1 Cryptographically Strong Pseudorandom Functions and Their Applications 陳昱升 碩士學位論文 中興大學 資訊科學系 2006 年 6 月.

Slides:



Advertisements
Similar presentations
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Advertisements

Xiutao Feng Institute of Software Chinese Academy of Sciences A Byte-Based Guess and Determine Attack on SOSEMANUK.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CIS 5371 Cryptography 3b. Pseudorandomness.
Digital Signatures and Hash Functions. Digital Signatures.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
Foundations of Cryptography Lecture 12 Lecturer: Moni Naor.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
1 Chapter 5 Hashes and Message Digests Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
On The Cryptographic Applications of Random Functions Oded Goldreich Shafi Goldwasser Silvio Micali Advances in Cryptology-CRYPTO ‘ 84 報告人 : 陳昱升.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Hellman’s TMTO 1 Hellman’s TMTO Attack. Hellman’s TMTO 2 Popcnt  Before we consider Hellman’s attack, consider simpler Time-Memory Trade-Off  “Population.
1 Secure Indexes Author : Eu-Jin Goh Presented by Yi Cheng Lin.
YA-TRAP: Yet Another Trivial RFID Authentication Protocol Gene Tsudik International Conference on Pervasive Computing and Communications, PerCom 2006.
Lecturer: Moni Naor Foundations of Cryptography Lecture 9: Pseudo-Random Functions and Permutations.
Foundations of Cryptography Lecture 9 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Foundations of Cryptography Rahul Jain CS6209, Jan – April 2011
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions J. Buchmann, E. Dahmen, A. Hülsing | TU Darmstadt |
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Message Authentication Requirements Disclosure Release of message contents to any person or process not possessing the appropriate cryptographic key Traffic.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2015 Nitesh Saxena.
Primitive Operations. Communication Operations –Reader to tag Read Write –Tag to Tag Read Write Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256,
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
WEP Protocol Weaknesses and Vulnerabilities
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
Block Cipher- introduction
RFID SECURITY.
1 Key-Exchange Protocol Using Pre-Agreed Session-ID Kenji Imamoto Kyushu University, JAPAN.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
Cryptography Lecture 6 Arpita Patra © Arpita Patra.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
CS555Spring 2012/Topic 81 Cryptography CS 555 Topic 8: Pseudorandom Functions and CPA Security.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
PKCS #5 v2.0: Password-Based Cryptography Standard
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
CS555Spring 2012/Topic 141 Cryptography CS 555 Topic 14: CBC-MAC & Hash Functions.
Cryptographic Hash Functions
Modern symmetric-key Encryption
Cryptographic Hash Functions
Cryptography Lecture 12.
Revisting Unpredictability-Based RFID Privacy Models
Cryptography Lecture 7.
Cryptography Lecture 5.
Cryptography Lecture 8.
Topic 13: Message Authentication Code
Cryptography Lecture 10.
Cryptography Lecture 9.
Presentation transcript:

1 Cryptographically Strong Pseudorandom Functions and Their Applications 陳昱升 碩士學位論文 中興大學 資訊科學系 2006 年 6 月

2 Outline Introduction –Randomness and Pseudorandomness –Pseudorandom Bit Generator (PRBG) –Pseudorandom Function (PRF) The GGM construction of PRFs from PRBGs Performance Improvement for the GGM Construction of PRFs Applications –Previous work –A RFID protocol for identifying merchandise

3 Introduction

4 Introduction Randomness Randomness –a concept of the equality of probability. Application of Randomness –scientific experiments –one-time pad system Generate randomness – Not easy –hardware –program –no way to prove their randomness

5 Introduction Pseudorandomness Pseudorandomness – our goal –Will not be efficiently distinguished from randomness by any adversary. Pseudorandom Bit Generator (PRBG) –Keeping the input (random seed) to a PRBG secret, the PRBG’s output is pseudorandom. Pseudorandom Function (PRF) –Keeping the key (random) of a PRF secret, the PRF’s behavior is pseudorandom.

6 Pseudoranom Bit Generator (PRBG) x (secret seed) …… truly random string Random function x f(x) On query x, a random function returns a random value. Pseudorandom function (PRF) x f(x) Pseudorandom function: Input-output behavior is computationally indistinguishable from that of a random function. Computationally Indistinguishable! Illustrations

7 The GGM construction of PRFs The GGM (Goldreich Goldwasser Micali) construction of PRFs –a generic method using PRBGs as build blocks. Let G: {0,1} k →{0,1} 2k be a PRBG. –G(x)=b 1 b 2 …b k b k+1 …b 2k –G 0 (x)=b 1 b 2 …b k –G 1 (x)=b k+1 b k+2 …b 2k

8 The GGM construction (conti.) Construct a PRF f k in the following way – is a randomly chosen key. –if is a query to f x, then

9 α

10 Other PRFs PRFs from Pseudorandom Synthesizers. PRFs based on DDH-assumption and Factoring assumption. PRFs based on Factoring assumption.

11 Performance Improvement for the GGM Construction of PRFs

12 Performance Analysis of the GGM construction At the (i-1)-th iteration, we compute G 0 (x) if α i =0 and compute G 1 (x) if α i =1. Denote T 0 and T 1 as the cost of generating G 0 (x) and G 1 (x), respectively. Assume that G generates pseudorandom bits sequentially. Then T 1 is about twice T 0. Then, the expected cost of evaluating the PRF is

13 The Variant of the GGM Construction Consider processing c bits per iteration. We have a 2 c -ary-tree construction for some constant integer c. PRBG x is a randomly chosen key. Define the functionas

14

15 is a PRF Prove by contradiction. Suppose that there exists a PPT A F that can distinguish from a random function with probability 1/Q(k), where Q(k) is a polynomial. Then use A F to construct another PPT A G that can distinguish the underlying PRBG with probability at least, which should be negligible. Contradiction. Therefore, any choice of c=O(logk) can still make the functions pseudorandom. (Because we must ensure that the length of G’s output 2 c k is a polynomial).

16 Figure 4 Illustration of using A F to construct A G

17 Performance Analysis of the Variant For c=2, we have In general, we have It can be verified that if c > 2. That is, the performance of the 4-ary-tree construction is optimal among all similar tree constructions.

18 Analysis of the Variant (Conti.) The previous analysis assumes that the underlying PRBG G generates pseudorandom bits sequentially. If the underlying PRBG G allows random access to any k-bit pseudorandom string with the same cost T 0. Then At most, by choosing c=logk we can shorten the depth of the tree to k/logk. Then

19 Summary We have given analysis and improvements for the GGM construction: –the 4-ary-tree (c=2) construction has the best performance on average if G generates bits sequentially. –the k-ary-tree (c=logk) construction if G allows random access with the same cost.

20 Applications of PRFs

21 Previous Work Checking the correctness of memory –Check the correctness of a large unreliable memory, given only a small reliable memory. Pseudo-Random Permutation –basic primitives in block ciphers. Storageless distribution of users’ secrets –assign (U,f x (U)) to user U. Message authentication –message m with a short tag f s (m). Identification –A group shares a common secret s. Members can identify each other through challenge r and response f s (r).

22 A RFID protocol for identifying merchandise Our goal – an ideal RFID protocol –protect against tag cloning attacks –resist against malicious tracing –efficiency of the protocol the server can quickly identify tags the communication cost is low. tag Server Reader tag Database

23 The difficulty of designing an ideal RFID protocol To be against cloning attacks or malicious tracing –a tag’s reply should not be constant. But a floating identifier of a tag causes the performance problem in the server –the server may need to maintain a sorting table. To be against DoS attack –To prevent the desynchronization attack, the tag may need to authenticate the reader.

24 A general challenge-response RFID protocol in order to mutually authenticate…

25 Our proposal Main idea –A mutual authentication protocol is usually needed to fulfill the security requirements. Such a protocol needs at least 4 times of transmission each identification. –To breakthrough the bottleneck, we divide the situation of a product into three phases. ( Ⅰ ) Warehouse phase ( Ⅱ ) Transfer phase ( Ⅲ ) Housekeeping phase

26 The three phases Warehouse phase –A product is in this phase before it is sold. Need to be against tag counterfeiting. Not need to be against malicious tracing. Transfer phase –The seller sells the product to the customer. Housekeeping phase –The customer owns and keeps the product. Need to be against malicious tracing. Not need to be against tag counterfeiting. The performance on the server is less concerned because the customer has less tags to identify.

27 The proposed protocol Initial Setting Each tag has a PRF and needs a small amount of memory: Choices of PRFs: SHA, MD5, DES, AES TypeRead-OnlyRewritable Write-Once Read-Many Value ID i KiKi SiSi MiMi Purpose The unique identification value of a tag The key of the PRF f Depend on the phase Separate different phase Size N tags would need about logN bits. 128 bits (adjust to the strength of security) the same as K i 1 bit

28 The proposed protocol ( Ⅰ ) Warehouse phase The server can quickly identify the tag. is used to be against tag cloning.

29 The proposed protocol ( Ⅱ ) Transfer phase The reader first obtains the value S i of the tag from the backend server and sends to the tag. The tag compares S i with its S i. If they are the same, set M i to 0 and update S i to. The seller tells the buyer K i as a secret.

30 To identify the tag, the server finds a key K i in its database which satisfies y=f Ki (S i ). The proposed protocol ( Ⅲ ) Housekeeping phase.

31 Security Analysis Tag counterfeiting –In Warehouse phase, an adversary may collect a set U={ (x,y=f Ki (x)) } with |U|=t. –For a new challenge x’, the probability to forge y’ Eavesdropping –A tag’s ID i can be eavesdropped. But ID i does not reveal any information about the product.

32 Security Analysis (conti.) Malicious tracing –In Housekeeping phase, a tag replies (S i,y=f Ki (S i )) and updates S i. –S i can be used to traced only if S i repeats. –For a random function f, the series f(x), f(f(x)), f(f(f(x))), … is expected to repeat at the –In our protocol, S i is expected to repeat at the 2 |D|/2, i.e th round. DoS attack –No desynchronization attack. –S i will not be quickly exhausted.

33 Efficiency analysis In Warehouse phase –the server can quick identify the tag by ID i. In Housekeeping phase –a tag replies a floating identifier. The server needs to do a search. But we assume the customer’s tags are no more than thousands. Each phase can be done in only 1 round –better than a mutual authentication protocol.

34 Conclusion We give analysis and improvements for the GGM construction of PRFs from PRBGs. We give analysis and improvements for the GGM construction of PRFs from PRBGs. –the 4-ary-tree (c=2) construction if G generates bits sequentially. –the k-ary-tree (c=logk) if G allows random access with the same cost. We propose a RFID protocol for identifying merchandise. We propose a RFID protocol for identifying merchandise. –Against tag cloning attacks –Against malicious tracing –Efficient

35 Thanks!