Everybodys a Target: Scalability in Public-Key Encryption Benedikt - - PowerPoint PPT Presentation

everybody s a target scalability in public key encryption
SMART_READER_LITE
LIVE PREVIEW

Everybodys a Target: Scalability in Public-Key Encryption Benedikt - - PowerPoint PPT Presentation

Everybodys a Target: Scalability in Public-Key Encryption Benedikt Auerbach 1 Federico Giacon 2 Eike Kiltz 3 1 IST Austria, Klosterneuburg, Austria 2 Gnosis Service GmbH, Berlin, Germany 3 Horst Grtz Institut fr IT-Sicherheit,


slide-1
SLIDE 1

Everybody’s a Target: Scalability in Public-Key Encryption

Benedikt Auerbach1 Federico Giacon2 Eike Kiltz3

1IST Austria, Klosterneuburg, Austria 2Gnosis Service GmbH, Berlin, Germany 3Horst Görtz Institut für IT-Sicherheit, Ruhr-Universität Bochum, Germany

May 04, 2020

slide-2
SLIDE 2

Agenda

◮ multi-instance security and the scaling factor ◮ the scaling behavior of Hashed-ElGamal key encapsulation ◮ generic group lower bounds for multi-instance CDH-type problems

2 / 24

slide-3
SLIDE 3

Multi-instance security

◮ usual security definition for cryptographic schemes

◮ adversary unable to compromise a single user

This work: Scaling of security in the number of users

How much more computational effort does it take to compromise n users compared to compromising one?

3 / 24

slide-4
SLIDE 4

Multi-instance security

◮ usual security definition for cryptographic schemes

◮ adversary unable to compromise a single user

This work: Scaling of security in the number of users

How much more computational effort does it take to compromise n users compared to compromising one?

3 / 24

slide-5
SLIDE 5

Multi-instance security

◮ usual security definition for cryptographic schemes

◮ adversary unable to compromise a single user

◮ this work: scaling of security in the number of users

◮ how much more computational effort does it take to compromise all

  • f n users compared to compromising one?

3 / 24

slide-6
SLIDE 6

Scaling behavior of cryptographic schemes

t

x compromised users

1

effort

4 / 24

slide-7
SLIDE 7

Scaling behavior of cryptographic schemes

t

x compromised users

1 n nt

effort

worst case best case

4 / 24

slide-8
SLIDE 8

Scaling behavior of cryptographic schemes

t

x compromised users

1 n nt

effort

worst case best case actual behavior?

4 / 24

slide-9
SLIDE 9

Background

◮ theory: parameters of schemes chosen such that even breaking a

single instance is infeasible

◮ in particular impossible to break many instances

◮ practice: use of outdated parameters widespread

◮ breaking of single instance within reach ◮ bad scaling behavior could enable large-scale attack 5 / 24

slide-10
SLIDE 10

Logjam attack

◮ bad scaling-behavior exploited in Logjam attack [ADGG+15]

◮ attacked TLS in the finite-field setting for primes of length 512 ◮ effort to break 220 instances only doubles compared to breaking one 6 / 24

slide-11
SLIDE 11

Logjam attack

Scaling behavior of ElGamal for subgroups of F∗

p, p prime of length 512

t

x compromised users

1

effort

Logjam attack

Effort to break 220 instances only doubles compared to breaking one

7 / 24

slide-12
SLIDE 12

Our contributions

◮ scaling behavior; theoretical perspective

◮ adapt multi-instance security to key-encapsulation mechanisms ◮ define the scaling factor of schemes

◮ scaling behavior; application to Hashed-ElGamal (HEG) key

encapsulation

◮ consider HEG for different parameter settings ◮ compute scaling factor in idealized models 8 / 24

slide-13
SLIDE 13

Multi-Instance Security and the Scaling Factor

9 / 24

slide-14
SLIDE 14

Reminder: key-encapsulation mechanisms

◮ Key-encapsulation mechanism KEM consists of algorithms

par

$

← Par (pk, sk)

$

← Gen(par) (K, C)

$

← Enc(par, pk) K ← Dec(par, sk, C)

10 / 24

slide-15
SLIDE 15

Security notions for KEMs

CCA: single-instance setting b

$

← {0, 1} par

$

← Par (pk, sk)

$

← Gen(par) (K ∗, C ∗)

$

← Enc(par, pk) if b = 0: K ∗ ← $ win ← [b = b′]

CCA

par, pk, K ∗, C ∗ C Dec(par, sk , C) b′

A

Advantage: AdvCCA

KEM(A) = Pr[win] − 1/2

11 / 24

slide-16
SLIDE 16

Security notions for KEMs

n-CCA: multi-instance setting [BelRisTes12]

  • b

$

← {0, 1}n par

$

← Par for i ∈ {1, .. , n}: (pki, ski)

$

← Gen(par) (K ∗

i , C ∗ i ) $

← Enc(par, pki) if bi = 0: K ∗

i ← $

win ← [n

i=1 bi = b′]

n-CCA

par, pk, K ∗, C ∗ C, i Dec(par, ski, C) b′

A

Advantage: Advn-CCA

KEM (A) = Pr[win] − 1/2

11 / 24

slide-17
SLIDE 17

Scaling factor

◮ how does the security of a key-encapsulation mechanism (KEM)

scale in the number of users?

◮ we define the scaling factor of KEM

SF(n) = MinTime(n) MinTime(1)

◮ MinTime(n): running time of fastest adversary breaking

n-CCA security users with success probability 1

12 / 24

slide-18
SLIDE 18

Scaling factor

◮ how does the security of a key-encapsulation mechanism (KEM)

scale in the number of users?

◮ we define the scaling factor of KEM

SF(n) = MinTime(n) MinTime(1)

◮ MinTime(n): running time of fastest adversary breaking

n-CCA security users with success probability 1

Lemma 1 ≤ SF(n) ≤ n

12 / 24

slide-19
SLIDE 19

The Scaling Behavior of Hashed-ElGamal

13 / 24

slide-20
SLIDE 20

Overview on our results

◮ considered KEM: Hashed-ElGamal

◮ consider variants with different shared parameters (granularity) ◮ elliptic-curve setting ◮ bounds in generic-group model and random-oracle model

◮ G group of prime order p generated by g

Granularity par sk pk SFHEG(n) high (G, p, g) x gx Θ(√n) medium (G, p) (g, x) (g, gx) Θ(√n) low ⊥ ((G, p, g), x) ((G, p, g), gx) Θ(n)

14 / 24

slide-21
SLIDE 21

Overview on our results

◮ goal: bound SFHEG(n) = MinTime(n) MinTime(1)

15 / 24

slide-22
SLIDE 22

Overview on our results

◮ goal: bound SFHEG(n) = MinTime(n) MinTime(1) ◮ upper bound

◮ known generic algorithms:

MinTime(n) =

  • O(√np)

high/med. granularity O(n√p) low granularity

◮ known generic bound: MinTime(1) = Ω(√p) 15 / 24

slide-23
SLIDE 23

Overview on our results

◮ goal: bound SFHEG(n) = MinTime(n) MinTime(1) ◮ upper bound

◮ known generic algorithms:

MinTime(n) =

  • O(√np)

high/med. granularity O(n√p) low granularity

◮ known generic bound: MinTime(1) = Ω(√p)

◮ lower bound

◮ known generic algorithm: MinTime(1) = O(√p) ◮ this work: generic-group bounds

MinTime(n) =

  • Ω(√np)

high/med. granularity Ω(n√p) low granularity

15 / 24

slide-24
SLIDE 24

Generic-group lower bound on MinTimeHEG(n)

Overview

n-CCAHEG

GGM

= = = = ⇒ ROM ∼ random-oracle model n-gapCDH ∼ multi-instance gap Diffie-Hellman problem AGM ∼ algebraic-group model [FKL18] n-gapDL ∼ multi-instance gap discrete-logarithm problem GGM ∼ generic-group model

16 / 24

slide-25
SLIDE 25

Generic-group lower bound on MinTimeHEG(n)

Overview

n-CCAHEG

ROM

= = = = ⇒ n-gapCDH

GGM

= = = = ⇒ ROM ∼ random-oracle model n-gapCDH ∼ multi-instance gap Diffie-Hellman problem AGM ∼ algebraic-group model [FKL18] n-gapDL ∼ multi-instance gap discrete-logarithm problem GGM ∼ generic-group model

16 / 24

slide-26
SLIDE 26

Generic-group lower bound on MinTimeHEG(n)

Overview

n-CCAHEG

ROM

= = = = ⇒ n-gapCDH

AGM

= = = = ⇒

GGM

= = = = ⇒ n-gapDL ROM ∼ random-oracle model n-gapCDH ∼ multi-instance gap Diffie-Hellman problem AGM ∼ algebraic-group model [FKL18] n-gapDL ∼ multi-instance gap discrete-logarithm problem GGM ∼ generic-group model

16 / 24

slide-27
SLIDE 27

Generic-group lower bound on MinTimeHEG(n)

Overview

n-CCAHEG

ROM

= = = = ⇒ n-gapCDH

(AGM)

= = = = = ⇒

GGM

= = = = ⇒

GGM

= = = = ⇒ n-gapDL ROM ∼ random-oracle model n-gapCDH ∼ multi-instance gap Diffie-Hellman problem AGM ∼ algebraic-group model [FKL18] n-gapDL ∼ multi-instance gap discrete-logarithm problem GGM ∼ generic-group model

16 / 24

slide-28
SLIDE 28

Generic-Group Lower Bounds for Multi-Instance CDH-Type Problems

17 / 24

slide-29
SLIDE 29

Multi-instance CDH-type problems

Multi-instance discrete logarithm problem, G = (G, p, g) for i ∈ {1, .. , n}: xi

$

← Zp Xi ← gxi win ← [∀i : zi = xi]

n-DL

G, X

  • z

A

Advantage: Advn-DL(A) = Pr[win]

18 / 24

slide-30
SLIDE 30

Multi-instance CDH-type problems

Multi-instance gap discrete logarithm problem, G = (G, p, g) for i ∈ {1, .. , n}: xi

$

← Zp Xi ← gxi d ←

  • 1

if g ˜

x˜ y = ˜

Z else win ← [∀i : zi = xi]

n-gapDL

G, X ˜ X, ˜ Y , ˜ Z d

  • z

A

Advantage: Advn-gapDL(A) = Pr[win]

18 / 24

slide-31
SLIDE 31

Multi-instance CDH-type problems

Multi-instance gap computational Diffie-Hellman problem, G = (G, p, g) for i ∈ {1, .. , n}: xi

$

← Zp; yi

$

← Zp Xi ← gxi; Yi ← gyi d ←

  • 1

if g ˜

x˜ y = ˜

Z else win ← [∀i : Zi = gxiyi]

n-gapCDH

G, X, Y ˜ X, ˜ Y , ˜ Z d

  • Z

A

Advantage: Advn-gapCDH(A) = Pr[win]

18 / 24

slide-32
SLIDE 32

Multi-instance generic-group lower bounds

Overview

problem granularity MinTime n-DL high Ω(√np) [Yun15] n-DL low Ω(√np) [GDJY13] Generic-group bounds for multi-instance Diffie-Hellman-type problems

◮ G of prime order p ◮ n instances

19 / 24

slide-33
SLIDE 33

Multi-instance generic-group lower bounds

Overview

problem granularity MinTime n-DL high Ω(√np) [Yun15] n-DL low Ω(√np) [GDJY13] this work n-gapDL high/med. Ω(√np) n-gapCDH high/med. Ω(√np) n-gapDL low Ω(n√p) n-gapCDH low Ω(n√p) Generic-group bounds for multi-instance Diffie-Hellman-type problems

◮ G of prime order p ◮ n instances

19 / 24

slide-34
SLIDE 34

Multi-instance generic-group lower bounds

Overview

problem granularity MinTime n-DL high Ω(√np) [Yun15] n-DL low Ω(√np) [GDJY13] this work n-gapDL high/med. Ω(√np) n-gapCDH high/med. Ω(√np) n-gapDL low Ω(n√p) n-gapCDH low Ω(n√p) n-polyDLd high Ω(

  • np/d)

Generic-group bounds for multi-instance Diffie-Hellman-type problems

◮ G of prime order p ◮ n instances

19 / 24

slide-35
SLIDE 35

Intuition behind proofs

n-gapDL

◮ high granularity

◮ reduce n-gapDL to geometric

search problem: search-by-hypersurface problem (SHS2)

◮ prove information theoretic

bound on hardness of SHS2

◮ DDH-oracle requires us to

work in realm of commutative algebra

low / medium granularity

derived from high granularity result

  • x

space: Zn

p; goal: find

x

20 / 24

slide-36
SLIDE 36

Intuition behind proofs

n-gapDL

◮ high granularity

◮ reduce n-gapDL to geometric

search problem: search-by-hypersurface problem (SHS2)

◮ prove information theoretic

bound on hardness of SHS2

◮ DDH-oracle requires us to

work in realm of commutative algebra

low / medium granularity

derived from high granularity result

  • x

space: Zn

p; goal: find

x

20 / 24

slide-37
SLIDE 37

Intuition behind proofs

n-gapDL

◮ high granularity

◮ reduce n-gapDL to geometric

search problem: search-by-hypersurface problem (SHS2)

◮ prove information theoretic

bound on hardness of SHS2

◮ DDH-oracle requires us to

work in realm of commutative algebra

low / medium granularity

derived from high granularity result

  • x

space: Zn

p; goal: find

x

20 / 24

slide-38
SLIDE 38

Intuition behind proofs

n-gapDL

◮ high granularity

◮ reduce n-gapDL to geometric

search problem: search-by-hypersurface problem (SHS2)

◮ prove information theoretic

bound on hardness of SHS2

◮ DDH-oracle requires us to

work in realm of commutative algebra

low / medium granularity

derived from high granularity result

  • x

space: Zn

p; goal: find

x

20 / 24

slide-39
SLIDE 39

Intuition behind proofs

n-gapDL

◮ high granularity

◮ reduce n-gapDL to geometric

search problem: search-by-hypersurface problem (SHS2)

◮ prove information theoretic

bound on hardness of SHS2

◮ DDH-oracle requires us to

work in realm of commutative algebra

low / medium granularity

derived from high granularity result

  • x

space: Zn

p; goal: find

x

20 / 24

slide-40
SLIDE 40

Intuition behind proofs

n-gapDL

◮ high granularity

◮ reduce n-gapDL to geometric

search problem: search-by-hypersurface problem (SHS2)

◮ prove information theoretic

bound on hardness of SHS2

◮ DDH-oracle requires us to

work in realm of commutative algebra

low / medium granularity

derived from high granularity result

  • x

space: Zn

p; goal: find

x

20 / 24

slide-41
SLIDE 41

Intuition behind proofs

n-gapDL

◮ high granularity

◮ reduce n-gapDL to geometric

search problem: search-by-hypersurface problem (SHS2)

◮ prove information theoretic

bound on hardness of SHS2

◮ DDH-oracle requires us to

work in realm of commutative algebra

◮ low / medium granularity

◮ derived from high granularity

result

  • x

space: Zn

p; goal: find

x

20 / 24

slide-42
SLIDE 42

Intuition behind proofs

n-gapCDH

◮ high granularity

◮ show that bound for n-gapDL carries over to n-gapCDH using AGM 21 / 24

slide-43
SLIDE 43

Intuition behind proofs

n-gapCDH

◮ high granularity

◮ show that bound for n-gapDL carries over to n-gapCDH using AGM

◮ low / medium granularity

◮ derived from high granularity result 21 / 24

slide-44
SLIDE 44

Summary and Future Directions

◮ summary

◮ we define the scaling factor SF, which measures the scaling of a

scheme’s security in the number of users

◮ we compute lower bounds on SF for variants of the Hashed-ElGamal

KEM in the generic-group model

◮ we prove generic lower bounds on the hardness of various

multi-instance CDH-type problems

◮ future directions

◮ revisit the KEM-DEM paradigm ◮ consider preprocessing

ia.cr/2019/364

22 / 24

slide-45
SLIDE 45

References I

David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, and Paul Zimmermann. Imperfect forward secrecy: How Diffie-Hellman fails in practice. In Indrajit Ray, Ninghui Li, and Christopher Kruegel:, editors, ACM CCS 15, pages 5–17. ACM Press, October 2015. Mihir Bellare, Thomas Ristenpart, and Stefano Tessaro. Multi-instance security and its application to password-based cryptography. In Reihaneh Safavi-Naini and Ran Canetti, editors, CRYPTO 2012, volume 7417 of LNCS, pages 312–329. Springer, Heidelberg, August 2012.

23 / 24

slide-46
SLIDE 46

References II

Georg Fuchsbauer, Eike Kiltz, and Julian Loss. The algebraic group model and its applications. In Hovav Shacham and Alexandra Boldyreva, editors, CRYPTO 2018, Part II, volume 10992 of LNCS, pages 33–62. Springer, Heidelberg, August 2018. Juan A. Garay, David S. Johnson, Aggelos Kiayias, and Moti Yung. Resource-based corruptions and the combinatorics of hidden diversity. In Robert D. Kleinberg, editor, ITCS 2013, pages 415–428. ACM, January 2013. Aaram Yun. Generic hardness of the multiple discrete logarithm problem. In Elisabeth Oswald and Marc Fischlin, editors, EUROCRYPT 2015, Part II, volume 9057 of LNCS, pages 817–836. Springer, Heidelberg, April 2015.

24 / 24