Unconditionally Secure Chaffing-and-Winnowing for Multiple Use Wataru Kitada 1, Goichiro Hanaoka 2, Kanta Matsuura 1, Hideki Imai 2 1. IIS, the University.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Symmetric Message Authentication Codes Prof. Ravi Sandhu.
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
New Results on PA/CCA Encryption Carmine Ventre and Ivan Visconti Università di Salerno.
CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
1 Uncoercible Communication, or How to Lie with Impunity Matthew Kerner CSEP 590 3/5/06.
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Lecture 3.3: Public Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
Rennes, 23/10/2014 Cristina Onete Putting it all together: using multiple primitives together.
1 An Efficient Strong Key-Insulated Signature Scheme and Its Application 5 th European PKI Workshop June 16-17, 2008 NTNU, Trondheim, Norway Go Ohtake.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
Public Encryption: RSA
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Cramer-Shoup is Plaintext Aware in the Standard Model Alexander W. Dent Information Security Group Royal Holloway, University of London.
Computer Security CS 426 Lecture 3
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
CIS 5371 Cryptography Introduction.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Overview and Basic Concepts Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus -
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
``Chaffing and Winnowing’’ & Crypto Policy Comments Ronald L. Rivest Cryptography and Information Security Group MIT Lab for Computer Science April 1998.
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Multivariate Signature Scheme using Quadratic Forms Takanori Yasuda (ISIT) Joint work with Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Two New Online Ciphers Mridul Nandi National Institute of Standards and Technology, Gaithersburg, MD Indocrypt 2008, Kharagpur.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Giuseppe Bianchi Warm-up example 1 found on a real paper! Warm-up example 1 found on a real paper!
1 Digitally Signed Document Sanitizing Scheme Based on Bilinear Maps Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai ASIACCS’06, March 21–24, 2006, Taipei,
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Overview of Cryptography & Its Applications
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Lecture 23 Symmetric Encryption
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Part 1  Cryptography 1 Integrity Part 1  Cryptography 2 Data Integrity  Integrity  detect unauthorized writing (i.e., modification of data)  Example:
INCS 741: Cryptography Overview and Basic Concepts.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
MAC: Message Authentication Code
Cryptography Lecture 12.
Cryptography Lecture 11.
Cryptography Lecture 11.
Cryptography Lecture 11.
Cryptography Lecture 10.
Presentation transcript:

Unconditionally Secure Chaffing-and-Winnowing for Multiple Use Wataru Kitada 1, Goichiro Hanaoka 2, Kanta Matsuura 1, Hideki Imai 2 1. IIS, the University of Tokyo 2. RCIS, AIST

Detailed analysis of Chaffing-and- Winnowing (C&W) under multiple-use setting More efficient Chaffing-and-Winnowing –C&W for n-time use from n-spoofing secure A-code –practical C&W from A-code with a specific property Overview of This Work 2 We show:

Contents Overview Unconditionally Secure C&W for Multiple Use C&W with one authentication tag Future Work and Conclusion 3

Overview –Chaffing and Winnowing –Previous Work –Our Contribution Unconditionally Secure C&W for Multiple Use C&W with one authentication tag Future Work and Conclusion 4

Chaffing-and-Winnowing (C&W) A technique to achieve confidentiality without using encryption when sending data over an insecure channel. Proposed by R. Rivest “Chaffing and winnowing: confidentiality without encryption”

Basic Idea Send plaintext directly No encryption is performed Send dummies with the plaintext. chaff Only one of the plaintext is authentic, the other ones are dummies Receiver can distinguish plaintext (wheat) from dummies (chaff). winnow Being able to distinguish plaintext from dummies would require an adversary to know the secret key.

7 Chaffing-and-Winnowing Example –Authentication code (A-code) : A k (M) –Plaintext: “Hi Bob” A 1 =A k (“Hi Bob”) A 2 =A k’ (“Hi Larry”) (“Hi Bob”,A 1 ),(“Hi Larry”,A 2 ) Compute A k (“Hi Bob”) and A k (“Hi Larry”) Compare A k (“Hi Bob”) and A 1, A k (“Hi Larry”) and A 2 “Hi Bob”

Previous Work Bellare and Boldyreva, ASIACRYPT 2000 –Showed the security of C&W in the computationally secure setting Hanaoka et al., AAECC 2006 (HHHWI06) –Showed the security of C&W in the unconditinally secure setting 8

Main Result of HHHWI06 9 Impersonation- secure A-code Perfectly secure and Non-Malleable encryption Impersonation- and substitution- secure A-code Perfectly secure encryption Theorem 1 Theorem 2 C&W We can achieve:

Related Work Stinson, manuscript, 2006 –“Unconditionally secure chaffing and winnowing with short authentication tags” –construct C&W from short authentication tags 10 Impersonation- secure A-code with short tag Perfectly secure encryption C&W

Our Contribution Our work is extension of HHHWI06 –HHHWI06 only consider the case in one-time use Then, we extend for multiple use –In other words, to generalize the HHHWI06 –Detailed analysis of C&W under multiple-use setting construct unconditionally secure C&W for multiple use show C&W with one authentication tag 11

One-time/Multiple Use 12 One-time use Multiple use

Overview Unconditionally Secure C&W for Multiple Use –Security Notions –Our Result –Construction and Comparison C&W with one authentication tag Future Work and Conclusion 13

Security on A-code 14 n-Spoofing ImpersonationSubstitution

Perfect Security 15 n-Perfect Security (n-PS) Perfect Security

Non-Malleability (1/2) An adversary is given n ciphertexts Corresponding plaintexts are Non-Malleability: –inability to generate a ciphertext whose plaintext is related to for example –Definition 16

Non-Malleability (2/2) 17 n-Non-Malleability (n-NM) Non-Malleability

Our Results (1/3) Construct unconditionally secure C&W for multiple use –from n-spoofing secure A-code to n-perfectly secure (n-PS) encryption –from (n+1)-spoofing secure A-code to n-perfectly secure (n-PS) and n-Non-Malleable (n-NM) encryption 18

Our Results (2/3) 19 n-spoofing secure A-code n-PS and n-NM encryption (n+1)-spoofing secure A-code n-PS encryption C&W

Our Results (3/3) 20 Imp A-code PS and NM encryption Imp and Sub A-code PS encryption C&W n-spoofing secure A-code n-PS and n-NM encryption (n+1)-spoofing secure A-code n-PS encryption C&W HHHWI06 Our Result

Construction 21

Comparison 22 Construction Key Size [bits] Ciphertext Size [bits] Our proposal n copies of HHHWI06

Overview Unconditionally Secure C&W for Multiple Use C&W with one authentication tag Future Work and Conclusion 23

Overview (1/2) C&W with one authentication tag –If the underlying A-code has a specific property, we can construct C&W with one authentication tag 24 n-Spf A-code with a specific property n-PS and n-NM encryption with one tag (n+1)-Spf A-code with a specific property n-PS encryption with one tag C&W

Overview (2/2) From this result, we can see that these A-codes can be seen as conventional encryptions –we prove that to send one tag corresponding to the message is secure 25 AuthenticationEncryption Can be seen as

The specific property “For all a, there exists at least one k such that, for all m, A k (m)=a” There exists an example of an A-code which is n-Spoofing secure and has this property 26 For example:

Construction 27

Comparison 28 ConstructionKey Size [bits] Ciphertext Size [bits] Need specific A-codes? Our proposal (previous) No Our proposal (with one tag) Yes n copies of HHHWI06 No The construction with one tag is practical

Overview Unconditionally Secure C&W for Multiple Use C&W with one authentication tag Future Work and Conclusion 29

Future Work Remove the restriction that (like Stinson’s work) –In [Stinson’06], C&W is constructed from A- code with short tags (more weak A-code) –[Stinson’06] D.R. Stinson, “Unconditionally secure chaffing and winnowing with short authentication tags,” Cryptology ePrint Archive, Report 2006/189,

Conclusion Detailed analysis of C&W under multiple-use setting –from n-Spf secure A-code to n-PS encryption –from (n+1)-Spf secure A-code to n-PS and n-NM encryption More efficient Chaffing-and-Winnowing –C&W for n-time use from n-spoofing secure A- code –practical C&W from A-code with a specific property provide same function as conventional encryption 31