 11 direct reducibility within direct reducibility within 13

  33. PGV Functions [ B FFS13] Fall Into Two Groups 1 4 2 3 separation (direct) 5 8 � 6 7 reducibility (free) 9 12 10 11 13

  34. PGV Functions [ B FFS13] Fall Into Two Groups f r e e r e d u c t i o n 1 4 2 3 separation (direct) 5 8 � 6 7 reducibility (free) 9 12 10 11 13

  35. Free Reduction From PGV 2 to PGV 1 M M K K 1 2 1 secure ⇒ PGV T E PGV E There exists T s.t. for any E : secure 2 E 14

  36. Free Reduction From PGV 2 to PGV 1 M M K K 1 2 1 secure ⇒ PGV T E PGV E There exists T s.t. for any E : secure 2 T E ( K , M ) := E ( K , M ) ⊕ K E 14

  37. Free Reduction From PGV 2 to PGV 1 M M K K 1 2 1 secure ⇒ PGV T E PGV E There exists T s.t. for any E : secure 2 T E ( K , M ) := E ( K , M ) ⊕ K M K E E 14

  38. Free Reduction From PGV 2 to PGV 1 M M K K 1 2 1 secure ⇒ PGV T E PGV E There exists T s.t. for any E : secure 2 T E ( K , M ) := E ( K , M ) ⊕ K M T K E 14

  39. Free Reduction From PGV 2 to PGV 1 M M K K 1 2 1 secure ⇒ PGV T E PGV E There exists T s.t. for any E : secure 2 T E ( K , M ) := E ( K , M ) ⊕ K M M T T ≡ K K E E 14

  40. PGV Functions [ B FFS13] Fall Into Two Groups 1 4 2 3 separation (direct) 5 8 � 6 7 reducibility (free) 9 12 10 11 15

  41. Groups are Incomparable, No Clear Winner No direct reducibility from #1 to #2 Or vice versa Free reducibility “switches” group But no simultaneous security for both 16

  42. Groups are Incomparable, No Clear Winner � #1 secure E s.t. No direct reducibility from #1 to #2 #2 ??? Or vice versa Free reducibility “switches” group But no simultaneous security for both 16

  43. Groups are Incomparable, No Clear Winner � #1 secure E s.t. No direct reducibility from #1 to #2 #2 ??? Or vice versa T Free reducibility “switches” group � #1 ??? T ( E ) s.t. But no simultaneous security for both #2 secure 16

  44. Groups are Incomparable, No Clear Winner � #1 secure T ( T ( E )) s.t. No direct reducibility from #1 to #2 #2 ??? Or vice versa T Free reducibility “switches” group � #1 ??? T ( E ) s.t. But no simultaneous security for both #2 secure 16

  45. Outline Oracle reducibility A versatile comparison paradigm Ideal-cipher comparisons Blockcipher-based compression functions Random-oracle comparisons [BF11] ElGamal-type encryption schemes 17

  46. Cryptographic Constructions Often Undergo Iterative Improvements Feasibility result Not practical, but it works Practical result Simpler, tighter, faster, . . . Further improvements Milder or fewer assumptions 18

  47. Cryptographic Constructions Often Undergo Iterative Improvements Further improvements Milder or fewer assumptions 18

  48. An “Improved” Construction May be Worse in Other Ways If a 1 holds, then C ′ is secure If a 1 and a 2 hold, then C is ? < secure in � ideal model � . in � ideal model � . 19

Recommend


More recommend