On a Traitor Tracing Scheme from ACISP 2003

Slides:



Advertisements
Similar presentations
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Public Key Encryption Algorithm
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
Public Key Cryptography
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 NTRU: A Ring-Based Public Key Cryptosystem Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman LNCS 1423, 1998.
RSA Question 2 Bob thinks that p and q are primes but p isn’t. Then, Bob thinks ©Bob:=(p-1)(q-1) = Á(n). Is this true ? Bob chooses a random e (1 < e
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.

RSA and its Mathematics Behind
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Introduction to Algorithms Second Edition by Cormen, Leiserson, Rivest & Stein Chapter 31.
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Algebra of RSA codes Yinduo Ma Tong Li. Ron Rivest, Adi Shamir and Leonard Adleman.
RSA and its Mathematics Behind July Topics  Modular Arithmetic  Greatest Common Divisor  Euler’s Identity  RSA algorithm  Security in RSA.
Cryptography & Network Security : Topic Seminar Description & Analysis Madhava.N 1RV06SCN05 2 nd Semester M.Tech CNE RVCE RSA ALGORITHM.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
RSA The algorithm was publicly described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Partly used for PGP (Pretty Good Privacy) to encrypt.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Information and Computer Security CPIS 312 Lab 8 1 Asymmetric Key Algorithms RSA Algorithm TRIGUI Mohamed Salim.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Overview Modern public-key cryptosystems: RSA
Public Key Cryptography
Theft-protected Proprietary Certificates
Public Key Encryption Major topics The RSA scheme was devised in 1978
Public Key Encryption.
Mathematics of Cryptography
Topic 26: Discrete LOG Applications
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Identity Based Encryption
Advanced Algorithms Analysis and Design
PUBLIC-KEY ENCRYPTION Focusing on RSA
Public Key Encryption and Digital Signatures
Network Security.
Outline of implementation
RSA and El Gamal Cryptosystems
Public-key Cryptography
Elliptic Curves.
IEEE TRANSACTIONS ON INFORMATION THEORY, JULY 1985
Background: Lattices and the Learning-with-Errors problem
Elliptic Curve Cryptography (ECC)
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
Topic 25: Discrete LOG, DDH + Attacks on Plain RSA
Number Theory and Euclidean Algorithm
ElGamal Public-Key Systems over GF(p) & GF(2m)
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data An, Sanghong KAIST
Analysis of the RSA Encryption Algorithm
Digital Signatures.
Network Security.
A New Provably Secure Certificateless Signature Scheme
Where Complexity Finally Comes In Handy…
A Secret Enriched Visual Cryptography
CSC 774 Advanced Network Security
Where Complexity Finally Comes In Handy…
Introduction to Algorithms Second Edition by
z , and therefore u =  x ~ /s is an approximation of p z.
Oblivious Transfer.
The RSA Public-Key Encryption Algorithm
Where Complexity Finally Comes In Handy…
Public-Key Cryptography Quadratic Residues and „Rabin Lock“
Presentation transcript:

On a Traitor Tracing Scheme from ACISP 2003 Dongvu Tonien dongOuow.edu.au Abstract At ACISP 2003 conference, Narayanan, Rangan and Kim proposed a secret-key traitor tracing scheme used for pay TV system. In this note, we point out a flaw in their scheme. 1 The Narayanan-Rangan-Kim scheme Let m be the number of services (data providers), n be the number of users, t be the collusion threshold, and S be the tolerance bound on accusing innocent users as traitors. Let e denote the Euler constant. The following describes main algorithms in the Narayanan-Rangan-Kim pay TV scheme. Algorithm Setup: with security parameter le, the setup algorithm does the following. Choose two large primes p, q and set N = pq such that N has £ bits; Choose a random number R such that RO(N) + 1 has a divisor d of roughly £ bits; Choose 2f-bit numbers d1, d2, d3 which are divisible by d and gcd(di, d3) = d; Choose random numbers 4, d5, , dt+4 E {1,2, , 0(N)}; Runs the constraint generation algorithm: Generate et logs constraints divided into h = e logs groups. A constraint -y (Po, ul, it2, • • • , Pt, P) represents the equation EL0 tCixi = 0 (mod P) where P is a prime. Each constraint group contains t constraints of the same prime; For each j = 1, , n, generate a vector x = (xo, , ...x1 , xt) = (e4J, e5j, . , et+4,i) as follows: select each of the constraints with probability 1 — x is constructed so that it satisfies all the selected constraints. Algorithm Add User: if a user Ui (1 < j < n) joins the system, do the following. Select a random even number ei,j; Retrieve vector (e4,i, e5,,... , et+4,i) from the Setup algorithm; Choose e2 j and e3 j so that Ertl = RO(N) + 1; Give user Ui the following (t 4)-tuple (ei,j, e2 j, e3 j, e4 j, e5 j• • • • , et+4,j) as his/her secret decryption key. 1

= e4,id4 + e5,id5 + • • • + et+4,idt+4 — (RO(N) + 1) = 0 (mod d). Algorithm AddStream: if a data provider (or stream) Si joins the system, do the following. Give t + 4 secret numbers d1, d2, , dt+4 to Si; Choose a random g, E of high order modulo N; Give Si the value g, as its secret encryption key. Algorithm Subscribe: if a user Uj subscribes to a stream Si, do the following. Set the subscribe matrix entry Subsc[i,j] = 1; Give user Uj the value g71'' . Algorithm Unsubscribe: if a user Uj unsubscribes to a stream Si, do the following. Set the subscribe matrix entry Subsc[i, j] = 0; Reset the value g, of the stream Si to a new value new g,; Re-subscribes all users who are currently subscribing to Si (that is, give each user Uk that subscribes to Si the new value new giel'k). Algorithm Broadcast: if a stream Si wants to broadcast a program M, then Si uses its secret encryption key g, to do the following. Choose a random number z coprime to 0(N); Calculate and broadcast the following ciphertext (z, C2, C3, . . . , Ct+4) (z mdi g md2 md3 mdt+4). Algorithm Decryption: if user Uj subscribes stream Si, then Uj can use its secret encryption key (ei,j, e2,,... ,et+4,i) and the value giel' to decrypt a ciphertext (z, Cl, C2, C3, • • • , Ct+4) broad-casted by Si as follows C2e2'j C3e3'j Ctet+44'i Al1 . (gr,i )z 2 A Flaw This flaw is in the algorithm Add User. In the step 3 of this algorithm, two numbers e2,i, e3,i must be chosen so that el,j dl + e2,id2 + e3,id3 + e4,id4 + e5,id5 et+4,idt+4 = RO(N) + 1. Since d1, d2 and d3 are all divisible by d, the necessary condition for this equation is solvable for e2j, e3,i is = e4,id4 + e5,id5 + • • • + et+4,idt+4 — (RO(N) + 1) = 0 (mod d). 2

Therefore, we have n equations on t + 1 numbers d4, d5, • • • , dt+4 as follows Ai = e4,1d4 + e5,1d5 + ... + et+4,idt+4 — (RO(M) + 1) = (mod d) 02 = e4,2d4 + e5,2d5 + • • + et+4,2dt+4 — (RO(M) + 1) = An = e4,Thd4 + e5,Thd5 + • • • + et+4,ndt+4 — (RO(M) + 1) = Since n is much larger than t, this is unlikely to be satisfied. Note that in the algorithm Setup, t + 1 numbers d4, d5, ... , dt+4 are randomly chosen independently with the generation of the n vectors (e4,1, • • • ,et+4,1), (e4,2, • • • ,et+4,2), • • • , (e4,n, • • • ,et+4,n)• Since the flaw is in a crucial component, the Add User algorithm of the system, the pay TV scheme proposed by Narayanan, Rangan and Kim is unusable. References [1] A. Narayanan, C.P. Rangan and K. Kim, Practical Pay TV Schemes, ACISP'03, LNCS 2727 (2003), pp. 192-203. 3