1 Adaptive Witness Encryption and Asymmetric Password-based Cryptography PKC 2015 March 31, 2015 Mihir Bellare UC San Diego Viet Tung Hoang University.

Slides:



Advertisements
Similar presentations
Computational Privacy. Overview Goal: Allow n-private computation of arbitrary funcs. –Impossible in information-theoretic setting Computational setting:
Advertisements

Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions PKC 2010 May 27, 2010 Petros Mol, Scott Yilek 1 UC, San Diego.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
1 Adam O’Neill Leonid Reyzin Boston University A Unified Approach to Deterministic Encryption and a Connection to Computational Entropy Benjamin Fuller.
Key Exchange Using Passwords and Long Keys Vladimir Kolesnikov Charles Rackoff Comp. Sci. University of Toronto.
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
S EMANTICALLY - SECURE FUNCTIONAL ENCRYPTION : P OSSIBILITY RESULTS, IMPOSSIBILITY RESULTS AND THE QUEST FOR A GENERAL DEFINITION Adam O’Neill, Georgetown.
TAMPER DETECTION AND NON-MALLEABLE CODES Daniel Wichs (Northeastern U)
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Perfect and Statistical Secrecy, probabilistic algorithms, Definitions of Easy and Hard, 1-Way FN -- formal definition.
Oblivious Transfer based on the McEliece Assumptions
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Overview of Cryptography Anupam Datta CMU Fall A: Foundations of Security and Privacy.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Apr 4, 2003Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Cryptography Lecture 8 Stefan Dziembowski
CIS 450 – Network Security Chapter 8 – Password Security.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
Feb 17, 2003Mårten Trolin1 Previous lecture Practical things about the course. Example of cryptosystem — substitution cipher. Symmetric vs. asymmetric.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
TAMPER DETECTION AND NON-MALLEABLE CODES Daniel Wichs (Northeastern U)
CS555Spring 2012/Topic 71 Cryptography CS 555 Topic 7: Stream Ciphers and CPA Security.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
1 Differential Privacy Cynthia Dwork Mamadou H. Diallo.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
1 / 23 Efficient Garbling from A Fixed-key Blockcipher Applied MPC workshop February 20, 2014 Mihir Bellare UC San Diego Viet Tung Hoang UC San Diego Phillip.
PKCS #5 v2.0: Password-Based Cryptography Standard
Cryptography Lecture 10 Arpita Patra © Arpita Patra.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
A Fixed-key Blockcipher
Selective-opening security in the presence of randomness failures
B504/I538: Introduction to Cryptography
Modern symmetric-key Encryption
Topic 14: Random Oracle Model, Hashing Applications
Topic 11: Authenticated Encryption + CCA-Security
Cryptographic Hash Functions Part I
Cryptography Lecture 12.
Cryptography Lecture 4.
Cryptography Lecture 6.
Cryptography Lecture 10.
Topic 7: Pseudorandom Functions and CPA-Security
Cryptography Lecture 25.
Cryptography Lecture 11.
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Cryptographic Hash Functions Part I
Cryptography Lecture 4.
Cryptography Lecture 5.
Cryptography Lecture 3.
Cryptography Lecture 9.
Cryptography Lecture 11.
Cryptography Lecture 10.
Cryptography Lecture 21.
Presentation transcript:

1 Adaptive Witness Encryption and Asymmetric Password-based Cryptography PKC 2015 March 31, 2015 Mihir Bellare UC San Diego Viet Tung Hoang University of Maryland Georgetown University

2 Client Server Password Hashed password Hash Random salt Symmetric Enc Protect clients’ passwords if server gets compromised Password-based encryption Using passwords for protecting privacy is ubiquitous.

3 When server gets compromised -Most prior works focus on protecting weak passwords against dictionary attacks Does it mean that strong passwords have no security issue? Privacy of past communication is lost, as getting the hashed passwords is enough to decrypt prior ciphertexts memory-hard functions [P09] honey encryption [JR14]

4 Today - Formalize Asymmetric Password-based Encryption (APBE) Non-invasive APBE Invasive APBE New security definition needed Notion in [GGSW13] isn’t enough for their own applications Their subsequent fixes affect achievability or usability Past communication remains secure even if the hashed passwords are leaked - Prescribe a new password hash - Simple and practical -Use an existing password hash  Preserve legacy hashed passwords - Built from witness encryption [GGSW13]

5 APBE, informal view Client Server Password Hashed password Hash Random salt PKE Hashed password is public key Secret key can be derived from password & salt Past communication remains secure even if the hashed passwords are leaked Can be relaxed to model Google’s End-To-End

6 Formalizing APBE APBE scheme F = (F.Ph, F.Enc, F.Dec) deterministic F.Ph 1 k, pw salt hpw F.Enc 1 k, m, hpw salt c $ F.Dec 1 k, c, pw salt m  Correctness : F.Dec(1 k, F.Enc(1 k, m, F.Ph(1 k, pw, salt), salt) = m

7 Security of APBE A1A1 pw Vector of arbitrarily correlated passwords Each individual password must be unpredictable Match input length of F.Ph A vector sa of random salts is generated, with |sa| = |pw| F.Ph 1 k, pw[ i ] sa[ i ] hpw[ i ] A2A2 b  {0, 1} $ LR(.,.,. ) ( m 0, m 1, i ) F.Enc(1 k, m b, hpw[ i ], sa[ i ]) Adv apbe ( k ) = F, A (A 1, A 2 )

8 Achieving invasive APBE efficiently: Scheme APBE1 1 k, pw H salt: used as hash key Gen Public key Secret key hpw coins Correlated passwords should give seemingly unrelated coins Solution: Related-Input Pseudorandomness (RIP)  An implicit assumption on existing password-hashing functions Use a keyed hash function H and a PKE  = (Gen, Enc, Dec) Can achieve APBE efficiently if we have the choice of F.Ph [GOR11]

9 Achieving invasive APBE efficiently: Scheme APBE1 A1A1 pw Vector of unpredictable passwords The RIP notion H 1 k, pw[ i ] sa[ i ]: random hash key hpw[ i ] A2A2 b  {0, 1} $ b = 1 sa[ i ], hpw[ i ] are randomly generated b = 0 1 k, sa, hpw Theorem: If H is RIP-secure and  is IND-CPA-secure then APBE1 is a secure APBE scheme

10 Achieving non-invasive APBE -Problem: In many systems, it’s not possible to change the current hash, because of legacy hashed passwords -Goal: Non-invasive APBE  Must use existing hashed passwords as public keys F.Ph is a given password-hashing function H Can make assumption on security of H but can’t prescribe H ’s design

11 The tool: Witness encryption - WE = (WE.Enc, WE.Dec) associated with an NP language L c  WE.Enc(1 k, x, m ) Use a string x as public key x  WE.Dec(1 k, w, c ) $ Witness w for membership of x in L - Security (informal): WE provides good privacy protection of messages if one uses x  L as public key [GGSW13] Nothing is said about using x  L as public key

12 Achieving non-invasive APBE from WE: Scheme APBE2 Need: Witness encryption with adaptive security (AS) New security definition Also needed for applications of [GGSW13] A ( x, m 0, m 1,state) c  WE.Enc(1 k, x, m b ) AS security b  {0, 1} $ $ ( c, state) AS can be realized directly from iO [GGH+13]

13 Achieving non-invasive APBE from WE: Scheme APBE2 Theorem: If H is RIP-secure, WE is AS-secure, and 2 H.il – H.ol is negligible then APBE2 is a secure APBE scheme Security of WE speaks nothing about using x  L for encrypting  some property of L needed The language L for WE: L = { (1 k, salt, H (1 k, salt, pw)) } is in NP WE.Enc m, (1 k, salt, hpw) c $ WE.Dec c, (1 k, salt, pw) m Problem: Can’t cover cases like H = iterated SHA-1 (H.ol = 160 bits) with 24-character passwords (H.il = 156 bits) Can circumvent if use an extractable WE [GKP+13] When use x  L for encrypting, if A breaks the scheme  extract a witness of x

14 Why new security definition for WE? Soundness security [GGSW13]: For every PT A, every x  L, every equal-length m 0 and m 1, there is a negligible such that for every k Fix x and grow k to make advantage small Problem: In applications, typically, each x corresponds to a fixed k For example, in the PKE of [GGSW13] use x of length 2 k

15 SS isn’t enough for applications WE WE f SS-secure Behaves like WE, but leaks the message if | x |  f ( k ) transform For a counter-example for the PKE of [GGSW13], use f ( k ) = 2 k Theorem: WE f is still SS-secure, if f is non-decreasing, PT-computable, and f ( t )  when t  Intuition: For a fixed x, if k is sufficiently large then f ( k ) > | x |

16 SS versus AS SS[ L ]AS[ L ] If {0, 1} * \ L is infinite For L  NP Counter-example that SS doesn’t imply AS: WE WE f SS-secure transform Want: AS-insecure Behaves like WE, but leaks the message if | x |  f ( k ) Range of f is N  There are infinitely many values of k such that {0, 1} f ( k ) \ L ≠  - To preserve SS security of WE f : f is non-decreasing, PT-computable, and f ( t )  when t  - To break AS security: Want to efficiently find x  L with | x | = f ( k ) (if exists)

17 SS versus AS WE WE f transform Idea: Exploit the fact that L  NP  EXP There is constant d such that we check if z  L in time Solution: Use Can find x such that | x | = f ( k ) and x  L (if exists) in time - To preserve SS security of WE f : f is non-decreasing, PT-computable, and f ( t )  when t  -To break AS security: Want to efficiently find x  L with | x | = f ( k ) (if exists) Range of f needs to be N

18 Fixing SS is not as easy as it seems It’s not just “a problem of order of quantifiers” SS2 Notion [GGSW13a, KNY14]: There is a negligible such that for every PT A, every x  L, every equal-length m 0 and m 1, and every k Achievability problem: It’s impossible to achieve SS2 Reason (informal): WE can’t have statistical security [GGSW13]  Advantage bound can’t be independent of adversary

19 Fixing SS is not as easy as it seems SS3 Notion [GGSW13b, GLW14]: For every PT A, there is a negligible such that for every x  L, every equal-length m 0 and m 1, and every k Usability problem: When use WE for a PKE, can encrypt bit-by-bit only Reason: IND-CPA adversary A can choose its m 0 and m 1, but WE adversary B doesn’t have that choice  Reduction doesn’t work Fix: Consider a non-uniform B B can run A with the best coins, which are given to B as advice  AS is more convenient to use and less error-prone

20 Conclusion -AS improves the clarity and usability of WE -(Invasive) APBE should be employed instead of standard password-based encryption whenever possible Usability