Chosen-Ciphertext Security Chosen-Ciphertext Security without - - PowerPoint PPT Presentation

chosen ciphertext security chosen ciphertext security
SMART_READER_LITE
LIVE PREVIEW

Chosen-Ciphertext Security Chosen-Ciphertext Security without - - PowerPoint PPT Presentation

Chosen-Ciphertext Security Chosen-Ciphertext Security without Redundancy without Redundancy Duong Hieu Phan David Pointcheval ENS France CNRS-ENS France Asiacrypt '03 Taipei - Taiwan December 1 st 2003 Summary Summary Asymmetric


slide-1
SLIDE 1

Chosen-Ciphertext Security Chosen-Ciphertext Security without Redundancy without Redundancy

Duong Hieu Phan David Pointcheval

ENS – France CNRS-ENS – France Asiacrypt '03 Taipei - Taiwan December 1st 2003

slide-2
SLIDE 2

Chosen-Ciphertext Security without Redundancy - 2 David Pointcheval – CNRS - ENS

Summary Summary

Asymmetric Encryption Full-Domain Permutation Encryption 3-round OAEP Conclusion

slide-3
SLIDE 3

Chosen-Ciphertext Security without Redundancy - 3 David Pointcheval – CNRS - ENS

Asymmetric Encryption Asymmetric Encryption

An asymmetric encryption scheme π = (G,E,D) is defined by 3 algorithms:

➢ G – key generation ➢ E – encryption ➢ D – decryption

(ke,kd)

G

ω

kd ke

E D

r c m m

slide-4
SLIDE 4

Chosen-Ciphertext Security without Redundancy - 4 David Pointcheval – CNRS - ENS

Security Notions Security Notions

One-Wayness (OW) :

without the private key, it is computationally impossible to recover the plaintext

Semantic Security (IND - Indistinguishability) :

the ciphertext reveals no more information about the plaintext to a polynomial adversary

slide-5
SLIDE 5

Chosen-Ciphertext Security without Redundancy - 5 David Pointcheval – CNRS - ENS

Attacks Attacks

Chosen-Plaintext Attacks (CPA)

➢ the basic attack in the public-key setting

→ the adversary can encrypt any message of its choice

More information: oracle access Chosen-Ciphertext Attacks (CCA)

the adversary has access to the decryption oracle

  • n any ciphertext of its choice (except the challenge)

➢ non-adaptive (CCA1): only before receiving the challenge ➢ adaptive (CCA2): unlimited oracle access

slide-6
SLIDE 6

Chosen-Ciphertext Security without Redundancy - 6 David Pointcheval – CNRS - ENS

IND-CCA2 IND-CCA2 A

c m or ⊥ m1 m0

kd ke

G E

r mb c* b’ b∈ {0,1} r random

D

c ≠ c* m or ⊥

b’ = b

?

CCA2

D

CCA1

slide-7
SLIDE 7

Chosen-Ciphertext Security without Redundancy - 7 David Pointcheval – CNRS - ENS

Indistinguishabilit Indistinguishability: Probabilistic y: Probabilistic

To achieve indistinguishability, a public-key encryption scheme must be probabilistic

  • therwise, with the chalenge c = E(mb)
  • ne computes c0 = E(m0) and checks whether c0 = c

For any plaintext, the number of possible ciphertexts must be lower-bounded by 2k, for a security level in 2k : at least length(c) ≥ length(m) + k

slide-8
SLIDE 8

Chosen-Ciphertext Security without Redundancy - 8 David Pointcheval – CNRS - ENS

Chosen-Ciphertext Security: Chosen-Ciphertext Security: Redundancy Redundancy

To resist chosen-ciphertext attacks, all the proposed constructions introduce redundancy: OAEP: redundancy in the padding REACT: MAC in the ciphertext Cramer-Shoup: Proof of validity = redundancy Such a redundancy makes that a random ciphertext is valid (a possible output of the encryption algorithm) with a very small probability, less than 2-k: in practice: at least length(c) ≥ length(m) + 2k

plaintext

  • awareness

}

slide-9
SLIDE 9

Chosen-Ciphertext Security without Redundancy - 9 David Pointcheval – CNRS - ENS

Optimal Size = No Redundancy Optimal Size = No Redundancy

No redundancy = any ciphertext is valid:

➢ is a possible output of E(m,r) ➢ the function

E: M × R →C (m,r) → c is a surjection Advantages:

➢ optimal bandwidth ➢ no reaction attack / implementation issues ➢ easier distribution of the decryption process

slide-10
SLIDE 10

Chosen-Ciphertext Security without Redundancy - 10 David Pointcheval – CNRS - ENS

First candidate: in the same vein as the Full-Domain Hash Signature Public permutation P (Random Permutation Model)

  • nto M ×

R ≈ C ≈ {0,1}n × {0,1}k ≈ {0,1}l Trapdoor one-way permutation f onto {0,1}l E: M × R → C (m,r) → c = f (P(m,r))

➢ the public key is the pair ( f , P) which includes P-1 ➢ the private key is the trapdoor f -1

Full-Domain Permutation Encryption Full-Domain Permutation Encryption

slide-11
SLIDE 11

Chosen-Ciphertext Security without Redundancy - 11 David Pointcheval – CNRS - ENS

In the RPM, a (t,ε )-IND-CCA2 adversary helps to invert f within almost the same time t, and with success probability greater than ε – q/2k Simulation of the oracles P, P-1 and D using a list Λ

  • f tuples {(m,r,p,c)}: p = P(m,r), c = f (p) = E(m,r)

➢ problem if (m,r) is assumed to correspond to P-1( f -1(c))

from the D-simulation, and the adversary asks for P(m,r):

→ the simulation should output p = f -1(c), which is unknown

but D outputs m only: r is unpredictable

FDP Encryption is IND-CCA2 Secure FDP Encryption is IND-CCA2 Secure

slide-12
SLIDE 12

Chosen-Ciphertext Security without Redundancy - 12 David Pointcheval – CNRS - ENS

No redundancy Optimal bandwidth: length(c) = length(m) + k High security level: IND-CCA2

➢ with efficient reduction ➢ but in the Random-Permutation Model

Can we weaken the assumptions?

FDP Encryption: Properties FDP Encryption: Properties

slide-13
SLIDE 13

Chosen-Ciphertext Security without Redundancy - 13 David Pointcheval – CNRS - ENS

A weaker model : the random-oracle model

➢ access to a truly random function

How to build a random permutation from a random function?

➢ Luby-Rackoff: a Feistel construction ➢ not that easy:

here, one has access to the internal function... Let us try anyway: OAEP

The Random-Oracle Model The Random-Oracle Model

slide-14
SLIDE 14

Chosen-Ciphertext Security without Redundancy - 14 David Pointcheval – CNRS - ENS

M = m || 0k r random

G H

E(m) : c = f(s || t) D(c) : s || t = f -1(c) then invert OAEP, if the redundancy is satisfied, one returns m G, H: random functions s

2-round OAEP 2-round OAEP

t

slide-15
SLIDE 15

Chosen-Ciphertext Security without Redundancy - 15 David Pointcheval – CNRS - ENS

2-round OAEP (cont'd) 2-round OAEP (cont'd)

In the random-oracle model If f is a trapdoor partial-domain OW permutation:

➢ (s,t) →

f (s || t) trapdoor one-way

➢ f (s || t) →

s also hard to compute

With a redundancy 0k and random of size k0 The encryption scheme f -OAEP: IND-CCA2 with quadratic time reduction (in qFqGTf ) + quadratic lost (in qDqG / 2k0: k0 = 2k) length(c) = length(m) + 3k

slide-16
SLIDE 16

Chosen-Ciphertext Security without Redundancy - 16 David Pointcheval – CNRS - ENS

What About the Redundancy? What About the Redundancy?

For IND-CCA2: redundancy Plaintext-awareness = unvalid ciphertexts Without redundancy... is it still IND-CCA2?

➢ 2-round OAEP: no known attack, but no proof either

→ Any simulation seems to be subject

to the Shoup's attack (malleability of OAEP)

➢ 3-round OAEP: can be proven

slide-17
SLIDE 17

Chosen-Ciphertext Security without Redundancy - 17 David Pointcheval – CNRS - ENS

3-round OAEP 3-round OAEP

m F F, G and H: random functions t u r E(m) : c = f (t || u) D(c) : t || u = f -1(c) then invert OAEP, and return m s G H

slide-18
SLIDE 18

Chosen-Ciphertext Security without Redundancy - 18 David Pointcheval – CNRS - ENS

Idea of the Security Idea of the Security

2-round OAEP: as in the Shoup's attack,

➢ the adversary can forge a ciphertext c,

with the same r as in the challenge ciphertext

➢ the simulator cannot check that!

With one more round:

➢ the adversary is stuck!

  • ne can simulate everything

➢ at random when not already known

slide-19
SLIDE 19

Chosen-Ciphertext Security without Redundancy - 19 David Pointcheval – CNRS - ENS

Tightness of the Reduction Tightness of the Reduction

Everything works well with lists, ΛF, ΛG, ΛH, ΛD But for g = G(s), which implies

➢ F(r) = m ⊕

s for r = t ⊕ g

➢ for any (t, h) ∈

ΛH, and (m,c) ∈ ΛD

such that c = f (t, h ⊕

s) in case such a query is asked later Problem if such a query has already been asked... Since g is random, the overall probability of such a bad event is upper-bounded by qD qF / 2k.

m F t u r s G H

slide-20
SLIDE 20

Chosen-Ciphertext Security without Redundancy - 20 David Pointcheval – CNRS - ENS

Security Result Security Result

With a random of size k0, but no redundancy In the ROM, a (t,ε )-IND-CCA2 adversary helps to partially invert f within t' ≈ t + qGqHTf, and with success probability greater than ε – qDQ / 2k0 The 3-round OAEP is: IND-CCA2 with quadratic time reduction + quadratic lost (⇒ k0 = 2k) length(c) = length(m) + 2k

slide-21
SLIDE 21

Chosen-Ciphertext Security without Redundancy - 21 David Pointcheval – CNRS - ENS

Conclusion Conclusion

We have proposed the first IND-CCA2 encryption schemes, without redundancy: the FDP encryption is optimal

➢ based on the OW of the trapdoor permutation ➢ optimal bandwidth ➢ but in the Random-Permutation Model

the 3-round OAEP has similar characteristics as the 2-round OAEP, but without redundancy