Computational Soundness of Symbolic Security and Implicit Complexity



Similar documents
Lecture 5 - CPA security, Pseudorandom functions

1 Message Authentication

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

1 Construction of CCA-secure encryption

Lecture 9 - Message Authentication Codes

MACs Message authentication and integrity. Table of contents

Message Authentication Code

Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak

Ch.9 Cryptography. The Graduate Center, CUNY.! CSc Theoretical Computer Science Konstantinos Vamvourellis

Lecture 15 - Digital Signatures

Victor Shoup Avi Rubin. Abstract

An Overview of Common Adversary Models

Talk announcement please consider attending!

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

Simulation-Based Security with Inexhaustible Interactive Turing Machines

Post-Quantum Cryptography #4

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives

Formal Methods in Security Protocols Analysis

Lecture 2: Complexity Theory Review and Interactive Proofs

Security Analysis of DRBG Using HMAC in NIST SP

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre

MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC

Introduction. Digital Signature

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Provable-Security Analysis of Authenticated Encryption in Kerberos

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

Chosen-Ciphertext Security from Identity-Based Encryption

Message Authentication Codes 133

Lecture 11: The Goldreich-Levin Theorem

CryptoVerif Tutorial

MAC. SKE in Practice. Lecture 5

Authentication and Encryption: How to order them? Motivation

Yale University Department of Computer Science

CPSC 467b: Cryptography and Computer Security

Security Aspects of. Database Outsourcing. Vahid Khodabakhshi Hadi Halvachi. Dec, 2012

Verifying security protocols using theorem provers

Proofs in Cryptography

GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Yehuda Lindell Bar-Ilan University

How to prove security of communication protocols?

How to Formally Model Features of Network Security Protocols

Cryptography. Lecture Notes from CS276, Spring Luca Trevisan Stanford University

Lecture 13: Message Authentication Codes

Public Key Encryption that Allows PIR Queries

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

Authenticated encryption

How To Verify A Bluetooth Device Pairing With A Human Eye Oracle

Capture Resilient ElGamal Signature Protocols

Cryptography and Network Security: Summary

Lecture 3: One-Way Encryption, RSA Example

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

Cryptography and Network Security, PART IV: Reviews, Patches, and Theory 1 / 53

Non-interactive and Reusable Non-malleable Commitment Schemes

The Complexity of Online Memory Checking

On-Line/Off-Line Digital Signatures

Improved Online/Offline Signature Schemes

Length extension attack on narrow-pipe SHA-3 candidates

MTAT Cryptology II. Digital Signatures. Sven Laur University of Tartu

Department Informatik. Privacy-Preserving Forensics. Technical Reports / ISSN Frederik Armknecht, Andreas Dewald

On Factoring Integers and Evaluating Discrete Logarithms

Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm

Identity-Based Encryption from the Weil Pairing

CSG 399 Lecture. The Inductive Approach to Protocol Analysis p.1

Reconsidering Generic Composition

Security Analysis for Order Preserving Encryption Schemes

Chapter 12. Digital signatures Digital signature schemes

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Advanced Cryptography

Adversary Modelling 1

Privacy-Providing Signatures and Their Applications. PhD Thesis. Author: Somayeh Heidarvand. Advisor: Jorge L. Villar

Chapter 16: Authentication in Distributed System

SYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1

2.1 Complexity Classes

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Certified Security Proofs of Cryptographic Protocols in the Computational Model : an Application to Intrusion Resilience

Digital Signatures. What are Signature Schemes?

VERIFIABLE SEARCHABLE SYMMETRIC ENCRYPTION

Schnorr Blind Signatures and Insights From a Computer Network Marketing Model

1 Signatures vs. MACs

Secure Deduplication of Encrypted Data without Additional Independent Servers

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

APPLYING FORMAL METHODS TO CRYPTOGRAPHIC PROTOCOL ANALYSIS: EMERGING ISSUES AND TRENDS

Chapter 11. Asymmetric Encryption Asymmetric encryption schemes

Verifiable Delegation of Computation over Large Datasets

Entangled Encodings and Data Entanglement

Transcription:

Computational Soundness of Symbolic Security and Implicit Complexity Bruce Kapron Computer Science Department University of Victoria Victoria, British Columbia NII Shonan Meeting, November 3-7, 2013

Overview We would like to be use secure cryptographic primitives (e.g., block ciphers, hash functions) in schemes and protocols which realize some security functionality Problem: how do we validate the correctness of these constructions? Two traditional approaches: symbolic and computational Can we relate the two? Can implicit complexity help?

Symbolic model Basic model: Dolev-Yao [Dolev Yao 82] Primitives achieve perfect security Adversaries are in total control of execution and communication 1. May initiate any number of executions of a protocol in any role with any party 2. Can intercept and modify any message, or send arbitrary messages to active parties Adversaries are nondeterministic concern is with the existence of an attack No computational assumptions

A well-known success story Needham-Schroeder public-key protocol 1 A B : {A.N A } kb 2 B A : {N A.N B } ka 3 A B : {N A } kb At the end of this protocol, A and B might assume: (1) they know with whom they have been interacting, (2) they agree on the values N a and N b and (3) no one else knows N a and N b

Lowe s attack on NSPK Using a model-checking approach in a Dolev-Yao framework, [Lowe 1996] demonstrated the following interleaving attack. Oscar runs two copies α and β of this protocol concurrently (one as the receiver with A and one as the initiator, impersonating A with B). α.1 A O : {A.N A } ko β.1 O(A) B : {A.N A } kb β.2 B O(A) : {N A.N B } ka α.2 O A : {N A.N B } ka α.3 A O : {N B } ko β.3 O(A) B : {N B } kb

Dolev-Yao model pros and cons Simple symbolic model allows automated reasoning (theorem proving or model checking) useful for discovering flaws in protocols Semantics is not clear what does it mean when a protocol is shown to be correct? Mismatch with computational cryptography idealized (perfect) primitives, adversaries are computationally unbounded and nondeterministic.

Computational security Cryptographic primitives are modeled as PPT algorithms, Security holds against poly-time adversaries. Security is formulated probabilistically adversaries may have some (small) chance of success Reduction paradigm: to show a scheme S built using primitives P 1,..., P 2 is secure, show that for any advesary A which breaks S there is an adversary A which breaks one of the P i s Black-box reductions: A = M A for some poly-time OTM M

Example Asymptotic CPA security of encryption An encryption scheme is a triple Gen, Enc, Dec where Gen, Enc are PPT functions and Dec is a deterministic poly-time function such that for any k Rng(Gen), and any message m, Dec(k, Enc(k, m)) = m An adversary is a pair A = A q, A c where A q is a poly-time OTM and A c is PPT

CPA security continued Security is defined using the following game, which depends on a security parameter n 1. k Gen(1 n ) 2. A q is given oracle access to Enc(k, ) and 1 n as input and outputs the transcript h of its interaction with the oracle, plus a challenge pair m 0, m 1 3. A c is given t and Enc(k, m b ) for a random b {0, 1} and outputs a guess b A s advantage is Pr[b = b ] 1 2 The scheme is secure if there is a negligible function ν such that every adversary s advantage is bounded by ν(n)

Computational approach pros and cons Schemes and protocols are formulated in a compuational model Security guarantees closely related to security achievable by implementation (concrete approach offers quantifiable guarantees) Definitions are complex just defining security of a primitive like encryption requires the use of OTMs Proofs are even more complex involve reductions between (ostensibly) type-2 functions, in a probabilistic setting Proof automation is difficult (but not impossible, e.g., [Blanchet 07],[Barthes et. al. 12])

Relating the two views Goal: Achieving the best of the two worlds. One possible approach: Computational Soundness: computational security guarantees from symbolic proofs. Typical form: Protocol Π is symbolically secure generic instantiations of Π (under exactly-defined secure primitives) are computationally secure. This enables: Doing proofs in a symbolic model (without explicitly dealing with complexity-based notions), and obtaining computational security from (once and for all) established computational soundness theorems.

Symbolically secure encryption Abadi & Rogaway 2001: The first result of this kind. Limited to eavesdropping adversaries and single-message protocols. Many extensions since then in the eavesdropping setting ([Micciancio Warinschi 02], [Herzog 04],... ) [MW 04] security of trace-based properties (e.g. authentication) against non-adaptive active adversaries, messages cannot contain secret keys [Hajiabadi K 13] extension to adaptive adversaries, reduced restrictions on secret keys in messages

Abadi-Rogaway model Expressions represent messages built using encryption and simple data constructors, e.g., {{k 1 } k2.k 3 } k4 Adversarial knowledge is modeled inductively: F kr (E, K) denotes the set of keys recoverable from E assuming keys in K are already known We take the least fixed point of λk.f kr (E, K) to obtain E s recoverable keys all other keys in E are hidden The pattern of E is obtained by replacing subexpressions of the form {E } k, where k is hidden in E, by. Expressions E, F are equivalent (E F ) if they have the same pattern, up to renaming of keys

Abadi-Rogaway model If we interpret encryption computationally (e.g. by a CPA-secure encryption scheme) then for any n, an expression E has a natural interpretation [ E ] as a distribution over {0, 1} p(n) for some polynomial p Distribution ensembles X = {X } n and Y = {Y } n are computationally indistinguishable (X Y ) if for every n any PPT adversary has negligible in n advantage in distinguishing between a sample from X n and one from Y n Abadi-Rogaway soundness result (roughly): if E, F are expressions with no key cycles, then E F = [ E ] [ F ] Original result formulated for a more restictive form of encrpytion security

A more foundational approach? Some drawbacks of the A-R model specific to a particular primitive and adversarial model, soundness proof follows the pattern of a standard computational security proof (i.e. reduction) Each time we introduce a variation of this logic, a new computational soundness proof will be required We will consider a different approach with connections to ICC (at least syntatic modeling of complexity) A logical analogue to cryptography based on generic assumptions (OWF PRG PRF CPA-encryption) One goal: soundness of A-R style logics via interpretation in a more generic logic

Formalizing computational indistinguishability This approach introduced by [Impagliazzo, K 03] A distribution ensemble is samplable if there is a there is a poly time function which is given n uniform bits of randomness and generates a sample from X n We can just view samplable ensembles as PPT functions, which can be presented by using a standard function algebra (we used Cobham, but more implicit approaches would work as well) with primitives for randomization rand(n) and rs(n) Can give axioms and rules for f g Possible to define basic primitives, e.g., f is a PRG if f (rs(n)) rs(n + 1)

Formalizing computational soundness Can we prove the soundness of A-R by interpreting it in the IK system? We are working on an approach which will prove soundness for certain encryption schemes based on pseudorandom functions (PRFs) Goal one: modeling PRFs (pseudorandom functions) and using them to define encryption in the IK system Goal two: proving A-R soundness by interpretation Goal three (somewhat orthgonal): formally proving PRG PRF (mimicking the construction of [Goldreich, Goldwasser, Micali 86])

Modeling PRFs Need to model state and interaction in a function algebra a natural candidate is BFF 2. We ll give a rough description of how this is done. Let B = {0, 1}. An oracle (intensional function) is a pair f = s f, a f where s f : S f B S f and a f : S f B B We assume that elements of S A just consist of A s randomness and its query history An adversary is a triple A = q A, s A, e A where q A : S A B, s A : S A B B and e A : S A B

Modeling interaction For σ S A, τ S f, Step(A, f, σ, τ) equals σ, τ where σ = s A (σ, a), τ, a = f (τ, q) and q = q A (σ). We can now use feasible iteration to define Step so that if A is polytime in its input, then for sufficiently large n, e A (Step 1 (A, f, σ 0(1 n ), τ 0 (1 n ), 1 n )) is identically distributed to A f (1 n ) This will allow us to define indistinguishability of intensional functions f g can lift axiomatiztion of to one for

Defining PRFs in this setting Consider the intensional function ρ whose state consists of a sequence of pairs of elements of B corresponding to the queries that it has made. ρ is defined as follows: suppose σ = ( q 1, a 1,..., q k, a k ). If there is some j k with q = q j, then ρ(σ, q) = σ, a i where i = (µj k)(q = q j ). Otherwise, ρ(σ, q) = r rs(n). σ q, r, r Then for a length preserving f (i.e. f (x) = x,) f is a PRF if f ρ.

Conclusions and future work There are now a variety of computationally sound symbolic systems for reasoning about security (in the A-R style. There are many other approaches that we haven t even mentioned.) Generic logics for computational indistinguishability could provide a more basic framework for reasoning about security logics for specific primitives or security models proved sound by interpretation Can model, e.g., PRFs To do: finish up Goals 2 and 3