Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited
نویسندگان
چکیده
We revisit the security of cryptographic primitives in the random-oracle model against attackers having a bounded amount of auxiliary information about the random oracle. This situation arises most naturally when an attacker carries out offline preprocessing to generate state (namely, auxiliary information) that is later used as part of an on-line attack, with perhaps the best-known example being the use of rainbow tables for function inversion. The resulting model is also critical to obtain accurate bounds against non-uniform attackers when the random oracle is instantiated by a concrete hash function. Unruh (Crypto 2007) introduced a generic technique (called presampling) for analyzing security in this model: a random oracle for which S bits of arbitrary auxiliary information can be replaced by a random oracle whose value is fixed in some way on P points; the two are distinguishable with probability at most O( p ST/P ) by attackers making at most T oracle queries. Unruh conjectured that the distinguishing advantage could be made negligible for a sufficiently large polynomial P . We show that Unruh’s conjecture is false by proving that the distinguishing probability is at least Ω(ST/P ). Faced with this negative general result, we establish new security bounds, — which are nearly optimal and beat pre-sampling bounds, — for specific applications of random oracles, including one-way functions, pseudorandom functions/generators, and message authentication codes. We also explore the effectiveness of salting as a mechanism to defend against offline preprocessing, and give quantitative bounds demonstrating that salting provably helps in the context of one-wayness, collisionresistance, pseudorandom generators/functions, and message authentication codes. In each case, using (at most) n bits of salt, where n is the length of the secret key, we get the same security O(T/2) in the random oracle model with auxiliary input as we get without auxiliary input. At the heart of our results is the compression technique of Gennaro and Trevisan, and its extensions by De, Trevisan and Tulsiani. ⋆ Work done while visiting the University of Maryland. Partially supported by gifts from VMware Labs and Google, and NSF grants 1619158, 1319051, 1314568. ⋆⋆ Work done while at NYU and visiting the University of Maryland. ⋆ ⋆ ⋆ Work supported in part by NSF award #1223623.
منابع مشابه
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracledependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain information about the random oracle. Using simple examples we show that this model should be preferred over the classical variant where the auxiliary input is independent of the random oracle. In the presence of oracle-depend...
متن کاملExecutable Specifications in Software Reliability Engineering
output input valid? test ok? Figure 1. DFD of the testing scenario. is executed with a concrete test input (state). An implemented retrieve function maps the concrete input and output to its abstract representations. A precondition check validates the input and feeds it into the oracle which checks the relation to the produced output. If the postcondition evaluates to true, the test passed. Thi...
متن کاملCracks Analysis in Zavin Concrete Dam Using Fracture Mechanics Approach
Most of the existing concrete dams are subjected to cracking. These cracks are caused by various factors such as construction practices, curing, loads and volume change of mass concrete which reduce the efficiency, failure or instability of concrete dams. Using fracture mechanics as a new method to estimate stability and durability of concrete dams is recommended in scientific publications in w...
متن کاملRandom Oracles and Non-Uniformity
We revisit security proofs for various cryptographic primitives in the auxiliary-input randomoracle model (AI-ROM), in which an attacker A can compute arbitrary S bits of leakage about the random oracle O before attacking the system and then use additional T oracle queries to O during the attack. This model has natural applications in settings where traditional randomoracle proofs are not usefu...
متن کاملSweep Line Algorithm for Convex Hull Revisited
Convex hull of some given points is the intersection of all convex sets containing them. It is used as primary structure in many other problems in computational geometry and other areas like image processing, model identification, geographical data systems, and triangular computation of a set of points and so on. Computing the convex hull of a set of point is one of the most fundamental and imp...
متن کامل