CPA Security and Limitations

نویسندگان

  • Alessandro Chiesa
  • Joseph Hui
چکیده

Consider Pr [ A( ,Uk,·) ( 1, E ( 1,Uk,m k )) = 1 ] for b = 0, 1 (we will refer to this as Pr [A0] and Pr [A1] for convenience). Suppose that the oracle is queried at most p (k) times for some polynomial p (k). The i-th time the oracle is queried, it picks some random c0 (call it ci,0) and then returns ci,0,Uk (ci,0) ⊕m. Let E be the event that ci,0 = c 0 for any i. Since each ci,0 is chosen at random, the probability of E is 2−k for each i and by the union bound at most p (k) 2−k overall, and this is a polynomial times an inverse exponential and therefore negligible. Now consider the case where E does not occur. Then what is the advantage of the algorithm, i.e. ∣∣Pr [A0|E]− Pr [A1|E]∣∣? The advantage is necessarily zero: because ci,0 6= c 0 for all i, and U is uniformly random, the value of b is independent from all of the data that A has seen. That is to say, for every scenario where A answers correctly, the scenario where A answers incorrectly, on the exact same inputs and answers from the oracle, occurs with the same probability, and A answers correctly with probability precisely 1 2 . So, following the total probability law, we have

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...

متن کامل

Non-Malleable Encryption: Simpler, Shorter, Stronger

In a seminal paper, Dolev et al. [15] introduced the notion of non-malleable encryption (NM-CPA). This notion is very intriguing since it suffices for many applications of chosen-ciphertext secure encryption (IND-CCA), and, yet, can be generically built from semantically secure (IND-CPA) encryption, as was shown in the seminal works by Pass et al. [29] and by Choi et al. [9], the latter of whic...

متن کامل

On Selective-Opening Attacks against Encryption Schemes

At FOCS’99, Dwork et al. put forth the notion of ‘selective-opening attacks’ (SOAs, for short). In the literature, security against such attacks has been formalized via indistinguishability-based and simulation-based notions, respectively called IND-SO-CPA security and SIM-SO-CPA security. Furthermore, the IND-SO-CPA notion has been studied under two flavors – weak-IND-SO-CPA and full-IND-SO-CP...

متن کامل

A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study

In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...

متن کامل

What about Bob? The Inadequacy of CPA Security for Proxy Reencryption

Consider three parties: Alice, Bob, and Polly. Alice keeps some encrypted data that she can decrypt with a secret key known to her. She wants to communicate the data to Bob, but not to Polly (nor anybody else). Assuming Alice knows Bob’s public key, how can she communicate the data to him? Proxy reencryption provides an elegant answer: Alice creates a reencryption key that will enable Polly (th...

متن کامل

Cases of Limitations and Violations of the Principles of Moral and Criminal Law in the Study of Reasons for Crimes Against Security Based on Expediency

Background: In specific criminal law, security crimes are of special importance due to their harmful effects on the whole society and the country. One of the reasons for studying crimes against security is that the way and method of discovering and investigating the perpetrators of crimes against security is different from other crimes. The purpose of explaining the limitations and deviations f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015