Presentation
4 3 2
- 1. Introduction
Conception of a language for cryptographic reductions
- L. Ducas, Master Thesis
Supervisor : M. Baudet
Conception of a language for cryptographic reductions L. Ducas, - - PowerPoint PPT Presentation
L. Ducas, Master Thesis Conception of a language 1. Introduction 2 3 4 for cryptographic reductions Supervisor : M. Baudet Presentation Master thesis of Lo Ducas, supervised by Mathieu Baudet (ANSSI). Conception of a language for
4 3 2
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
4 3 2
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
4 3 2
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
4 3 2
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
4 3 2
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
4 3 2
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
4 3 2
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
request answser
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
Oracle
Oracle Answer
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
Oracle Attacker
Attaquant b : bool, successfull attack ?
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
Attacker
criterion
b : bool, successfull attack ?
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
Attacker criterion
Reduction
Meta-reduction
Reduction Pseudo- attacker Oracle
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
ref : a T (Ref a) → ( ! ) deref : Ref a T a → ( := ) assign : Ref a a T U → → rand_bool : T bool rand_int : int T int →
4 3
Conception d’un langage pour les réductions cryptographiques Stage M2 : L. Ducas Encadré par M. Baudet
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
L L
Public key signature Private key message Boolean
Signature Scheme gen sign verif
Hached value
hash Hash Then sign Critère Existencial forgery Attacker
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
Signature scheme gen sign verif hash Attacker Criterion Existencial forgery or collision Réduction ?
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
Public key signature Private key message Boolean Hached value
Attaquant Criterion Existencial forgery or collision
logger
listh
h a s h
Réduction
logger
List of Public key signature Private key message Boolean Hached value
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
Attaquant Criterion Existencial forgery or collision
logger
listh List iter hash
List of h a s h
Réduction
Public key signature Private key message Boolean Hached value
4 3
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
Cryptographic game Challenger R1 R2 R3 …
R3 R1 + R6; R2 R3 / R5 ← ←
answer
4
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
Attacker Normal API Attacker Cheated API Trees (formulas)
4
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
+
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
Conception of a language for cryptographic reductions
Supervisor : M. Baudet
[Bellar & Rogaway, 1994] MWihir Bellare and Phillip Rogaway. Optimal asymmetric encryption. In Advances in Cryptology – EUROCRYPT 1994 [Blanchet, 2006] Bruno Blanchet. A computationally sound mechanized prover for security protocols. In Proc. 2006 IEEE Symposium on Security and Privacy, [Backes et al., 2008] Michael Backes, Matthias Berg, and Dominique Unruh. A formal language for cryptographic pseudocode. In Proc. 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR’08), [Yu Zhang, 2009] Yu Zhang. The computational SLR: a logic for reasoning about computational indistinguishability. Cryptology ePrint Archive, Report 2008/434 (TLCA '09) [Barthe et al., 2009] Gilles Barthe, Benjamin Gr goire, Romain Janvier, and Santiago Zanella B ́
́ In Proc. 2nd Informal ACM SIGPLAN Workshop on Mechanizing Metatheory, Oct 2007. [Rogaway, 2006] Phillip Rogaway. Formalizing human ignorance. In Progress in Cryptology – VIETCRYPT 2006 [GGM, 1986] O Goldreich, S Goldwasser, and S Micali. How to construct random
[Paillier et Vergnaud, 2005] Pascal Paillier and Damien Vergnaud. Discrete-log-based signatures may not be equivalent to discrete log. In ASIACRYPT, pages 1–20, 2005. [Walder, 1989] Philip Wadler. Theorems for free ! In Proc. 4th Int. Symposium on Functional Programming Languages and Computer Architecture (FPCA’89),