All papers in 2006 (Page 5 of 485 results)
Analysis of the Linux Random Number Generator
Uncategorized
Uncategorized
Linux is the most popular open source project. The
Linux random number generator is part of the kernel of
all Linux distributions and is based on generating randomness from entropy of operating
system events. The output of this generator is used for almost every
security protocol, including TLS/SSL key generation, choosing TCP sequence numbers,
and file system and email encryption. Although the
generator is part of an open source project, its source code (about lines of code) is poorly documented, and patched with hundreds of code patches.
We used dynamic and static reverse engineering to learn the operation of this generator. This paper presents
a description of the underlying algorithms and exposes several security vulnerabilities. In particular, we show an attack on the forward security of the generator which enables an adversary who exposes the state of the generator
to compute previous states and outputs. In addition we present a few cryptographic
flaws in the design of the generator, as well as measurements of
the actual entropy collected by it, and a critical analysis of the use of the generator in Linux distributions on disk-less devices.
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with small ciphertexts of size linear in the depth of the hierarchy. Applications include search on encrypted data, fully private communication, etc.
Our results resolve two open problems pertaining to anonymous identity-based encryption, our scheme being the first to offer provable anonymity in the standard model, in addition to being the first to realize fully anonymous HIBE at all levels in the hierarchy.
Cryptography from Anonymity
There is a vast body of work on {\em implementing} anonymous
communication. In this paper, we study the possibility of using
anonymous communication as a {\em building block}, and show that
one can leverage on anonymity in a variety of cryptographic
contexts. Our results go in two directions.
\begin{itemize}
\item{\bf Feasibility.} We show that anonymous communication
over {\em insecure} channels can be used to implement
unconditionally secure point-to-point channels, and hence
general multi-party protocols with unconditional security in the
presence of an honest majority. In contrast, anonymity cannot be
generally used to obtain unconditional security when there is no
honest majority.
\item{\bf Efficiency.} We show that anonymous channels can yield
substantial efficiency improvements for several natural secure
computation tasks. In particular, we present the first solution
to the problem of private information retrieval (PIR) which can
handle multiple users while being close to optimal with respect
to {\em both} communication and computation. A key observation
that underlies these results is that {\em local randomization}
of inputs, via secret-sharing, when combined with the {\em
global mixing} of the shares, provided by anonymity, allows to
carry out useful computations on the inputs while keeping the
inputs private.
\end{itemize}
Browsers Defenses Against Phishing, Spoofing and Malware
Web users are increasingly victims of phishing, spoofing and malware attacks. In this article, we discuss existing and proposed defense mechanisms. We highlight the vulnerabilities of current defenses, and the challenges of validating and adopting new defenses.
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast
Atomic broadcast is a communication primitive that allows a group of
n parties to deliver a common sequence of payload messages despite
the failure of some parties. We address the problem of asynchronous
atomic broadcast when up to t < n/3 parties may exhibit Byzantine
behavior. We provide the first protocol with an amortized expected
message complexity of O(n) per delivered payload. The most
efficient previous solutions are the BFT protocol by Castro and
Liskov and the KS protocol by Kursawe and Shoup, both of which have
message complexity O(n^2). Like the BFT and KS protocols,
our protocol is optimistic and uses inexpensive mechanisms during
periods when no faults occur; when network instability or faults
are detected, it switches to a more expensive recovery mode. The
key idea of our solution is to replace reliable broadcast in the KS
protocol by consistent broadcast, which reduces the message
complexity from O(n^2) to O(n) in the optimistic mode.
But since consistent broadcast provides weaker guarantees than
reliable broadcast, our recovery mode incorporates novel techniques
to ensure that safety and liveness are always satisfied.
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine
We enumerate requirements and give constructions for the vote storage unit of an electronic voting machine. In this application, the record of votes must survive even an unexpected failure of the machine; hence the data structure should be durable. At the same time, the order in which
votes are cast must be hidden to protect the privacy of voters, so the data structure should be history-independent. Adversaries may try to
surreptitiously add or delete votes from the storage unit after the
election has concluded, so the storage should be tamper-evident.
Finally, we must guard against an adversarial voting machine's attempts to mark ballots through the representation of the data structure, so we
desire a subliminal-free representation. We leverage the properties
of Programmable Read Only Memory (PROM), a special kind
of write-once storage medium, to meet these requirements. We give constructions for data structures on PROM storage that simultaneously satisfy all our desired properties. Our techniques can significantly reduce the need to verify code running on a voting machine.
Efficient Identity-based Signatures Secure in the Standard Model
The only known construction of identity-based signatures that can be
proven secure in the standard model is based on the approach of
attaching certificates to non-identity-based signatures. This
folklore construction method leads to schemes that are somewhat
inefficient and leaves open the problem of finding more efficient
direct constructions. We present the first such construction. Our
scheme is obtained from a modification of Waters' recently proposed
identity-based encryption scheme. It is computationally
efficient and the signatures are short. The scheme's security is
proven in the standard model and rests on the hardness of the
computational Diffie-Hellman problem in groups equipped with a
pairing.
Towards Provably Secure Group Key Agreement Building on Group Theory
Known proposals for key establishment schemes based on combinatorial group theory are often formulated in a rather informal manner. Typically, issues like the choice of a session identifier and parallel protocol executions are not addressed, and no security proof in an established model is provided. Successful attacks against proposed parameter sets for braid groups further decreased the attractivity of combinatorial group theory as a candidate platform for cryptography.
We present a 2-round group key agreement protocol that can be proven secure in the random oracle model if a certain group-theoretical problem is hard. The security proof builds on a framework of Bresson et al., and explicitly addresses some issues concerning malicious insiders and also forward secrecy. While being designed as a tool for basing group key agreement on non-abelian groups, our framework also yields a 2-round group key agreement basing on a Computational Diffie-Hellman assumption.
Verifiable Random Permutations
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali, allow one to efficiently simulate the computation of a function which is indistinguishable from a truly random function. A seemingly stronger primitive is that of a (strong) pseudorandom permutation (PRP), which allows one to efficiently simulate a truly random permutation (and its inverse). The celebrated result of Luby and Rackoff shows that these primitives are, in fact, equivalent: four rounds of the Feistel transform are necessary and sufficient to turn a PRF into a (strong) PRP.
In this paper we study a similar conversion for the verifiable analogs of PRFs and PRPs, called Verifiable Random Functions (VRFs) and Verifiable Random Permutations (VRPs). VRFs, introduced by Micali, Rabin and Vadhan, extend the notion of a PRF to allow the owner of the secret key for the VRF to prove to the outside parties that a given VRF value was correctly (and uniquely!) computed. Yet, such proofs do not violate the pseudorandomness of the remaining, yet ``unopened'' values. VRPs, introduced in this paper, similarly extend the notion of PRPs. We notice that the result of Luby and Rackoff no longer applies to converting VRFs into VRPs, since the VRP proofs must reveal
the VRF outputs (and proofs) of the intermediate rounds. Indeed, we
show that even logarithmic (in the security parameter) number of rounds is not enough for this conversion. Our main result, however, shows that super-logarithmic number of rounds of the Feistel transform suffice to build a VRP out of an arbitrary VRF.
As an application, we give a construction of non-interactive zero-knowledge (NIZK) proofs with efficient provers for any NP language from any VRF. The result is obtained from our VRF--->VRP conversion, by noticing that VRPs easily yield ``invariant signatures'' of Goldwasser and Ostrovsky , which are known to imply NIZK. (We also notice that the detour through VRPs seems necessary for this implication, since using VRFs in place of invariant signatures is provably insufficient for the NIZK construction of Goldwasser et al. to go through.)
On Secret Sharing Schemes, Matroids and Polymatroids
The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the shares and the length of the secret. The optimization of this parameter for general access structures is an important and very difficult open problem in secret sharing. We explore in this paper the connections of this open problem with matroids and polymatroids.
Matroid ports were introduced by Lehman in 1964. A forbidden minor characterization of matroid ports was given by Seymour in 1976. These results are previous to the invention of secret sharing by Shamir in 1979. Important connections between ideal secret sharing schemes and matroids were discovered by Brickell and Davenport in 1991. Their results can be restated as follows: every ideal secret sharing scheme defines a matroid, and its access structure is a port of that matroid. In spite of this, the results by Lehman and Seymour and other subsequent results on matroid ports have not been noticed until now by the researchers interested in secret sharing.
Lower bounds on the optimal complexity of access structures can be found by taking into account that the joint Shannon entropies of a set of random variables define a polymatroid. We introduce a new parameter, which is denoted by , to represent the best lower bound that can be obtained by this method. We prove that every bound that is obtained by this technique for an access structure applies to its dual structure as well.
By using the aforementioned result by Seymour we obtain two new characterizations of matroid ports. The first one refers to the existence of a certain combinatorial configuration in the access structure, while the second one involves the values of the parameter that is introduced in this paper. Both are related to bounds on the optimal complexity. As a consequence, we generalize the result by Brickell and Davenport by proving that, if the length of every share in a secret sharing scheme is less than 3/2 times the length of the secret, then its access structure is a matroid port. This generalizes and explains a phenomenon that was observed in several families of access structures.
Finally, we present a construction of linear secret sharing schemes for the ports of the Vamos matroid and the non-Desargues matroid, which do not admit any ideal secret sharing scheme. We obtain in this way upper bounds on their optimal complexity. These new bounds are a contribution on the search of examples of access structures whose optimal complexity lies between 1 and 3/2.
Last updated: 2006-02-27
A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement
Let be a cyclic multiplicative group of order . It is known that the Diffie-Hellman problem is random self-reducible in with respect to a fixed generator if is known. That is, given and having oracle access to a `Diffie-Hellman Problem' solver with fixed generator , it is possible to compute in polynomial time. On the other hand, it is not known if such a reduction exists when is unknown. We exploit this ``gap'' to construct a cryptosystem based on hidden order groups by presenting a practical implementation of a novel cryptographic primitive called \emph{Strong Associative One-Way Function} (SAOWF). SAOWFs have interesting applications like one-round group key agreement. We demonstrate this by presenting an efficient group key agreement protocol for dynamic ad-hoc groups. Our cryptosystem can be considered as a combination of the Diffie-Hellman and RSA cryptosystems.
ON THE WEIL SUM EVALUATION OF CENTRAL POLYNOMIAL IN MULTIVARIATE QUADRATIC CRYPTOSYSTEM
A parity checking-styled Weil sum algorithm is presented for a
general class of the univariate polynomials which fully characterize
a system of polynomials in variables over . The
previously known proof methods of explicit Weil sum evaluation of
Dembowski-Ostrom polynomials are extended to general case. The
algorithm computes the absolute values of the Weil sums of the
generic central polynomials in MQ problem.
How to Construct Sufficient Condition in Searching Collisions of MD5
In Eurocrypt 2005, Wang et al. presented a collision attak on MD5. In their paper, they
intoduced "Sufficient Condition" which would be needed to generate collisions. In this paper, we explain
how to construct sufficent conditions of MD5 when a differential path is given. By applying our algorithm
to a collision path given byWang et al, we found that sufficient conditions introduced by them contained
some unnecessary conditions. Generally speaking, when a differential path is given, corresponding sets
of sufficient conditions is not unique. In our research, we analyzed the differential path found by Wang
et al, and we found a different set of sufficient conditions from that of Wang et al. We have generated
collisions by using our sifficient conditions.
Stronger Security of Authenticated Key Exchange
In this paper we study security definitions for authenticated key
exchange (AKE) protocols. We observe that there are several
families of attacks on AKE protocols that lie outside the boundary
of the current class of security definitions. In an attempt to
bring these attacks within the scope of analysis we extend the AKE
security definition to provide greater powers to the adversary. We
provide a general framework for defining AKE security, which we call
strong AKE security, such that existing security definitions
occur as instances of the framework. We then introduce NAXOS, a new
two-pass AKE protocol, and prove that it is secure in this stronger
definition.
In addition, we formulate a notion of ephemeral secret key which
captures all ephemeral information used in session establishment. We
demonstrate the importance of this formulation by showing that a
secure AKE protocol SIG-DH can become vulnerable when instantiated
with signature schemes which are insecure against revelation of the
secret random bits used in the signature generation.
Cryptanalysis of the Bluetooth E0 Cipher using OBDD's
In this paper we analyze the E0 cipher, which is the cipher used
in the Bluetooth specifications. We adapted and optimized the Binary
Decision Diagram attack of Krause, for the specific details of
E0. Our method requires 128 known bits of the keystream in order
to recover the initial value of the four LFSR's in the E0 system.
We describe several variants which we built to lower the complexity
of the attack. We evaluated our attack against the real
(non-reduced) E0 cipher. Our best attack can recover the initial
value of the four LFSR's, for the first time, with a realistic space
complexity of 2^23 (84MB RAM), and with a time complexity of
2^87. This attack can be massively parallelized to
lower the overall time complexity. Beyond the
specifics of E0, our work describes practical experience with
BDD-based cryptanalysis, which so far has mostly been a theoretical
concept.
A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security
Uncategorized
Uncategorized
Motivated by the quest for reducing assumptions in security proofs in
cryptography, this paper is concerned with designing efficient
symmetric encryption and authentication schemes based on any weak pseudorandom function (PRF) which can be much more efficiently
implemented than PRFs. Damgard and Nielsen (CRYPTO '02) have
shown how to construct an efficient symmetric encryption scheme based
on any weak PRF that is provably secure against chosen-plaintext
attacks. The main ingredient is a range-extension construction for
weak PRFs. By using well-known techniques, they also showed how their
scheme can be made secure against the stronger chosen-ciphertext attacks.
The results of our paper are three-fold. First, we give a range-extension construction for weak PRFs that is optimal within a
large and natural class of reductions (especially all known today).
Second, we propose a construction of a regular PRF from any weak PRF.
Third, these two results imply a (for long messages) much more
efficient chosen-ciphertext secure encryption scheme than the one
proposed by Damgard and Nielsen. The results also give answers to
open questions posed by Naor and Reingold (CRYPTO '98) and by
Damgard and Nielsen.
The experimental distinguishing attack on RC4
The output of RC4 was analyzed using the "book stack" test for
randomness. It is experimentally shown that the
keystream generated from RC4 can be distinguished from random with
about output bits.
Automated Security Proofs with Sequences of Games
Uncategorized
Uncategorized
This paper presents the first automatic technique for proving not only
protocols but also primitives in the exact security computational
model. Automatic proofs of cryptographic protocols were up to now
reserved to the Dolev-Yao model, which however makes quite strong
assumptions on the primitives. On the other hand, with the proofs by
reductions, in the complexity theoretic framework, more subtle
security assumptions can be considered, but security analyses are
manual. A process calculus is thus defined in order to take into
account the probabilistic semantics of the computational model. It is
already rich enough to describe all the usual security notions of both
symmetric and asymmetric cryptography, as well as the basic
computational assumptions. As an example, we illustrate the use of the
new tool with the proof of a quite famous asymmetric primitive:
unforgeability under chosen-message attacks (UF-CMA) of the
Full-Domain Hash signature scheme under the (trapdoor)-one-wayness of
some permutations.
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
Automated tools such as model checkers and theorem provers for the
analysis of security protocols typically abstract from cryptography by
Dolev-Yao models, i.e., abstract term algebras replace the real
cryptographic operations. Recently it was shown that in essence this
approach is cryptographically sound for certain operations like
signing and encryption. The strongest results show this in the sense
of blackbox reactive simulatability (BRSIM)/UC with only small changes
to both Dolev-Yao models and natural implementations. This notion
essentially means the preservation of arbitrary security properties
under active attacks in arbitrary protocol environments.
We show that it is impossible to extend the strong BRSIM/UC results to
usual Dolev-Yao models of hash functions in the general case. These
models treat hash functions as free operators of the term algebra. In
contrast, we show that these models are sound in the same strict sense
in the random oracle model of cryptography. For the standard model of
cryptography, we also discuss several conceivable restrictions to the
Dolev-Yao models and classify them into possible and impossible cases.
Scalar Multiplication on Koblitz Curves using Double Bases
The paper is an examination of double-base decompositions of
integers , namely expansions loosely of the form
for some base . This was examined in previous
works in the case when lie in
.
On the positive side, we show how to extend previous results
of to Koblitz curves over binary fields. Namely, we
obtain a sublinear scalar algorithm to compute, given a generic
positive integer and an elliptic curve point , the point
in time elliptic curve
operations with essentially no storage, thus making the method
asymptotically faster than any know scalar multiplication algorithm
on Koblitz curves.
On the negative side, we analyze scalar multiplication using double
base numbers and show that on a generic elliptic curve over a finite
field, we cannot expect a sublinear algorithm with double bases. Finally, we show that
all algorithms used hitherto need at least curve operations.
Simple and Flexible Private Revocation Checking
Digital certificates signed by trusted certification authorities (CAs) are used for multiple
purposes, most commonly for secure binding of public keys to names and other attributes of
their owners. Although a certificate usually includes an expiration time, it is not uncommon
that a certificate needs to be revoked prematurely. For this reason, whenever a client (user
or program) needs to assert the validity of another party’s certificate, it performs revocation
checking. There are many revocation techniques varying in both the operational model and
underlying data structures. One common feature is that a client typically contacts an on-line
third party (trusted, untrusted or semi-trusted), identifies the certificate of interest and obtains
some form of a proof of either revocation or validity (non-revocation) for the certificate in
question.
While useful, revocation checking can leak potentially sensitive information. In particular,
third parties of dubious trustworthiness discover two things: (1) the identity of the party posing
the query, as well as (2) the target of the query. The former can be easily remedied with
techniques such as onion routing or anonymous web browsing. Whereas, hiding the target of
the query is not as obvious. Arguably, a more important loss of privacy results from the
third party’s ability to tie the source of the revocation check with the query’s target. (Since,
most likely, the two are about to communicate.) This paper is concerned with the problem of
privacy in revocation checking and its contribution is two-fold: it identifies and explores the
loss of privacy inherent in current revocation checking, and, it constructs a simple, efficient and
flexible privacy-preserving component for one well-known revocation method.
On Expected Constant-Round Protocols for Byzantine Agreement
In a seminal paper, Feldman and Micali (STOC '88) show an -party Byzantine agreement protocol tolerating malicious parties that runs in expected constant rounds. Here, we show an expected constant-round protocol for authenticated Byzantine agreement assuming
honest majority (i.e., ), and relying only on the existence of a secure signature scheme and a public-key infrastructure (PKI).
Combined with existing results, this gives the first expected constant-round protocol for secure computation with honest majority in a point-to-point network assuming only one-way functions and a PKI. Our key technical tool --- a new primitive we introduce called moderated VSS --- also yields a simpler proof of the Feldman-Micali result.
We also show a simple technique for sequential composition of protocols without simultaneous termination (something that is inherent for Byzantine agreement protocols using rounds) for the case of .
Perturbing and Protecting a Traceable Block Cipher
At the Asiacrypt 2003 conference Billet and Gilbert introduce a block cipher, which, to quote them, has the following paradoxical traceability properties: it is computationally easy to derive many equivalent distinct descriptions of the same instance of the block cipher; but it is computationally difficult, given one or even up to of them, to recover the so-called meta-key from which they were derived, or to find any additional equivalent description, or more generally to forge any new untraceable description of the same instance of the block cipher.
Their construction relies on the Isomorphism of Polynomials (IP) problem. We here show how to strengthen this construction against algebraic attacks by concealing the underlying IP problems.
Our modification is such that our description of the block cipher now does not give the expected results all the time and parallel executions are used to obtain the correct value.
Provably Secure Universal Steganographic Systems
Uncategorized
Uncategorized
We propose a simple universal (that is, distribution--free) steganographic system
in which covertexts with and without hidden texts are statistically indistinguishable.
Moreover, the proposed steganographic system has two important properties. First, the rate of transmission of hidden information approaches the Shannon entropy
of the covertext source as the size of blocks used for hidden text encoding tends to infinity.
Second, if the size of the alphabet of the covertext source and its minentropy tend to infinity
then the the number of bits of hidden text per letter of covertext tends to where
is the (fixed) size of blocks used for hidden text encoding. The proposed stegosystem uses randomization.
Last updated: 2006-07-30
A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries
We present MEM, which is a new mode of encryption using a block cipher. MEM is proved to be a strong pseudo-random permutation (SPRP) against {\em symmetric} nonce respecting adversaries, where a symmetric nonce respecting adversary is one which does not repeat nonces to either the encryption or the decryption oracle. Against such adversaries, MEM provides a secure, length preserving, tagless mode of encryption. In our construction, the number of block cipher calls is approximately half that of the earlier known more general constructions CMC, EME and EME of tweakable SPRPs. In situations where the appropriate adversary can be assumed, and where a tagless mode of encryption is
required, our construction is the most efficient solution till date.
Last updated: 2006-04-19
--Withdrawn--
Uncategorized
Uncategorized
The classic Merkle-Damgård (\textbf{MD}) structure provides a popular way of turning a fixed-length compression function into a variable-length input cryptographic hash function. However, the multi-block collision attacks (MBCA) on the \textbf{MD}-style hash functions MD5, SHA-0 and SHA-1 demonstrate the weakness of the \textbf{MD} construction in extending the collision resistance property of a single compression function to its iterations. In this paper, we investigate a recently proposed cryptographic construction (called \textbf{3C}) devised by enhancing the \textbf{MD} construction, and prove it provides quantitatively more resistance against MBCA than does the \textbf{MD}-style. Specifically, we prove that it requires at least computational effort to perform any MBCA on the -bit \textbf{3C} hash function when the same attack on a -bit \textbf{MD} hash function (using the same compression function) requires an effort not less than . This is the first result showing a generic construction with resistance to MBCA. We further improve the resistance of the \textbf{3C} design against MBCA and propose the new \textbf{3C+} hash function construction. We prove that \textbf{3C+} is completely \emph{immune} to MBCA since it costs at least effort to perform any MBCA on the \textbf{3C+} construction. This reduces the collision security of \textbf{3C+} to the collision security of the underlying compression function, hence restoring the paradigm that one only needs to design a secure compression function to obtain a secure iterated hash function. Both the \textbf{3C} and \textbf{3C+} constructions are very simple adjustments to the \textbf{MD} construction and they are immune to the straight forward extension attacks which apply to the \textbf{MD} hash functions. The second preimage attacks on -bit hash functions also do not work on the constructions presented in this paper.
Last updated: 2006-03-14
An Efficient ID-based Signature Scheme from Pairings
In this paper, we propose an efficient ID-based signature scheme based on pairing. The number of paring operation involved in the verification procedure is one. Our scheme is proved secure against existential forgery on adaptively chosen message and ID attack under the hardness assumption of computational Diffie-Hellman problem, in the random oracle model.
High Security Pairing-Based Cryptography Revisited
The security and performance of pairing based cryptography has provoked a
large volume of research, in part because of the exciting new cryptographic
schemes that it underpins. We re-examine how one should implement pairings over
ordinary elliptic curves for various practical levels of security. We conclude,
contrary to prior work, that the Tate pairing is more efficient than the
Weil pairing for all such security levels. This is achieved by using efficient exponentiation techniques
in the cyclotomic subgroup backed by efficient squaring routines within the
same subgroup.
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
Web services are an important series of industry standards for adding
semantics to web-based and XML-based communication, in particular
among enterprises. Like the entire series, the security standards and
proposals are highly modular. Combinations of several standards are
put together for testing as interoperability scenarios, and these
scenarios are likely to evolve into industry best practices. In the
terminology of security research, the interoperability scenarios
correspond to security protocols. Hence, it is desirable to analyze
them for security. In this paper, we analyze the security of the new
Secure WS-ReliableMessaging Scenario, the first scenario to combine
security elements with elements of another quality-of-service
standard. We do this both symbolically and cryptographically. The
results of both analyses are positive. The discussion of actual
cryptographic primitives of web services security is a novelty of
independent interest in this paper.
Key Exchange Using Passwords and Long Keys
We propose a new model for key exchange (KE) based on a combination of different types of keys. In our setting, servers exchange keys with clients, who memorize short passwords and carry (stealable) storage cards containing long (cryptographic) keys. Our setting is a generalization of that of Halevi and Krawczyk \cite{HaleviKr99} (HK), where clients have a password and the public key of the server.
We point out a subtle flaw in the protocols of HK and demonstrate a practical attack on them, resulting in a full password compromise. We give a definition of security of KE in our (and thus also in the HK) setting and discuss many related subtleties. We define and discuss protection against denial of access (DoA) attacks, which is not possible in any of the previous KE models that use passwords. Finally, we give a very simple and efficient protocol satisfying all our requirements.
Key Exchange Protocols: Security Definition, Proof Method and Applications
We develop a compositional method for proving cryptographically
sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventional runs of a protocol against a probabilistic polynomial-time attacker.
Since key indistinguishability and other previous specifications
of secure key exchange suffer from specific compositionality problems, we develop a suitable specification of acceptable key generation. This definition is based on a simple game played by an adversary against a key exchange protocol and a conventional challenger characterizing secure encryption (or other primitives of interest). The method is illustrated using a sample protocol.
Multicollision Attacks on some Generalized Sequential Hash Functions
A multicollision for a function
is a set of inputs whose outputs are all identical.
A. Joux showed multicollision
attacks on the classical iterated hash function. He also showed how
these multicollision attacks can be used to get a collision attack
on a concatenated hash function. In this paper,
we study multicollision attacks in a more general class of hash functions which
we term ``generalized sequential hash functions''.
We show that multicollision attacks exist for this class of hash functions provided that
every message block is used at most twice in the computation
of the message digest.
How to Build a Low-Cost, Extended-Range RFID Skimmer
Radio-Frequency Identifier (RFID) technology, using the ISO-14443
standard, is becoming increasingly popular, with applications like
credit-cards, national-ID cards, E-passports, and physical access
control. The security of such applications is clearly critical. A
key feature of RFID-based systems is their very short range: Typical
systems are designed to operate at a range of 5-10cm. Despite this
very short nominal range, Kfir and Wool predicted that a rogue
device can communicate with an ISO-14443 RFID tag from a distance of
40-50cm, based on modeling and simulations. Moreover, they claimed
that such a device can be made portable, with low power
requirements, and can be built very cheaply. Such a device can be
used as a stand-alone RFID skimmer, to surreptitiously read the
contents of simple RFID tags. The same device can be as the
``leech'' part of a relay-attack system, by which an attacker can
make purchases using a victim's RFID-enhanced credit card---despite
any cryptographic protocols that may be used.
In this study we show that the modeling predictions are quite
accurate. We show how to build a portable, extended-range RFID
skimmer, using only electronics hobbyist supplies and tools. Our
skimmer is able to read ISO-14443 tags from a distance of
~25cm, uses a lightweight 40cm-diameter copper-tube
antenna, is powered by a 12V battery---and requires a
budget of ~$100. We believe that, with some more effort, we can
reach ranges of ~35cm, using the same skills, tools, and
budget.
We conclude that (a) ISO-14443 RFID tags can be skimmed from a
distance that does not require the attacker to touch the victim;
(b) Simple RFID tags, that respond to any reader, are immediately
vulnerable to skimming; and (c) We are about half-way toward a
full-blown implementation of a relay-attack.
Cryptanalysis of the CFVZ cryptosystem
The paper analyzes a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the complexity of solving the underlying problem for the proposed system is dominated by the complexity of solving a fixed number of discrete logarithm problems in the group of an elliptic curve. Using an adapted Pollard rho algorithm it is shown that this problem is essentially as hard as solving one discrete logarithm problem in the group of an elliptic curve.
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
Hardware side channel vulnerabilities have been studied for many
years in embedded silicon-security arena including SmartCards,
SetTop-boxes, etc. However, because various recent security
activities
have goals of improving the software isolation properties of PC
platforms, software side channels have become a subject of
interest. Recent publications
discussed cache-based software side channel vulnerabilities of AES
and RSA. Thus, following the classical approach --- a new side
channel vulnerability opens a new mitigation research path
--- this paper starts to investigate efficient mitigations to
protect AES-software against side channel vulnerabilities. First,
we will present several mitigation strategies to harden existing
AES software against cache-based software side channel attacks and
analyze their theoretical protection. Then, we will present a
%thorough
performance and security evaluation of our mitigation strategies.
For ease of evaluation we measured the performance of our code
against the performance of the openSSL AES implementation. In
addition, we also analyzed our code under various existing
attacks.
Depending on the level of the
required side channel protection, the measured performance loss of
our mitigations strategies versus openSSL (respectively best assembler) varies
between factors of 1.35 (2.66) and 2.85 (5.83).
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems
We proposed the concept, piece in hand (soldiers in hand) matrix and have developed the framework based on the concept so far. The piece in hand matrix is a general concept which can be applicable to any type of multivariate public key cryptosystems to enhance their security. In this paper, we make improvements in the PH matrix method as follows. (i) In the PH matrix method, an arbitrary number of additional variables can be introduced to the random polynomial term in the public key, which is eliminated by the multiplication of the PH matrix to the public key in the decryption. Thus these additional variables enables the public key to have more than one solution, and therefore increases the difficulty to solve the public key. We show, in an experimental manner, that the PH matrix method improved in this way is secure even against the Gröbner basis attack. (ii) In the nonlinear PH matrix method proposed previously, the degree of polynomials in the public key is more than two, and this may cause an undesirable increase in the length of the public key. In this paper, we propose a nonlinear PH matrix method, where the degree of the public key is kept the same as the degree of the public key of the original cryptosystem, which is normally two.
Secure Device Pairing based on a Visual Channel
Uncategorized
Uncategorized
Recently several researchers and practitioners have begun to address the problem of secure device pairing or how to set up secure communication between two devices without the assistance of a trusted third party. McCune, et al. [12] proposed Seeing-is-Believing (SiB), a system which uses a visual channel. The SiB visual channel consists of one device displaying the hash of its public key in the form of a two-dimensional barcode, and the other device reading this information using a photo camera. Strong mutual authentication in SiB requires running two separate unilateral authentication steps.
In this paper, we show how strong mutual authentication can be achieved even with a unidirectional visual channel, where SiB could provide only a weaker property termed as presence. This could help reduce the SiB execution time and improve usability. By adopting recently proposed improved pairing protocols, we propose how visual channel authentication can be used even on devices that have very limited displaying capabilities, all the way down to a device whose display consists of a cheap single light-source, such as an LED. We also describe a new video codec that may be used to improve execution time of pairing in limited display devices, and can be used for other applications besides pairing.
Crossword Puzzle Attack on NLS
Uncategorized
Uncategorized
NLS is one of the stream ciphers submitted to the eSTREAM project.
We present a distinguishing attack on NLS by Crossword Puzzle (CP) attack method
which is newly introduced in this paper.
We build the distinguisher by using linear approximations of
both the non-linear feedback shift register (NFSR) and the nonlinear filter function (NLF).
Since the bias of the distinguisher depends on the value,
which is a key-dependent word,
we present the graph showing how the bias of distinguisher vary with .
In result, we estimate the average bias to be around .
Therefore, we claim that NLS is distinguishable from truly random cipher after observing
keystream words on the average.
The experiments also show that our distinguishing attack is successful on of
among possible values.
New Results on Multipartite Access Structures
In a multipartite access structure, the set of players is divided
into different entities, in such a way that all players of the same entity play the same role in the structure. Not many results are known about these structures, when .
Even if the total characterization of ideal multipartite access structures seems a very ambitious goal, we take a first step in this direction. On the one hand, we detect some conditions that directly imply that a multipartite structure cannot be ideal. On the other hand, we prove that three wide families of multipartite access structures are ideal. We believe that the techniques employed in these proofs are so general that they could be used to prove in the future more general results related to the characterization of ideal multipartite access structures.
Cryptographically Sound Theorem Proving
We describe a faithful embedding of the Dolev-Yao model of Backes,
Pfitzmann, and Waidner (CCS 2003) in the theorem prover Isabelle/HOL.
This model is cryptographically sound in the strong sense of reactive
simulatability/UC, which essentially entails the preservation of
arbitrary security properties under active attacks and in arbitrary
protocol environments. The main challenge in designing a practical
formalization of this model is to cope with the complexity of
providing such strong soundness guarantees. We reduce this complexity
by abstracting the model into a sound, light-weight formalization that
enables both concise property specifications and efficient application
of our proof strategies and their supporting proof tools. This yields
the first tool-supported framework for symbolically verifying security
protocols that enjoys the strong cryptographic soundness guarantees
provided by reactive simulatability/UC. As a proof of concept, we have
proved the security of the Needham-Schroeder-Lowe protocol using our
framework.
Efficient Primitives from Exponentiation in Zp
Since Diffie-Hellman \cite{DH76},
many secure systems, based on discrete logarithm or Diffie-Hellman
assumption in , were introduced in the literature. In
this work, we investigate the possibility to construct efficient
primitives from exponentiation techniques over .
Consequently, we propose a new pseudorandom generator, where its
security is proven under the decisional Diffie-Hellman assumption.
Our generator is the most efficient among all generators from
that are provably secure under standard
assumptions. If an appropriate precomputation is allowed, our generator can produce bits per modular multiplication.
This is the best possible result in the literature (even improved by such a precomputation as well). Interestingly, our generator is the first
provably secure under a decisional assumption and might be
instructive for discovering potentially more efficient generators in
the future.
Our second result is a new
family of universally collision resistant hash family (CRHF). Our
CRHF is provably secure under the discrete log assumption and is
more efficient than all previous CRHFs that are provably secure
under standard assumptions
(especially without a random oracle). This result is
important, especially when the unproven hash functions (e.g., MD4,
MD5, SHA-1) were broken by Wang et al. \cite{W+05,WY05,WYY05}.
Fully Collusion Resistant Traitor Tracing
Uncategorized
Uncategorized
We construct the first fully collusion resistant tracing traitors
system with sublinear size ciphertexts and constant size private keys.
More precisely, let be the total number of users. Our system
generates ciphertexts of size and private keys of size
. We build our system by first building a simpler primitive
called private linear broadcast encryption (PLBE). We then show
that any PLBE gives a tracing traitors system with the same
parameters. Our system uses bilinear maps in groups of composite
order.
Linear Integer Secret Sharing and Distributed Exponentiation
Uncategorized
Uncategorized
We introduce the notion of Linear Integer Secret-Sharing (LISS) schemes, and show constructions of such schemes for any access structure. We show that any LISS scheme can be used to build a secure distributed protocol for exponentiation in any group. This implies, for instance, distributed RSA protocols for arbitrary access structures and with arbitrary public exponents.
New Proofs for NMAC and HMAC: Security Without Collision-Resistance
Uncategorized
Uncategorized
HMAC was proved by Bellare, Canetti and Krawczyk [2] to be a PRF assuming that (1)
the underlying compression function is a PRF, and (2) the iterated hash
function is weakly collision-resistant.
However, recent attacks show that assumption (2) is false for
MD5 and SHA-1,
removing the proof-based support for HMAC in these cases.
This paper proves that HMAC is a PRF
under the sole assumption that the compression function is a PRF. This recovers
a proof based guarantee since no known attacks compromise the pseudorandomness
of the compression function, and it also helps explain the resistance-to-attack
that HMAC has shown even when implemented with hash functions whose
(weak) collision resistance is compromised. We also show that an even
weaker-than-PRF condition on the compression function, namely that it is a
privacy-preserving MAC, suffices to establish HMAC is a MAC as long as the hash
function meets the very weak requirement of being computationally almost
universal, where again the value lies in the fact that known attacks do not
invalidate the assumptions made.
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms
We consider the problem of efficiently generating sequences in hardware for use in certain cryptographic algorithms. The conventional method of doing this is to use a counter. We show that sequences generated by linear feedback shift registers (LFSRs) can be tailored to suit the appropriate algorithms. For hardware implementation, this reduces both time and chip area. As a result, we are able to suggest improvements to
the design of DES Cracker built by the Electronic Frontier Foundation in 1998; provide an efficient strategy for generating start points in time-memory trade/off attacks; and present an improved parallel hardware implementation of a variant of the counter mode of operation of a block cipher.
Reactively Simulatable Certified Mail
(Revision of Sept. 2004 of a journal submission from Dec. 2000.)
Certified mail is the fair exchange of a message
for a receipt, i.e., the recipient gets the message if
and only if the sender gets a receipt. It is an important
primitive for electronic commerce and other atomicity services.
Certified-mail protocols are known in the literature, but there
was no rigorous definition yet, in particular for optimistic protocols
and for many interleaved executions.
We provide such a definition via an ideal system and show that
a specific real certified-mail protocol is as secure as this ideal
system in the sense of reactive simulatability in the standard model
of cryptography and under standard assumptions.
As certified mail without any third party is not practical, we consider optimistic protocols,
which involve a third party only if one party tries to cheat.
The real protocol resembles prior protocols, but we had to use a different
cryptographic primitive to achieve simulatability.
The communication model is synchronous.
This proof first demonstrated that a cryptographic multi-step protocol
can fulfil a general definition of reactive simulatability
enabling concurrent composition.
We also first showed how formal-method style reasoning can be applied
over the ideal system in a cryptographically sound way.
Moreover, the treatment of multiple protocol runs and their modular proof in spite
of the use of common cryptographic primitives for all runs can
be seen as a first example of what is now known as joint-state composition.
Linkable Democratic Group Signatures
In a variety of group-oriented applications cryptographic primitives
like group signatures or ring signatures are valuable methods to
achieve anonymity of group members. However, in their classical form, these schemes cannot be deployed for applications that simultaneously require (i) to avoid centralized management authority like group manager and (ii) the signer to be anonymous only against non-members while group members have rights to trace and identify the signer.
The idea of recently introduced {\it democratic group signatures} is
to provide these properties. Based on this idea we introduce a
group-oriented signature scheme that allows the group members to
trace the identity of any other group member who issued a signature
while non-members are only able to link the signatures issued by the
same signer without tracing. For this purpose the signature scheme
assigns to every group member a unique pseudonym that can be used by any non-member verifier to communicate with the anonymous signer from the group. We present several group-oriented application scenarios where this kind of linkability is essential.
We propose a concrete linkable democratic group signature scheme for
two-parties, prove its security in the random oracle model, and
describe how to modularly extend it to the multi-party case.
Two-Round AES Differentials
In this paper we study the probability of differentials and
characteristics over 2 rounds of the AES with the objective to
understand how the components of the AES round transformation
interact.
We extend and correct the analysis of the differential properties
of the multiplicative inverse in GF( ). We show that AES has characteristics with a
fixed-key probability that is many times larger than the EDP. For
instance, in the case of 2-round AES, we measured factors up to
.
We study the number of characteristics with EDP whose
probability adds up to the probability of a differential and
derive formulas that allow to produce a close estimate of this
number for any differential. We show how the properties discovered
in our study can be used to explain the values of the
differentials with the largest EDP values and to construct new
distinguishers using truncated differentials.
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field
Uncategorized
Uncategorized
We present the Zhuang-Zi algorithm, a new method for solving multivariate polynomial equations over a finite field. We describe the algorithm and present examples, some of which cannot be solved with the fastest known algorithms.
Message Authentication on 64-bit Architectures
This paper takes UMAC --- a message authentication algorithm (MAC) optimized for performance on 32-bit architectures --- as its starting point, and adapts its strategies for optimum performance on 64-bit architectures. The resulting MAC, called UMAC8, achieves per message forgery probabilities of about and for tags of length 64 and 128 bits. The UMAC strategies are discussed at length and adapted for 64-bit environments, but are also modified to address several UMAC shortcomings, particularly key-agility and susceptibility to timing attacks. UMAC achieved peak throughput rates, when generating 64-bit tags, of 1.0 CPU cycle per byte of message authenticated, while UMAC8 achieves 0.5 cycles per byte.
Vector Stream Cipher Instant Key Recovery
Vector Stream Cipher (VSC) is a stream cipher designed by ChaosWare and patented by NICT (formerly CRL), Japanese patents 3030341 and 3455758, US patent 6,668,265. VSC is recommended by the Softbank Technology Corporation for use in high bandwidth and high security applications. In this paper we present a practical attack instantly recovering the entire secret key of the high-speed single-round VSC variants with only 4 known subsequent plaintext blocks showing how all single-round VSC variants can be trivially broken due to their simple algebraic nature. The algorithm presented in this paper cannot break the 8-round VSC, but it can be easily adapted to any particular high-speed single-round VSC variant and extended to break some of the multiple-round VSC variants with very little effort and it may help accelerate other attacks.
Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials
In this contribution, we derive a novel parallel formulation of the standard Itoh-Tsujii algorithm for multiplicative inverse computation over GF( ). The main building blocks used by our algorithm are: field multiplication, field squaring and field square root operators. It achieves its best performance when using a special class of irreducible trinomials, namely, , with and odd numbers and when implemented in hardware
platforms. Under these conditions, our experimental results show that
our parallel version of the Itoh-Tsujii algorithm yields a speedup of about 30% when compared with the standard version of it. Implemented in a Virtex 3200E FPGA device, our design is able to compute multiplicative inversion over GF( ) after 20 clock cycles in about S.
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles
We describe a new and practical identity-based key encapsulation mechanism that is secure in the standard model against chosen-ciphertext (CCA2) attacks. Since our construction is direct and not based on hierarchical identity-based encryption, it is more efficient than all previously proposed schemes.
Furthermore, we give the first chosen-ciphertext secure identity-based key encapsulation mechanism with threshold key delegation and decryption in the standard model.
Arithmetic of Generalized Jacobians
This paper aims at introducing generalized Jacobians as a new candidate for discrete logarithm (DL) based cryptography. The motivation for this work came from the observation that several practical DL-based cryptosystems, such as ElGamal, the Elliptic and Hyperelliptic Curve Cryptosystems, XTR, LUC as well as CEILIDH can all naturally be reinterpreted in terms of generalized Jacobians. However, usual Jacobians and algebraic tori are thus far the only generalized Jacobians implicitly utilized in cryptography. In order to go one step further, we here study the simplest nontrivial generalized Jacobians of an elliptic curve. In this first of a series of articles, we obtain explicit formulae allowing to efficiently perform arithmetic operations in these groups. This work is part of our doctoral dissertation, where security aspects are considered in depth. As a result, these groups thus provide the first concrete example of semi-abelian varieties suitable for DL-based cryptography.
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators
Given a Boolean function on -variables, we find a reduced set of homogeneous linear equations by solving which one can decide whether there exist annihilators at degree or not.
Using our method the size of the associated matrix becomes
, where,
and
and the time required to construct the matrix is same as the size of the matrix. This is a
preprocessing step before the exact solution strategy (to decide on the existence of the annihilators) that requires to solve the set of homogeneous linear equations (basically to calculate the rank) and this can be improved when the number of variables and the number of equations are minimized. As the linear transformation on the input variables of the Boolean function keeps the degree of the annihilators invariant, our preprocessing step can be more efficiently applied if one can find an affine transformation over to get such that is maximized (and in turn is minimized too). We present an efficient heuristic towards this. Our study also shows for what kind of Boolean functions the asymptotic reduction in the size of the matrix is possible and when the reduction is not asymptotic but constant.
On a Variation of Kurosawa-Desmedt Encryption Scheme
Kurosawa-Desmedt encryption scheme is a variation of Cramer-Shoup encryption schemes, which are the first practical schemes secure against adaptive chosen ciphertext attack in standard model. We introduce a variant of Kurosawa-Desmedt encryption scheme, which is not only secure against adaptive chosen ciphertext attack but also slightly more efficient than the original version.
Improved cryptanalysis of Py
We improve on the best known cryptanalysis of the
stream cipher Py by using a hidden Markov model for the
carry bits in addition operations where a certain
distinguishing event takes place, and constructing from
it an "optimal distinguisher" for the bias in the output
bits which makes more use of the information available.
We provide a general means to efficiently measure the
efficacy of such a hidden Markov model based
distinguisher, and show that our attack improves on the
previous distinguisher by a factor of 2^16 in the number of
samples needed. Given 2^72 bytes of output we can
distinguish Py from random with advantage greater than 1/2, or given only a single stream of 2^64 bytes we have
advantage 0.03.
Authenticated Hybrid Encryption for Multiple Recipients
Authenticated encryption schemes used in order to send one message to one recipient have received considerable attention in the last years. We investigate the case of schemes, we call authenticated schemes, that allow one to encrypt efficiently in a public-key setting a message for several, say , recipients in an
authenticated manner. We propose formal security definitions for such
schemes that work also for and which are stronger and/or more
general than those currently proposed. We then present a flexible mode of operation that transforms any authenticated encryption scheme working on small messages into a authenticated encryption scheme working on longer messages. We show that it allows the construction of efficient schemes that are proved secure for the strongest security notion.
Cryptanalysis of recently proposed Remote User Authentication Schemes
Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.’s scheme and made an improvement. In this paper, we show that both Manik et al.’s and Chou et al.’s schemes are insecure against forgery attack and replay attack.
Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms
Low degree annihilators for Boolean functions are
of great interest in cryptology because of algebraic attacks on
LFSR-based stream ciphers. Several polynomial algorithms for
construction of low degree annihilators are introduced in this
paper. The existence of such algorithms is studied for the
following forms of the function representation: algebraic normal
form (ANF), disjunctive normal form (DNF), conjunctive normal form
(CNF), and arbitrary formula with the Boolean operations of
negation, conjunction, and disjunction. For ANF and DNF of a
Boolean function there exist polynomial algorithms that find
the vector space of all annihilators of degree
. For CNF this problem is NP-hard. Nevertheless author
introduces one polynomial algorithm that constructs some subspace
of having formula that represents .
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
We present a general framework for constructing families of elliptic curves of prime order with prescribed embedding degree. We demonstrate this method by constructing curves with embedding degree k = 10, which solves an open problem posed by Boneh, Lynn, and Shacham. We show that our framework incorporates existing constructions for k = 3, 4, 6, and 12, and we give evidence that the method is unlikely to produce infinite families of curves with embedding degree k > 12.
Signatures for Network Coding
This paper presents a practical digital signature scheme to be used in conjunction with network coding. Our scheme simultaneously provides authentication and detects malicious nodes that intentionally corrupt content on the network. The homomorphic property of the signatures allows nodes to sign any linear comination of the incoming packets without contacting the signing authority, but it is computationally infeasible for a node to sign a linear combination of the packets without disclosing what linear combination was used in the generation of the packet. Furthermore, we prove that the signature scheme is secure under well known cryptographic assumptions of the hardness of the Discrete-Log problem and the computational co-Diffie-Hellman problem on elliptic curves. Our scheme has a three-fold advantage over schemes based on homomorphic hashing: Firstly, we do not need to securely transmit hash values of the packets that the source transmits; secondly, since our scheme is based on elliptic curves, smaller security parameters suffice and this translates to improved efficiency since the bit lengths involved are smaller; finally, our scheme provides authentication of the data in addition to detecting pollution of packets.
Improving the Decoding Efficiency of Private Search
Abstract. We show two ways of recovering all matching documents, in the Ostrovsky et al. Private Search [3], while requiring considerably shorter buffers. Both schemes rely on the fact that documents colliding in a buffer position provide the sum of their plaintexts. Efficient decoding algorithms can make use of this property to recover documents never present alone in a buffer position.
A Method to Implement Direct Anonymous Attestation
We propose an efficient anonymous authentication scheme which might be
deployed in the setting of trusted computing platform. Our construction
implements features such as total anonymity, variable anonymity,
and rogue TPM tagging. The new scheme is significantly
simpler, and more efficient than the current solution that has been
adopted in the standard specification. We have proved the new scheme
is secure under the strong RSA assumption, and the decisional Diffie-Hellman assumption.
Cryptographic hash functions from expander graphs
We propose constructing provable collision resistant hash functions from expander graphs. As examples, we investigate two specific families of optimal expander graphs for provable hash function constructions: the families of Ramanujan graphs constructed by Lubotzky-Phillips-Sarnak and Pizer respectively. When the hash function is constructed from one of Pizer's Ramanujan graphs, (the set of supersingular elliptic curves over with -isogenies, a prime different from ), then collision resistance follows from hardness of computing isogenies between supersingular elliptic curves. We estimate the cost per bit to compute these hash functions, and we implement our hash function for several members of the LPS graph family and give actual timings.
Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes
When communicating over a noisy channel, it is typically much easier to deal with random, independent errors with a known distribution than with adversarial errors. This paper looks at how one can use schemes designed for random errors in an adversarial context, at the cost of relatively few additional random bits and without using unproven computational assumptions.
The basic approach is to permute the positions of a bit string using a permutation drawn from a -wise independent family, where . This leads to two new results:
1. We construct *computationally efficient* information reconciliation protocols correcting adversarial binary Hamming errors with optimal communication and entropy loss bits, where is the length of the strings and is the binary entropy function. Information reconciliation protocols are important tools for dealing with noisy secrets in cryptography; they are also used to synchronize remote copies of large files.
2. We improve the randomness complexity (key length) of efficiently decodable capacity-approaching "private codes" from to .
We also present a simplified proof of an existential result on private codes due to Langberg (FOCS '04).
Hermes8 : A Low-Complexity Low-Power Stream Cipher
Since stream ciphers have the reputation to be inefficient in software applications the new stream cipher Hermes8 has been developed. It is based on a 8-bit-architecture and an algorithm with low complexity. The two versions presented here are Hermes8-80 with 23 byte state and 10 byte key and furthermore Hermes8-128 with 37 byte state and 16 byte key. Both are suited to run efficiently on 8-bit micro computers and dedicated hardware (e.g. for embedded systems). The estimated performance is up to one encrypted byte per 118 CPU cycles and one encrypted byte per nine cycles in hardware. The clarity and low complexity of the design supports cryptanalytic methods. The 8x8 sized S-BOX provides the non-linear function needed for proper confusion. Hermes8 uses the well-established AES S-BOX, but works also excellent with well-designed random S-BOXes. Hermes8 withstands so far several attacks by means of statistical tests, e.g. the Strict Avalanche Criterion and FIPS 140-2 are met successfully.
Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks
It has been noted recently that algebraic (annihilator) immunity
alone does not provide sufficient resistance against algebraic attacks. In this regard, given a Boolean function , just checking the minimum degree annihilators of is not enough and one should check the relationsips of the form , and a function , even if it has very good algebraic immunity, is not necessarily good against fast algebraic attack, if degree of becomes very low when degree of
is equal to or little greater than the algebraic immunity of . In this paper we theoretically study the two currently known constructions
having maximum possible algebraic immunity from this viewpoint. To the end, we also experimentally study some cryptographically significant functions having good algebraic immunity.
Threshold and Proactive Pseudo-Random Permutations
Uncategorized
Uncategorized
We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP). Our protocol needs only O(1) communication rounds. It tolerates up to (n-1)/2 of n dishonest servers in the semi-honest environment. Many protocols that use PRPs (e.g., a CBC block cipher mode) can now be translated into the distributed setting. Our main technique for constructing invertible threshold PRPs is a distributed Luby-Rackoff construction where both the secret keys *and* the input are shared among the servers. We also present protocols for obliviously computing pseudo-random functions by Naor-Reingold and Dodis-Yampolskiy with shared input and keys.
Message Modification for Step 21-23 on SHA-0
In CRYPTO 2005, Xiaoyun Wang, Hongbo Yu and Yiqun Lisa Yin proposed an efficient collision attack on SHA-0.
Collision messages are found with complexity SHA-0 operations by using their method.
Collision messages can be obtained when a message satisfying all sufficient conditions is found.
In their paper, they proposed message modifications that can satisfy all sufficient conditions of step 1-20.
However, they didn't propose message modifications for sufficient conditions after step 21.
In this paper, we propose message modifications for sufficient conditions of step 21-23.
By using our message modifications, collision messages are found with complexity SHA-0 operations.
A Family of Dunces: Trivial RFID Identification and Authentication Protocols
Security and privacy in RFID systems is an important and active
research area. A number of challenges arise due to the extremely
limited computational, storage and communication abilities of
a typical RFID tag. This paper describes a step-by-step
construction of a family of simple protocols for inexpensive
untraceable identification and authentication of RFID tags.
This work is aimed primarily at RFID tags that are capable of
performing a small number of inexpensive conventional (as opposed
to public key) cryptographic operations. It also represents the
first result geared for so-called {\em batch mode} of RFID
scanning whereby the identification (and/or authentication) of
tags is delayed. Proposed protocols involve minimal interaction
between a tag and a reader and place very low computational burden
on the tag. Notably, they also impose low computational load on
back-end servers.
Sound Computational Interpretation of Symbolic Hashes in the Standard Model
This paper provides one more step towards bridging the gap between the formal and computational approaches to cryptographic protocols. We extend the well-known Abadi-Rogaway logic with probabilistic hashes and we give precise semantic to it using Canetti's oracle hashing. Finally, we show that this interpretation is computationally sound.
Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings
In 2005, Wen et al. proposed the first provably secure three-party password-based authenticated key exchange using Weil pairings, and provided their proof in a modified Bellare-Rogaway model (BR-model). Here, we show an impersonation attack on Wen et al.¡¦s scheme and point out a main flaw of their model that allows a man-in-the-middle adversary easily violate the security.
Certificate-Based Encryption Without Random Oracles
Uncategorized
Uncategorized
We present a certificate-based encryption scheme which is fully secure in the standard model. Our
scheme is based on the identity-based encryption scheme of Waters \cite{W05}. Although some
generic constructions from IBE to CBE has been previously proposed, they use the Random Oracle
heuristic or provide less practical schemes than ours. Finally, we point out that one of
the existing generic constructions going from IBE to CBE is flawed.
Formal Proof for the Correctness of RSA-PSS
Formal verification is getting more and more important in computer science. However the state of the art formal verification methods in cryptography are very rudimentary. This paper is one step to provide a tool box allowing the use of formal methods in every aspect of cryptography. In this paper we give a formal specification of the RSA probabilistic signature scheme (RSA-PSS) [4] which is used as algorithm for digital signatures in the PKCS #1 v2.1 standard [7]. Additionally we show the correctness of RSA-PSS. This includes the correctness of RSA, the formal treatment of SHA-1 and the correctness of the PSS encoding method. Moreover we present a proof of concept for the feasibility of verification techniques to a standard signature algorithm.
Finding Characteristic Polynomials with Jump Indices
Uncategorized
Uncategorized
Jansen introduced a technique for building LFSRs that can be clocked a large number of times with a single simple operation. These may be useful in the construction of stream ciphers based on clock-controlled LFSRs. However, for LFSR sizes of typical interest, it appears generally hard to find such jumping LFSRs with particular desired parameters. In this note we explain a trick which we used to find the jumping LFSRs in MICKEY and MICKEY-128, and which may be useful for future applications.
Breaking and Fixing Public-Key Kerberos
We report on a man-in-the-middle attack on PKINIT, the public key extension of the widely deployed Kerberos 5 authentication protocol. This flaw allows an attacker to impersonate Kerberos administrative principals (KDC) and end-servers to a client, hence breaching the authentication guarantees of Kerberos. It also gives the attacker the keys that the KDC would normally generate to encrypt the service requests of this client, hence defeating confidentiality as well. The discovery of this attack caused the IETF to change the specification of PKINIT and Microsoft to release a security update for some Windows operating systems. We discovered this attack as part of an ongoing formal analysis of the Kerberos protocol suite, and we have formally verified several fixes to PKINIT that prevent our attack.
A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers
We present a simple algorithm for computing the arithmetic weight of an integer with respect to a given radix r>=2. The arithmetic weight of n is the minimum number of nonzero digits in any signed radix-r representation of n. This algorithm leads to a new family of minimal weight signed radix-r representations which can be constructed using a
left-to-right on-line algorithm. These representations are different from the ones previously reported by Joye and Yen at PKC 2002. The idea behind our algorithm is that of choosing closest elements which was introduced by Muir and Stinson at CT-RSA 2005. Our results have applications in coding theory and in the efficient implementation of public-key cryptography.
Further Discussions on the Security of a Nominative Signature Scheme
A nominative signature scheme allows a nominator (or signer) and a
nominee (or verifier) to jointly generate and publish a signature in
such a way that \emph{only} the nominee can verify the signature and
if necessary, \emph{only} the nominee can prove to a third party
that the signature is valid. In a recent work, Huang and Wang
proposed a new nominative signature scheme which, in addition to the
above properties, \emph{only} allows the nominee to convert a
nominative signature to a publicly verifiable one. In ACISP 2005,
Susilo and Mu presented several algorithms and claimed that these
algorithms can be used by the nominator to verify the validity of a
published nominative signature, show to a third party that the
signature is valid, and also convert the signature to a publicly
verifiable one, all \emph{without} any help from the nominee. In
this paper, we point out that Susilo and Mu's attacks are actually
\emph{incomplete} and {\it inaccurate}. In particular, we show that
there exists no efficient algorithm for a nominator to check the
validity of a signature if this signature is generated by the
nominator and the nominee {\it honestly} and the Decisional
Diffie-Hellman Problem is hard. On the other hand, we point out that
the Huang-Wang scheme is indeed {\it insecure}, since there is an
attack that allows the nominator to generate valid nominative
signatures alone and prove the validity of such signatures to a
third party.
Group Key Agreement for Ad Hoc Networks
Over the last 30 years the study of group key agreement has stimulated much work. And as a result of the increased popularity of ad hoc networks, some approaches for the group key establishment in such networks are proposed. However, they are either only for static group or the memory, computation and communication costs are unacceptable for ad-hoc networks.
In this thesis some protocol suites from the literature (2^d-cube, 2^d-octopus, Asokan-Ginzboorg, CLIQUES, STR and TGDH) shall be discussed. We have optimized STR and TGDH by reducing the memory, communication and computation costs. The optimized version are denoted by µSTR and µTGDH respectively.
Based on the protocol suites µSTR and µTGDH we present a Tree-based group key agreement Framework for Ad-hoc Networks (TFAN). TFAN is especially suitable for ad-hoc networks with limited bandwidth and devices with limited memory and computation capability.
To simulate the protocols, we have implemented TFAN, µSTR and µTGDH with J2ME CDC. The TFAN API will be described in this thesis.
Pairing Calculation on Supersingular Genus 2 Curves
In this paper we describe how to efficiently implement pairing calculation on supersingular genus~2 curves over prime fields. We find that pairing calculation on supersingular genus~2 curves over prime fields is efficient and a viable candidate for practical implementation. We also show how to eliminate divisions in an efficient manner when computing the Tate pairing, and how this algorithm is useful for curves of genus greater than one.
Provably Secure Subsitution of Cryptographic Tools
Many cryptographic protocols secure against malicious players use specially designed cryptographic tools. Essentially, these special tools function much like less-expensive tools, but give extra `powers'
to a reduction or simulation algorithm. Using these powers, cryptographers can construct a proof of security using standard
techniques. However, these powers are not available to either the
honest parties or the adversary. In a large class of protocols, by
replacing the expensive, specially designed cryptographic tool with a
corresponding less-expensive tool, we can improve the protocol's
efficiency without changing the functionality available to either the
adversary or the honest parties. The key motivating question we
address in this paper is whether the new, `substituted' protocol is
still secure.
We introduce a framework for reasoning about this question. Our framework uses translators: special purpose oracles that map outputs of one cryptographic tool to corresponding outputs of a different tool. Translators are similar to, but generally weaker than, the ``angels'' of Prabhakaran and Sahai. We introduce the notion of substitution-friendly protocols and show that such protocols remain secure after substitution in our framework. We also leverage existing proofs of security; there is no need to re-prove security from scratch. We demonstrate our framework with a non-interactive non-malleable bit commitment protocol.
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography
Worldwide symmetric encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard), and EES (Escrowed Encryption Standard), have been -- and some of them still are -- extensively used to solve the problem of communication over an insecure channel, but with today's advanced technologies, they seem to not be as secure as one would like. In this paper, we propose efficient alternatives based on special classes of globally invertible cascaded convolutional transducers. The proposed symmetric encryption techniques have at least four advantages over traditional schemes based on Feistel ciphers. First, the secret key of a cascaded convolutional cryptosystem is usually much more easier to generate. Second, the encryption and decryption procedures are much simpler, and consequentially, much faster. Third, the desired security level can be obtained by just setting appropriate values for the parameters of the convolutional cryptosystem. Finally, they are much more parallelizable than symmetric encryption standards based on Feistel ciphers.
Geometric constructions of optimal linear perfect hash families
A linear -perfect hash family of size in a
vector space of order over a field of order consists of a
sequence of linear functions from to
with the following property: for all subsets
there exists such that is injective
when restricted to . A linear -perfect hash family of
minimal size is said to be optimal. In this paper we use projective geometry techniques to
completely determine the values of for which optimal linear
-perfect hash families exist and give constructions in
these cases. We also give constructions of optimal linear
-perfect hash families.
Homomorphic Cryptosystems and their Applications
In this thesis we consider homomorphic cryptosystems and their applications. Homomorphic cryptosystems allow for computations on encrypted data. We prove that the search for an algebraically homomorphic scheme can be reduced to the search of a homomorphic scheme on a special non-abelian group. Furthermore, we focus on a special application: computing with encrypted functions and data, respectively. For this application we develop an improved protocol that is efficient for functions that are computable by polynomial branching programs. Finally, we generalise the elliptic curve Paillier scheme by S. Galbraith in order to construct a threshold version of it. For this threshold scheme we develop several Sigma-protocols. Using these protocols we apply our threshold scheme on multiparty computations, electronic voting and commitment schemes.
- « Previous
- 1
- ...
- 4
- 5