Public-Seed Pseudorandom Permutations -...

51
Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop New York June 8, 2017 Joint work with Pratik Soni (UCSB)

Transcript of Public-Seed Pseudorandom Permutations -...

Page 1: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Public-SeedPseudorandomPermutations

StefanoTessaroUCSB

DIMACSWorkshopNewYork

June8,2017

JointworkwithPratikSoni (UCSB)

Page 2: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Welookatexisting classofcryptographicprimitivesandintroduce/studythefirstโ€œplausibleโ€assumptionsonthem.

Pratik Soni, Stefano Tessaro Public-Seed Pseudorandom Permutations

EUROCRYPT 2017

Page 3: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Cryptographicschemesoftenbuiltfromsimplerbuildingblocks

Isthereauniversal andsimplebuildingblockforefficientsymmetriccryptography?

๐ป

๐พ โŠ• ๐‘–๐‘๐‘Ž๐‘‘ ||๐‘€

๐พ โŠ• ๐‘œ๐‘๐‘Ž๐‘‘

๐ป

hashfunction(e.g.,SHA-3)

๐ธ+

๐‘€,

๐ผ๐‘‰

๐‘€/

๐ธ+

๐‘€โ„“

blockcipher(e.g.,AES)

Mainmotivation:Singleobjectrequiringoptimizedimplementation!

Page 4: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Recenttrend: = permutation

๐œ‹0

0๐œ‹ ๐œ‹

๐‘€, ๐‘€/ ๐‘€3

๐‘€

๐‘ฏ(๐‘€)

efficiently computable and invertible permutation

๐‘Ÿ

๐‘Ÿ-bitblocks:

Example.Spongeconstruction(asinSHA-3)[BDPvA]

๐‘› โˆ’ ๐‘Ÿ

Page 5: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Severalpermutation-basedconstructions

โ€ฆ

Hashfunctions,authenticatedencryptionschemes,PRNGs,garblingschemesโ€ฆ

Page 6: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Permutationinstantiations

Fixed-keyblockciphers

Ad-hocdesignse.g.,inSHA-3, AE schemes, โ€ฆ Designedtowithstandcryptanalytic

attacks againstconstructionsusingthem!e.g.,nocollisionattack

e.g.,๐œ‹ โˆถ ๐‘ฅ โ†ฆ AES(0,/@, ๐‘ฅ)๐€๐„๐’

0,/@Fasterhashfunctions[RS08],fastgarbling[BHKR13]

Page 7: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Permutationsassumptions

Idealgoal: Standard-model reduction!โ€œIf ๐œ‹ satisfies ๐‘‹ then ๐ถ[๐œ‹] satisfies ๐‘Œ.โ€

e.g., ๐ถ = SHAโˆ’3;๐‘Œ = Anythingnon-trivial๐‘‹ =? ? ?

Unfortunately: Nostandard-modelproofsknownundernon-tautologicalassumptions!

๐‘†Q0

0

๐œ‹ ๐œ‹ ๐œ‹

Whatsecuritypropertiesdoweexpectfromapermutation?

Page 8: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Securityofpermutation-basedcrypto

Provablesecurity CryptanalysisRandompermutationmodel! Application specificattacks

๐œ‹ israndom+adversarygivenoracleaccessto๐œ‹ and ๐œ‹R,

clearlyunachievable[CGH98]โ€ฆโ€ฆsecurityagainstgeneric

attacks!

Insightsarehardtorecyclefornewapplications

Verylittlepermutation-specificcryptanalysis

Page 9: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Exampleโ€“ OWFsfrompermutations

๐‘ฅ ๐‘ฆ = ๐œ‹ ๐‘ฅ๐œ‹

Clearly:Cannotbeoneway!

๐œ‹: {0,1}X โ†’ 0,1 X

๐œ‹R,(๐‘ฆ)๐œ‹R,

So,howdowemakeaone-wayfunctionoutof๐œ‹?

Page 10: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

๐œ‹๐‘ฅ๐‘ฆ

๐‘ง ๐‘ง

Naรฏveidea:Truncation ๐‘“: 0,1 X โ†’ 0,1 X//

Not oneway:โˆ€๐‘ฆ: ๐œ‹R,(๐‘ฆ, ๐‘ง) preimageof๐‘ง

๐œ‹๐‘ฅ

๐‘ฆ

๐‘ง ๐‘ง

Bettercandidate:๐‘”: 0,1 X// โ†’ 0,1 X//

Conjectured one-wayfor๐œ‹ = SHA-3permutation

0

๐‘ฅ

Wanted: Basic(succinct,non-tautological)securitypropertysatisfiedby๐œ‹ whichimpliesone-wayness of๐‘”?

Page 11: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Hashfunctions

Permutations

idealmodel standardmodel

randomoracle

randompermutation

CRHF,OWFs,UOWHFs,CI,UCEsโ€ฆ

Whatkindofcryptographichardnesscanweexpectfromapermutation?

Permutationsvshashfunctions

Page 12: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Thiswork,inanutshell

inspiredbytheUCEframework [BHK13]

First plausible anduseful standard-modelsecurityassumptionforpermutations.

โ€œPublic-seedPseudorandomPermutationsโ€(psPRPs)

Twomainquestions:

CanwegetpsPRPs atall?

ArepsPRPsuseful?

Page 13: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

psPRPs โ€“ LandscapepreviewDeterministic&HedgedPKE

Immunizingbackdoored PRGs

CCA-secureEnc.

โ€ฆ

HardcorefunctionsKDM-securesymmetrickeyEnc.

Point-functionObfuscation

Efficientgarblingfromfixed-keyblock-ciphers

Message-lockedEncryption(MLE)๐ฉ๐ฌ๐๐‘๐๐ฉ๐ฌ๐๐‘๐ ๐”๐‚๐„

e.g.,Sponges

Feistel

Page 14: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Roadmap

1.Definitions

2.Constructions&Applications

3.Conclusions

Co-related input hashFunctions (CIH)

Page 15: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

๐‘ƒ = (๐บ๐‘’๐‘›, ๐œ‹, ๐œ‹R,)

๐บ๐‘’๐‘› ๐‘ฅ ๐œ‹h ๐‘ฅ

๐œ‹ โˆถ 0,1 X โ†’ 0,1 X

๐œ‹h1i ๐‘ 

Seedgeneration

๐‘ฆ ๐œ‹hR, ๐‘ฆ๐œ‹hR,

Forwardevaluation

Backwardevaluation

(2) โˆ€๐‘ฅ โˆถ ๐œ‹hR, ๐œ‹h ๐‘ฅ = ๐‘ฅ

(1) ๐œ‹h โˆถ 0,1 X โ†’ 0,1 X

Syntax:Seeded permutations

Page 16: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

๐ท

๐‘  โ† Gen(1i)

๐œ‹p /๐œ‹hR,

5

๐œŒ โ† Perms(๐‘›)

๐œŒ/๐œŒR,โ‰ˆ

Stage1:โ€ข Oracleaccessโ€ข Secretseed

Stage2:โ€ข Learnsseedโ€ข Nooracleaccess

Secret-seedsecurity:Pseudorandompermutations(PRPs)

Limitedinformation

flow

0/1

Page 17: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

๐‘“ โ† Func(โˆ—, ๐‘›) ๐‘“๐‘  โ† Gen(1i)

โ„Žh

UCEsecurity

๐‘†source

๐ฟ

๐ป = (๐บ๐‘’๐‘›, โ„Ž)

distinguisher ๐ท

Bellare Hoang Keelveedhi

0/1

๐’”

๐‘  โ† Gen(1i)

โ‰ˆ

leakage

Page 18: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

๐œŒ โ† Perms(๐‘›) ๐œŒ/๐œŒR,๐‘  โ† Gen(1i)

๐œ‹h/๐œ‹hR,

psPRP security[Thiswork]

๐‘†source

๐ฟ

distinguisher ๐ท 0/1

๐’”

โ‰ˆ

๐‘ƒ = (๐บ๐‘’๐‘›, ๐œ‹, ๐œ‹R,)Makesbothforwardandbackwardqueries!

Page 19: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

(+, 0X)(+, 0X)

๐œ‹h/๐œ‹hR, ๐œŒ/๐œŒR,

๐‘†

๐ฟ = ๐‘ฆ

๐ท

๐’”

๐‘ฆ

Outputs1iff๐‘ฆ = ๐œ‹h 0X

1

1

withprob.1

withprob.1/2X

๐‘ฆ

Observation: ๐ฉ๐ฌ๐๐‘๐-securityimpossible againstallPPTsources!

โ‰ˆ

Page 20: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Solution: Restrictclassofconsideredsources!

Definition. ๐‘ƒ ๐ฉ๐ฌ๐๐‘๐[๐’ฎ]-secure: โˆ€๐‘† โˆˆ ๐’ฎ,โˆ€PPT ๐ท:๐œ‹h/๐œ‹hR, โ‰ˆ ๐œŒ/๐œŒR,

allsources

๐’ฎ ๐‘†

๐ฟ

๐ท 0/1

๐’”

๐œ‹h/๐œ‹hR, ๐œŒ/๐œŒR,

Page 21: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

all sources

๐’ฎh๏ฟฝh๐’ฎh๏ฟฝ๏ฟฝ unpredictable

reset-secure

Here:unpredictableandreset-securesources

Bothrestrictionscaptureunpredictabilityofsourcequeries!

๐’ฎh๏ฟฝ๏ฟฝ โŠ† ๐’ฎh๏ฟฝh ๐ฉ๐ฌ๐๐‘๐ ๐’ฎh๏ฟฝh strongerassumptionthan๐ฉ๐ฌ๐๐‘๐ ๐’ฎh๏ฟฝ๏ฟฝโŸน

Page 22: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Sourcerestrictionsโ€“ unpredictability

๐‘† ๐œŒ/๐œŒR,(๐œŽ๏ฟฝ, ๐‘ฅ๏ฟฝ)

๐‘ฆ๏ฟฝ๐ฟ

๐‘„โ€ฒ

๐‘„ โ† ๐‘„ โˆช {๐‘ฅ๏ฟฝ, ๐‘ฆ๏ฟฝ}

Pr[๐‘„๏ฟฝ โˆฉ ๐‘„ โ‰  ๐œ™] = negl(๐œ†)

โŠ†๐’ฎh๏ฟฝ๏ฟฝ: ๐ด iscomputationallyunbounded,polyqueries

๐’ฎ๏ฟฝ๏ฟฝ๏ฟฝ: ๐ด isPPT iOโŸน๐ฉ๐ฌ๐๐‘๐[๐’ฎ๏ฟฝ๏ฟฝ๏ฟฝ] impossible[BFM14]

๐œŽ๏ฟฝ โˆˆ {+,โˆ’}

Goal:Mustbehardfor๐ด topredict๐‘†โ€™squeriesortheirinverses๐ด

Page 23: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

โ‰ˆ

Sourcerestrictionsโ€“ reset-security

โŠ†๐’ฎh๏ฟฝh: ๐‘… iscomputationallyunbounded,polyqueries

๐’ฎ๏ฟฝ๏ฟฝh: ๐‘… isPPT

๐‘† ๐œŒ/๐œŒR,

๐‘…

๐ฟ

๐œŒ/๐œŒR,

0/1 ๐œŒ โ† Perms(๐‘›) ๐œŒ, ๐œŒ๏ฟฝ โ† Perms(๐‘›)

Fact. ๐’ฎh๏ฟฝ๏ฟฝ โŠ† ๐’ฎh๏ฟฝh

๐‘† ๐œŒ/๐œŒR,

๐‘…

๐ฟ

๐œŒ๏ฟฝ/๐œŒ๏ฟฝR,

0/1

Page 24: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Recapโ€“ Definitions

CentralassumptionsinUCEtheory

Equallyuseful?

Page 25: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Roadmap

1.Definitions

2.Constructions&Applications

3.Conclusions

Page 26: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Exampleโ€“ Truncation

๐œ‹h๐‘ฅ

๐‘ฆ

๐‘ง ๐‘ง

0

๐‘ฅ ๐‘”h ๐‘ฅ = ๐œ‹h ๐‘ฅ, 0XR๏ฟฝ [1. . ๐‘˜]

Lemma. If๐œ‹ ๐ฉ๐ฌ๐๐‘๐[๐’ฎh๏ฟฝ๏ฟฝ]-secureand๐‘š +๐œ” log๐œ† โ‰ค

๐‘˜ โ‰ค ๐‘› โˆ’ ๐œ” log๐œ† ,then๐‘” isPRG.

๐‘  โ† Gen(1i)๐‘ฅ โ† 0,1 XR๏ฟฝ

(๐‘ฆ, ๐‘ง) โ† ๐œ‹h(๐‘ฅ, 0)๐‘ โ† ๐ท(๐‘ , ๐‘ง) ๐‘†

๐œ‹h(๐‘ฅ, 0XR๏ฟฝ) (๐‘ฆ, ๐‘ง)

๐ท๐‘ง ๐‘

๐‘”h: 0,1 ๏ฟฝ โ†’ 0,1 ๏ฟฝ

๐’”

Thus,alsoaOWF ...

Page 27: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

๐‘  โ† Gen(1i)๐‘ฅ โ† 0,1 XR๏ฟฝ

(๐‘ฆ, ๐‘ง) โ† ๐œ‹h(๐‘ฅ, 0)๐‘ โ† ๐ท(๐‘ , ๐‘ง)

Proofโ€“ Contโ€™d

๐‘†

๐œ‹h(๐‘ฅ, 0XR๏ฟฝ) (๐‘ฆ, ๐‘ง)

๐ท๐‘ง ๐‘

๐’”

๐‘†

๐œŒ(๐‘ฅ, 0XR๏ฟฝ) (๐‘ฆ, ๐‘ง)

๐‘ง

๐’”โ‰ˆ๐ท ๐‘

if๐‘† โˆˆ ๐’ฎh๏ฟฝ๏ฟฝ

random!

๐‘  โ† Gen๐‘ง โ† 0,1 ๏ฟฝ

๐‘ โ† ๐ท(๐‘ , ๐‘ง)

Page 28: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Proofโ€“ Unpredictabilityof๐‘†

๐‘†

๐œŒ(๐‘ฅ, 0XR๏ฟฝ) (๐‘ฆ, ๐‘ง)

๐‘ง ๐‘… ๐‘„

๐œŒ/๐œŒR,

Fact. Pr (๐‘ฅ, 0XR๏ฟฝ), ๐‘ฆ, ๐‘ง โˆฉ ๐‘„ โ‰  ๐œ™ โ‰ค ๏ฟฝ/๏ฟฝ+ ๏ฟฝ

/ ยกยข

๐‘ž = ๐ฉ๐จ๐ฅ๐ฒ(๐‘›)queries

Page 29: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

NextCanwegetpsPRPs atall?

ArepsPRPsuseful?

Constructionsfrom UCEs

HeuristicInstantiations

ConstructionsofUCEs

DirectapplicationsGarblingfromfixed-key

blockciphersCommondenominator:CP-sequentialindifferentiability

Page 30: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

HowtobuildUCEsfrompsPRPs?

๐ป

๐œ‹h/๐œ‹hR,

โŸน๐‘ƒ ๐ฉ๐ฌ๐๐‘๐[๐’ฎh๏ฟฝh]-secure ๐ป[๐‘ƒ] ๐”๐‚๐„[๐’ฎh๏ฟฝh]-secure.Idealtheorem.

๐‘€ โˆˆ 0,1 โˆ— ๐ปh(๐‘€)

Whatdoes๐ปneedtosatisfyforthistobetrue?

๐ป[๐‘ƒ]

Page 31: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

๐ด ๐ดโ‰ˆ๐ป

0/1

๐‘“

Sim

0/1

Indifferentiability [MRH04]

Definition. ๐ป indiff.fromROifโˆƒ PPT Sim โˆ€ PPT ๐ด:๐ป+๐œŒ/๐œŒR, โ‰ˆ ๐‘“+Sim

?๐œŒ/๐œŒR,

๐œŒ โ† Perms(๐‘›)

๐‘“ โ† Funcs(โˆ—, ๐‘›)

Page 32: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

๐ด, ๐ด,โ‰ˆ

๐ป

0/1

๐‘“

Sim

0/1

CP-sequentialindifferentiability

Def. ๐ป CP-indiff.fromROifโˆƒ PPT Sim โˆ€ PPT (๐ด,, ๐ด/):๐ป+๐œŒ/๐œŒR, โ‰ˆ ๐‘“+Sim

๐œŒ/๐œŒR,

๐œŒ โ† Perms(๐‘›)

๐‘“ โ† Funcs(โˆ—, ๐‘›)

๐ด/ ๐ด/

๐‘ ๐‘ก ๐‘ ๐‘ก

Page 33: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

FrompsPRPs toUCEs

Similarto[BHK14]. But:โ€ข Needsfullindifferentiability

โ€ข UCEdomainextension

โŸน๐‘ƒ ๐ฉ๐ฌ๐๐‘๐[๐’ฎh๏ฟฝh]-secure

๐ป[๐‘ƒ] ๐”๐‚๐„[๐’ฎh๏ฟฝh]-secure.

Theorem.

๐ป CP-indiff from RO

๐ป

๐œ‹h/๐œ‹hR,

Corollary.Everyperm-basedindiff.hash-functiontransformsapsPRP intoaUCE!

Page 34: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

๐‘†โˆ— ๐‘†โˆ—

FrompsPRPs toUCEsโ€“ Proof

๐ป

๐œ‹h/๐œ‹hR,

๐‘† ๐ท

๐’” ๐ป

๐œŒ/๐œŒR,

๐‘† ๐ท

๐’” ๐‘“

๐‘† ๐ท

๐’”โ‰ˆ โ‰ˆ

๐‘† reset-secure๐ป isCP-indiff from๐‘…๐‘‚

byCP-indiff.by ๐ฉ๐ฌ๐๐‘๐[๐’ฎh๏ฟฝh]-securityif๐‘†โˆ— โˆˆ ๐’ฎh๏ฟฝh

๐œŒ โ† Perms(๐‘›) ๐‘“ โ† Funcs(โˆ—, ๐‘›)๐‘  โ† Gen(1i)

Page 35: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

๐‘…โˆ—

๐‘…โˆ—

๐‘†โˆ—

๐‘†โˆ—

โ„Ž ๐œŒ/๐œŒR,

๐‘† ๐‘… ๐‘† ๐‘…

๐‘“โ‰ˆ

Sim

๐‘† ๐‘…

๐‘“ Sim

๐‘“ยซ

๐‘† ๐‘…

โ„Ž

๐œŒ/๐œŒR,

๐œŒ๏ฟฝ/๐œŒ๏ฟฝR,

cpi

โ‰ˆcpi

Reset-securityof๐‘บโˆ—?

โ‰ˆ๐‘† isreset-secure!

Page 36: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Goodnews#1

Corollary. Everyperm-basedindiff.hash-functiontransformsapsPRP intoaUCE!

Manypracticalhashdesignsfrompermutationsareindifferentiable fromRO!

UCEisameaningfulsecuritytargetโ€“severalapplications!

Page 37: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Examplesโ€“ Sponges

๐‘ฆ

Corollary,๐‘ƒ ๐ฉ๐ฌ๐๐‘๐ ๐’ฎh๏ฟฝh -secureโŸน Sponge[๐‘ƒ]๐”๐‚๐„ ๐’ฎh๏ฟฝh -secure.

Theorem.[BDVP08] Sponge indifferentiable from RO.

๐‘€ โˆˆ {0,1}โˆ—

๐‘†Q๐‘Ÿ

n โˆ’ ๐‘Ÿ

0

0

๐œŒ

๐‘Ÿ

๐œŒ ๐œŒ

๐‘€, ๐‘€/ ๐‘€ยฎ

๐œ‹h ๐œ‹h ๐œ‹h

Validates theSpongeparadigmforUCEapplications!

Page 38: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Goodnews#2โ€“ Noneedforfullindifferentiabilitytruncates ๐‘›-bitsto๐‘Ÿ-bits

๐œŒ๐‘› ๐‘› ๐‘Ÿ

Chop

Notindifferentiable!โ€ข Forrandom๐‘ฆ,get๐‘ฅ =๐œŒR,(๐‘ฆ)

โ€ข Queryconstructionon๐‘ฅ,checkconsistencywithfirst๐‘Ÿ bitsof๐‘ฆ

๐ดChop

๐œŒ/๐œŒR,๐ด

๐‘“

Sim

0/1 0/1

Page 39: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Chopโ€“ Contโ€™d

Theorem.Chop isCP-indiff fromROwhen๐‘› โˆ’ ๐‘Ÿ โˆˆ ๐œ”(log ๐œ†).

Corollary. ๐‘ƒ ๐ฉ๐ฌ๐๐‘๐ ๐’ฎh๏ฟฝh -secureโŸน Chop[๐‘ƒ] ๐”๐‚๐„[๐’ฎh๏ฟฝh]-secure.

๐”๐‚๐„ ๐’ฎh๏ฟฝ๏ฟฝ๐ฉ๐ฌ๐๐‘๐ ๐’ฎh๏ฟฝ๏ฟฝ

truncates ๐‘›-bitsto๐‘Ÿ-bits

๐œŒ๐œ‹h๐‘› ๐‘› ๐‘Ÿ

From Chop ๐‘ƒ toVILUCE:Domainextensiontechniques[BHK14]

Page 40: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Whatabouttheconverse?

psPRPs UCEs

Page 41: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

psPRPs fromUCEs

๐ด, ๐ด,

โ‰ˆ๐‘ƒ

0/1

๐œŒ/๐œŒR,

Sim

0/1

๐‘“๐ด/ ๐ด/

๐‘ ๐‘ก ๐‘ ๐‘ก

โŸน๐ป๐”๐‚๐„[๐’ฎh๏ฟฝh]-secure

๐‘ƒ[๐ป] ๐ฉ๐ฌ๐๐‘๐[๐’ฎh๏ฟฝh]-secure.

Theorem.

๐‘ƒ CP-indiff from RP

Page 42: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

FromUCEstopsPRPs โ€“ Feistel

impossible[CPS08]

[HKT11][DS16] [DKT16]

#roundsforindifferentiability

???

๐‘“, ๐‘“/ ๐‘“ยฑ ๐‘“ยฒ ๐‘“ยณ ๐‘Œ โˆˆ {0,1}/X

๐œ“ยณ[๐’‡]

๐‘‹ โˆˆ {0,1}/X

Corollary. psPRPs exist iff UCEsexist!!!*

*wrt reset-securesources

Page 43: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Corollary.๐‘ฏ ๐”๐‚๐„ ๐’ฎh๏ฟฝh -secureโŸน ๐œ“ยณ[๐‘ฏ] ๐ฉ๐ฌ๐๐‘๐[๐’ฎh๏ฟฝh]-secure.

Theorem. 5-round Feistel is CP-indiff from RP

[HKT11][DS16] [DSKT16]

#roundsforCP-sequentialindifferentiability

Thiswork!!!

Round-complexityofFeistelforUCE-to-psPRP transformation?

Page 44: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

5-roundproofisquiteinvolved!

Our5-roundSim:

impossible[LR88]

[HKT11][DS16] [DSKT16]

#roundsofFeistel forpsPRP-security

Thiswork!!!Open:Do4-roundssuffice?

โ€ข Reliesonchaincompletiontechniques

โ€ข Heavilyexploitsqueryordering

โ€ข Verydifferentchain-completionstrategyfrompreviousworks,norecursion needed

๐‘“, ๐‘“/ ๐‘“ยฑ ๐‘“ยฒ ๐‘“ยณ

๐‘‹, ๐‘‹/ ๐‘‹ยฑ ๐‘‹ยฒ ๐‘‹ยณ ๐‘‹ยท

๐‘‹Q ๐‘‹ยณSet

uniformSet

uniform

forceVal forceVal

detect detect

???

Page 45: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Acoupleofextraresults!

(Inpassing!)

Page 46: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

HeuristicInstantiations

๐ธ

๐‘  โ† {0,1}๏ฟฝ

psPRP ๐’ฎh๏ฟฝh -secure

psPRP ๐’ฎh๏ฟฝ๏ฟฝ -secure๐œ‹

๐‘  โ† {0,1}๏ฟฝ

Fromseedless permutations:

Fromblockciphers:

Ideal-ciphermodel

RPmodel

๐บ๐‘’๐‘›:

๐œ‹h ๐‘ฅ = ๐ธ(๐‘ , ๐‘ฅ)

๐œ‹h ๐‘ฅ = ๐‘  โŠ• ๐œ‹(๐‘  โŠ• ๐‘ฅ)

๐บ๐‘’๐‘›:

Page 47: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

FastGarblingfrompsPRPs

Ourvariant:๐ธ 0๏ฟฝ, ๐‘ฅ โ‡’ ๐œ‹h(๐‘ฅ),freshseed๐‘  generateduponeachgarblingoperation!

Garblingschemefrom[BHKR13]โ€ข Onlycallsfixed-keyblockcipher

๐‘ฅ โ†’ ๐ธ(0๏ฟฝ, ๐‘ฅ)

โ€ข ProofinRPmodel

โ€ข Veryfast โ€“ nokeyre-schedule

Theorem. Secure when๐œ‹๐’” is ๐ฉ๐ฌ๐๐‘๐[๐’ฎh๏ฟฝ๏ฟฝ].

Garbled AND-Gate

๐ธ 0X, ๐‘ฅยบQ โŠ• ๐‘ฅยปQ โŠ• ๐‘ฅยบQ โŠ• ๐‘ฅยปQ โŠ• ๐‘ฅยผQ

๐ธ 0X, ๐‘ฅยบQ โŠ• ๐‘ฅยป, โŠ• ๐‘ฅยบQ โŠ• ๐‘ฅยป, โŠ• ๐‘ฅยผQ

๐ธ 0X, ๐‘ฅยบ, โŠ• ๐‘ฅยปQ โŠ• ๐‘ฅยบ, โŠ• ๐‘ฅยปQ โŠ• ๐‘ฅยผQ

๐ธ 0X, ๐‘ฅยบ, โŠ• ๐‘ฅยป, โŠ• ๐‘ฅยบ, โŠ• ๐‘ฅยป, โŠ• ๐‘ฅยผ,

๐‘ฅยบQ,๐‘ฅยบ,๐‘ฅยผQ,๐‘ฅยผ,AND๐‘ฅยปQ, ๐‘ฅยป,

Page 48: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Roadmap

1.Definitions

2.Constructions&Applications

3.Conclusions

Page 49: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Constructions

Conclusion

First (useful) standardmodelassumptionsonpermutations

ApplicationspsPRPs

Page 50: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

(Some)openquestions

BeyondpsPRPs:- Simplerassumptionsonpermutations?

MoreonpsPRPs:- MoreefficientconstructionsfromUCEs?- Weakerassumptions?- Cryptanalysis?

ps-Pseudorandomness asaparadigm:- UCE =psPRF

- ApplicationsofpsX?

IsSHA-3aCRHFunderanynon-trivialassumption?

Page 51: Public-Seed Pseudorandom Permutations - DIMACSdimacs.rutgers.edu/Workshops/ComplexityCryptographic/Slides/...Public-Seed Pseudorandom Permutations Stefano Tessaro UCSB DIMACS Workshop

Thankyou!PaperonePrint reallysoonโ€ฆ

Fornow:http://www.cs.ucsb.edu/~tessaro/papers/SonTes17.pdf