All papers in 2004 (Page 3 of 375 results)
Updating the Parameters of a Threshold Scheme by Minimal Broadcast
Uncategorized
Uncategorized
Threshold schemes allow secret data to be protected amongst a set
of participants in such a way that only a pre-specified threshold
of participants can reconstruct the secret from private
information (shares) distributed to them on system setup using
secure channels. We consider the general problem of designing
unconditionally secure
threshold schemes whose defining parameters (the threshold and the
number of participants) can later be changed by using only public
channel broadcast messages. In this paper we are interested in the
efficiency of such threshold schemes, and seek to minimise storage
costs (size of shares) as well as optimise performance in low
bandwidth environments by minimising the size of necessary
broadcast messages. We prove a number of lower bounds on the
smallest size of broadcast message necessary to make general
changes to the parameters of a threshold scheme in which each
participant already holds shares of minimal size. We establish the
tightness of these bounds by demonstrating optimal schemes.
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in a legal dispute over whether a contract had been signed or not by a user. A biometric reading provided by the alleged signer would be enough to verify the signature. We make use of Fuzzy extractors to generate a key string from a biometric measurement. We use this biometric based key string and an elliptic curve point embedding technique to create the public key and corresponding private key. We then make use of a pairing based signature scheme to perform signing and verification with these keys. We describe a possible attack on this system and suggest ways to combat it. Finally we describe how such a biometric signature scheme can be developed by reusing existing components in our Java Identity Based Encryption implementation. The design allows traditional as well as biometric identity based signatures.
A Proof of Yao's Protocol for Secure Two-Party Computation
In the mid 1980's, Yao presented a constant-round protocol for
securely computing any two-party functionality in the presence of
semi-honest adversaries (FOCS 1986). In this paper, we provide a
complete description of Yao's protocol, along with a rigorous
proof of security. Despite the importance of Yao's protocol to the
field of secure computation, to the best of our knowledge, this is
the first time that a proof of security has been published.
Short Group Signatures
We construct a short group signature scheme. Signatures in our scheme are approximately the size of a standard RSA signature with the same security. Security of our group signature is based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption. We prove security of our system, in the random oracle model, using a variant of the security definition for group signatures recently given by Bellare, Micciancio, and Warinschi.
Secure Identity Based Encryption Without Random Oracles
We present a fully secure identity based encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the decisional bilinear Diffie-Hellman assumption. Previous constructions of this type incurred a large penalty factor in the security reduction from the underlying complexity assumption. The security reduction of the present system is polynomial in all the parameters.
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure {\em without the random oracle model} in groups equipped with a bilinear map. Selective identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in the standard model the adversary is allowed to choose this identity adaptively. The first system is based on the decisional bilinear Diffie-Hellman assumption, and extends to give a selective identity Hierarchical IBE secure without random oracles. The second system is based on a related assumption called the bilinear Diffie-Hellman inversion assumption. Applications of either system include an efficient CCA2 public key cryptosystem that supports non-interactive threshold decryption in the standard model, and a simple and practical IBE system that remains secure against full adaptive-ID attacks, under some security penalty, without random oracles.
Short Signatures Without Random Oracles
We describe a short signature scheme which is existentially unforgeable under a chosen message attack without using random oracles. The security of our scheme depends on a new complexity assumption we call the {\em Strong Diffie-Hellman} assumption. This assumption has similar properties to the Strong RSA assumption, hence the name. Strong RSA was previously used to construct signature schemes without random oracles. However, signatures generated by our scheme are much shorter and simpler than signatures from schemes based on Strong RSA. Furthermore, our scheme provides a limited form of message recovery.
Efficient Consistency Proofs for Generalized Queries on a Committed Database
A *consistent query protocol* (CQP) allows a database owner to publish a very short string which *commits* her and everybody else to a particular database , so that any copy of the database can later be used to answer queries and give short proofs that the answers are consistent with the commitment . Here *commits* means that there is at most one database that anybody can find (in polynomial time) which is consistent with . (Unlike in some previous work, this strong guarantee holds even for owners who try to cheat while creating .) Efficient CQPs for membership and one-dimensional range queries are known \cite{BRW02,K98,MR}: given a query pair , the server answers with all the keys in the database which lie in the interval and a proof that the answer is correct.
This paper explores CQPs for more general types of databases. We put forward a general technique for constructing CQPs for any type of query, assuming the existence of a data structure/algorithm with certain inherent robustness properties that we define (called a *data robust algorithm*). We illustrate our technique by constructing an efficient protocol for *orthogonal range queries*, where the database keys are points in and a query asks for all keys in a rectangle . Our data-robust algorithm is within a factor of the best known standard data structure (a range tree, due to Bentley (1980)).
We modify our protocol so that it is also private, that is, the proofs leak no information about the database beyond the query answers. We show a generic modification to ensure privacy based on zero-knowledge proofs, and also give a new, more efficient protocol tailored to hash trees.
Regional Blackouts: Protection of Broadcast Content on 3G Networks.
One of the driving forces behind the development of 3G systems is the potential to deliver complex content to consumers. This is evident from the growing collaboration between broadcast and mobile network operators, and the expectation that future broadcast receivers will be able to forward content to mobile devices. One challenge in providing such a service is the requirement for content protection. An aspect of this that is particularly relevant to mobile systems is the ability to control where content is viewed. Although 3G networks can provide location of a user’s receiver, this device may be in a different location from the device that renders the content. Thus the provider cannot be certain where the content will be viewed.
This paper proposes two protocols that will provide the location of the end device in a secure manner that can be trusted by the content provider.
Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack
Uncategorized
Uncategorized
We think that there are two main attacks on TTM cryptosystem; the
Goubin-Courtois attack ([6]) and the Ding-Schmidt attack
([5]). The paper of Goubin-Courtois is not clearly written.
Their arguments (with many gaps) depend on an parameter which
is never defined. It is nature to take their parameter to
be the index used in our "lock polynomials" (see section 1).
Later on Courtois implies otherwise in his website. In their paper
([6]) or in his website, Courtois simply declares that TTM is of
rank 2 (i.e., ) without any justification. In this paper,
we will illustrate another example (cf Example below) satisfies
both requirements, i.e., the index used in our "lock polynomials"
(see section 1) is 7, and the number of variables in all quartic forms is 4 which
shows that Goubin-Courtois' unsubstantial claim: "TTM is rank 2" invalid. Thus
we settle this question of Goubin-Courtois attack once for all. To guard
against "high rank attack", in this Example every variable appears 9
times in 9 different polynomials.
On the other hand J.~Ding and D.~Schmidt show ([5]) how to
construct an interesting attack on some implementations of TTM ([10,11])
based on Patarin's idea ([14]) of bilinear relations created by the
structure in the kernel equations in an implementation of TTM. The
success of this attack is accidental. In our Example, the attack
fails. we will describe a {\it mixed implementation} which will make
any attack, which is sensitive to the size of the ground field, ineffective.
In this paper, the Example is strong (i.e., against both
Goubin-Courtois attack and Ding-Schmidt attack as well as other previously proposed incomplete
attacks like XL( ), FXL( ).
A Secure and Efficient Key Exchange Protocol for Mobile Communications
This paper proposes a key exchange protocol with mutual authentication, which requires only 0.1 modular multiplications for online computations. This online computation is ten times faster than that of conventional protocols. The message size of the proposed protocol is about half (50%~66%) that of the previous protocols. In addition to its efficiency in online computation and bandwidth, the paper provides a formal proof to guarantee the security of the proposed protocol. Possessing of both secure and efficient properties makes the proposed protocol suitable for the low power mobile communications.
FRMAC, a Fast Randomized Message Authentication Code
We revisit the randomized approach followed in the design of the RMAC message authentication code in order to construct a MAC with similar properties, but based on Wegman-Carter's -universal hash families instead of a classical CBC chain. This yields a new message authentication code called FRMAC whose security bounds are, as in RMAC, beyond the birthday paradox limit. With efficient hash functions in software, the performance of FRMAC for large messages is similar to those of the fastest previously known schemes. FRMAC can also be more efficient for small messages. Furthermore, due to relaxed requirements about the nonces in the security proof, the implementation of FRMAC in real applications tends to be easier.
A comparison of MNT curves and supersingular curves
We compare both the security and performance issues related to the
choice of MNT curves against supersingular curves in characteristic three,
for pairing based systems.
We pay particular attention to equating the relevant security levels and
comparing not only computational performance and bandwidth performance.
The paper focuses on the BLS signature scheme and the Boneh--Franklin
encryption scheme, but a similar analysis can be applied to many other
pairing based schemes.
ID-based Cryptography from Composite Degree Residuosity
Uncategorized
Uncategorized
We present identity-based identification (resp. encryption, signature, blind signature,ring signature) from composite degree residuosity (CDR). Constructions of identifications and signatures
motivated by several existing CDR-based bandwidth-efficient
encryption schemes are presented. Their securities are proven equivalent to famous hard problems, in the random oracle model.
Motivated by Cocks,we construct an identity-based encryption from CDR. Its security is proven equivalent to a new problem, the JSR (Jacobi Symbol of Roots of two quadratic polynomials) Problem. We prove JSR is at least as hard as QRP (Quadratic Residuosity Problem). Furthermore, we present the first two-way equivalence reduction of the security of Cocks' IBE, to the JSR Problem.
Last updated: 2004-09-26
On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards
Uncategorized
Uncategorized
In 2002, Chien et al. proposed an efficient remote user authentication scheme using smart cards. Later, in 2004, W. C. Ku and S. M. Chen pointed out some attacks on Chien et al.’s scheme. W. C. Ku and S. M. Chen also proposed a modified scheme to prevent the attacks on Chien et al.’s scheme. This paper discusses the security of the W. C. Ku and S. M. Chen’s scheme. This paper aims to show that the modified scheme is still vulnerable to the password guessing attack and the insider attack.
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission
We consider the scenario where Alice wants to send a secret(classical) -bit message to Bob using a classical key, and where
only one-way transmission from Alice to Bob is possible. In this
case, quantum communication cannot help to obtain perfect secrecy
with key length smaller then . We study the question of whether
there might still be fundamental differences between the case where
quantum as opposed to classical communication is used. In this
direction, we show that there exist ciphers with perfect security producing quantum ciphertext where, even if an adversary knows the
plaintext and applies an optimal measurement on the ciphertext, his
Shannon uncertainty about the key used is almost maximal. This is in
contrast to the classical case where the adversary always learns
bits of information on the key in a known plaintext attack. We also
show that there is a limit to how different the classical and
quantum cases can be: the most probable key, given matching plain-
and ciphertexts, has the same probability in both the quantum and
the classical cases. We suggest an application of our results in
the case where only a short secret key is available and the message
is much longer.
Improvement of Thériault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus
Gaudry present a variation of index calculus attack for solving the
DLP in the Jacobian of hyperelliptic curves. Harley and Thériault
improve these kind of algorithm. Here, we will present a variation of
these kind of algorithm, which is faster than previous ones.
Its complexity is .
Recently, P. Gaudry and E. Thomé
http://eprint.iacr.org/2004/153/
present the algorithm, whose complexity is same as our results.
So I submit my manuscript to this eprint archive.
Scalable Public-Key Tracing and Revoking
Traitor Tracing Schemes constitute a very useful tool against
piracy in the context of digital content broadcast. In such
multi-recipient encryption schemes, each decryption key is
fingerprinted and when a pirate decoder is discovered, the
authorities can trace the identities of the users that
contributed in its construction (called traitors).
Public-key traitor tracing schemes allow for a multitude of
non-trusted content providers using the same set of keys, which
makes the scheme ``server-side scalable.''
To make such schemes also ``client-side scalable,'' i.e. long lived and usable for a large population of subscribers that changes dynamically over time, it is crucial to implement efficient Add-user and Remove-user operations.
Previous work on public-key traitor tracing did not address this
dynamic scenario thoroughly, and there is no efficient scalable public
key traitor tracing scheme that allows an increasing number of Add-user and Remove-user operations.
To address these issues, we introduce the model of Scalable
Public-Key Traitor Tracing, and present the first construction of such
a scheme. Our model mandates for deterministic traitor tracing and an
unlimited number of efficient Add-user operations and Remove-user operations.
A scalable system achieves an unlimited number of revocations
while retaining high level of efficiency by dividing the run-time of
the system into periods. Each period has a saturation level for the
number of revocations. When a period becomes saturated, an _efficient_ New-period operation is issued by the system server that resets the saturation level.
We present a formal adversarial model for our system taking into
account its periodic structure, and we prove our construction secure, both against adversaries that attempt to cheat the revocation mechanism as well as against adversaries that attempt to cheat the traitor tracing mechanism.
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
Routing is one of the most basic networking functions in mobile ad
hoc networks. Hence, an adversary can easily paralyze the
operation of the network by attacking the routing protocol. This
has been realized by many researchers, and several ``secure''
routing protocols have been proposed for ad hoc networks. However,
the security of those protocols have mainly been analyzed by
informal means only. In this paper, we argue that flaws in ad hoc
routing protocols can be very subtle, and we advocate a more
systematic way of analysis. We propose a mathematical framework in
which security can be precisely defined, and routing protocols for
mobile ad hoc networks can be analyzed rigorously. Our framework
is tailored for on-demand source routing protocols, but the
general principles are applicable to other types of protocols too.
Our approach is based on the simulation paradigm, which has
already been used extensively for the analysis of key
establishment protocols, but to the best of our knowledge, it has
not been applied in the context of ad hoc routing so far. We also
propose a new on-demand source routing protocol, called endairA,
and we demonstrate the usage of our framework by proving that it
is secure in our model.
Mobile Terminal Security
The miniaturization of electronics and recent developments in
biometric and screen technologies will permit a pervasive presence
of embedded systems. This - and the inclusion of networking
capabilities and IP addresses in many handheld devices - will
foster the widespread deployment of personal mobile
equipment.\smallskip
This work attempts to overview these diverse aspects of mobile
device security. We will describe mobile networks' security (WLAN
and WPAN security, GSM and 3GPP security) and address platform
security issues such as bytecode verification for mobile equipment
and protection against viruses and Trojan horses in mobile
environment - with a concrete J2ME implementation example. Finally
we will turn to hardware attacks and briefly survey the physical
weaknesses that can be exploited to compromise mobile
equipment.\smallskip
Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three
Although identity based cryptography offers a number of functional advantages over conventional public key methods, the computational costs are significantly greater. The dominant part of this cost is the Tate pairing which, in characteristic three, is best computed using the algorithm of Duursma and Lee. However, in hardware and constrained environments this algorithm is unattractive since it requires online computation of cube roots or enough storage space to pre-compute required results. We examine the use of normal basis arithmetic in characteristic three in an attempt to get the best of both worlds: an efficient method for computing the Tate pairing that requires no pre-computation and that may also be implemented in hardware to accelerate devices such as smart-cards. Since normal basis arithmetic in characteristic three has not received much attention before, we
also discuss the construction of suitable bases and associated curve
parameterisations.
Quantum cryptography: a practical information security perspective
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic channel. Without this authenticated link, QKE is vulnerable to man-in-the-middle attacks. Overlooking this fact results in exaggerated claims and/or false expectations about the potential impact of QKE. In this paper we present a systematic comparison of QKE with traditional key establishment protocols in realistic secure communication systems.
Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks
In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages to individuals and corporations. In this work, we analyze these attacks, and find they often exploit usability failures of browsers.
We developed and describe TrustBar, a browser extension for improved secure identification indicators. Users can assign a name/logo to a secure site, presented by TrustBar when the browser presents that secure site; otherwise, TrustBar presents the certified site's owner name, and the name/logo of the Certificate Authority (CA) who identified the owner. Some of these ideas are already adopted by browsers, following our work.
We describe usability experiments, which measure, and prove the effectiveness, of TrustBar's improved security and identification indicators. We derive general secure-usability principles from our experiments and experience with TrustBar
Controlling Spam by Secure Internet Content Selection
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an efficient cryptographic mechanism for spam-control, based on allocation of responsibility (liability). With SICS, e-mail is sent with a content label, and a cryptographic protocol ensures labels are authentic and penalizes falsely labeled e-mail (spam). The protocol supports trusted senders (penalized by loss of trust) and unknown senders (penalized financially). The recipient can determine the compensation amount for falsely labeled e-mail (spam)). SICS is practical, with negligible overhead, gradual adoption path, and use of existing relationships; it is also flexible and appropriate for most scenarios, including deployment by end users and/or ISPs and support for privacy and legitimate, properly labeled commercial e-mail. SICS improves on other crypto-based proposals for spam controls, and complements non-cryptographic spam controls
A double large prime variation for small genus hyperelliptic index calculus
In this article, we examine how the index calculus approach for computing
discrete logarithms in small genus hyperelliptic curves can be improved
by introducing a double large prime variation. Two algorithms are
presented. The first algorithm is a rather natural adaptation of the
double large prime variation to the intended context. On heuristic and
experimental grounds, it seems to perform quite well but lacks a
complete and precise analysis. Our second algorithm is a considerably
simplified variant, which can be analyzed easily. The resulting
complexity improves on the fastest known algorithms. Computer experiments
show that for hyperelliptic curves of genus three, our first algorithm
surpasses Pollard's Rho method even for rather small field sizes.
Another Look at ``Provable Security''
We give an informal analysis and critique of several typical
``provable security'' results. In some cases there are
intuitive but convincing arguments for rejecting the conclusions
suggested by the formal terminology and ``proofs,'' whereas
in other cases the formalism seems to be consistent with common
sense. We discuss the reasons why the search for mathematically
convincing theoretical evidence to support the security of
public-key systems has been an important theme of
researchers. But we argue that the theorem-proof paradigm
of theoretical mathematics is of limited relevance here
and often leads to papers that are confusing and misleading.
Because our paper is aimed at the general mathematical public,
it is self-contained and as jargon-free as possible.
Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type
Computing the order of the Jacobian group of a hyperelliptic curve
over a finite field is very important to construct
a hyperelliptic curve cryptosystem (HCC), because
to construct secure HCC, we need Jacobian groups of order in the form
where is a prime greater than about and
is a very small integer.
But even in the case of genus two,
known algorithms to compute the order of a Jacobian group for a general curve
need a very long running time over a large prime field.
In the case of genus three, only a few examples of suitable curves for HCC are known.
In the case of genus four, no example has been known over a large prime field.
In this article, we give explicit formulae of the order of Jacobian groups for
hyperelliptic curves over a finite prime field of type ,
which allows us to search suitable
curves for HCC. By using these formulae,
we can find many suitable curves for genus-4 HCC and show some examples.
An Authenticated Certificateless Public Key Encryption Scheme
Uncategorized
Uncategorized
In 2003, Al-Riyami and Paterson \cite{AP} proposed the
certificateless public key cryptography(CL-PKC) which is
intermediate between traditional certificated PKC and
identity-based PKC. In this paper, we propose an authenticated
certificateless public key encryption scheme. Our result improves
their public key encryption scheme in efficiency and security. The
security of the protocol is based on the hardness of two problems;
the computational Diffie-Hellman problem(CDHP) and the bilinear
Diffie-Hellman problem(BDHP). We also give a formal security model
for both confidentiality and unforgeability, and then show that
our scheme is provably secure in the random oracle model.
Secure and Efficient AES Software Implementation for Smart Caards
In implementing cryptographic algorithms on limited devices such as smart cards, speed and memory requirements had always presented a challenge. With the advent of side channel attacks, this task became even more difficult because a programmer must take into account countermeasures against such attacks, which often increases computational time, or memory requirements, or both.
In this paper we describe a new method for secure implementation of the Advanced Encryption Standard algorithm. The method is based on a data masking technique, which is the most widely used countermeasure against power analysis and timing attacks at a software level.
The change of element representation allows us to replace all multiplications in the field with table lookups using masked log/alog tables, and achieve an efficient solution that combines low memory requirements with high speed and resistance to attacks.
Provably Secure Delegation-by-Certification Proxy Signature Schemes
In this paper, we first show that previous proxy
signature schemes by delegation with certificate are not provably
secure under adaptive-chosen message attacks and adaptive-chosen
warrant attacks. The schemes do not provide the strong
undeniability. Then we construct a proxy signature scheme by
delegation with certificate based on Co-GDH group from bilinear
map. Our proxy signature scheme is existentially unforgeable
against adaptive-chosen message attacks and adaptive-chosen
warrant attacks in random oracle model. We adopt a straight method
of security reduction in which our scheme's security is reduced to
hardness of the computational co-Diffie-Hellem problem. The
proposed signature scheme is the first secure
delegation-by-certificate proxy signature based on co-GDH groups
from bilinear maps under the formal security model in random
oracle model.
Key Recovery Method for CRT Implementation of RSA
This paper analyzes a key recovery method for RSA signature generation or decryption implementations using the Chinese Remainder Theorem (CRT) speed up. The CRT-based RSA implementation is common in both low computing power devices and high speed cryptographic acceleration cards. This recovery method is designed to work in conjunction with a side-channel attack where the CRT exponents are discovered from a message decryption or signature generation operation, the public exponent is assumed small and the public modulus is unknown. Since many RSA implementations use the small, low hamming weight public exponent 65537 this turns out to be a realistic method. An algorithm for recovering the private key, modulus and prime factorization candidates is presented with a proof of correctness. Runtime estimates and sample source code is given.
Near-Collisions of SHA-0
In this paper we find two near-collisions of the full compression
function of SHA-0, in
which up to 142 of the 160 bits of the output are equal.
We also find
many full collisions of 65-round reduced SHA-0, which is a large
improvement to the best previous result of 35 rounds.
We use the very
surprising fact that the messages have many neutral bits, some of
which do not affect
the differences for about 15--20 rounds.
We also show that 82-round
SHA-0 is much weaker than the (80-round) SHA-0, although it has more
rounds.
This fact demonstrates that the strength of SHA-0 is not
monotonous in the number of rounds.
Electromagnetic Side Channels of an FPGA Implementation of AES
We show how to attack an FPGA implementation of AES where all bytes are processed in parallel using differential electromagnetic analysis. We first focus on exploiting local side channels to isolate the behaviour of our targeted byte. Then, generalizing the Square attack, we describe a new way of retrieving information, mixing algebraic properties and physical observations.
Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables
The class of Rotation Symmetric Boolean Functions (RSBFs) has received serious attention recently in searching functions of cryptographic significance. These functions are invariant under circular translation of indices. In this paper we study such functions on odd number of variables and interesting combinatorial properties related to Walsh spectra of such functions are revealed. In particular we concentrate on plateaued functions (functions with three valued Walsh spectra) in this class and derive necessary conditions for existence of balanced rotation symmetric plateaued functions. As application of our result we show the non existence of 9-variable, 3-resilient RSBF with nonlinearity 240 that has been posed as an open question in FSE 2004. Further we show how one can make efficient search in the space of RSBFs based on our theoretical results and as example we complete the search for unbalanced 9-variable, 3rd order correlation immune plateaued RSBFs with nonlinearity 240.
Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash
This paper should be considered as a draft.
Part of it is an extended version
of the paper Generic Attacks and the Security of Quartz presented at PKC 2003 and at the second Nessie workshop. It also contains a lot of new material that is not published elsewhere:
-(yet another) discussion about what is and what isn't a secure signature scheme
-up-to-date security results fo Sflash and Quartz
-new results on computational security of Sflash w.r.t algebraic relation attacks in the light of Faugère-Joux Crypto 2003 paper.
-and more...
Comments are welcome !
Last updated: 2004-07-30
Elliptic Curve based Signcryption and its Multi-party Schemes
Uncategorized
Uncategorized
Signcryption is a novel public key primitive to achieve the combined functionality of authentication and confidentiality in an efficient manner. A new Elliptic Curve Cryptosystems based Signcryption which combines ECDSA and PSCE-1 is presented in the paper. The signcryption scheme is a publicly verifiable scheme which can be verified by the third party after the specific recipient removes his key information. Analysis shows that the proposed scheme is secure against the adaptive chosen ciphertext attack. The signcryption saves the communication cost at least 1.25 times and enhances computation cost 1.19 times over ECDSA-then-PSCE-1. Compared with other signcryption schemes, such as Y.Zheng¡¯s ECSCS, the new signcryption uses a uniform elliptic curve cryptosystem platform instead of four kinds of cryptosystem components: hash function, keyed hash function, symmetric cipher and elliptic curve. While keeping high security and efficiency, the scheme can be implemented in software and hardware at low price because of above advantages. Base on the signcryption, a broadcast scheme for multiple recipients and a threshold scheme with key distributed generation for multiple senders are also proposed.
Elastic AES
Recently an algorithmic schema was proposed for converting any existing block cipher into one which excepts variable length inputs with the computational workload increasing in proportion to the block size. The resulting cipher is referred to as an elastic block cipher. The initial work presented immunity to certain key recovery attacks, and left open further analysis of the method and its possible instantiations. In order to provide a concrete example of an elastic block cipher, we design and implement an elastic version of the Advanced Encryption Standard (AES) cipher which accepts all block sizes in the range 128 to 255 bits. To validate the design we perform differential cryptanalysis on elastic AES which confirms that the cipher does not introduce potential differential attacks as a result of a subset of bits being omitted from each round (which is at the heart of the elastic design). We also compare the performance of software implementations of elastic AES and regular AES on variable size inputs, as a step in determining the practicality of the elastic version.
Last updated: 2005-03-23
Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher
Uncategorized
Uncategorized
Two alternative architectures and VLSI implementations of the 64-bit NESSIE proposal, MISTY1 block cipher, are presented in this paper. For these implementations, FPGA devices were used. The first architecture is suitable for applications with high throughput requirements. A throughput of up to 7.2 Gbps can be achieved at a clock frequency of 96 MHz. The main characteristic of this implementation is that uses RAM blocks that are embedded in the FPGA device in order to implement the necessary by the algorithm S-boxes. The second architecture can be used in applications with constrained hardware resources. It uses feedback logic and inner pipeline with negative edge-triggered register. So, it causes the critical path to be shorter, without increasing the latency of the cipher execution. Compared with an implementation without inner pipeline, performance improvement of 97% is achieved. The measured throughput of the second architecture implementation is 561 Mbps at 79 MHz.
New Notions of Security: Achieving Universal Composability without Trusted Setup
We propose a modification to the framework of Universally Composable (UC) security [Canetti'01]. Our new notion, involves comparing the protocol executions with an ideal execution involving ideal functionalities (just as in UC-security), but allowing the environment and adversary access to some super-polynomial computational power. We argue the meaningfulness of the new notion, which in particular subsumes many of the traditional notions of security.
We generalize the Universal Composition theorem of [Canetti'01] to the new setting. Then under new computational assumptions, we realize secure multi-party computation (for static adversaries) without a common reference string or any other set-up assumptions, in the new framework. This is known to be impossible under the UC framework.
How to Disembed a Program?
This paper presents the theoretical blueprint of a new secure
token called the Externalized Microprocessor (XmP). Unlike a smart-card, the XmP contains no ROM at all.
While exporting all the device's executable code to potentially
untrustworthy terminals poses formidable security problems, the
advantages of ROM-less secure tokens are numerous: chip masking
time disappears, bug patching becomes a mere terminal update
and hence does not imply any roll-out of cards in the field. Most
importantly, code size ceases to be a limiting factor. This is
particularly significant given the steady increase in on-board
software complexity.
After describing the machine's instruction-set we will introduce
two XmP variants. The first design is a public-key oriented
architecture which relies on a new RSA screening scheme and
features a relatively low communication overhead at the cost of
computational complexity, whereas the second variant is secret-key
oriented and relies on simple MACs and hash functions but requires
more communication.
For each of these two designs, we propose two protocols that
execute and dynamically authenticate arbitrary programs. We also
provide a strong security model for these protocols and prove
their security under appropriate complexity assumptions.
New GF(2n) Parallel Multiplier Using Redundant Representation
Uncategorized
Uncategorized
A new GF(2n) redundant representation is presented. Squaring in the representation is almost cost-free. Based on the representation, two multipliers are proposed. The XOR gate complexity of the first multiplier is lower than a recently proposed normal basis multiplier when CN (the complexity of the basis) is larger than 3n-1.
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large number of login requests per unit time as in the case of an online dictionary attack. The protocol is stateless and thus less vulnerable to DoS (Denial of Service) attacks.
More Efficient Server Assisted One Time Signatures
Server assisted one time signature scheme was recently presented as a non-repudiation service for mobile and constrained devices. However, the scheme suffered with high storage requirements for the virtual server and high memory requirements for the mobile client. We improve the scheme by significantly reducing virtual server storage requirements as well as mobile client memory requirements. More precisely, the virtual server storage requirements in our scheme are reduced by a factor of more than 80 compared to the original scheme. Further, memory requirements for the mobile client are reduced by a factor of more than 130. This is done by generating various quantities pseudorandomly and storing just their cryptographic hash (instead of storing them fully) wherever possible, while still being able to perform dispute resolution.
Secure and Efficient Masking of AES - A Mission Impossible?
This document discusses masking approaches with a special focus on the AES S-box. Firstly, we discuss previously presented masking schemes with respect to their security and implementation. We conclude that algorithmic countermeasures to secure the AES algorithm
against side-channel attacks have not been resistant against all
first-order side-channel attacks.
Secondly, we introduce a new masking countermeasure which is not only secure against first-order side-channel attacks, but which also leads to relatively small implementations compared to other masking schemes when implemented in dedicated hardware.
Secret Handshakes from CA-Oblivious Encryption
Secret handshake protocols were recently introduced by Balfanz et al. [IEEE, Oakland 2003] to allow members of the same group to authenticate each other *secretly*, in the sense that someone who is not a group member cannot tell, by engaging some party in the handshake protocol, whether that party is a member of the group. On the other hand, any two parties who are members of the same group will recognize each other as members. Thus, secret handshakes can be used in any scenario where group members need to identify each other without revealing their group affiliations to outsiders.
The secret handshake protocol of Balfanz et al. relies on a Bilinear Diffie-Hellman assumption (in ROM) on certain elliptic curves. We show how to build secret handshake protocols secure under more standard cryptographic assumption of Computational Diffie Hellman(CDH), using a novel tool of CA-oblivious public key encryption, which is an encryption scheme s.t. neither the public key nor the ciphertext reveal any information about the Certification Authority (CA) which certified the public key. We construct such CA-oblivious encryption, and hence a handshake scheme, based on CDH (in ROM). The new scheme takes 3 communication rounds like the scheme of Balfanz et al., but it is about twice cheaper computationally, and it relies on a weaker computational assumption.
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography
Uncategorized
Uncategorized
The output of the Tate pairing on an elliptic curve over a finite
field may be viewed as an element of an algebraic torus.
Using this simple observation, we transfer techniques recently
developed for torus-based cryptography to pairing-based cryptography,
resulting in more efficient computations, and lower bandwidth
requirements. To illustrate the efficacy of this approach, we
apply the method to pairings on supersingular elliptic curves in
characteristic three.
A New ID-based Signature with Batch Verification
An identity (ID)-based signature scheme allows any pair of
users to communicate securely and to verify each other's
signatures without exchanging public key certificates. We have
several ID-based signatures based on the discrete logarithm
problem. While they have an advantage that the system secret can
be shared by several parties through threshold schemes, they have
a critical disadvantage in efficiency. To enhance the efficiency
of verification, we propose a new ID-based signature
scheme that allows batch verification of multiple signatures.
The verification cost of the proposed signature scheme for
signatures is almost constant with minimal security loss and
when a new signature by a different
signer is added to the batch verification, the additional cost
is almost a half of that of a single signature.
We prove that the proposed signature scheme is secure
against existential forgery under adaptively chosen message and ID attack in the random oracle model and
show why other ID-based signature schemes are hard to achieve these properties.
Private Inference Control
Uncategorized
Uncategorized
Access control can be used to ensure that database queries
pertaining to sensitive information
are not answered. This is not enough to prevent users from
learning sensitive information though, because users can combine
non-sensitive information to discover something sensitive.
Inference control prevents users from obtaining sensitive
information via such ``inference channels'', however, existing
inference control techniques are not private - that is, they
require the server to learn what queries the user is making in
order to deny inference-enabling queries.
We propose a new primitive - private inference control (PIC) -
which is a means for the server to provide inference control
without learning what information is being retrieved. PIC is a
generalization of private information retrieval (PIR) and
symmetrically-private information retrieval (SPIR). While it is
straightforward to implement access control using PIR (simply omit
sensitive information from the database), it is nontrivial to
implement inference control efficiently. We measure the
efficiency of a PIC protocol in terms of its communication
complexity, its round complexity, and the work the server performs
per query. Under existing cryptographic assumptions, we give a PIC
scheme which is simultaneously optimal, up to logarithmic factors,
in the work the server performs per query, the total communication
complexity, and the number of rounds of interaction. We also
present a scheme requiring more communication but sufficient
storage of state by the server to facilitate private user
revocation. Finally, we present a generic reduction which shows
that one can focus on designing PIC schemes for which the
inference channels take a particularly simple threshold form.
Generalizing Kedlaya's order counting based on Miura Theory
K. Kedlaya proposed an method to count the number of -rational points in a hyper-elliptic curve, using the Leschetz fixed points formula in Monsky-Washinitzer Cohomology. The method has been extended to super-elliptic curves (Gaudry and Gürel) immediately, to characteristic two hyper-elliptic curves, and to curves (J. Denef, F. Vercauteren). Based on Miura theory, which is associated with how a curve is expressed as an affine variety, this paper applies Kedlaya's method to so-called strongly telescopic curves which are no longer plane curves and contain super-elliptic curves as special cases.
Elastic Block Ciphers
We introduce the new concept of elastic block ciphers, symmetric-key encryption algorithms that (1) for a variable-size input do not expand the plaintext (i.e., do not require plaintext padding) and (2) adjust their computational load proportionally to the size increase. Contrary to stream ciphers, elastic block ciphers maintain the diffusion property and non-synchronicity of traditional block ciphers. Elastic block ciphers are ideal (when combined with encryption modes) for applications where length-preserving encryption is most beneficial, such as protecting variable-length database fields or network packets.
We present a general algorithm for converting a traditional block
cipher, such as AES, to its elastic version, and analyze the security
of the resulting cipher against key recovery attacks. Our approach
allows us to ``stretch'' the supported block size of a block cipher up
to twice the original length, while increasing the computational load
proportionally to the expanded block size. Our approach does not allow
us to use the original cipher as a ``black box'' (i.e., as an
ideal cipher or a pseudorandom permutation as is used in constructing
modes of encryption). Nevertheless, under some reasonable conditions
on the cipher's structure and its key schedule, we reduce certain key
recovery attacks of the elastic version to such attacks on the fixed-size block cipher. This schema and the security reduction enable us to capitalize on secure ciphers and their already established security properties in developing elastic designs. We note that we are not aware of previous ``reduction type'' proofs of security in the area of concrete (i.e., non ``black-box'') block cipher design. Our work puts forth the notion of elasticity in block cipher design.
DDH-based Group Key Agreement in a Mobile Environment
A group key agreement protocol is designed to efficiently
implement secure multicast channels for a group of parties
communicating over an untrusted, open network by allowing them to
agree on a common secret key. In the past decade many problems
related to group key agreement have been tackled and solved
(diminished if not solved), and recently some constant-round
protocols have been proven secure in concrete, realistic setting.
However, all forward-secure protocols so far are still too
expensive for small mobile devices. In this paper we propose a new
constant-round protocol well suited for a mobile environment and
prove its security under the Decisional Diffie-Hellman assumption.
The protocol meets simplicity, efficiency, and all the desired
security properties.
Two Software Normal Basis Multiplication Algorithms for GF(2n)
In this paper, two different normal basis multiplication algorithms for software implementation are proposed over GF(2n). The first algorithm is suitable for high complexity normal bases and the second algorithm is fast for type-I optimal normal bases and low complexity normal bases. The ANSI C source program is also included in this paper.
EME*: extending EME to handle arbitrary-length messages with associated data
This work describes a mode of operation, EME*, that turns a regular block cipher into a length-preserving enciphering scheme for messages of (almost) arbitrary length. Specifically, the resulting scheme can handle any bit-length, not shorter than the block size of the underlying cipher, and it also handles associated data of arbitrary bit-length. Such a scheme can either be used directly in applications that need encryption but cannot afford length expansion, or serve as a convenient building block for higher-level modes.
The mode EME* is a refinement of the EME mode of Halevi and Rogaway, and it inherits the efficiency and parallelism from the original EME.
Universally Composable DKG with Linear Number of Exponentiations
Many problems have been solved by protocols using
discrete-logarithm based threshold cryptosystems. Such protocols
require a random joint public key for which the secret key is shared
among the parties.
A multiparty protocol that generates such a key is called a DKG
protocol. Until now no DKG protocol is known to be universally
composable.
We extend Feldman's original verifiable secret sharing scheme to
construct a DKG protocol, and prove that it is universally
composable. Our result holds in a common random string model under the
Decision Diffie-Hellman assumption. We stress that we do not need any
trapdoor for the common random string.
Our protocol is optimistic. If all parties behave honestly, each party
computes only exponentiations, where is the number of
parties. In the worst case each party computes
exponentiations. This should be contrasted with previous constructions
in which each party computes exponentiations regardless
of if they behave honestly or not. In the optimistic case the number
of bits sent in our protocol is essentially equal to the number of
bits sent in independent copies of Feldman's original protocol.
On security of XTR public key cryptosystems against Side Channel Attacks
The XTR public key system was introduced at Crypto 2000.
Application of XTR in cryptographic protocols leads to substantial
savings both in communication and computational overhead without
compromising security. It is regarded that XTR is suitable for a
variety of environments, including low-end smart cards, and XTR is
the excellent alternative to either RSA or ECC. In
\cite{LV00a,SL01}, authors remarked that XTR single exponentiation
(XTR-SE) is less susceptible than usual exponentiation routines to
environmental attacks such as timing attacks and Differential
Power Analysis (DPA). In this paper, however, we investigate the
security of side channel attack (SCA) on XTR. This paper shows
that XTR-SE is immune against simple power analysis (SPA) under
assumption that the order of the computation of XTR-SE is
carefully considered. However we show that XTR-SE is vulnerable to
Data-bit DPA (DDPA)\cite{Cor99}, Address-bit DPA
(ADPA)\cite{IIT02}, and doubling attack \cite{FV03}. Moreover, we
propose two countermeasures that prevent from DDPA and a
countermeasure against ADPA. One of the countermeasures using
randomization of the base element proposed to defeat DDPA, i.e.,
randomization of the base element using field isomorphism, could
be used to break doubling attack. Thus if we only deal with SPA,
DDPA, ADPA, and doubling attack as the attack algorithm for
XTR-SE, XTR-SE should be added following countermeasures:
randomization of the base element using field isomorphism (DDPA
and doubling attack) + randomized addressing (ADPA). But the
proposed countermeasure against doubling attack is very
inefficient. So to maintain the advantage of efficiency of XTR a
good countermeasure against doubling attack is actually necessary.
A New Two-Party Identity-Based Authenticated Key Agreement
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorithm first proposed by Sakai and Kasahara. We show how this key agreement can be used in either escrowed or escrowless mode. We also describe conditions under which users of different Key Generation Centres can agree on a shared secret key. We give an overview of existing two-party key agreement protocols, and compare our new scheme with existing ones in terms of computational cost and storage requirements.
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
Uncategorized
Uncategorized
We present the first blind identity-based signcryption (BIBSC).
We formulate its security model and define the security notions of blindness and parallel one-more unforgeability (p1m-uf). We present an efficient construction from pairings, then prove a security theorem that reduces its p1m-uf to Schnorr¡¦s ROS Problem in the random oracle model plus the generic group and pairing model. The latter model is an extension of the generic group model to add support for pairings, which we introduce in this paper. In the process, we also introduce a new security model for (non-blind) identity-based signcryption (IBSC) which is a strengthening of Boyen¡¦s. We construct the first IBSC scheme proven secure in the strenghened model which is also the fastest (resp. shortest) IBSC in this model or Boyen¡¦s model. The shortcomings of several existing IBSC schemes in the strenghened model are shown.
Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup
We analyse the consequences of specific properties of the key-setup phase in symmetric encryption schemes for their security. We find that key-setup routines satisfying IND-CNA and one-wayness allow to construct schemes which are provably secure against key-recovery attacks. We propose a specific cryptosystem based on a stream cipher
with a one-way IND-CNA key-setup, for which we present a proof, based on a set of scheme-specific assumptions, that it remains secure even if a successful key-recovery attack against the underlying cipher is found.
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoids the use of interactive zero-knowledge proofs. As a consequence, the protocol can be proven secure in a universally-composable (UC) like framework which prohibits rewinding. We prove the security in what we call the single-inconsistent-player (SIP) UC model, which guarantees arbitrary composition as long as all protocols are executed by the same players. As applications, we propose a fully UC threshold Schnorr signature scheme, a fully UC threshold DSS signature scheme, and a SIP UC threshold Cramer-Shoup cryptosystem.
Our results are based on a new adaptively-secure Feldman VSS scheme. Although adaptive security was already addressed by Feldman in the original paper, the scheme requires secure communication, secure erasure, and either a linear number of rounds or digital signatures to resolve disputes. Our scheme overcomes all of these shortcomings, but on the other hand requires some restriction on the corruption behavior of the adversary, which however disappears in some applications including our new DLKG protocol.
We also propose several new adaptively-secure protocols, which may find other applications, like a distributed trapdoor-key generation protocol for Pedersen's commitment scheme, an adaptively-secure Pedersen VSS scheme (as a {\em committed} VSS), or distributed-verifier proofs for proving relations among commitments or even any NP relations in general.
Fast addition on non-hyperelliptic genus curves
We present a fast addition algorithm in the Jacobian of a genus non-hyperelliptic curve over a field of any characteristic. When the curve has a rational flex and , the computational cost for addition is and for doubling. An appendix focuses on the computation of flexes in all characteristics. For large odd , we also show that the set of rational points of a non-hyperelliptic curve of genus can not be an arc.
Efficient and Forward-Secure Identity-Based Signcryption
Several signcryption schemes proposed in the literature are known to lack semantic security, and semantically secure signcryption schemes tend to be more computationally expensive. In fact, devising an efficient signcryption scheme providing both public verifiability and forward security was until now an open problem.
In this paper, we show how a particular kind of signcryption scheme may become completely insecure when implemented with certain efficient instantiations of the Tate or Weil pairing. We also address the drawbacks of the secure schemes by proposing efficient, semantically and forward-secure signcryption schemes, in both transferable and non-transferable form, that can be realised on top of any pairing instantiation. As a bonus, we also derive from them a new, efficient identity-based signature scheme.
On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions
The recently proposed {\em universally composable {\em (UC)} security} framework for analyzing security of cryptographic protocols provides very strong security guarantees. In particular, a protocol proven secure in this framework is guaranteed to maintain its security even when run concurrently with arbitrary other protocols. It has been shown that if a majority of the parties are honest, then universally composable protocols exist for essentially any cryptographic task in the {\em plain model} (i.e., with no setup assumptions beyond that of authenticated communication). When honest majority is not guaranteed, general feasibility results are known only given trusted set-up, such as in the common reference string model. Only little was known regarding the existence of universally composable protocols in the plain model without honest majority, and in particular regarding the important special case of two-party protocols.
We study the feasibility of universally composable two-party {\em function evaluation} in the plain model. Our results show that in this setting, very few functions can be securely computed in the
framework of universal composability. We demonstrate this by providing broad impossibility results that apply to large classes of deterministic and probabilistic functions. For some of these classes, we also present full characterizations of what can and cannot be securely realized in the framework of universal composability. Specifically, our characterizations are for the classes of deterministic functions in which (a) both parties receive the same output, (b) only one party receives output, and (c) only one party has input.
Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange
Group key agreement protocols are designed to solve the
fundamental problem of securely establishing a session key among a
group of parties communicating over a public channel. Although a
number of protocols have been proposed to solve this problem over
the years, they are not well suited for a high-delay wide area
network; their communication overhead is significant in terms of
the number of communication rounds or the number of exchanged
messages, both of which are recognized as the dominant factors
that slow down group key agreement over a networking environment
with high communication latency. In this paper we present a
communication-efficient group key agreement protocol and prove its
security in the random oracle model under the factoring
assumption. The proposed protocol provides perfect forward secrecy
and requires only a constant number of communication rounds for
any of group rekeying operations, while achieving optimal message
complexity.
Improved Identity-Based Signcryption
Uncategorized
Uncategorized
We present an identity-based signcryption scheme that we believe is the most efficient proposed to date.
We provide random oracle model~\cite{ROP} proofs of security under the definitions proposed in~\cite{MIBS}
On the Security and Composability of the One Time Pad
Recent experimental results in quantum cryptography have renewed the interest in information-theoretically secure ciphers. In April 2004, in Vienna a bank transfer was secured by means of a one time pad encryption, with the key material being derived from a quantum key exchange. However, in this experiment the integrity of the transmitted message remained unprotected. This can have severe consequences, if the bank transfer form itself contains no authentication mechanism and there is a known position where the amount of money or the recipient is specified. Through flipping bits at the corresponding positions in the ciphertext, the amount of transfered money or the recipient of the money can be changed.
This concrete example illustrates the necessity for a thorough theoretical analysis of information-theoretically secure cryptographic techniques that are to be deployed in practice. In this work we show how to implement a statistically secure and composable system for message passing, that is, a channel with negligible failure rate secure against unbounded adversaries, using a one time pad based cryptosystem. We prove the security of our system in an asynchronous adversarially-controlled network using the framework put forward by Backes, Pfitzmann, and Waidner. The composition theorem offered by this framework enables the use of our scheme as a building block of more complex protocols as needed in practical applications.
Relation between XL algorithm and Groebner Bases Algorithms
We clarify a relation between the XL algorithm and Groebner bases algorithms. The XL algorithm was proposed to be a more efficient algorithm to solve a system of equations with a special assumption without trying to calculate a whole Groebner basis. But in our result, it is shown that the XL algorithm is also a Groebner bases algorithm which can be represented as a redundant version of a Groebner bases algorithm F4 under the assumption in XL.
The Vulnerability of SSL to Chosen Plaintext Attack
The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode of encryption which requires an initialization vector (IV) in order to encrypt. Although the initial IV used by SSL is a (pseudo)random string which is generated and shared during the initial handshake phase, subsequent IVs used by SSL are chosen in a deterministic, predictable pattern; in particular, the IV of a message is taken to be the final ciphertext block of the immediately-preceding message. We show that this introduces a vulnerability in SSL which (potentially) enables easy recovery of low-entropy strings such as passwords or PINs that have been encrypted. Moreover, we argue that the open nature of web browsers provides a feasible ``point of entry'' for this attack via a corrupted plug-in; thus, implementing the attack is likely to be much easier than, say, installing a Trojan Horse for ``keyboard sniffing''. Finally, we suggest a number of modifications to the SSL standard which will prevent this attack.
Designing Against the `Overdefined System of Equations' Attack
Recently, Courtois and Pieprzyk proposed an attack on symmetric ciphers that takes advantage of a previously-unexploited property of substitution boxes, or s-boxes, in the round function. This paper gives a brief overview of this ``overdefined system of equations'' attack and shows how the attack may be avoided through the use of round functions that contain a variety of protection mechanisms, including combinations of operators from different algebraic groups, a circular rotation step, and substitution boxes (s-boxes) of large dimension.
Concealing Complex Policies with Hidden Credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies and credentials. We propose a significant
improvement in decryption performance when implementing hidden credentials using the Franklin/Boneh IBE. We also propose a substantially improved secret splitting scheme for enforcing complex policies, and show how it improves concealment of policies from nonsatisfying recipients.
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the signer can neither learn the messages he/she sign nor the signatures the recipients obtain afterwards. Partially blind signature is a variant such that part of the message contains pre-agreed information (agreed by the signer and the signature requester) in unblinded form, while threshold blind signature distributes the signing power to a group of signers such that a signature can only be produced by interacting with a predetermined numbers of signers. In this paper, we propose a threshold partially blind signature scheme from bilinear pairings and an ID-based partially blind signature scheme, which are provably secure in the random oracle model. To the best of authors' knowledge, we give the first discussion on these two notions.
Classification of genus 2 curves over and optimization of their arithmetic
To obtain efficient cryptosystems based on hyperelliptic curves, we studied genus 2 isomorphism classes of hyperelliptic curves in characteristic 2. We found general and optimal form for these curves, just as the short Weierstrass form for elliptic curves. We studied the security and the arithmetic on their jacobian. We also rewrote and optimized the formulas of Lange in characteristic 2, and we introduced a new system of coordinate. Therefore, we deduced the best form of hyperelliptic curves of genus 2 in characteristic 2 to use in cryptography.
Capacity and Examples of Template Protecting Biometric Authentication Systems
Uncategorized
Uncategorized
In this paper, we formulate precisely the requirements for privacy
protecting biometric authentication systems. The secrecy capacity
is investigated for the discrete and the continuous case. We
present, furthermore, a general algorithm that meets the
requirements and achieves as well as (the
identification capacity). Finally, we present some practical
constructions of the general algorithm and analyze their
properties.
Receipt-Free Homomorphic Elections and Write-in Ballots
We present a voting protocol that protects voters' privacy and achieves universal verifiability, receipt-freeness, and uncoercibility without ad hoc physical assumptions or procedural constraints (such as untappable channels, voting booths, smart cards, third-party randomizers, and so on). We discuss under which conditions the scheme allows voters to cast write-in ballots, and we show how it can be practically implemented through voter-verified (paper) ballots. The scheme allows voters to combine voting credentials with their chosen votes applying the homomorphic properties of certain probabilistic cryptosystems.
Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings
Uncategorized
Uncategorized
Group signature schemes are cryptographic systems that
provide revocable anonymity for signers. We propose a group
signature scheme with constant-size public key and signature
length that does not require trapdoor. So system parameters can be
shared by multiple groups belonging to different organizations.
The scheme is provably secure in the formal model recently
proposed by Bellare, Shi and Zhang (BSZ04), using random oracle
model, Decisional Bilinear Diffie-Hellman and Strong
Diffie-Hellman assumptions. We give a more efficient variant
scheme and prove its security in a formal model which is a
modification of BSZ04 model and has a weaker anonymity
requirement. Both schemes are very efficient and the sizes of
signatures are approximately one half and one third, respectively,
of the sizes of the well-known ACJT00 scheme. We will show that
the schemes can be used to construct a traceable signature scheme
and identity escrow schemes. They can also be
extended to provide membership revocation.
Cryptanalysis of SFlash v3
Sflash is a fast multivariate signature scheme. Though the first version Sflash-v1 was flawed, a second version, Sflash-v2 was selected by the Nessie Consortium and was recommended for implementation of low-end smart cards. Very recently, due to the security concern, the designer of Sflash recommended that Sflash-v2 should not be used, instead a new version Sflash-v3 is proposed, which essentially only increases the length of the signature.
The Sflash family of signature schemes is a variant of the Matsumoto and Imai public key cryptosystem. The modification is through the Minus method, namely given a set of polynomial equations, one takes out a few of them to make them much more difficult to solve.
In this paper, we attack the Sflash-v3 scheme by combining an idea from the relinearization method by Kipnis and Shamir, which was used to attack the Hidden Field Equation schemes, and the linearization method by Patarin. We show that the attack complexity is less than 2^80, the security standard required by the Nessie Consortium.
The Exact Security of an Identity Based Signature and its Applications
Uncategorized
Uncategorized
This paper first positively answers the previously open question
of whether it was possible to obtain an optimal security reduction
for an identity based signature (IBS) under a reasonable
computational assumption. We revisit the Sakai-Ogishi-Kasahara IBS
that was recently proven secure by Bellare, Namprempre and Neven
through a general framework applying to a large family of schemes.
We show that their modified SOK-IBS scheme can be viewed as a
one-level instantiation of Gentry and Silverberg's alternative
hierarchical IBS the exact security of which was never considered
before. We also show that this signature is as secure as the
one-more Diffie-Hellman problem. As an application, we propose a
modification of Boyen's "Swiss Army Knife" identity based
signature encryption (IBSE) that presents better security
reductions and
satisfies the same strong security requirements with a similar efficiency.
Provably Secure Masking of AES
A general method to
secure cryptographic algorithm implementations against side-channel
attacks is the use of randomization techniques and, in particular,
masking. Roughly speaking, using random values unknown to an adversary
one masks the input to a cryptographic algorithm. As a result, the
intermediate results in the algorithm computation are uncorrelated to
the input and the adversary cannot obtain any useful information from
the side-channel. Unfortunately, previous AES randomization techniques
have based their security on heuristics and experiments. Thus, flaws
have been found which make AES randomized implementations still
vulnerable to side-channel cryptanalysis. In this paper, we provide a
formal notion of security for randomized maskings of arbitrary
cryptographic algorithms.
Furthermore, we present an AES randomization technique
that is provably secure against side-channel attacks if the adversary
is able to access a single intermediate result. Our randomized masking technique is quite general
and it can be applied to arbitrary algorithms using only arithmetic
operations over some even characteristic finite field. We notice
that to our knowledge this is the first time that a randomization
technique for the AES has been proven secure in a formal model.
The Sorcerer’s Apprentice Guide to Fault Attacks
Uncategorized
Uncategorized
The effect of faults on electronic systems has been studied
since the 1970s when it was noticed that radioactive
particles caused errors in chips. This led to further research
on the effect of charged particles on silicon, motivated by
the aerospace industry who was becoming concerned about
the effect of faults in airborn electronic systems. Since
then various mechanisms for fault creation and propagation
have been discovered and researched. This paper covers
the various methods that can be used to induce faults
in semiconductors and exploit such errors maliciously. Several
examples of attacks stemming from the exploiting of
faults are explained. Finally a series of countermeasures to
thwart these attacks are described.
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but
take care of hashing the DH output (as required, for example, for secure
DH-based encryption and key exchange) the usual requirement to work over a
DDH group (i.e., a group in which the Decisional Diffie-Hellman assumption
holds) can be relaxed to only requiring that the DH group contains a large
enough DDH subgroup. In particular, this implies the security of (hashed)
Diffie-Hellman over non-prime order groups such as . Moreover, our
results show that one can work directly over without requiring any
knowledge of the prime factorization of and without even having to
find a generator of .
These results are obtained via a general characterization of DDH groups in
terms of their DDH subgroups, and a relaxation (called -DDH)
of the DDH assumption via computational entropy.
We also show that, under the short-exponent
discrete-log assumption, the security of the hashed Diffie-Hellman transform
is preserved when replacing full exponents with short exponents.
Attacking a Public Key Cryptosystem Based on Tree Replacement
We point out several security flaws in the cryptosystem based on tree replacement systems proposed by Samuel, Thomas, Abisha and Subramanian at INDOCRYPT 2002. Due to the success of (among others) very simple ciphertext-only attacks, we evidence that this system does not, in its present form, offer acceptable security guarantees for cryptographic applications.
How To Re-initialize a Hash Chain
Hash Chains are used extensively in various cryptographic systems such as one-time passwords, server supported signatures, secure address resolution, certificate revocation, micropayments etc. However, currently they suffer from the limitation that they have a finite number of links which when exhausted requires the system to be re-initialized. In this paper, we present a new kind of hash chain which we call a Re-initializable Hash Chain (RHC). A RHC has the property that if its links are exhausted, it can be securely re-initialized in a non-repudiable manner to result in another RHC. This process can be continued indefinitely to give rise to an infinite length hash chain, or more precisely, an infinite number of finite length hash chains tied together. Finally we illustrate how a conventional hash chain (CHC) may be profitable replaced with a RHC in cryptographic systems.
Last updated: 2004-05-05
On the Ambiguity of Concurrent Signatures
We point out that the notion of {\em ambiguity}
introduced in the concurrent signatures proposed by Chen, Kudla, and
Paterson in Eurocrypt 2004 is incorrect. Any third party who observed two signatures can differentiate who has/have produced the signatures by performing the verification algorithm. We note that the model proposed in the paper is sound, but the concrete scheme does not really provide what is required in the model.
GNFS Factoring Statistics of RSA-100, 110, ..., 150
GNFS (general number field sieve) algorithm is currently the fastest known algorithm for factoring large integers. Up to the present, several running time estimates for GNFS are announced. These estimates are usually based on the previous factoring results. However, since the previous factoring results were done by various programs and/or computers, it is difficult to compare those running time. We implemented GNFS and factored 100- to 150-digits number on the same environment. This manuscript describes the statistics of these factorings.
Block Ciphers and Stream Ciphers: The State of the Art
In these lecture notes we survey the state of the art in symmetric key encryption, in particular
in the block ciphers and stream ciphers area. The area of symmetric key encryption has been
very active in the last five years due to growing interest from academic and industry research,
standardization efforts like AES, NESSIE and CRYPTREC, as well as due to ease of government control
over export of cryptography.
A Provably Secure Nyberg-Rueppel Signature Variant with Applications
Uncategorized
Uncategorized
This paper analyzes the modified Nyberg-Rueppel
signature scheme (mNR), proving it secure in the Generic Group Model (GM).
We also show that the security of the mNR signature is equivalent (in the standard model)
to that of a twin signature, while achieving
computational and bandwidth improvements.
As a provably secure signature scheme, mNR is very efficient. We demonstrate its
practical relevance by providing an application to the
construction of a provably secure, self-certified,
identity-based scheme (SCID). SCID schemes combine some of the best features
of both PKI-based schemes (functionally trusted authorities, public keys revocable without the
need to change identifier strings) and ID-based ones (lower bandwidth requirements). The new SCID
scheme matches the performance achieved by the most efficient ones based on the discrete logarithm,
while requiring only standard security assumptions in the Generic Group Model.
A New Stream Cipher HC-256
HC-256 is a software-efficient stream cipher. It generates keystream from a 256-bit secret key and a 256-bit initialization vector. The encryption speed of the C implementation of HC-256 is about 1.9 bits per clock cycle (4.2 cycle/byte) on the Intel Pentium 4 processor. A variant of HC-256 is also introduced in this paper.
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Database outsourcing is a popular industry trend which involves organizations delegating their data
management needs to an external service provider. In this model, a service provider hosts its clients’
databases and offers mechanisms for clients to create, store, update and access (query) their databases.
Since a service provider is almost never fully trusted, security and privacy of outsourced data are important
concerns.
This paper focuses on integrity and authenticity issues in outsourced databases. Whenever someone
queries a hosted database, the returned results must be demonstrably authentic: the querier needs to
establish – in an efficient manner – that both integrity and authenticity (with respect to the actual data
owner) are assured. To this end, some recent work examined two relevant signature schemes: one
based on a condensed variant of batch RSA and the other – on aggregated signature scheme by Boneh,
et al.
In this paper, we introduce the notion of immutability for aggregated signature schemes. Immutability
refers to the difficulty of computing new valid aggregated signatures from a set of other aggregated
signatures. This is an important feature, particularly for outsourced databases, as lack thereof would
enable a frequent querier to eventually amass enough aggregated signatures to answer other (un-posed)
queries, thus becoming a de facto service provider. Since the schemes considered in [19] do not offer
immutability, we propose several practical methods to achieve it.
Provably Secure Authenticated Tree Based Group Key Agreement Protocol
Uncategorized
Uncategorized
We present a provably secure authenticated tree based key agreement protocol. The protocol is obtained by combining Boldyreva's multi-signature with an unauthenticated ternary tree based multi-party extension of Joux's key agreement protocol. The securiry is in the standard model as formalized by Bresson et al. The proof is based on the techniques used by Katz and Yung in proving the security of their key agreement protocol.
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance
Key pre-distribution (KPD) schemes, are inherently trade-offs between security and complexity, and are perhaps well suited for securing large-scale deployments of resource constrained nodes without persistent access to a trusted authority (TA). However, the need to offset their inherent security limitations, calls for some degree of tamper - resistance of nodes. Obviously, if absolute tamper-resistance is guaranteed, KPD schemes are rendered secure. In practice, however, tamper-resistance will have some limitations which will be exploited by attackers. In this paper, we analyze the security of deployments of random key pre-distribution schemes based on some assumptions on the "extent of tamper-resistance." We argue that a "limited extent of tamper resistance" when used in conjunction with a mechanism for "periodic key updates," drastically improves the security of (especially random) KPD schemes.
Last updated: 2004-06-08
Efficient Batch Verification of Signature Schemes based on Bilinear Maps
In this paper we present batch signature verification schemes for identity and non-identity signatures schemes based on bilinear maps.
We examine some signature schemes and exploit their properties so that we can batch process the verification of these signatures in an efficient manner. Batch verification of message signatures is useful in real world applications. Most email clients are predominantly offline and so do not download emails one at a time. Instead the mails arrive at an online mail server individually, where they are collected together and stored. It is only after some period of time that any mails on the server are downloaded in bulk. It is not unreasonable to have 5 - 10 emails download into your inbox in any one transaction with the mail server. Say these mails were all signed, then this would be an ideal time to do batch signature verification. We show that we can make substantial savings over the naïve approach of verifying one message signature at a time.
Using primitive subgroups to do more with fewer bits
This paper gives a survey of some ways to improve the efficiency of discrete log-based cryptography by using the restriction of scalars and the geometry and arithmetic of algebraic tori and abelian varieties.
Fuzzy Identity Based Encryption
We introduce a new type of Identity-Based Encryption
(IBE) scheme that we call Fuzzy Identity-Based Encryption.
In Fuzzy IBE we view an identity as set of descriptive attributes.
A Fuzzy IBE scheme allows for a private key for an identity, , to decrypt a ciphertext encrypted with an identity, , if
and only if the identities and are close to each
other as measured by the ``set overlap'' distance metric.
A Fuzzy IBE scheme can be applied to enable encryption
using biometric inputs as identities; the error-tolerance property
of a Fuzzy IBE scheme is precisely what allows for the use of
biometric identities, which inherently will have some noise each
time they are sampled. Additionally, we show that Fuzzy-IBE can
be used for a type of application that we term ``attribute-based encryption''.
In this paper we present two constructions of Fuzzy IBE schemes. Our
constructions can be viewed as an Identity-Based Encryption of a
message under several attributes that compose a (fuzzy) identity.
Our IBE schemes are both error-tolerant and secure against collusion
attacks. Additionally, our basic construction does not use random
oracles. We prove the security of our schemes under the Selective-ID
security model.
The CS2 Block Cipher
In this paper we describe our new CS block cipher which is an extension of the original CS-Cipher. Our new design inherits the efficiency of the original design while being upgraded to support a larger block size as well as use a slightly improved substitution box. We prove that our design is immune to differential and linear cryptanalysis as well as argue it resists several other known attacks.
Evaluating elliptic curve based KEMs in the light of pairings
Uncategorized
Uncategorized
Several efforts have been made recently to put forward a set of cryptographic primitives
for public key encryption, suitable to be standardized.
In two of them (in the first place the NESSIE european evaluation project, already finished, and in the second
place the standardisation bodies ISO/IEC),
the methodology by Victor Shoup for hybrid encryption, known as
{\em Key Encapsulation Method-Data Encapsulation Mechanism} (KEM-DEM), has been accepted.
In this work we re-evaluate the elliptic curve based KEMs studied to become standards, which are called
ACE-KEM, ECIES-KEM and PSEC-KEM. Their security is based on different assumptions related
to the elliptic curve discrete logarithm (ECDL) problem on a random elliptic curve.
First of all, we fix some inexact results claimed in the previous literature.
As a consequence, the performance features of PSEC-KEM are dramatically affected.
In second place, we analyse both their security properties and performance
when elliptic curves with computable bilinear
maps ({\em pairing curves} for short) are used. It turns out that these KEMs present a very tight security
reduction to the same problem, namely the ECDH problem on such curves;
moreover, one can even relate their security to the ECDL problem in
certain curves with a small security loss. It is also argued that ECIES-KEM arises as the best option
among these KEMs when pairing curves are used. This is remarkable, since NESSIE did not include
ECIES-KEM over a random curve in its portfolio of recommended cryptographic primitives.
It is concluded that for medium security level applications, which is
likely the case for many embedded systems (e.g. smart cards), implementing these KEMs over pairing curves
should be considered a very reasonable option.
Scan Based Side Channel Attack on Data Encryption Standard
Scan based test is a double edged sword. On one hand, it is a powerful test technique. On the other hand, it is an equally powerful attack tool. In this paper we show that scan chains can be used as a side channel to recover secret keys from a hardware implementation of the Data Encryption Standard (DES).
By loading pairs of known plaintexts with one-bit difference in the normal mode and then scanning out the internal state in the test mode, we first determine the position of all scan elements in the scan chain. Then, based on a systematic analysis of the structure of the non-linear substitution boxes, and using three additional plaintexts we discover the DES secret key. Finally, some assumptions in the attack are discussed.
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems
We define \emph{reactive simulatability} for general
asynchronous systems. Roughly, simulatability means that a real system
implements an ideal system (specification) in a way that preserves
security in a general cryptographic sense.
Reactive means that the system can interact with its users
multiple times, e.g., in many concurrent protocol runs or a multi-round
game. In terms of distributed systems, reactive simulatability
is a type of refinement that preserves particularly strong properties,
in particular confidentiality.
A core feature of reactive simulatability is \emph{composability}, i.e.,
the real system can be plugged in instead of the ideal system within
arbitrary larger systems; this is shown in follow-up papers, and so is the
preservation of many classes of individual security properties
from the ideal to the real systems.
A large part of this paper defines a suitable system model. It is
based on probabilistic IO automata (PIOA) with two main new features:
One is \emph{generic distributed scheduling}. Important special cases
are realistic adversarial scheduling, procedure-call-type scheduling
among colocated system parts, and special schedulers such as for
fairness, also in combinations. The other is the definition of the
\emph{reactive runtime} via a realization by Turing machines such
that notions like polynomial-time are composable. The simple
complexity of the transition functions of the automata is not
composable.
As specializations of this model we define security-specific concepts,
in particular a separation beween honest users and adversaries and several
trust models.
The benefit of IO automata as the main model, instead of only interactive
Turing machines as usual in cryptographic multi-party computation,
is that many cryptographic systems can be specified with an ideal system
consisting of only one simple, deterministic IO automaton without any
cryptographic objects, as many follow-up papers show. This enables the use of
classic formal methods and automatic proof tools for proving
larger distributed protocols and systems that use these cryptographic systems.
Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers
Recently proposed algebraic attacks [AK03,CM03] and fast algebraic attacks [A04,C03] have provided the best analyses against some deployed LFSR-based ciphers. The process complexity is exponential in the degree of the equations. Fast algebraic attacks were introduced [C03] as a way of reducing run-time complexity by reducing the degree of the system of equations. Previous reports on fast algebraic attacks [A04,C03] have underestimated the complexity of substituting the keystream into the system of equations, which in some cases dominates the attack. We also show how the Fast Fourier Transform (FFT) [CT65] can be applied to decrease the complexity of the substitution step, although in one case this step still dominates the attack complexity. Finally, we show that all functions of degree d satisfy a common, function-independent linear combination that may be used in the pre-computation step of the fast algebraic attack and provide an explicit factorization of the corresponding characteristic polynomial. This yields the fastest known method for performing the pre-computation step.
HENKOS Stream Cipher
Uncategorized
Uncategorized
The purpose of this paper is to revise the HENKOS Stream Cipher paper present in the archive at 2004/080 and to provide a clear description of the proposed HENKOS cryptographic algorithm.
Pairing-Based One-Round Tripartite Key Agreement Protocols
Since Joux published the first pairing-based one-round tripartite key agreement protocol [13], many authenticated protocols have been proposed. However most of them were soon broken or demonstrated not to achieve some desirable security attributes. In this paper we present a protocol variant based on Shim's work [20]. As the formalized model of this type of AK protocols is not mature, the security properties of the protocol are heuristically investigated by attempting a list of attacks. The attack list presented in the paper has both the importance in theory and the meaning in practice and can be used to evaluate other tripartite and group key agreement protocols.
Analysis of the WinZip encryption method
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having "easy-to-use AES encryption to protect your sensitive data." We exhibit several attacks against WinZip's new encryption method, dubbed "AE-2" or "Advanced Encryption, version two." We then discuss secure alternatives. Since at a high level the underlying WinZip encryption method appears secure (the core is exactly Encrypt-then-Authenticate using AES-CTR and HMAC-SHA1), and since one of our attacks was made possible because of the way that WinZip Computing, Inc.~decided to fix a different security problem with its previous encryption method AE-1, our attacks further underscore the subtlety of designing cryptographically secure software.
- « Previous
- 1
- 2
- 3
- 4
- Next »