1 September, 2002 doc:.: 802.15-02/386r0 Daniel V. Bailey, William Whyte, Ari Singer, NTRU 1 Project: IEEE P802.15 Working Group for Wireless Personal.

Slides:



Advertisements
Similar presentations
1 November, 2002 doc:.: /480r0 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Advertisements

Doc.: IEEE a-Updating-15-7-security Submission May 2015 Robert Moskowitz, HTT ConsultingSlide 1 Project: IEEE P Working Group for.
Doc.: IEEE s Submission January 2015 Mineo Takai, Space-Time EngineeringSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE xxxxx Submission doc. : IEEE doc. : IEEE pac Nov 2012 Slide 1 Project: IEEE P Working.
Doc.: IEEE Submission March 2012 Jani Pellikka, Andrei Gurtov (University of Oulu)Slide 1 Project: IEEE P Working Group.
Doc.: IEEE /145r0 Submission November 1999 Rick Alfvin, KodakSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE /0395r1 Submission July 2004 Dr. John R. Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Doc.: IEEE xxxxx Submission doc. : IEEE Nov 2012 Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE /0136r0 Submission March 2006 Abbie Mathew, NewLANS Project: IEEE P Working Group for Wireless Personal Area Networks Submission.
1 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
July 2004 Jay Bain, Fearn Consulting doc.: IEEE /0379r0 Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE /0xxr0 Submission January, 2001 Allen Heberling, Eastman Kodak CompanySlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission November 2012 Sunggeun Jin (ETRI)Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
1 April, 2002 doc:.: /207r1 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE Submission doc. : IEEE March 2009 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission November 2003, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE /155r1 Submission March 2002 John Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE Submission September 2013 Li, Hernandez, Dotlic, Miura, NICT Slide 1 Project: IEEE P Working Group for Wireless.
Doc.: IEEE /430r0 Submission José A. Gutierrez November 02 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
September 2006 Bruce Bosco, MotorolaSlide 1 doc.: IEEE c Submission Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE xxxxx Submission doc. : IEEE Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P
Doc.: IEEE b Submission Aug H. Shao, H. Dai, J. Zhang, Mitsubishi ElectricSlide 1 Project: IEEE P Working Group for Wireless.
Doc.: IEEE Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Communicating.
Doc.: IEEE g TG4g Presentation Jan 2010 C.S. Sum1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)‏
Doc.: IEEE c Submission July, 2005 Skafidas,Pollock,Saleem, NICTASlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /0392r0 Submission July 2005 Dr. John R. Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Doc.: IEEE g Submission March 2011 Xing Tao (SIMIT/WSNIRI), Khanh Tuan Le (TI) Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /0111r1 Submission May 2006 LEE, CUNYSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE e Submission July 2009 Andy Summers, Skip Ashton, EmberSlide 1 Project: IEEE P Working Group for Wireless Personal.
14 March 2002 doc.: IEEE /152r1 Gregg Rasor, MotorolaSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks.
14 March 2002 doc.: IEEE /152r2 Gregg Rasor, MotorolaSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks.
Submission Title: [Add name of submission]
Name - WirelessHD doc.: IEEE g July 2010
June 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposed Scenarios for Usage Model Document.
doc.: IEEE <doc#>
doc.: IEEE <doc#>
March 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Toumaz response to TG6 Call for Applications]
doc.: IEEE <doc#>
< Sept > Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [IG LPWA Draft Call for Contributions]
doc.: IEEE <doc#>
<month year> doc.: IEEE / January 2005
doc.: IEEE /XXXr0 Sep 19, 2007 June 2009
<month year>20 Jan 2006
<month year> doc.: IEEE <030158r0> January 2004
<month year> <doc.: IEEE doc> January 2016
<month year> doc.: IEEE / September 2004
平成31年5月 doc.: IEEE /424r1 September 2007
doc.: IEEE <doc#1>
<month year> doc.: IEEE / July 2004
27 Febraury 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Sub-committee Status Report.
doc.: IEEE <doc#>
doc.: IEEE <doc g>
Tero Kivinen, INSIDE Secure
July 2010 <month year> doc.: IEEE g Doc.: IEEE g
March 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Timeline of TG4s] Date Submitted: [16 March.
January 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [TG3c Project Plan] Date Submitted: [17.
June, 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [OFDM PHY Mode Representation] Date Submitted:
November 2007 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [TG3c Project Plan] Date Submitted: [15.
September 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suggested TG3c PAR Changes] Date Submitted:
Mar 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution for Comment 70 ] Date Submitted:
May 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [TG3c Project Plan] Date Submitted: [15 May.
Mar 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution for Comment 70 ] Date Submitted:
平成31年7月 doc.: IEEE /424r1 November 2007
September 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Timeline of TG4s] Date Submitted: [17.
Robert Moskowitz, Verizon
Submission Title: TG9ma Agenda for September Meeting
August 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: CID 422 Proposal Date Submitted: 14 August,
August 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: CID 422 Proposal Date Submitted: 14 August,
Submission Title: TG9ma Closing Report for July Meeting
Submission Title: TG9ma Closing Report for September Meeting
Presentation transcript:

1 September, 2002 doc:.: /386r0 Daniel V. Bailey, William Whyte, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Comments on D10] Date Submitted: [September 8, 2002] Source: [Daniel V. Bailey, Product Manager for Wireless Networks, William Whyte, Director of Cryptographic R&D, and Ari Singer, Principal Engineer] Company [NTRU] Address [5 Burlington Woods, Burlington, MA 01803] Voice:[(781) ], FAX: [(781) ], Re: [Draft P /D14] Abstract:[This presentation gives an overview of some recent results on NTRUEncrypt padding.] Purpose:[To familiarize the working group with some security-related comments from LB19.] Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P

2 September, 2002 doc:.: /386r0 Daniel V. Bailey, William Whyte, Ari Singer, NTRU 2 Public-Key Cryptography in uses two kinds of cryptography: symmetric and public- key Symmetric cryptography used to encrypt bits to be transmitted over the air –AES-CCM the algorithm in Public-key cryptography used during authentication to establish symmetric keys This is done by public-key encrypting two random challenges: one from the DEV and one from the Security Manager Recent research asks: What if the challenges weren’t random? If Ophelia injected two random challenges into your device, and it encrypted one of them, could she tell which was which?

3 September, 2002 doc:.: /386r0 Daniel V. Bailey, William Whyte, Ari Singer, NTRU 3 Padding for public-key cryptosystems What is Padding? –With a public-key cryptosystem, *anyone* can encrypt a message Just use the public key, which is, uh, public –So if I send a message that is “yes” or “no,” you can check which one I sent by encrypting “yes” and “no” both, and matching your resulting encrypted message to my transmitted message –These attacks only work if the attacker can guess the message. They don’t work if the message is random (e.g. a symmetric key, for example) –PADDING is just random data added to the message, so I send “YesXXXXXXXX” and if you encrypt “Yes” and try to match, it won’t match, unless the padding matches also Padding isn’t as simple as the example above – the padding has to be intermixed with the message so that: –Every bit of the padding affects every bit of the message –There are 80 bits of padding for 80-bit security, etc.

4 September, 2002 doc:.: /386r0 Daniel V. Bailey, William Whyte, Ari Singer, NTRU 4 Overview: Results Nguyen and Pointcheval recently published a result about the provable security of NTRUEncrypt padding scheme SVES-1 –Prove that for N=251, individual encrypted messages have at least 2 40 (40-bit) strength, but cannot be proved to have 2 80 strength –Dai has since demonstrated how to construct specific messages that have only 2 40 strength in a specialized attack scenario A Chosen Plaintext Attack where the attacker chooses two messages, you encrypt one, and she tries to tell which one you encrypted –NTRU research team have applied this attack to general messages and a more general attack scenario (Known Plaintext Attack) This attack requires the ‘message space’ to be small The larger the set of messages, the less well the attack works Entirely ineffective against encrypted AES keys, or NTRUEncrypt as used in Analysis of the effectiveness of this attack with non-random messages is still ongoing

5 September, 2002 doc:.: /386r0 Daniel V. Bailey, William Whyte, Ari Singer, NTRU 5 Overview: Recommendations This attack is not practical in any realistic setting –In particular, not effective against –Could carry on using SVES-1 entirely safely NTRU is proposing a new padding scheme –SVES-2 –Almost as efficient as SVES-1 (one more hash function call required) –… but proof of 2 80 strength for individual encrypted messages –Specified in EESS#1 draft 5. ( NTRU Recommendation: switches to use of SVES-2. –No danger from use of SVES-1 –… but no need to interoperate with legacy SVES-1. –All things being equal, it’s better to use schemes that have tighter bounds on their provable security

6 September, 2002 doc:.: /386r0 Daniel V. Bailey, William Whyte, Ari Singer, NTRU 6 Scrutiny of padding methods How are these padding methods arrived at? –Either ad hoc, or by using methods with associated security proofs Proofs give additional level of assurance –RSA ad hoc padding attacked, addressed by use of security proof: ftp://ftp.rsasecurity.com/pub/pdfs/bulletn7.pdf –NTRUEncrypt ad hoc padding attacked, partially addressed by use of security proof: Result this year says NTRUEncrypt padding cannot be proved to offer more than 40-bit security if the message can be dictated by the attacker: –[NP02] Phong Q. Nguyen, David Pointcheval. Analysis and Improvements of NTRU Encryption Paddings. CRYPTO 2002, LNCS 2442, Proposed new padding method has 80-bit provable security

7 September, 2002 doc:.: /386r0 Daniel V. Bailey, William Whyte, Ari Singer, NTRU 7 NTRUEncrypt padding and Padding-based attacks work when the encrypted message is guessable (so-called “chosen-plaintext” attacks and dictionary, or “known-plaintext” attacks) or modifiable (“chosen-ciphertext’ attacks) Padding-based attacks don’t work when the original message is random (e.g. symmetric security keys) and the attacker can’t modify the ciphertext This new attack is not a threat to (using NTRUEncrypt SVES-1), because in the public-key cryptosystem encrypts a symmetric key and because SVES-1 ciphertexts cannot be modified [NP02] However, NTRU still recommends the use of the system with tighter security proofs as good practice.