All papers in 2006 (Page 3 of 485 results)
Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps
We propose a new computational complexity assumption from bilinear
map, based on which we construct Verifier-Local Revocation group
signatures with shorter lengths than previous ones.
Unrestricted Aggregate Signatures
Uncategorized
Uncategorized
Secure use of the BGLS aggregate signature schemes is restricted to the aggregation of distinct messages (for the basic scheme) or per-signer distinct messages (for the enhanced, prepend-public-key version of the scheme). We argue that these restrictions preclude interesting applications, make usage of the schemes error-prone and are generally undesirable in practice. Via a new analysis and proof, we show how the restrictions can be lifted, yielding the first truly unrestricted aggregate signature scheme. Via another new analysis and proof, we show that the distinct signer restriction on the sequential aggregate signature schemes of Lysyanskaya et al. can also be dropped, yielding an unrestricted sequential aggregate signature scheme. Finally, we present variants of these schemes with tight security reductions.
Constant Round Group Key Exchange with Logarithmic Computational Complexity
Protocols for group key exchange (GKE) are cryptographic
algorithms that describe how a group of parties communicating over
a public network can come up with a common secret key. Due to
their critical role in building secure multicast channels, a
number of GKE protocols have been proposed over the years in a
variety of settings. However despite many impressive achievements,
it still remains a challenging problem to design a secure GKE
protocol which scales very well for large groups. Our observation
is that all provably-secure constant-round GKE protocols providing
forward secrecy thus far are not fully scalable, but have a
computational complexity that scales only linearly in group size.
Motivated by this observation, we propose a new GKE protocol that
not only offers full scalability in all directions but also
attains provable security against active adversaries. Full
scalability is achieved by using a complete binary tree structure
where users are arranged on both internal and leaf nodes. Security
is proved via reduction to the decisional Diffie-Hellman
assumption in a well-defined formal model of communication and
adversarial capabilities.
Does Privacy Require True Randomness?
Most cryptographic primitives require randomness (for example, to
generate their secret keys). Usually, one assumes that perfect
randomness is available, but, conceivably, such primitives might be
built under weaker, more realistic assumptions. This is known to be
true for many authentication applications, when entropy alone is
typically sufficient. In contrast, all known techniques for achieving
privacy seem to fundamentally require (nearly) perfect randomness. We
ask the question whether this is just a coincidence, or, perhaps,
privacy inherently requires true randomness?
We completely resolve this question for the case of
(information-theoretic) private-key encryption, where parties wish to
encrypt a b-bit value using a shared secret key sampled from some
imperfect source of randomness S. Our main result shows that if such n-bit source S allows for a secure encryption of b bits, where b>log n, then one can deterministically extract nearly b almost perfect random bits from S. Further, the restriction that b>log n is nearly tight: there exist sources S allowing one to perfectly encrypt (log n - loglog n) bits, but not to deterministically extract even a single slightly unbiased bit.
Hence, to a large extent, *true randomness is inherent for encryption*: either the key length must be exponential in the message length b, or one can deterministically extract nearly b almost unbiased random bits from the key. In particular, the *one-time pad scheme is essentially universal*.
Our technique also extends to related *computational* primitives which
are perfectly-binding, such as perfectly-binding commitment and
computationally secure private- or public-key encryption, showing the
necessity to efficiently extract almost b *pseudorandom* bits.
Last updated: 2006-08-24
Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing)
Recently, Boneh, Gentry, and Waters '05 presented an efficient broadcast encryption, and Boneh, Sahai, and Waters '06 presented an efficient traitor tracing scheme. The former broadcast encryption result contains both a simpler chosen plaintext secure version and a more complicated but chosen ciphertext secure version. The latter traitor tracing scheme is only chosen plaintext secure. In this paper, we use the twin encryption technique of Naor and Yung '90 to add chosen ciphertext security to both papers. By``twinning", we extend the simpler chosen plaintext secure broadcast encryption to achieve chosen ciphertext security, and we extend the chosen plaintext secure traitor tracing to achieve chosen ciphertext security. We also extend both schemes to versions corresponding to threshold encryption which we call "broadcast threshold encryption" and "threshold-traitor tracing", i.e. tracing of threshold traitors. In these schemes, any un-revoked users can decrypt while users cannot. The tracing is to a set of users. We call this set a "threshold-traitor". Our broadcast threshold encryption is collusion resistant. Our threshold-traitor tracing is collusion resistant in its traceability.
Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys
There is a rarely mentioned foundational problem involving collision-resistant hash-functions: common constructions are keyless, but formal definitions are keyed. The discrepancy stems from the fact that a function H:{0,1}^* -> {0,1}^n always admits an efficient collision-finding algorithm, it's just that us human beings might be unable to write the program down. We explain a simple way to sidestep this difficulty that avoids having to key our hash functions. The idea is to state theorems in a way that prescribes an explicitly-given reduction, normally a black-box one. We illustrate this approach using well-known examples involving digital signatures, pseudorandom functions, and the Merkle-Damgard construction.
Deniable Authentication and Key Exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability features of SKEME and SIGMA, two natural and efficient protocols which serve as basis for the Internet Key Exchange (IKE) protocol. The two protocols require distinct approaches to their deniability analysis, hence highlighting important definitional issues as well as necessitating different tools in the analysis.
SKEME is an encryption-based protocol for which we prove full deniability based on the plaintext awareness of the underlying encryption scheme. Interestingly SKEME's deniability is possibly the first ``natural'' application which essentially requires plaintext awareness (until now this notion has been mainly used as a tool for proving chosen-ciphertext security); in particular this use of plaintext awareness is not tied to the random oracle model.
SIGMA, on the other hand, uses non-repudiable signatures for authentication and hence cannot be proven to be fully deniable. Yet we are able to prove a weaker, but meaningful, ``partial deniability" property: a party may not be able to deny that it was ``alive" at some point in time but can fully deny the contents of its communications and the identity of its interlocutors.
We remark that the deniability of SKEME and SIGMA holds in a concurrent setting and does not essentially rely on the random oracle model.
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters (With an Exposition of Waters' Artificial Abort Technique)
At Eurocrypt 2005, Waters proposed an efficient identity based encryption (IBE) scheme. One drawback of this scheme is that the size of the public parameter is rather large. Our first contribution is a generalization of Waters scheme. In particular, we show that there is an interesting trade-off between the tightness of the security reduction and smallness of the public parameter size. For a given security level, this implies that if one reduces the public parameter size there is a corresponding increase in the computational cost. This
introduces a flexibility in choosing the public parameter size without compromising in security. In concrete terms, to achieve -bit security for 160-bit identities we show that compared to Waters protocol the public parameter size can be reduced by almost while increasing the computation cost by . Our second contribution is to extend the IBE protocol to a hierarchical IBE (HIBE) protocol which can be shown to be secure in the full model without the use of random oracle. A previous construction of a HIBE in the same setting is due to Waters. Our construction improves upon Waters' suggestion by significantly reducing the number of public parameters.
Fundamental problems in provable security and cryptography
This paper examines methods for formally proving the security of cryptographic schemes. We show that, despite many years of active research, there are fundamental problems which have yet to be solved. We also present a new approach to one of the more controversial aspects of provable security: the random oracle model.
On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits
This paper concerns the possibility of developing a coherent
theory of security when feasibility is associated
with expected probabilistic polynomial-time (expected PPT).
The source of difficulty is that
the known definitions of expected PPT strategies
(i.e., expected PPT interactive machines)
do not support natural results of the type presented below.
To overcome this difficulty,
we suggest new definitions of expected PPT strategies,
which are more restrictive than the known definitions
(but nevertheless
extend the notion of expected PPT non-interactive algorithms).
We advocate the conceptual adequacy of these definitions,
and point out their technical advantages.
Specifically, identifying a natural subclass of black-box simulators,
called normal, we prove the following two results:
(1) Security proofs that refer to all strict PPT adversaries
(and are proven via normal black-box simulators), extend to
provide security with respect to all adversaries that satisfy
the restricted definitions of expected PPT.
(2) Security composition theorems of the type known for strict PPT
hold for these restricted definitions of expected PPT,
where security means simulation by normal black-box simulators.
Specifically, a normal black-box simulator is required
to make an expected polynomial number of steps,
when given oracle access to any strategy,
where each oracle call is counted as a single step.
This natural property is satisfies by most known simulators
and is easy to verify.
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the password using a cryptographic hash function. This solution provides relatively weak protection, since an attacker that gets hold of the encrypted data can mount an off-line dictionary attack on the user's password, thereby recovering the key and decrypting the stored data.
We propose an approach for limiting off-line dictionary attacks in this setting without relying on secret storage or secure hardware. In our proposal, the process of deriving a key from the password requires the user to solve a puzzle that is presumed to be solvable only by humans (e.g, a CAPTCHA). We describe a simple protocol using this approach: many different puzzles are stored on the disk, the user's password is used to specify which of them need to be solved, and the encryption key is derived from the password and the solutions of the specified puzzles. Completely specifying and analyzing this simple protocol, however, raises a host of modeling and technical issues, such as new properties of human-solvable puzzles and some seemingly hard combinatorial problems. Here we analyze this protocol in some interesting special cases.
A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random
We present PEP, which is a new construction of a tweakable strong pseudo-random permutation.
PEP uses a hash-encrypt-hash approach which has recently been used in the construction of HCTR.
This approach is different from the encrypt-mask-encrypt approach of constructions such as CMC,
EME and EME . The general hash-encrypt-hash approach was earlier used by Naor-Reingold to
provide a generic construction technique for an SPRP (but not a tweakable SPRP). PEP can be seen
as the development of the Naor-Reingold approach into a fully specified mode of operation
with a concrete security reduction for a tweakable strong pseudo-random permutation.
The security bound of HCTR which is also based on the Naor-Reingold approach is weaker than
that of PEP.
Compared to previous known constructions, PEP is the only construction of tweakable SPRP which
uses a single key, is efficiently parallelizable and can handle an arbitrary number of blocks.
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Recently, Fang et al [24] proposed an improvement to Das et al's scheme [6] to prevent some weaknesses. Further, Chou et al [19] and Thulasi et al [23] pointed out some weakness of Das et al's scheme. However, the improvd scheme is still insecure to off-line attack.
In this paper, we propose an improvement of their schemes that provides the better security compared to the schemes previously published. Further, proposed scheme enables users to choose and change their password by their own choices without the help of a remote server.
Secure Positioning of Mobile Terminals with Simplex Radio Communication
With the rapid spread of various mobile terminals in our society, the importance of secure positioning is growing for wireless networks in adversarial settings. Recently, several authors have proposed a secure positioning mechanism of mobile terminals which is based on the geometric property of wireless node placement, and on the postulate of modern physics that a propagation speed of information never exceeds the velocity of light. In particular, they utilize the measurements of the round-trip time of radio signal propagation and bidirectional communication for variants of the challenge-and-response. In this paper, we propose a novel means to construct the above mechanism by use of unidirectional communication instead of bidirectional communication. Our proposal is based on the assumption that a mobile terminal incorporates a high-precision inner clock in a tamper-resistant protected area. In positioning, the mobile terminal uses its inner clock and the time and location information broadcasted by radio from trusted stations. Our proposal has a major advantage in protecting the location privacy of mobile terminal users, because the mobile terminal need not provide any information to the trusted stations through positioning procedures. Besides, our proposal is free from the positioning error due to claimant's processing-time fluctuations in the challenge-and-response, and is well-suited for mobile terminals in the open air, or on the move at high speed, in terms of practical usage. We analyze the security, the functionality, and the feasibility of our proposal in comparison to previous proposals.
Efficient Use of Random Delays
Random delays are commonly used as a countermeasure to inhibit side channel analysis and fault attacks in embedded devices. This paper proposes a different manner of generating random delays. The alternative proposed increases the desynchronisation compared to uniformly distributed random delays. It is also shown that it is possible to reduce the amount of time lost due to random delays, while maintaining the increased variation.
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack
Blockwise-adaptive chosen-plaintext and chosen-ciphertext attack are new models for cryptanalytic
adversaries, first discovered by Joux, et al [JMV02], and describe a vulnerability in
SSH discovered by Bellare, et al [BKN02]. Unlike traditional chosen-plaintext (CPA) or chosen-ciphertext
(CCA) adversaries, the blockwise adversary can submit individual blocks for encryption
or decryption rather than entire messages. This paper focuses on the search for on-line
encryption schemes which are resistant to blockwise-adaptive chosen-plaintext attack. We prove
that one oracle query with non-equal inputs is sufficient to win the blockwise-adaptive chosen-plaintext
game if the game can be won by any adversary in ppt with non-negligible advantage.
In order to uniformly describe such encryption schemes, we define a canonical representation
of encryption schemes based on functions believed to be pseudorandom (i.e. Block Ciphers).
This Canonical Form is general enough to cover many modes currently in use, including ECB,
CBC, CTR, OFB, CFB, ABC, IGE, XCBC, HCBC and HPCBC. An immediate result of the
theorems in this paper is that CTR, OFB, CFB, HCBC and HPCBC are proven secure against
blockwise-adaptive CPA, as well as S-ABC under certain conditions. Conversely ECB, CBC,
IGE, and P-ABC are proven to be blockwise-adaptive CPA insecure. Since CBC, IGE and
P-ABC are chosen-plaintext secure, this indicates that the blockwise-adaptive chosen-plaintext
model is a non-trivial extension of the traditional chosen-plaintext attack model.
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
One of the most commonly used two-factor authentication mechanisms is
based on smart card and user's password. Throughout the years, there
have been many schemes proposed, but most of them have already been
found flawed due to the lack of formal security analysis. On the
cryptanalysis of this type of schemes, in this paper, we further
review two recently proposed schemes and show that their security
claims are invalid. To address the current issue, we propose a new
and simplified property set and a formal adversarial model for
analyzing the security of this type of schemes. We believe that the
property set and the adversarial model themselves are of independent
interest.
We then propose a new scheme and a generic construction framework. In
particular, we show that a secure password based key exchange
protocol can be transformed efficiently to a smartcard and password
based two-factor authentication scheme provided that there exist
pseudorandom functions and collision-resistant hash functions.
An Analysis of the Hermes8 Stream Ciphers
Uncategorized
Uncategorized
Hermes8 is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM). In this paper we present an analysis of the Hermes8 stream ciphers. In particular, we show an attack on the latest version of the cipher (Hermes8F), which requires very few known keystream bytes and recovers the cipher secret key in less than a second on a normal PC. Furthermore, we make some remarks on the cipher's key schedule and discuss some properties of ciphers with similar algebraic structure to Hermes8.
On the Equivalence of Several Security Notions of Key Encapsulation Mechanism
KEM (Key Encapsulation Mechanism) was introduced by Shoup to formalize the asymmetric encryption specified for key distribution in ISO standards on public-key encryption. Shoup defined the ``semantic security (IND) against adaptively chosen ciphertext attacks (CCA2)'' as a desirable security notion of KEM. This paper introduces ''non-malleability (NM)'' of KEM, a stronger security notion than IND. We provide three definitions of NM, and show that these three definitions are equivalent. We then show that NM-CCA2 KEM is equivalent to IND-CCA2 KEM. That is, we show that NM is equivalent to IND under CCA2 attacks, although NM is stronger than IND in the definition (or under some attacks like CCA1). In addition, this paper defines the universally composable (UC) security of KEM and shows that NM-CCA2 KEM is equivalent to UC KEM.
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation
We show how to significantly speed-up the encryption portion
of some public-key cryptosystems by the simple expedient of allowing a
sender to maintain state that is re-used across different encryptions.
In particular we present stateful versions of the DHIES and
Kurosawa-Desmedt schemes that each use only one exponentiation to
encrypt, as opposed to two and three respectively in the original
schemes, yielding the fastest discrete-log based public-key encryption
schemes known in the random-oracle and standard models respectively.
The schemes are proven to meet an appropriate extension of the
standard definition of IND-CCA security that takes into account novel
types of attacks possible in the stateful setting.
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis
We present a novel approach for proving secrecy properties of security
protocols by mechanized flow analysis. In contrast to existing tools
for proving secrecy by abstract interpretation, our tool enjoys
cryptographic soundness in the strong sense of blackbox reactive
simulatability/UC which entails that secrecy properties proven by our
tool are automatically guaranteed to hold for secure cryptographic
implementations of the analyzed protocol, with respect to the more
fine-grained cryptographic secrecy definitions and adversary models.
Our tool is capable of reasoning about a comprehensive language for
expressing protocols, in particular handling symmetric encryption and
asymmetric encryption, and it produces proofs for an unbounded number
of sessions in the presence of an active adversary. We have
implemented the tool and applied it to a number of common protocols
from the literature.
Some (in)sufficient conditions for secure hybrid encryption.
The KEM/DEM hybrid encryption paradigm combines the efficiency and large message space of secret key encryption with the advantages of public key cryptography. Due to its simplicity and flexibility, the approach has ever since gained increased popularity and has been successfully adapted in encryption standards.
In hybrid public key encryption (PKE), first a key encapsulation mechanism (KEM) is used to fix a random session key that is then fed into a highly efficient data encapsulation mechanism (DEM) to encrypt the actual message. A composition theorem states that if both the KEM and the DEM have the highest level of security (i.e. security against chosen-ciphertext attacks), then so does the hybrid PKE scheme. It is not known if these strong security requirements on the KEM and DEM are also neccessary, nor if such general composition theorems exist for weaker levels of security. In this work we study neccessary and sufficient conditions on the security of the KEM and the DEM in order to guarantee a hybrid PKE scheme with a certain given level of security. More precisely, using nine different security notions for KEMs, ten for DEMs, and six for PKE schemes we completely characterize which combinations lead to a secure hybrid PKE scheme (by proving a composition theorem) and which do not (by providing counterexamples).
Furthermore, as an independent result, we revisit and extend prior work on the relation among security notions for KEMs and DEMs.
A Simple and Unified Method of Proving Unpredictability
Uncategorized
Uncategorized
Recently Bernstein has provided a simpler proof of
unpredictability of CBC construction which is
giving insight of the construction. Unpredictability of any
function intuitively means that the function behaves very closely
to a uniform random function. In this paper we make a unifying and
simple approach to prove unpredictability of many existing
constructions. We first revisit Bernstein's proof. Using this idea
we can show a simpler proof of unpredictability of a class of DAG
based construction, XCBC, TMAC, OMAC and PMAC. We also provide a simpler proof for stronger bound of CBC and a simpler proof of security of on-line Hash-CBC. We note that there is a flaw in the original security proof of Hash-CBC. This paper will help to understand security analysis of unpredictability of many constructions in a simpler way.
Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems
With the exception of the recently proposed class of cascaded dynamic convolutional cryptosystems, all the symmetric cryptosystems studied so far in the literature are static, in the sense that their structure do not change at all during encryption/decryption. In this paper, we propose and analyze a new class of dynamic symmetric cryptosystems, called automata-based dynamic convolutional
cryptosystems (ADCCs). The paper is organized as follows. First, we provide the reader with a brief introduction to convolutional codes.
Second, we give the definition of an ADCC, and then show how to use such a cryptosystem for encryption/decryption. Third, we provide a thorough security analysis of ADCCs, and then discuss their practical advantages. The conclusion of our cryptanalysis is that an ADCC is very hard to break completely, but quite easy to break partially. Fourth, an extension of ADCCs, called nonlinear cascaded ADCCs, is proposed and shown to be much more secure in practice than ADCCs. Finally, an efficient FPGA implementation of nonlinear cascaded ADCCs is presented.
Logical Concepts in Cryptography
This thesis is about a breadth-first exploration of logical concepts in cryptography and their linguistic abstraction and model-theoretic combination in a comprehensive logical system, called CPL (for Cryptographic Protocol Logic). We focus on two fundamental aspects of cryptography. Namely, the security of communication (as opposed to security of storage) and cryptographic protocols (as opposed to cryptographic operators). The primary logical concepts explored are the following: the modal concepts of belief, knowledge, norms, provability, space, and time. The distinguishing feature of CPL is that it unifies and refines a variety of existing approaches. This feature is the result of our wholistic conception of property-based (modal logics) and model-based (process algebra) formalisms.
Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks
We show in this paper how to apply well known methods from sparse linear algebra to the problem of computing the immunity of a Boolean function against algebraic or fast algebraic attacks.
For an -variable Boolean function, this approach gives an algorithm that works for both attacks in complexity and memory.
Here and corresponds to the degree of the algebraic system to be solved in the last step of the attacks.
For algebraic attacks, our algorithm needs significantly less memory than the algorithm in \cite{ACGKMR06} with roughly the same time complexity (and it is precisely the memory usage which is the real bottleneck of the last algorithm).
For fast algebraic attacks, it does not only improve the memory complexity, it is also the algorithm with the best time complexity known so far for most values of the degree constraints.
A Note On Game-Hopping Proofs
Game hopping is a method for proving the security of a cryptographic scheme. In a game hopping proof, we observe that an attacker running in a particular attack environment has an unknown probability of success. We then slowly alter the attack environment until the attackers success probability can be computed. We also bound the increase in the attacker's success probability caused by the changes to the attack environment. Thus, we can deduce a bound for the attacker's success probability in the original environment. Currently, there are three known ``types'' of game hop: transitions based on indistinguishability, transitions based on failure events, and bridging steps. This note introduces a fourth type of game hop.
Simplified Submission of Inputs to Protocols
Uncategorized
Uncategorized
Consider an electronic election scheme implemented using a mix-net; a large number of voters submit their votes and then a smaller number of servers compute the result. The mix-net accepts an encrypted vote from each voter and outputs the set of votes in sorted order without revealing the permutation used. To ensure a fair election, the votes of corrupt voters should be independent of the votes of honest voters, i.e., some type of non-malleability or plaintext awareness is needed. However, for efficiency reasons the servers typically expect inputs from some homomorphic cryptosystem, which is inherently malleable.
In this paper we consider the problem of how non-malleability can be guaranteed in the submission phase and still allow the servers to start their computation with ciphertexts of the appropriate homomorphic cryptosystem. This can clearly be achieved using general techniques, but we would like a solution which is: (1) provably secure under standard assumptions, (2) non-interactive for the submitting parties, (3) very efficient for all parties in terms of computation and communication.
We give the first solution to this problem which has all these properties. Our solution is surprisingly simple and can be based on various Cramer-Shoup cryptosystems. To capture its security properties we introduce a variation of CCA2-security.
Cryptanalysis of a Cognitive Authentication Scheme
We present attacks against two cognitive authentication schemes [W06] recently proposed at the 2006 IEEE Symposium on Security and Privacy. These authentication schemes are designed to be secure against eavesdropping attacks while relying only on human cognitive skills. They achieve authentication via challenge response protocols based on a shared secret set of pictures. Our attacks use a SAT solver to recover a user's key in a few seconds, after observing only a small number of successful logins. These attacks demonstrate that the authentication schemes of [W06] are not secure against an eavesdropping adversary.
Efficient Divisor Class Halving on Genus Two Curves
Uncategorized
Uncategorized
Efficient halving of divisor classes offers the possibility to improve scalar multiplication on hyperelliptic curves and is also a step towards giving hyperelliptic curve cryptosystems all the features that elliptic curve systems have. We present a halving algorithm for divisor classes of genus 2 curves over finite fields of characteristic 2. We derive explicit halving formulae from a doubling algorithm by reversing this process. A family of binary curves, that are not known to be weak, is covered by the proposed algorithm. Compared to previous known halving algorithms, we achieve a noticeable speed-up for this family of curves.
Constant-Round Concurrent NMWI and its relation to NMZK
Uncategorized
Uncategorized
One of the central questions in Cryptography is to design round-efficient protocols that are secure under man-in-the-middle attacks.
In this paper we introduce and study the notion of non-malleable witness indistinguishability (NMWI) and examine its relation with the classic notion of non-malleable zero knowledge (NMZK). Indeed, despite tremendous applicability of witness indistinguishability, while a lot of attention has been given to NMZK, very little attention has been given to witness indistinguishability in case of man-in-the-middle attacks.
We initiate this study, with several (perhaps somewhat surprising) results:
1) We give the first definition of NMWI proof systems. Just like every NMZK proof is a zero-knowledge proof which aims to attain a very strong proof independence property, we require (and formalize) the notion that every NMWI proof is a witness indistinguishable proof system which enjoys a very strong witness independence property against any man-in-the-middle attack.
2) We show the existence of a constant-round NMWI argument system for NP in the standard model (i.e. without any trusted or any other setup assumptions).
3) It is known that every zero-knowledge (ZK) argument is also a witness indistinguishable (WI) argument, but not vice-versa, i.e. ZK is not contained in WI. Rather surprisingly, we show that NMWI and NMZK argument systems are incomparable. That is, we show that there exists a NMZK argument system that is not a NMWI argument system and we also show that there is a NMWI argument system that is not a NMZK argument system.
4) We show that our constant-round NMWI argument system is also secure under a concurrent man-in-the-middle attack, i.e., it is a concurrent constant-round NMWI argument system. This is somewhat surprising since the question of a constant-round concurrent NMZK argument system is still open.
5) We then turn our attention to Bare Public-Key (BPK) model. We show how to expand upon our concurrent NMWI result in the plain model to obtain a constant-round concurrent NMZK argument system for any NP language in the BPK model.
Malicious KGC Attacks in Certificateless Cryptography
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret key. If the KGC is malicious, it can always impersonate the user. Certificateless cryptography, introduced by Al-Riyami and Paterson in 2003, is intended to solve this problem. However, in all the previously proposed certificateless schemes, it is always assumed that the malicious KGC starts launching attacks (so-called Type II attacks) only after it has generated a master public/secret key pair honestly. In this paper, we propose new security models that remove this assumption for both certificateless signature and encryption schemes. Under the new models, we show that a class of certificateless encryption and signature schemes proposed previously are insecure. These schemes still suffer from the key escrow problem. On the other side, we also give new proofs to show that there are two generic constructions, one for certificateless signature and the other for certificateless encryption, proposed recently that are secure under our new models.
Applications of SAT Solvers to Cryptanalysis of Hash Functions
Several standard cryptographic hash functions were
broken in 2005. Some essential building blocks of these attacks
lend themselves well to automation by encoding them as CNF
formulas, which are within reach of modern SAT solvers. In this
paper we demonstrate effectiveness of this approach. In
particular, we are able to generate full collisions for MD4 and
MD5 given only the differential path and applying a (minimally
modified) off-the-shelf SAT solver. To the best of our knowledge,
this is the first example of a SAT-solver-aided cryptanalysis of a
non-trivial cryptographic primitive. We expect SAT solvers to find
new applications as a validation and testing tool of practicing
cryptanalysts.
Hard Instances of the Constrained Discrete Logarithm Problem
The discrete logarithm problem (DLP) generalizes
to the constrained DLP, where the secret exponent
belongs to a set known to the attacker. The complexity of
generic algorithms for solving the constrained DLP depends
on the choice of the set. Motivated by cryptographic
applications, we study sets with succinct representation
for which the constrained DLP is hard. We draw on earlier
results due to Erdös et~al. and Schnorr, develop
geometric tools such as generalized Menelaus' theorem for
proving lower bounds on the complexity of the constrained
DLP, and construct sets with succinct representation with
provable non-trivial lower bounds.
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper focuses on key agreement protocols in the asymmetric authentication model, wherein parties hold a public/private key pair. In particular, we consider a type of known key attack called key compromise impersonation that may occur once the adversary has obtained the private key of an honest party. This attack represents a subtle threat that is often underestimated and difficult to counter. Several protocols are shown vulnerable to this attack despite their authors claiming the opposite. We also consider in more detail how three formal (complexity-theoretic based) models of distributed computing found in the literature cover such attacks.
Accelerating Cryptanalysis with the Method of Four Russians
Solving a dense linear system of boolean equations is the final step of several cryptanalytic
attacks. Examples include stream cipher cryptanalysis via XL and related algorithms, integer
factorization, and attacks on the HFE public-key cryptosystem. While both Gaussian Elimination
and Strassen’s Algorithm have been proposed as methods, this paper specifies an algorithm
that is much faster than both in practice. Performance is formally modeled, and experimental
running times are provided, including for the optimal setting of the algorithm’s parameter.
The consequences for published attacks on systems are also provided. The algorithm is named
Method of Four Russians for Inversion (M4RI), in honor of the matrix multiplication algorithm
from which it emerged, the Method of Four Russians Multiplication (M4RM).
Linear Cryptanalysis of CTC
CTC is a toy cipher designed by Courtois in order to prove the strength of
algebraic attacks. In this paper we study the differential and the linear
behavior of the 85 S-boxes version, which is attacked using algebraic
techniques faster than exhaustive key search. We show that an -round
variant of the cipher can be attacked by a linear attack using only
known plaintexts, with a negligible time complexity.
We conclude that CTC is insecure, even for quite a large number of rounds.
We note that our observations can be probably used to devise other attacks
that exploit the relatively slow diffusion of CTC.
Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240
The existence of -variable Boolean functions having nonlinearity
strictly greater than has been shown very recently (May 2006)
by Kavut, Maitra and Yücel. The functions with nonlinearity 241 have been identified by a heuristic search in the class of Rotation Symmetric Boolean Functions (RSBFs). In this paper we efficiently perform the exhaustive search to enumerate the 9-variable RSBFs having nonlinearity and found that there are such functions with nonlinearity 241 only and there is no RSBF having nonlinearity . Our search enumerates many 9-variable RSBFs having nonlinearity 241. We further show that there are only two functions which are different up to the affine equivalence. Towards the end we explain the coding theoretic significance of these functions.
Disguising tori and elliptic curves
Frey proposed the idea of `disguising' an elliptic curve. This is a method to obtain a `black box' representation of a group. We adapt this notion to finite fields and tori and study the question of whether such systems are secure.
Our main result is an algebraic attack which shows that it is not secure to disguise the torus . We also show that some methods for disguising an elliptic curve are not secure. Finally, we present a method to disguise an elliptic curve which seems to resist our algebraic attack.
Last updated: 2007-07-11
Factoring Class Polynomials over the Genus Field
Uncategorized
Uncategorized
Aimed at computer scientists, this "how to" describes a method (with detailed algorithms) that allows to compute the factors of a class polynomial over the genus field. Though we only consider polynomials
having real factors over the genus field, it is not difficult to adapt the method so that it works when these factors are complex.
ON THE POSTQUANTUM CIPHER SCHEME
We discuss the general theoretical ideas of the possibility using
cryptosystems based on the partial differential equations (PDE)
and the role of inverse scattering problem for the cryptanalysis
as the possible way to the postquantum cipher scheme. An
application of the nonlinear Schrödinger equation and optical
fibre technology in cryptology is presented.
Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems
Key issuing protocols deal with overcoming the two inherent
problems: key escrow and secure channel requirement of the
identity based cryptosystems. An efficient key issuing protocol
enables the identity based cryptosystems to be more acceptable and
applicable in the real world. We present a secure and efficient
threshold key issuing protocol. In our protocol, neither KGC nor
KPA can impersonate the users to obtain the private keys and thus
it achieves the trust level III \cite{girault}. The protocol is
secure against replay, man-in-the-middle and insider attacks.
Length-based cryptanalysis: The case of Thompson's Group
The length-based approach is a heuristic for solving randomly generated equations in groups which possess a reasonably behaved length function. We describe several improvements of the previously suggested length-based algorithms, that make them applicable to Thompson's group with significant success rates. In particular, this shows that the Shpilrain-Ushakov public key cryptosystem based on Thompson's group is insecure, and suggests that no practical public key cryptosystem based on this group can be secure.
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairings on elliptic curves have been used as cryptographic
primitives for the development of new applications such as
identity based schemes. For the practical applications, it is
crucial to provide efficient and secure implementations of the
pairings. There have been several works on efficient
implementations of the pairings. However, the research for secure
implementations of the pairings has not been thoroughly
investigated. In this paper, we investigate vulnerability of the
pairing used in some pairing based protocols against side channel
attacks. We propose an efficient algorithm secure against such
side channel attacks of the eta pairing using randomized
projective coordinate systems for the pairing computation.
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers
In this paper, we prove the probability advantages of two linear expressions which are summarized from the ABC stream cipher submitted to ECRPYT Estream Project. Two linear expressions with probability advantages reflect the linear correlations among Modular Addition equations. Corresponding to each linear expression and its advantage, a large amount of weak keys are derived under which all the ABC main keys can be retrieved successively. The first linear
expression is a generic bit linear correlation between two Modular Addition equations. The second is a linear correlation of bit carries derived from three Modular Addition equations and the linear equation of LFSR in ABC.
It is remarked that the second is found by Wu and Preneel, and has been used to find weak keys. In the cryptanalysis of ABC, Wu and Preneel only utilized its estimated probability advantage which is concluded by experimental data, and they did not give its strict proof.
Modular Addition and XOR operations are widely used in designing symmetric ciphers. We believe that these types of linear expressions with probability advantages not only can be used to analyze some other symmetric ciphers, but also are important criteria in designing secure symmetric ciphers.
A Stronger Definition for Anonymous Electronic Cash
We investigate definitions of security for previously proposed schemes
for electronic cash and strengthen them so that the bank does need to
be trusted to the same extent. We give an experiment-based definition
for our stronger notion and show that they imply security in the
framework for Universal Composability. Finally we propose a scheme
secure under our definition in the common reference string (CRS) model
under the assumption that trapdoor permutations exist. As a tool we
define and prove the existence of simulation-sound non-interactive
zero-knowledge proofs (NIZK-PK) in the CRS-model under the assumption
that a family of trapdoor permutations exists.
Computing Zeta Functions of Nondegenerate Curves
In this paper we present a -adic algorithm to compute the zeta function of a nondegenerate curve over a finite field using Monsky-Washnitzer cohomology. The paper vastly generalizes previous work since all known cases, e.g. hyperelliptic, superelliptic and curves, can be transformed to fit the nondegenerate case. For curves with a fixed Newton polytope, the property of being nondegenerate is generic, so that the algorithm works for almost all curves with given Newton polytope. For a genus curve over , the expected running time is , whereas the space complexity amounts to , assuming is fixed.
Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption
Uncategorized
Uncategorized
In this paper we resolve an open problem regarding resettable zero
knowledge in the bare public-key (BPK for short) model: Does there
exist constant round resettable zero knowledge argument with
concurrent soundness for in BPK model without
assuming \emph{sub-exponential hardness}? We give a positive answer
to this question by presenting such a protocol for any language in
in the bare public-key model assuming only
collision-resistant hash functions against \emph{polynomial-time}
adversaries.
Last updated: 2006-12-24
Searchable Index Schemes for Groups : Security vs. Efficiency
Uncategorized
Uncategorized
A secure index search protocol makes it possible to search for the
index of encrypted documents using specified keywords without
decrypting them. %An untrusted database manager learns nothing more
%than the search result about the documents without revealing the
%keyword.
These days, personally portable devices of huge storage such as a
USB are easily used and hence private and sensitive documents of a
user may be securely kept in such personal devices. However,
secret documents shared by groups are usually stored in database.
In real organizations such as government offices or enterprises
with many departments, a group search occurs more often.
In this paper, we propose two search schemes for a hierarchical
group under an untrusted server ; A security-centered search
scheme(SSIS) and an optimized efficient search scheme(ESIS) for
commercial business use. We define `correlation resistance' as
privacy requirement over encrypted search system and prove that
SSIS can meet the notion. Also, we experimented two our proposed
schemes. In the first try, the performance of both schemes was not
good to use for practical business use. It was not until examining
the reason of this that we learned the efficient DB schema must be
applied into the search system for good performance. However, it
was hard to apply efficient DB schema into SSIS because of its
data structure. Hence, we applied efficient DB schema into only
ESIS. The experiments show that ESIS is approximately 200 times
faster than SSIS, which implies that other existing schemes are
also not practical because the data structure of them is similar
to SSIS. ESIS achieves real practicabilty by loosening its
security, but with at least extend. Therefore, in the near future,
it's required to develop keyword search system over encrypted data
which is secure and applicable to efficient DB schema. In
addition, we learned a lesson that works about the efficiency must
consider mutual interactive operation with application layer as
well as computational efficiency of a proposing scheme.
Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure?
Uncategorized
Uncategorized
We present an investigation into the security of three practical pairing algorithms; the Tate, Eta and Ate pairing, in terms of side
channel vulnerability. These three algorithms have recently shown to be efficiently computable on the resource constrained smart card, yet no in depth side channel analysis has yet appeared in the literature. Since the secret parameter input to the pairing can potentially be entered in either of the two possible positions, there exist two avenues of attack, i.e. e(P,Q) or e(Q,P) where P is public and Q is private. We analyse the core operations fundamental to pairings and not only highlight how each implementation may potentially succumb to a side channel attack, but also show how one path is more susceptible than the other in Tate and Ate. For those who wish to deploy pairing based systems we make a simple suggestion to improve resistance to side channel attacks.
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered as the best candidates to achieve strong authentication. However, using normal digital signature schemes is too costly to MANET due to the computation
overheads. Considering the feasibility of incorporating digital signatures in MANET, we incorporate the notion of online/offline signatures, where the computational overhead is shifted to the offline phase. However, due to the diversity of different routing protocols, a universal scheme that suits all MANET routing systems does not exist in the literature. Notably, an authentication scheme for the AODV routing is believed to be not suitable to the DSR routing. In this paper, we first introduce an efficient ID-based online/offline scheme for authentication in AODV and then provide
a formal transformation to convert the scheme to an ID-based online/offline multisignature scheme. Our scheme is unique, in the sense that a single ID-based online/offline signature scheme can be applied to both AODV and DSR routing protocols. We provide the generic construction as well as the concrete schemes to show an instantiation of the generic transformation. We also provide security proofs for our schemes based on the random oracle model. Finally, we provide an application of our schemes in the dynamic source routing protocol.
Application of ECM to a Class of RSA keys
Uncategorized
Uncategorized
Let be an RSA modulus where , are large
primes of the same bitsize and
. We study
the class of the public exponents for which there exist
integers , , satisfying
with and all
prime
factors
of
are less than . We
show that these
exponents are of improper use in RSA cryptosystems and that their
number
is at least
where is a small positive constant. Our method
combines
continued
fractions, Coppersmith's lattice-based technique for finding small
roots
of bivariate polynomials and H. W. Lenstra's elliptic curve
method
(ECM) for factoring.
RFID Security: Tradeoffs between Security and Efficiency
Uncategorized
Uncategorized
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and only such tags. For the case where tags hold independent keys, we prove a conjecture by Juels and Weis, namely in a strongly private and sound RFID system using only symmetric cryptography, a reader must access virtually all keys in the system when reading a tag.
It was already known from work by Molnar et al. that when keys are dependent,
the reader only needs to access a logarithmic number of keys, but at a cost in terms of privacy: for that system, strong privacy is lost if an adversary corrupts only a single tag. We propose protocols offering a new range of tradeoffs between security and efficiency. For instance the number of keys accessed by a reader to read a tag can be significantly smaller than the number of tags while retaining security, as long as we assume suitable limitations on the adversary.
A simple generalization of El-Gamal cryptosystem to non-abelian groups
In this paper we propose the group of unitriangular
matrices over a finite field as a non-abelian group and composition of inner, diagonal and central automorphisms as a group of
automorphisms for the MOR cryptosystem.
Improvement to AKS algorithm
We propose to verify the AKS algorithm identities not for sequential integers, but for integers which are sequentially squared. In that case a number of elements, for which the identities are valid, doubles.
A handy multi-coupon system
A coupon is an electronic data that represents the right to access a service provided by a service provider (e.g. gift certificates or movie tickets). Recently, a privacy-protecting multi-coupon system that allows a user to withdraw a predefined number of single coupons from the service provider has been proposed by Chen et al. at Financial Crypto 2005. In this system, every coupon has the same value which is predetermined by the system. The main drawbacks of Chen et al. proposal are that the redemption protocol of their system is inefficient, and that no formal security model is proposed. In this paper, we consequently propose a formal security model for coupon systems and design a practical multi-coupon system with new features: the quantity of single coupons in a multi-coupon is not defined by the system and the value of each coupon is chosen in a predefined set of values.
Another Look at Generic Groups
Uncategorized
Uncategorized
Starting with Shoup's seminal paper [24], the generic
group model has been an important tool in reductionist security
arguments. After an informal explanation of this model and
Shoup's theorem, we discuss the danger of flaws in proofs. We
next describe an ontological difference between the generic
group assumption and the random oracle model for hash
functions. We then examine some criticisms that have
been leveled at the generic group model and raise some
questions of our own.
Another Look at "Provable Security". II
Uncategorized
Uncategorized
We discuss the question of how to interpret reduction arguments
in cryptography. We give some examples to show the subtlety
and difficulty of this question.
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization
We prove the equivalence of two definitions of non-malleable
encryption, one based on the simulation approach of Dolev, Dwork and Naor and the other based on the comparison approach of Bellare,
Desai, Pointcheval and Rogaway.
Our definitions are slightly stronger than the original ones.
The equivalence relies on a new
characterization of non-malleable encryption in terms of the standard
notion of indistinguishability of Goldwasser and Micali. We show that
non-malleability is equivalent to indistinguishability under a
``parallel chosen ciphertext attack,'' this being a new kind of chosen
ciphertext attack we introduce, in which the adversary's decryption
queries are not allowed to depend on answers to previous queries, but
must be made all at once. This characterization simplifies both the
notion of non-malleable encryption and its usage, and enables one to
see more easily how it compares with other notions of encryption. The
results here apply to non-malleable encryption under any form of
attack, whether chosen-plaintext, chosen-ciphertext, or adaptive
chosen-ciphertext.
An Elliptic Curve Processor Suitable For RFID-Tags
RFID-Tags are small devices used for identification purposes in many applications nowadays. It is expected that they will enable many new applications and link the physical and the virtual world in the near future. Since the processing power of these devices is low, they are often in the line of fire when their security and privacy is concerned. It is widely believed that devices with such constrained resources can not carry out sufficient cryptographic operations to guarantee security in new applications. In this paper, we show that identification of RFID-Tags can reach high security levels. In particular, we show how secure identification protocols based on the DL problem on elliptic curves are implemented on a constrained device such as an RFID-Tag requiring between 8500 and 14000 gates, depending on the implementation characteristics. We investigate the case of elliptic curves over with p prime and over composite fields . The implementations in this paper make RFID-Tags suitable for anti-counterfeiting purposes even in the off-line setting.
The Fairness of Perfect Concurrent Signatures
At Eurocrypt 2004, Chen, Kudla and Paterson introduced the concept of {\it concurrent signatures}, which allows two parties to produce two ambiguous signatures until an extra piece of information (called {\it keystone}) is released by the initial signer. Once the keystone is released publicly, both signatures are binding to their true signers {\it concurrently}. At ICICS 2004, Susilo, Mu and Zhang further proposed {\it perfect concurrent signatures} to strengthen the ambiguity of concurrent signatures. That is, even the both signers are known having issued one of the two ambiguous signatures, any third party is still unable to deduce who signed which signature, different from Chen et al.'s scheme. However, this paper points out that Susilo et al.'s two perfect concurrent signatures are actually {\it not} concurrent signatures. Specifically, we identify an attack that enables the initial signer to release a carefully prepared keystone that binds the matching signer's signature, but not the initial signer's. Therefore, both of their two schemes are {\it unfair} for the matching signer. Moreover, we present a simple but effective way to avoid this attack such that the improved schemes are truly perfect concurrent signatures.
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Uncategorized
Uncategorized
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class can compute the keys of all classes lower down in the hierarchy, according to temporal constraints.
In this paper we design and analyze time-bound hierarchical key assignment schemes which are provably-secure and efficient. We consider both the unconditionally secure and the computationally secure settings and distinguish between two different goals: security with respect to key indistinguishability and against key recovery. We first present definitions of security with respect to both goals in the unconditionally secure setting and we show tight lower bounds on the size of the private information distributed to each class. Then, we consider the computational setting and we further distinguish security against static and adaptive adversarial behaviors. We explore the relations between all possible combinations of security goals and adversarial behaviors and, in particular, we prove that security against adaptive adversaries is (polynomially) equivalent to security against static adversaries. Afterwards, we prove that a recently proposed scheme is insecure against key recovery. Finally, we propose two different constructions for time-bound key assignment schemes. The first one is based on symmetric encryption schemes, whereas, the second one makes use of bilinear maps. Both constructions support updates to the access hierarchy with local changes to the public information and without requiring any private information to be re-distributed. These appear to be the first constructions for time-bound hierarchical key assignment schemes which are simultaneously practical and provably-secure.
Generalizations of the Karatsuba Algorithm for Efficient Implementations
In this work we generalize the classical Karatsuba Algorithm (KA) for
polynomial multiplication to (i) polynomials of arbitrary degree and (ii) recursive use. We determine exact complexity expressions for the KA and focus on how to use it with the least number of operations. We develop a rule for the optimum order of steps if the KA is used recursively. We show how the usage of dummy coefficients may improve performance. Finally we provide detailed information on how to use the KA with least cost, and also provide tables that describe the best possible usage of the KA for polynomials up to a degree of 127. Our results are especially useful for efficient implementations of cryptographic and coding schemes over fixed-size fields like .
What Hashes Make RSA-OAEP Secure?
Firstly, we demonstrate a pathological hash function choice that makes
RSA-OAEP insecure. This shows that at least some security property is
necessary for the hash functions used in RSA-OAEP. Nevertheless, we
conjecture that only some very minimal security properties of the hash
functions are actually necessary for the security of RSA-OAEP.
Secondly, we consider certain types of reductions that could be used
to prove the OW-CPA (i.e., the bare minimum) security of RSA-OAEP. We
apply metareductions that show if such reductions existed, then
RSA-OAEP would be OW-CCA2 insecure, or even worse, that the RSA
problem would solvable. Therefore, it seems unlikely that such
reductions could exist. Indeed, no such reductions proving the
OW-CCA2 security of RSA-OAEP exist.
Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants
In this paper we view interleaved Gabidulin codes and describe how to correct errors up to a rank equal to the amount of redundancy of the code with high probability. We give a detailed proof for our estimation of the probability of correct decoding.
In a second part, we view the application to variants of the GPT cryptosystem. For GGPT this leads to an efficient attack on the remaining secure instances, whereas it allows to derive at least partial information of the plaintext in the case of RRC-GPT.
Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem
Uncategorized
Uncategorized
Standards bodies have been addressing the key-wrap problem, a
cryptographic goal that has never received a provable-security
treatment. In response, we provide one, giving definitions,
constructions, and proofs. We suggest that key-wrap’s goal is
security in the sense of deterministic authenticated-encryption
(DAE), a notion that we put forward. We also provide an alternative
notion, a pseudorandom injection (PRI), which we prove to be
equivalent. We provide a DAE construction, SIV, analyze its concrete
security, develop a blockcipher-based instantiation of it, and
suggest that the method makes a desirable alternative to the
schemes of the X9.102 draft standard. The construction incorporates
a method to turn a PRF that operates on a string into an equally
efficient PRF that operates on a vector of strings, a problem of
independent interest. Finally, we consider IV-based authenticated-
encryption (AE) schemes that are maximally forgiving of repeated
IVs, a goal we formalize as misuse-resistant AE.We show that a DAE
scheme with a vector-valued header, such as SIV, directly realizes
this goal.
Multi-Dimensional Montgomery Ladders for Elliptic Curves
Montgomery's ladder algorithm for elliptic curve scalar multiplication uses only the x-coordinates of points. Avoiding calculation of the y-coordinates saves time for certain curves. Montgomery introduced his method to accelerate Lenstra's elliptic curve method for integer factoring. Bernstein extended Montgomery's ladder algorithm by computing integer combinations of two points, thus accelerating signature verification over certain curves. This paper modifies and extends Bernstein's algorithm to integer combinations of two or more points.
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
We present a computational analysis of basic Kerberos with and without its public-key extension PKINIT in which we consider authentication and key secrecy properties. Our proofs rely on the Dolev--Yao-style model of Backes, Pfitzmann, and Waidner, which allows for mapping results obtained symbolically within this model to cryptographically sound proofs if certain assumptions are met. This work was the first verification at the computational level of such a complex fragment of an industrial protocol. By considering a recently fixed version of PKINIT, we extend symbolic correctness results we previously attained in the Dolev--Yao model to cryptographically sound results in the computational model.
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
The standard symbolic, deducibility-based notions of secrecy are in
general insufficient from a cryptographic point of view, especially in
presence of hash functions. In this paper we devise and motivate a
more appropriate secrecy criterion which exactly captures a standard
cryptographic notion of secrecy for protocols involving public-key
enryption and hash functions: protocols that satisfy it are
computationally secure while any violation of our criterion directly
leads to an attack. Furthermore, we prove that our criterion is
decidable via an NP decision procedure. Our results hold for standard
security notions for encryption and hash functions modeled as random
oracles.
Statistical Analysis of the MARS Block Cipher
Uncategorized
Uncategorized
The work contains a statistical investigation of the MARS block cipher --- one of the AES finalists.
It is shown that 8 MARS round ciphertext can be recognized from a uniform
distribution with the help of the ``Book Stack"\, test providing that blocks of plaintexts
and bytes of memory are avaliable. The previous published attacks on this
cipher were only theoretical with unrealistic resource requirements.
Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains
In this paper, we propose a new fast and secure point multiplication algorithm. It is based on a particular kind of addition chains involving only additions (no doubling), providing a natural protection against side channel attacks. Moreover, we propose new addition formulae that take into account the specific structure of those chains making point multiplication very efficient.
Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion
Uncategorized
Uncategorized
Recently, a novel image scrambling (i.e., encryption) scheme without bandwidth expansion was proposed based on two-dimensional (2-D)discrete prolate spheroidal sequences (DPSS). This paper gives a comprehensive cryptanalysis of the image scrambling scheme, and draw a conclusion that it is not sufficiently secure against various cryptographical attacks, including ciphertext-only attack, known/chosen-plaintext attack and chosen-ciphertext attack. The cryptanalytic results suggest that the image scrambling scheme can only be used to realize perceptual encryption, instead of provide content protection for digital images.
Password-Authenticated Group Key Establishment from Smooth Projective Hash Functions
Uncategorized
Uncategorized
Password-authenticated key exchange (PAKE) protocols allow users sharing a password to agree upon a high entropy secret. In this paper, a provably secure password-authenticated pro-
tocol for group key establishment in the common reference string (CRS) model is presented. Our protocol is quite efficient, as regardless of the number of involved participants it can be imple-
mented with only three communication rounds. We use a (by now classical) trick of Burmester and Desmedt for deriving group key exchange protocols using a two-party construction as main building block. In our case, the two party PAKE used as a base is a one-round protocol by Katz and Vaikuntanatan, which in turn builds upon a special kind of smooth projective hash functions (KV-SPHFs). As evidenced by Benhamouda et al., KV-SPHFs can be instantiated on Cramer-Shoup ciphertexts, thus yielding very efficient (and pairing free) constructions.
Luby-Rackoff Ciphers from Weak Round Functions?
The Feistel-network is a popular structure underlying many block-ciphers where the cipher is constructed from many simpler rounds, each defined by some function which is derived from the secret key.
Luby and Rackoff showed that the three-round Feistel-network -- each round instantiated with a pseudorandom function secure against adaptive chosen plaintext attacks (CPA) -- is a CPA secure pseudorandom permutation, thus giving some confidence in the soundness of using a Feistel-network to design block-ciphers.
But the round functions used in actual block-ciphers are -- for efficiency reasons -- far from being pseudorandom. We investigate the security of the Feistel-network against CPA distinguishers when the only security guarantee we have for the round functions is that they are secure against non-adaptive chosen plaintext attacks (NCPA). We show that in the information-theoretic setting, four rounds with NCPA secure round functions are sufficient (and necessary) to get a CPA secure permutation. Unfortunately, this result does not translate into the more interesting pseudorandom setting. In fact, under the so-called Inverse Decisional Diffie-Hellman assumption the Feistel-network with four rounds, each instantiated with a NCPA secure pseudorandom function, is in general not a CPA secure pseudorandom permutation.
We also consider other relaxations of the Luby-Rackoff construction and prove their (in)security against different classes of attacks.
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes
Common occurrence of server overload and the threat of denial-of-service (DoS) attacks makes highly desirable to improve the performance and DoS resistance of SSL handshakes. In this paper, we tackle these two related problems by proposing reverse SSL, an extension in which the server is relieved from the heavy public key decryption operation and authenticated by means of a digital signature instead. On the server side, reverse SSL employs online/offline signatures to minimize the online computation required to generate the signature and on the client side, RSA key generation computation can be used as a client puzzle when clients do not have a public key certificate. The preliminary performance results show that reverse SSL is a promising technique for improving the performance and DoS resistance of SSL servers.
A Survey of Certificateless Encryption Schemes and Security Models
This paper surveys the literature on certificateless encryption schemes. In particular, we examine the (large number of) security models that have been proposed to prove the security of certificateless encryption schemes and propose a new nomenclature for these models. This allows us to "rank" the notions of security for a certificateless encryption scheme against an outside attacker and a passive key generation centre, and we suggest which of these notions should be regarded as the "correct" model for a secure certificateless
encryption scheme.
We also examine the security models that aim to provide security against an actively malicious key generation centre and against an outside attacker who attempts to deceive a legitimate sender into using an incorrect public key (with the intention to deny the the legitimate receiver that ability to decrypt the ciphertext). We note that the existing malicious key generation centre model fails to capture realistic attacks that a malicious key generation centre might make and propose a new model.
Lastly, we survey the existing certificateless encryption schemes and compare their security proofs. We show that few schemes provide the correct notion of security without appealing to the random oracle model. The few schemes that do provide sufficient security guarantees are comparatively inefficient. Hence, we conclude that more research is needed before certificateless encryption schemes can be thought to
be a practical technology.
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search over it. This problem has been the focus of active research and several security definitions and constructions have been proposed. In this paper we begin by reviewing existing notions of security and propose new and stronger security definitions. We then present two constructions that we show secure under our new definitions. Interestingly, in addition to satisfying stronger security guarantees, our constructions are more efficient than all previous constructions.
Further, prior work on SSE only considered the setting where only the owner of the data is capable of submitting search queries. We consider the natural extension where an arbitrary group of parties other than the owner can submit search queries. We formally define SSE in this multi-user setting, and present an efficient construction.
Minimal Weight and Colexicographically Minimal Integer Representations
Redundant number systems (e.g. signed binary representations) have
been utilized to efficiently implement algebraic operations required
by public-key cryptosystems, especially those based on elliptic
curves. Several families of integer representations have been
proposed that have a minimal number of nonzero digits (so-called
\emph{minimal weight} representations). We observe that many of the
constructions for minimal weight representations actually work by
building representations which are minimal in another sense. For a
given set of digits, these constructions build
\emph{colexicographically minimal} representations; that is, they
build representations where each nonzero digit is positioned as far
left (toward the most significant digit) as possible. We utilize
this strategy in a new algorithm which constructs a very general
family of minimal weight dimension- \emph{joint} representations
for any . The digits we use are from the set where and are
integers. By selecting particular values of and , it is
easily seen that our algorithm generalizes many of the minimal
weight representations previously described in the literature. From
our algorithm, we obtain a syntactical description of a particular
family of dimension- joint representations; any representation
which obeys this syntax must be both colexicographically minimal and
have minimal weight; moreover, every vector of integers has exactly
one representation that satisfies this syntax. We utilize this
syntax in a combinatorial analysis of the weight of the
representations.
Private Information Retrieval Using Trusted Hardware
Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past
years. Though information theoretically secure, most of them are impractical to deploy due to the
prohibitively high communication and computation complexity. The recent trend in outsourcing
databases fuels the research on practical PIR schemes. In this paper, we propose a new PIR system
by making use of trusted hardware. Our system is proven to be information theoretically secure.
Furthermore, we derive the computation complexity lower bound for hardware-based PIR schemes and
show that our construction meets the lower bounds for both the communication and computation costs,
respectively.
The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure
At CRYPTO 2004, Kurosawa and Desmedt presented a hybrid public-key encryption scheme that is chosen-ciphertext secure in the standard model. Until now it was unknown if the key-encapsulation part of the Kurosawa-Desmedt scheme by itself is still chosen-ciphertext secure or not. In this short note we answer this question to the negative, namely we present a simple chosen-ciphertext attack on the Kurosawa-Desmedt key encapsulation mechanism.
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Uncategorized
Uncategorized
Pseudorandom Generators (PRGs) based on the RSA inversion
(one-wayness) problem have been extensively studied in the
literature over the last 25 years. These generators have the
attractive feature of provable pseudorandomness security assuming
the hardness of the RSA inversion problem. However, despite
extensive study, the most efficient provably secure RSA-based
generators output asymptotically only at most bits per
multiply modulo an RSA modulus of bitlength , and hence are too
slow to be used in many practical applications.
To bring theory closer to practice, we present a simple
modification to the proof of security by Fischlin and Schnorr of
an RSA-based PRG, which shows that one can obtain an RSA-based PRG
which outputs bits per multiply and has provable
pseudorandomness security assuming the hardness of a well-studied
variant of the RSA inversion problem, where a constant fraction of
the plaintext bits are given. Our result gives a positive answer to an open question posed by Gennaro (J. of Cryptology, 2005) regarding finding a PRG beating the rate bits per multiply at the cost of a reasonable assumption on RSA inversion.
Last updated: 2007-11-02
ID-Based Ring Signature Scheme secure in the Standard Model
Uncategorized
Uncategorized
The only known construction of ID-based ring signature schemes which
maybe secure in the standard model is to attach certificates to
non-ID-based ring signatures. This method leads to schemes that are
somewhat inefficient and it is an open problem to find more
efficient and direct constructions. In this paper, we propose two
such constructions. Our first scheme, with signature size linear in
the cardinality of the ring, is secure in the standard model under
the computational Diffie-Hellman assumption. The second scheme,
achieving constant signature size, is secure in a weaker attack
model (the selective ID and weak chosen message model), under the
Diffie-Hellman Inversion assumption.
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems
Uncategorized
Uncategorized
Elliptic (ECC) and hyperelliptic curve cryptosystems (HECC) have emerged as cryptosystems of choice for small handheld and mobile devices. A lot of research has been devoted to the secure and efficient implementation on these devices. As such devices come with very low amount of resources, efficient memory management is an important issue in all such implementations. HECC arithmetic is now generally performed using so called explicit formulae. In literature, there is no result which focuses on the exact memory requirement for implementation these formulae. This is the first work to report such minimal memory requirement. Also, in the work we have provided a general methodology for realization of explicit formulae with minimal number of registers. Applying such methodology this work settles the issue for some important explicit formula available in the literature. This is an attempt to experimentally solve a particular instance based on HECC explicit formulae of the so called ``Register Sufficiency Problem", which is an NP-complete problem.
Generalization of the Selective-ID Security Model for HIBE Protocols
We generalize the selective-ID security model for HIBE by introducing two new
security models. Broadly speaking, both these models allow the adversary to commit
to a set of identities and in the challenge phase choose any one of the previously
committed identities. Two constructions of HIBE are presented which are
secure in the two models. Further, we show that the HIBEs can be
modified to obtain a multiple receiver IBE which is secure in the selective-ID
model without the random oracle assumption.
Ate pairing for in characteristic five
Uncategorized
Uncategorized
Recently, the authors proposed a method for computing the Tate pairing using a distortion map for
( ) over finite fields of characteristic five.
In this paper, we show the Ate pairing, an invariant of the Tate pairing, can be applied to this curve.
This leads to about computational cost-saving
over the Tate pairing.
Efficient Tate Pairing Computation Using Double-Base Chains
Pairing-based cryptosystems have been developing very fast in the last few years. The efficiencies of the cryptosystems are determined by the computation of the Tate pairing. In this paper a new efficient algorithm based on double-base chain for computing the Tate pairing is proposed for odd characteristic . The inherent sparseness of double-base number system reduces the computational cost for computing the Tate pairing evidently. It is faster than the previous fastest method for MOV degree k=6.
Improvement of recently proposed Remote User Authentication Schemes
Uncategorized
Uncategorized
Abstract. Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.’s scheme and made an improvement. Thulasi et al. [15] show that both Manik et al.’s and Chou et al.’s schemes are insecure against forgery attack and replay attack. But Thulasi et al. do not propose a improvement. In this paper, we propose an improvement to over come the flaws.
Identity-based Key Agreement Protocols From Pairings
In recent years, a large number of identity-based key agreement
protocols from pairings have been proposed. Some of them are
elegant and practical. However, the security of this type of
protocols has been surprisingly hard to prove. The main issue is
that a simulator is not able to deal with reveal queries, because
it requires solving either a computational problem or a decisional
problem, both of which are generally believed to be hard (i.e.,
computationally infeasible). The best solution of security proof
published so far uses the gap assumption, which means assuming
that the existence of a decisional oracle does not change the
hardness of the corresponding computational problem. The
disadvantage of using this solution to prove the security for this
type of protocols is that such decisional oracles, on which the
security proof relies, cannot be performed by any polynomial time
algorithm in the real world, because of the hardness of the
decisional problem. In this paper we present a method
incorporating a built-in decisional function in this type of
protocols. The function transfers a hard decisional problem in the
proof to an easy decisional problem. We then discuss the resulting
efficiency of the schemes and the relevant security reductions in
the context of different pairings one can use. We pay particular
attention, unlike most other papers in the area, to the issues
which arise when using asymmetric pairings.
Cryptographically Private Support Vector Machines
We study the problem of private classification using kernel methods. More specifically, we propose private protocols implementing the Kernel Adatron and Kernel Perceptron learning algorithms, give private classification protocols and private polynomial kernel computation protocols. The new protocols return their outputs---either the kernel value, the classifier or the classifications---in encrypted form so that they can be decrypted only by a common agreement by the protocol participants. We also show how to use the encrypted classifications to privately estimate many properties of the data and the classifier. The new SVM classifiers are the first to be proven private according to the standard cryptographic definitions.
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication
A novel algorithm for solving the LPN problem is proposed and analyzed. The algorithm originates from the recently proposed advanced fast correlation attacks, and it employs the concepts of decimation, linear combining, hypothesizing and minimum distance decoding. The proposed algorithm appears as more powerful than the best one previously reported known as the BKW algorithm. In fact the BKW algorithm is shown to be a special instance of the proposed algorithm, but without optimized parameters. An improved security evaluation of the HB protocol for RFID authentication is then developed. Employing the proposed algorithm, the security of the HB protocol is reevaluated, implying that the previously reported security margins appear as overestimated.
On ZK-Crypt, Book Stack, and Statistical Tests
The algorithms submitted to the ECRYPT Stream Cipher Project (eSTREAM)
were tested using the recently suggested statistical test named ``Book Stack''.
All the ciphers except ZK-Crypt have passed the tests.
The paper briefly describes the essence of the test.
Computer implementation of the test in C++ language is supplied.
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing
Signature schemes with message recovery have been wildly investigated
a decade ago in the literature, but the first ID-based signature with message recovery goes out into the world until 2005. In this paper, we first point out and revise one little but important problem
which occurs in the previous ID-based signature with message recovery scheme. Then, by completely different setting, we propose a new ID-based signature scheme with message recovery. Our scheme is much more efficient than the previous scheme. In our scheme (as well as other signature schemes with message recovery), the message itself is not required to be transmitted together with the signature,
it turns out to have the least data size of communication cost comparing with generic (not short) signature schemes. Although the communication overhead is still larger than Boneh et al. 's short signature (which is not ID-based), the computational cost of our scheme is more efficient than Boneh et al. 's scheme in the verification phase. We will also prove that the proposed scheme is provably secure in the random oracle model under CDH Assumption.
Last updated: 2006-10-27
Self-Generated-Certificate Public Key Cryptosystem
Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-Based
Cryptography (IBC) while without having the problem of key escrow. However, it \textit{does} suffer to
an attack where the adversary, Carol, replaces Alice's public key by someone's public key so that
Bob, who wants to send an encrypted message to Alice, uses Alice's identity and other's public
key as the inputs to the encryption function. As a result, Alice cannot decrypt the message
while Bob is unaware of this. We call it \textit{Denial-of-Decryption (DoD) Attack}
as its nature is similar to the well known Denial-of-Service (DoS) Attack. Based on CL-PKC,
we propose a new paradigm called \textit{Self-Generated-Certificate Public Key Cryptography (SGC-PKC)}
that captures the DoD Attack. We also provide a generic construction of
a self-generated-certificate public key encryption scheme
in the standard model. In addition, we further
propose a certificateless signature and a certificateless encryption scheme with concrete implementation.
They are all
provably secure in the standard model, which are
the first in the literature regardless of the generic
constructions by Yum and Lee which may contain security weaknesses as pointed out by others.
We believe these concrete implementations are of independent interest.
(Hierarchical Identity-Based) Threshold Ring Signatures
We construct the first several efficient threshold ring signatures (TRS) without random oracles. Specializing to a threshold of one, they are the first several efficient ring signatures without random oracles after the only earlier instantiation of Chow, Liu, Wei, and Yuen. Further specializing to a ring of just one user, they are the short (ordinary) signatures without random oracles summarized in Wei and Yuen.
We also construct the first hierarchical identity-based threshold ring signature without random oracles. The signature size is bits, where is the security parameter and is the number of users in the ring. Specializing to a threshold of one, it is the first hierarchical identity-based ring signature without random oracles. Further specializing to a ring of one user, it is the constant-size hierarchical identity-based signature (HIBS) without random oracles in Yuen-Wei - the signature size is bits which is independent of the number of levels in the hierarchy.
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
Uncategorized
Uncategorized
Abstract:
This paper describes the influences of the threshold voltage VT on the leakage behavior of the dice after a fabrication process. By measuring the current consumption (leakage) on a CMOS cryptographic device like smartcard security controller and using the DPA analysis it is possible to make the key visible which is used during a cryptographic operation. Therefore, in this paper not only the security risks by using the smartcard security controller will be shown where no DPA attacks have been performed. Furthermore, it will be shown that the results of DPA analysis only on a coincidentally selected die cannot be representative for the whole production. Rather the DPA analysis must be performed on a particularly selected die with the smallest VT parameter (worst case in the leakage behavior), so that the result for all other dice on the wafer (or for the whole production) can be considered as relevant. Thus, it will be shown that the test labs must use different methods regarding the DPA analysis in order to be able to cover the leakage behavior on all wafers of a production. For further re-evaluation of smartcards it is important that the manufacturer and the test labs can save time and costs by DPA measuring on the special selected worst case die.
A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION
RSA type public key cryptosystems based on the Pell's equation are proposed in the honor of an Indian mathematician Brahmgupta who studied Pell's equation long before European mathematicians came to know about it. Three RSA type schemes are proposed, first two are not semantically secure where as the other two schemes are semantically secure. The decryption speed of the proposed schemes is about two times as fast as RSA for a 2 log n-bit message. It is shown that the proposed schemes are more secure than the RSA scheme when purely common plaintexts are encrypted in the broadcast application and are as secure as the RSA scheme against ciphertext attack. In addition the proposed schemes are also secure against partially known plaintext attack. First two are not semantically secure but the third one is semantically secure.
Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator
Uncategorized
Uncategorized
The Dual Elliptic Curve Pseudorandom Generator (DEC PRG) is
proposed by Barker and Kelsey in a draft NIST Special Publication.
It is claimed that the pseudorandom generator is
secure unless the adversary can solve the elliptic curve discrete
logarithm problem (ECDLP) for the corresponding elliptic curve.
The claim is supported only by an informal discussion. No security
reduction is given, that is, it is not shown that an adversary
that breaks the pseudorandom generator implies a solver for the
ECDLP.
Our experimental results and also empirical argument show that the
DEC PRG is insecure. The attack does not imply
solving the ECDLP for the corresponding elliptic curve. The attack
is very efficient.
Unconditionally secure chaffing and winnowing with short authentication tags
Rivest proposed the idea of a chaffing-and-winnowing scheme, in which confidentiality is achieved through the use of an authentication code. Thus it would still be possible to have confidential communications even if conventional encryption schemes were outlawed. Hanaoka et al. constructed unconditionally secure chaffing-and-winnowing schemes which achieve perfect secrecy in the sense of Shannon. Their schemes are constructed from unconditionally secure authentication codes.
In this paper, we construct unconditionally secure chaffing-and-winnowing schemes from unconditionally secure authentication codes in which the authentication tags are very short. This could be a desirable feature, because certain types of unconditionally secure authentication codes can provide perfect secrecy if the length of an authentication tag is at least as long as the length of the plaintext. The use of such a code might be prohibited if encryption schemes are made illegal, so it is of interest to construct chaffing-and-winnowing schemes based on "short'' authentication tags.
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
In this paper, we define and analyze a new blockcipher mode of operation for encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following advantages: (1) beyond the birthday bound security, (2) security proofs with the standard PRP assumption, (3) highly efficient, (4) single blockcipher key, (5) fully parallelizable, (6) allows precomputation of keystream, and (7) allows random access. CENC is based on the new construction of ``from PRPs to PRF conversion,'' which is of independent interest. Based on CENC and a universal hash-based MAC (Wegman-Carter MAC), we also define a new authenticated-encryption with associated-data scheme, CHM, which stands for CENC with Hash-based MAC. The security of CHM is also beyond the birthday bound.
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1
HMAC is a widely used message authentication code and a
pseudorandom function generator based on cryptographic hash
functions such as MD5 and SHA-1. It has been standardized by ANSI,
IETF, ISO and NIST. HMAC is proved to be secure as long as the
compression function of the underlying hash function is a
pseudorandom function. In this paper we devise two new
distinguishers of the structure of HMAC, called {\em differential}
and {\em rectangle distinguishers}, and use them to discuss the
security of HMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. We
show how to distinguish HMAC with reduced or full versions of
these cryptographic hash functions from a random function or from
HMAC with a random function. We also show how to use our
differential distinguisher to devise a forgery attack on HMAC. Our
distinguishing and forgery attacks can also be mounted on NMAC
based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Furthermore, we show
that our differential and rectangle distinguishers can lead to
second-preimage attacks on HMAC and NMAC.