Elliptic Curve Hash (and Sign)



Similar documents
Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

Table of Contents. Bibliografische Informationen digitalisiert durch

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Cryptography and Network Security Chapter 11

A New Generic Digital Signature Algorithm

Introduction to Computer Security

Signature Schemes. CSG 252 Fall Riccardo Pucella

Generic attacks and index calculus. D. J. Bernstein University of Illinois at Chicago

Evaluation of Digital Signature Process

Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Digital Signature. Raj Jain. Washington University in St. Louis

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

A NEW HASH ALGORITHM: Khichidi-1

Authentication requirement Authentication function MAC Hash function Security of

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

CSCE 465 Computer & Network Security

Computer Security: Principles and Practice

Public Key Cryptography Overview

2. Cryptography 2.4 Digital Signatures

Hash Function JH and the NIST SHA3 Hash Competition

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Lecture 15 - Digital Signatures

One-Way Encryption and Message Authentication

Factoring. Factoring 1

Cryptographic Hash Functions Message Authentication Digital Signatures

Introduction to Cryptography CS 355

Introduction. Digital Signature

Smart card implementation of a digital signature scheme for Twisted Edwards curves

Cryptography Lecture 8. Digital signatures, hash functions

Cryptography and Network Security

Digital Signatures. Prof. Zeph Grunschlag

Length extension attack on narrow-pipe SHA-3 candidates

Implementation of Elliptic Curve Digital Signature Algorithm

Message Authentication

Lecture 9 - Message Authentication Codes

Cryptography and Network Security Chapter 10

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Fundamentals of Computer Security

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

Crittografia e sicurezza delle reti. Digital signatures- DSA

Public Key Cryptography. Performance Comparison and Benchmarking

Digital signatures. Informal properties

Notes on Network Security Prof. Hemant K. Soni

Study of algorithms for factoring integers and computing discrete logarithms

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

The Mathematics of the RSA Public-Key Cryptosystem

Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Practice Questions. CS161 Computer Security, Fall 2008

Implementing Network Security Protocols

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

Security Analysis of DRBG Using HMAC in NIST SP

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Public-Key Cryptanalysis 1: Introduction and Factoring

Hash Functions. Integrity checks

Cryptography and Network Security Chapter 9

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

A new probabilistic public key algorithm based on elliptic logarithms

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

1 Signatures vs. MACs

Elements of Applied Cryptography Public key encryption

A Novel Approach for Signing Multiple Messages: Hash- Based Signature

Integer Factorization using the Quadratic Sieve

Advanced Cryptography

Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves

Overview of Public-Key Cryptography

Public Key (asymmetric) Cryptography

Digital Signatures. What are Signature Schemes?

Lecture 13 - Basic Number Theory.

Digital Signature Standard (DSS)

ARCHIVED PUBLICATION

Network Security. Chapter 6 Random Number Generation

Provable-Security Analysis of Authenticated Encryption in Kerberos

MTAT Cryptology II. Digital Signatures. Sven Laur University of Tartu

CIS433/533 - Computer and Network Security Cryptography

Cryptography: Authentication, Blind Signatures, and Digital Cash

A Factoring and Discrete Logarithm based Cryptosystem

1 Message Authentication

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Communications security

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Recommendation for Applications Using Approved Hash Algorithms

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

CIS 5371 Cryptography. 8. Encryption --

Security Arguments for Digital Signatures and Blind Signatures

Cryptography and Network Security Chapter 12

Public Key Cryptography of Digital Signatures

Transcription:

Elliptic Curve Hash (and Sign) (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep 22-24 2008 Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 1 / 43

Outline 1 Background Evolution Implementation CFV 2 One-Up Problem for ECDSA 3 Conclusion Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 2 / 43

Elliptic Curve Only Hash Definition (High level) Pad message block M i into a point P i. T = i P i (1) Do the same for T. Truncate to get hash H. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 3 / 43

Motivation: SHA-3 Background Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 2 69 collision algorithm for SHA-1 Wang, Yao, Yao: 2 63 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call AHS Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

Motivation: SHA-3 Background Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 2 69 collision algorithm for SHA-1 Wang, Yao, Yao: 2 63 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call AHS Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

Motivation: SHA-3 Background Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 2 69 collision algorithm for SHA-1 Wang, Yao, Yao: 2 63 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call AHS Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

Motivation: SHA-3 Background Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 2 69 collision algorithm for SHA-1 Wang, Yao, Yao: 2 63 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call AHS Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

Motivation: SHA-3 Background Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 2 69 collision algorithm for SHA-1 Wang, Yao, Yao: 2 63 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call AHS Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

Motivation: SHA-3 Background Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 2 69 collision algorithm for SHA-1 Wang, Yao, Yao: 2 63 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call AHS Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

Motivation: SHA-3 Background Wang, Feng, Lai, Yu: collision FOUND in MD5. Wang, Yin, Yu: 2 69 collision algorithm for SHA-1 Wang, Yao, Yao: 2 63 collision algorithm for SHA-1 NIST: please use SHA-2 NIST: is SHA-2 ok? NIST: SHA-3 competition, AES-style Some like to call AHS Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 4 / 43

Discrete Log Hash: CHP Background Definition (Chaum, van Heijst, Pfitzmann (1991)) H(m, n) = mp + nq Theorem A collision in H gives log P (Q). Proof. If H(a, b) = H(c, d), then and solving log P (Q) = a c d b ap + bq = cp + dq (2) mod n. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 5 / 43

Discrete Log Hash: CHP Background Definition (Chaum, van Heijst, Pfitzmann (1991)) H(m, n) = mp + nq Theorem A collision in H gives log P (Q). Proof. If H(a, b) = H(c, d), then and solving log P (Q) = a c d b ap + bq = cp + dq (2) mod n. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 5 / 43

Discrete Log Hash: CHP Background Definition (Chaum, van Heijst, Pfitzmann (1991)) H(m, n) = mp + nq Theorem A collision in H gives log P (Q). Proof. If H(a, b) = H(c, d), then and solving log P (Q) = a c d b ap + bq = cp + dq (2) mod n. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 5 / 43

CHP Pros and Cons Background Provably secure assuming ECDLP hard. 3m/2 EC adds per 2m bits. Compression factor 2, must be iterated. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 6 / 43

Background Discrete Log Hash 2: MuHASH Definition (Bellare and Micciancio (1997)) Let P i = F (i M i ), where F is a random oracle. Let H = i P i (3) Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 7 / 43

MuHASH Advantages Background One EC add per m bits. E.g. 384 times faster than CHP. Parallelizable. Incremental: H = H P i + P i Provably secure, assuming ECDLP hard and F random oracle. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 8 / 43

MuHASH Disadvantages Background Assumes F is a random oracle. Insecure if F insecure. Must already have a collision-resistant F. SHA-1? SHA-2? SHA-3? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 9 / 43

s Design Rationale Evolution Leverage from MuHASH: Speed. Parallelizability. Incrementality. Avoid reliance on pre-existing F. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 10 / 43

EECH Evolution Replace F by fixed key block cipher: H = i F (i M i ) (4) Encrypted Elliptic Curve Hash (EECH) born. No collisions in F, guaranteed. Model F by ideal cipher. Rehash Bellare and Micciancio s security proof. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 11 / 43

EECH Evolution Replace F by fixed key block cipher: H = i F (i M i ) (4) Encrypted Elliptic Curve Hash (EECH) born. No collisions in F, guaranteed. Model F by ideal cipher. Rehash Bellare and Micciancio s security proof. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 11 / 43

EECH Evolution Replace F by fixed key block cipher: H = i F (i M i ) (4) Encrypted Elliptic Curve Hash (EECH) born. No collisions in F, guaranteed. Model F by ideal cipher. Rehash Bellare and Micciancio s security proof. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 11 / 43

EECH Evolution Replace F by fixed key block cipher: H = i F (i M i ) (4) Encrypted Elliptic Curve Hash (EECH) born. No collisions in F, guaranteed. Model F by ideal cipher. Rehash Bellare and Micciancio s security proof. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 11 / 43

EECH Evolution Replace F by fixed key block cipher: H = i F (i M i ) (4) Encrypted Elliptic Curve Hash (EECH) born. No collisions in F, guaranteed. Model F by ideal cipher. Rehash Bellare and Micciancio s security proof. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 11 / 43

Oops: Not 1-way Evolution Unlike MuHASH, F now invertible. If adversary knows M 1 and M 3 but not M 2, then 2 M 2 = F 1 (H(M 1, M 2, M 3 ) F (1 M 1 ) F (3 M 3 )) (5) Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 12 / 43

Oops: Not 1-way Evolution Unlike MuHASH, F now invertible. If adversary knows M 1 and M 3 but not M 2, then 2 M 2 = F 1 (H(M 1, M 2, M 3 ) F (1 M 1 ) F (3 M 3 )) (5) Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 12 / 43

Fix it up. Evolution Post-process with one-way function? Scalar multiply? EECH again? Pairing? Checksum in extra block? Seems to thwart block inversion attack. Interferes with incrementality. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 13 / 43

Evolution Ouch: Not collision resistant! Let 2 D = F 1 (F (1 A) + F (2 B) F (1 C)) (6) Probability of index 2 appearing depends its bit length. Try that many C values, until it works. Then F (1 A) + F (2 B) = F (1 C) + F (2 D), (7) i.e. a collision H(A, B) = H(C, D). Second preimage attack! Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 14 / 43

Fix it again. Evolution Pad M i, before applying F. If F random enough, inverting will not give requisite padding. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 15 / 43

Evolution Now that EECH is all fixed... just set F to the identity function. Elliptic Curve Only Hash. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 16 / 43

Evolution Now that EECH is all fixed... just set F to the identity function. Elliptic Curve Only Hash. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 16 / 43

Evolution Now that EECH is all fixed... just set F to the identity function. Elliptic Curve Only Hash. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 16 / 43

vs. EECH Evolution Purity of. No dependence on ideal cipher model. No performance cost of enciphering. is already slow enough. Is it more crazy to: encrypt with a fixed key, do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

vs. EECH Evolution Purity of. No dependence on ideal cipher model. No performance cost of enciphering. is already slow enough. Is it more crazy to: encrypt with a fixed key, do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

vs. EECH Evolution Purity of. No dependence on ideal cipher model. No performance cost of enciphering. is already slow enough. Is it more crazy to: encrypt with a fixed key, do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

vs. EECH Evolution Purity of. No dependence on ideal cipher model. No performance cost of enciphering. is already slow enough. Is it more crazy to: encrypt with a fixed key, do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

vs. EECH Evolution Purity of. No dependence on ideal cipher model. No performance cost of enciphering. is already slow enough. Is it more crazy to: encrypt with a fixed key, do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

vs. EECH Evolution Purity of. No dependence on ideal cipher model. No performance cost of enciphering. is already slow enough. Is it more crazy to: encrypt with a fixed key, do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

vs. EECH Evolution Purity of. No dependence on ideal cipher model. No performance cost of enciphering. is already slow enough. Is it more crazy to: encrypt with a fixed key, do nothing? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 17 / 43

Evolution Security Proof? Generic group model! Detailed version in progress. Big deal... Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 18 / 43

Security Attack!?! Evolution Semaev summation polynomial f n (X 1,..., X n ) = 0 if and only if there exist Y i with (X 1, Y 1 ) + + (X n, Y n ) = 0. Degree in each variable 2 n 2 Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 19 / 43

Evolution Second Preimage Attack on Given X 3 and X 4. Find X 1 and X 2, such that (X 1, Y 1 ) + (X 2, Y 2 ) = (X 3, Y 3 ) + (X 4, Y 4 ) which implies f 4 (X 1, X 2, X 3, X 4 ) = 0 Total degree 2(2 4 2 ) = 4. X i = c i Z i + d i, where Z i has low degree. g(z 1, Z 2 ) = 0 Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 20 / 43

Security Proof?????? Evolution Semaev: low degree solutions to Summation polynomials can be used to solve ECDLP. Contrapositive: if ECDLP hard, then hard to find low degree solutions. But: degrees much higher than Semaev degrees. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 21 / 43

Security Proof?????? Evolution Semaev: low degree solutions to Summation polynomials can be used to solve ECDLP. Contrapositive: if ECDLP hard, then hard to find low degree solutions. But: degrees much higher than Semaev degrees. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 21 / 43

Security Proof?????? Evolution Semaev: low degree solutions to Summation polynomials can be used to solve ECDLP. Contrapositive: if ECDLP hard, then hard to find low degree solutions. But: degrees much higher than Semaev degrees. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 21 / 43

Curve Choice Implementation NIST recommended curves: B-283, B-409, B-571. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 22 / 43

Why Binary? Implementation y solved by quadratic equation involving x containing padded message block. Quadratic equations faster in binary fields than in prime fields Use linear half-trace function (not square root) Use look up tables. Bonus: Intel announced AVX will include binary polynomial multiplier. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 23 / 43

Why Binary? Implementation y solved by quadratic equation involving x containing padded message block. Quadratic equations faster in binary fields than in prime fields Use linear half-trace function (not square root) Use look up tables. Bonus: Intel announced AVX will include binary polynomial multiplier. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 23 / 43

Why Binary? Implementation y solved by quadratic equation involving x containing padded message block. Quadratic equations faster in binary fields than in prime fields Use linear half-trace function (not square root) Use look up tables. Bonus: Intel announced AVX will include binary polynomial multiplier. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 23 / 43

Why Binary? Implementation y solved by quadratic equation involving x containing padded message block. Quadratic equations faster in binary fields than in prime fields Use linear half-trace function (not square root) Use look up tables. Bonus: Intel announced AVX will include binary polynomial multiplier. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 23 / 43

Why Binary? Implementation y solved by quadratic equation involving x containing padded message block. Quadratic equations faster in binary fields than in prime fields Use linear half-trace function (not square root) Use look up tables. Bonus: Intel announced AVX will include binary polynomial multiplier. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 23 / 43

Reference implementation Implementation Coded by Matt J. Campagna (who also helped with specification of details) Features: Bit lookups for trace function Table lookups for squaring and half-trace Basic shift-and-xor polynomial multiply Affine coordinates Rate on a desktop: 0.14 MB/s Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 24 / 43

Possible optimizations Implementation Other coordinates? Not predicted to help. Better multiplication: Should help somewhat. Simultaneous inversions: Each solving for y requires inversion. Each addition requires inversion. These can be replaced a few inversion and a corresponding number of multiplies. Predicted speedup: maybe five times? Parallelization Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 25 / 43

Hash with a Twist Implementation Bernstein: x-only DH with invalid x thrown to the twist. EECH/: every x maps to a point on curve or its twist Get one total and twisted total Sum these on curve over quadratic extension. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 26 / 43

Dreaming doesn t hurt Implementation 0.14 MB/s x 5 (simultaneous inversion, etc.) x 10 (Intel AVX) x 10 (ten CPU multicore) = 70 MB/s Faster than SHA-1? Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 27 / 43

CFV People who have helped me Matt Campagna René Struik Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 28 / 43

Call for Volunteers CFV Implementers Cryptanalysis Security provers Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 29 / 43

Convertible Group One-Up Problem for ECDSA Definition A group G and a function f : G Z. Use multiplicative notation for G. Call f the conversion function. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 30 / 43

One-Up Problem One-Up Problem for ECDSA Definition Given a, b G, find c such that c = ab f (c) (8) One is up: a 1. One c is up. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 31 / 43

Convertible DSA One-Up Problem for ECDSA Definition Let g G have order n. Let h : {0, 1} Z be a hash function. Then (r, s) is a valid signature on message m {0, 1} under public key y G, only if gcd(s, n) = 1 and r = f ( (g h(m) y r) 1/s mod n ). (9) Includes DSA. Includes ECDSA. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 32 / 43

One-Up Problem for ECDSA So what s up with this problem? Theorem If the one-up problem for (G, f ) is solvable, then Convertible DSA for (G, f, g, h) is forgeable. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 33 / 43

Hard up? One-Up Problem for ECDSA Conjecture For the (G, f ) in ECDSA, solving the 1-up problem costs about n group operations and converstions. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 34 / 43

Up s enough? One-Up Problem for ECDSA Conjecture Convertible DSA resists universal forgery against key-only attacks (UF-KOA) if 1 Discrete logs hard in G. 2 One up hard in (G, f ). 3 Hash h mod n is rarely zero. More powerful forgery attacks resisted if hash has further security properties (e.g. collision resistance). Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 35 / 43

Up over log? One-Up Problem for ECDSA If discrete logs easy,... Can one-up problem be hard? Maybe, if f... is random oracle. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 36 / 43

Up under log? One-Up Problem for ECDSA In generic group model, If advesary gets access to one-up oracle, then Discrete logs still hard. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 37 / 43

Semilog problem One-Up Problem for ECDSA Definition (ECC 2001, Advances in ECC) A semilog of y is a pair (r, s) which would be valid signature under public key y if the message had hash equal to one. Theorem (ECC 2001/Advances in ECC) ECDSA resists UF-KOA if and only if semilog is hard and hash is rarely zero. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 38 / 43

One-Up Problem for ECDSA Semilog = Fork(Log, 1up) Theorem The semilog problem, with one component is fixed, is equivalent to the discrete log problem if r is fixed. the 1-up problem if s is fixed. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 39 / 43

One-Up Problem for ECDSA Diffie-Hellman Disguised as One-Up If f (x) = log g (x), then One-up problem equivalent to DHP This f is impractial, so result is only theoretical. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 40 / 43

One-Up Problem for ECDSA One-Up as Obstacle Pointcheval and Stern couldn t prove ECDSA secure in random oracle model, assuming only hard log. Paillier and Vergnaud argued ECDSA couldn t be proved secure in the random oracle model, assuming hard log (unless one-more log problem was easy). Perhaps one-up problem was hidden obstacle. Not possible to prove ECDSA secure given only hard log, because one-up could be easy. In practice, though, one-up seems harder than log! Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 41 / 43

One-Up Problem for ECDSA One-Up as Obstacle Pointcheval and Stern couldn t prove ECDSA secure in random oracle model, assuming only hard log. Paillier and Vergnaud argued ECDSA couldn t be proved secure in the random oracle model, assuming hard log (unless one-more log problem was easy). Perhaps one-up problem was hidden obstacle. Not possible to prove ECDSA secure given only hard log, because one-up could be easy. In practice, though, one-up seems harder than log! Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 41 / 43

One-Up Problem for ECDSA One-Up as Obstacle Pointcheval and Stern couldn t prove ECDSA secure in random oracle model, assuming only hard log. Paillier and Vergnaud argued ECDSA couldn t be proved secure in the random oracle model, assuming hard log (unless one-more log problem was easy). Perhaps one-up problem was hidden obstacle. Not possible to prove ECDSA secure given only hard log, because one-up could be easy. In practice, though, one-up seems harder than log! Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 41 / 43

One-Up Problem for ECDSA One-Up as Obstacle Pointcheval and Stern couldn t prove ECDSA secure in random oracle model, assuming only hard log. Paillier and Vergnaud argued ECDSA couldn t be proved secure in the random oracle model, assuming hard log (unless one-more log problem was easy). Perhaps one-up problem was hidden obstacle. Not possible to prove ECDSA secure given only hard log, because one-up could be easy. In practice, though, one-up seems harder than log! Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 41 / 43

One-Up Problem for ECDSA One-Up as Obstacle Pointcheval and Stern couldn t prove ECDSA secure in random oracle model, assuming only hard log. Paillier and Vergnaud argued ECDSA couldn t be proved secure in the random oracle model, assuming hard log (unless one-more log problem was easy). Perhaps one-up problem was hidden obstacle. Not possible to prove ECDSA secure given only hard log, because one-up could be easy. In practice, though, one-up seems harder than log! Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 41 / 43

One-Up Problem for ECDSA ECDSA with No bit twiddling pure algebra. Use the same curve for both. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 42 / 43

Conclusion Conclusion ECC: not just for PKC and RNGs, anymore! : who needs need bit twiddling, now? ECDSA: One-up? Okay. Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 43 / 43