Sample or Random Security A Security Model for Segment-Based Visual Cryptography



Similar documents
Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

1 Construction of CCA-secure encryption

Authentication and Encryption: How to order them? Motivation

Talk announcement please consider attending!

MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC

Authenticated encryption

Message Authentication Code

Provable-Security Analysis of Authenticated Encryption in Kerberos

A low-cost Alternative for OAEP

Lecture 9 - Message Authentication Codes

CryptoVerif Tutorial

SYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre

Cryptography and Network Security, PART IV: Reviews, Patches, and Theory 1 / 53

MACs Message authentication and integrity. Table of contents

Lecture 5 - CPA security, Pseudorandom functions

Advanced Topics in Cryptography and Network Security

MAC. SKE in Practice. Lecture 5

On the Security of CTR + CBC-MAC

CIS 5371 Cryptography. 8. Encryption --

Post-Quantum Cryptography #4

Lecture 15 - Digital Signatures

Security Aspects of. Database Outsourcing. Vahid Khodabakhshi Hadi Halvachi. Dec, 2012

Computational Soundness of Symbolic Security and Implicit Complexity

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

1 Message Authentication

Lecture 3: One-Way Encryption, RSA Example

Chapter 11. Asymmetric Encryption Asymmetric encryption schemes

Security Analysis for Order Preserving Encryption Schemes

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives

Threat modeling of the security architectures of various wireless technologies

Identity-Based Encryption from the Weil Pairing

Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions

Ciphertext verification security of symmetric encryption schemes

An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication

Lecture 13: Message Authentication Codes

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

CS 758: Cryptography / Network Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Security Analysis of DRBG Using HMAC in NIST SP

Lecture 25: Pairing-Based Cryptography

Advanced Cryptography

An Application of Visual Cryptography To Financial Documents

Chosen-Ciphertext Security from Identity-Based Encryption

The Misuse of RC4 in Microsoft Word and Excel

Department Informatik. Privacy-Preserving Forensics. Technical Reports / ISSN Frederik Armknecht, Andreas Dewald

Module 1: e- Learning

CPSC 467b: Cryptography and Computer Security

On the Security of the Tor Authentication Protocol

Public Key Cryptography: RSA and Lots of Number Theory

Cryptography and Network Security

Low-Latency Cryptographic Protection for SCADA Communications

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Yale University Department of Computer Science

On the Security of Double and 2-key Triple Modes of Operation

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay

An Overview of Common Adversary Models

Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak

Reconsidering Generic Composition

Cryptography: Authentication, Blind Signatures, and Digital Cash

Symmetric Crypto MAC. Pierre-Alain Fouque

A Secure and Efficient Conference Key Distribution System

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Lectures for the course: Electronic Commerce Technology (IT 60104)

Chapter 3. Network Domain Security

Table of Contents. Bibliografische Informationen digitalisiert durch

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Message Authentication Codes 133

Cryptography and Network Security: Summary

Chosen-Ciphertext Security from Identity-Based Encryption

Transcription:

Sample or Random Security A Security Model for Segment-Based Visual Cryptography Sebastian Pape Dortmund Technical University March 5th, 2014 Financial Cryptography and Data Security 2014 Sebastian Pape Sample or Random Security March 5th, FC14 1 / 24

Overview 1 Introduction Visual Cryptography 2 Sample-Or-Random Security 3 Summary and Outlook Sebastian Pape Sample or Random Security March 5th, FC14 2 / 24

Introduction SOR-CO Summary and Outlook Scenario Untrustworthy Hardware / Software Sebastian Pape Sample or Random Security March 5th, FC14 3 / 24

Visual Cryptography - Idea (a) Transparencies side by side (b) Transparencies stacked Sebastian Pape Sample or Random Security March 5th, FC14 4 / 24

Pixel-based Visual Crypt. (Naor and Shamir, 1994) + = Figure: Example Figure: Shares With 4 Sub-pixels in a 2x2 Matrix Sebastian Pape Sample or Random Security March 5th, FC14 5 / 24

Segment-based Visual Cryptography (Borchert, 2007) Overlay Top Layer (a) full (b) c 1 (c) c 2 Bottom Layer Table: Contingency Table (d) k (e) c 1 k (f) c 2 k Sebastian Pape Sample or Random Security March 5th, FC14 6 / 24

Dice Codings (Doberitz, 2008) + Ciphertext Dec Key = Key Cipher Table: Contingency Table Plaintext (5) Sebastian Pape Sample or Random Security March 5th, FC14 7 / 24

Visual Cryptography - Application Figure: Keypad of a cash machine Figure: Keypads in visual Cryptography (Borchert, 2007) Sebastian Pape Sample or Random Security March 5th, FC14 8 / 24

Reminder: Reusing Key-Transparencies (1) + (2) = (1) + (3) = (2) + (3) = Figure: Combination of 3 transparencies Sebastian Pape Sample or Random Security March 5th, FC14 9 / 24

Overview 1 Introduction 2 Sample-Or-Random Security Real-Or-Random Security Sample-Or-Random Security Relation between ROR CPA and SOR CO Evaluation 3 Summary and Outlook Sebastian Pape Sample or Random Security March 5th, FC14 10 / 24

Real-Or-Random (ROR CPA) Bellare et al. (1997) Experiment Exp ror cpa b (n) = b k GenKey(1 n ) Key generation b R {0, 1} Random choice of b b A O RR(,b) Adversary tries to determine b Adversary s advantage Adv = Pr[correct] Pr[false] Adv ror cpa (n) def = Pr[Exp ror cpa 1 (n) = 1] Pr[Exp ror cpa 0 (n) = 1] Sebastian Pape Sample or Random Security March 5th, FC14 11 / 24

Why Ciphertext-Only Securitymodel? CPA is not suitable for visual cryptography Adversary may not have access to an encryption oracle CPA is too strong use of XOR allows determining the key e.g. encryptions of or 8 Allow Trade-off: Weaker securitymodel vs. easier key handling CO-Securitymodel Sample Structure sample struct sample struct returns a finite set of plaintexts following the pattern of struct. Example for Γ = {0, 1,..., n} Π(0, 1,..., n) sample keypad R {γ γ = γ 0 γ 1... γ n i, j with 0 i, j n. γ i γ j } Sebastian Pape Sample or Random Security March 5th, FC14 12 / 24

Sample-Or-Random (SOR CO) Experiment Exp sor co b (n) = b k GenKey(1 n ) Key generation b R {0, 1} Random choice of b b A O SR(struct) Adversary tries to determine b Adversary s advantage Adv sor co (n) def Adv = Pr[correct] Pr[false] = Pr[Exp sor co 1 (n) = 1] Pr[Exp sor co 0 A, Π (n) = 1] Sebastian Pape Sample or Random Security March 5th, FC14 13 / 24

Relation between ROR CPA and SOR CO LOR-CPA Bellare et al. (1997) ROR-CPA? SOR-CO Figure: Relation between Securitymodels for Symmetric Encryption Sebastian Pape Sample or Random Security March 5th, FC14 14 / 24

Relation between ROR CPA and SOR CO Theorem Notion of SOR CO is weaker than ROR CPA. Lemma 1: [ROR CPA SOR CO] If an encryption scheme Π is secure in the sense of ROR CPA, then Π is also secure in the sense of SOR CO. Lemma 2: [SOR CO ROR CPA] If there exists an encryption scheme Π which is secure in the sense of SOR CO, then there is an encryption scheme Π which is secure in the sense of SOR CO but not ROR CPA. Sebastian Pape Sample or Random Security March 5th, FC14 15 / 24

[SOR CO ROR CPA] Proof Lemma 2: [SOR CO ROR CPA] If there exists an encryption scheme Π which is secure in the sense of SOR CO, then there is an encryption scheme Π which is secure in the sense of SOR CO but not ROR CPA. Sketch of Proof Assumption: Π = (GenKey, Enc, Dec), SOR CO-secure exists Derive Π = (GenKey, Enc, Dec ), Lemma 2a: SOR CO-secure, Lemma 2b: but not ROR CPA-secure Idea: mark ciphertexts, to contradict ROR CPA-security Sebastian Pape Sample or Random Security March 5th, FC14 16 / 24

[SOR CO ROR CPA] derived encryption scheme Sample struct sample 1 sample keypad R {γ γ = γ 0 γ 1... γ n i, j with 0 i, j n. γ i γ j } Algorithms Π = (GenKey, Enc, Dec ): Algorithm GenKey (1 n ): Algorithm Enc k (m): k GenKey(1 n ) c Enc k (c) Algorithm Dec k (c ): c = α 1 α 2... α c return k if m = 0... 0 c := α 2... α c then c := 0 c m := Dec k (c) else return m c := 1 c return c Sebastian Pape Sample or Random Security March 5th, FC14 17 / 24

[SOR CO ROR CPA] Lemma 2a - Details Lemma 2a: Π = (GenKey, Enc, Dec ) is secure in the sense of SOR CO given the sample structure sample 1. Proof. b = 0 ( sample mode ): No change, 0... 0 never appears b = 1 ( random mode ): Negligible Adv, Pr[0... 0] = 1 (n+1) n+1 Adv sor co (n) = Pr[Exp sor co 1 (n) = 1] Pr[Exp sor co 0 A, Π (n) = 1] Pr[Exp sor co 1 (n) = 1] + Adv Pr[Exp sor co 0 A, Π (n) = 1] = Adv sor co (n) + Adv Sebastian Pape Sample or Random Security March 5th, FC14 18 / 24

[SOR CO ROR CPA] Lemma 2b - Details Lemma 2b: Π = (GenKey, Enc, Dec ) is not secure in the sense of ROR CPA. Proof. Adversary asks O RR (, b) for encryption of 0... 0. If O RR 0... b = 0 ( real mode ) If O RR 1... b = 1 ( random mode ) Adv ror cpa A cpa,π (n) = Pr[Exp ror cpa 1 A cpa,π (n) = 1] Pr[Exp ror cpa 0 A cpa,π (n) = 1] = 1 1 (n + 1) n+1 0 Sebastian Pape Sample or Random Security March 5th, FC14 19 / 24

Relation between ROR CPA und SOR CO Lemma 2: [SOR CO ROR CPA] If there exists an encryption scheme Π which is secure in the sense of SOR CO, then there is an encryption scheme Π which is secure in the sense of SOR CO but not ROR CPA. Theorem SOR CO is weaker than ROR CPA. LOR-CPA Bellare et al. (1997) ROR-CPA SOR-CO Sebastian Pape Sample or Random Security March 5th, FC14 20 / 24

Evaluation: SOR CO at 7-Segment / Dice Codings Difference of 2 Keypad- Ciphertexts is even Adversary asks for 2 ciphertexts if difference is even b = 0 ( sample mode ) if difference is odd b = 1 ( random mode ) Adv sor co (n) = Pr[Exp sor co 1 (n) = 1] Pr[Exp sor co 0 A, Π (n) = 1] = Pr[A = rand O = rand] Pr[A = rand O = samp] = 1 2 0 Idea for countermeasure: add noise to the ciphertexts Sebastian Pape Sample or Random Security March 5th, FC14 21 / 24

Dice Codings with Noise + = Ciphertext Key Plaintext (4) Figure: Visualization for n = 9 and ν = 7 Dec Key Cipher Table: Contingency Table Sebastian Pape Sample or Random Security March 5th, FC14 22 / 24

Overview 1 Introduction 2 Sample-Or-Random Security 3 Summary and Outlook Sebastian Pape Sample or Random Security March 5th, FC14 23 / 24

Summary and Open Questions SOR CO Securitymodel Relation to ROR CPA Visual encryption scheme making use of noise Conjecture: SOR-CO-secure if parameters chosen accordingly SOR CO-security Is Random-or-Sample Security a sufficient choice SampleA-or-SampleB Security? What about active adversaries? Dice codings with noise Given n and ν for how many ciphertexts is the scheme SOR-CO-secure? Sebastian Pape Sample or Random Security March 5th, FC14 24 / 24

References References References I M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. In Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS 97), pages 394 403, 1997. B. Borchert. Segment-based visual cryptography. Technical Report WSI-2007-04, Wilhelm-Schickard-Institut für Informatik, Tübingen, 2007. D. Doberitz. Visual cryptography protocols and their deployment against malware. Master s thesis, Ruhr-Universität Bochum, Germany, 2008. M. Naor and A. Shamir. Visual cryptography. In A. D. Santis, editor, EUROCRYPT, volume 950 of Lecture Notes in Computer Science, pages 1 12. Springer, 1994. ISBN 3-540-60176-7. Sebastian Pape Sample or Random Security March 5th, FC14 25 / 24