Simultaneous Hardcore Bits and Cryptography Against Freezing Attacks
نویسندگان
چکیده
This paper considers two questions in cryptography. 1. Simultaneous Hardcore Bits. Let f be a one-way function. We say that a block of bits of x are simultaneously hard-core for f(x) if given f(x), they cannot be distinguished from a random string of the same length. Although there are many examples of (candidate) one-way functions with one hardcore bit (or even O(log n) simultaneously hardcore bits), there are very few examples of oneway functions (and even fewer examples of trapdoor one-way functions) for which a linear number of the input bits are simultaneously hardcore. We show that for the lattice-based (injective) trapdoor function recently proposed by Gentry, Peikert and Vaikuntanathan (STOC 2008), which is in turn based on the one-way function of Regev (STOC 2005), an n− o(n) number of input bits are simultaneously hardcore (where n is the total number of input bits). 2. Cryptography Against Memory-Freezing Attacks. The absolute privacy of the secret keys associated with cryptographic algorithms has been the corner-stone of modern cryptography. Still, it has been clear that in practice keys do get compromised at times, by various means. In a particularly devastating side-channel attack, termed the “freezing attack” which was proposed recently, a significant fraction of the bits of the secret key can be measured if the secret key is ever stored in the part of memory which can be accessed (even after power has been turned off for a short amount of time). Such an attack has been shown to completely compromise the security of various cryptosystems, including the RSA cryptosystem and variants. We show that the public-key encryption scheme of Regev (STOC 2005), and the identity-based encryption scheme of Gentry, Peikert and Vaikuntanathan (STOC 2008) are remarkably robust against freezing attacks where the adversary can measure a large fraction of the bits of the secretkey. This is done without increasing the size of the secret key, or by introducing any complication of the natural encryption and decryption routines. Although seemingly completely different, these two problems turn out to be very similar: in particular, our results demonstrate that the proof techniques that can be used to solve both these problems are intimately related. ∗Institute of Advanced Study, Princeton, NJ and DIMACS, Rutgers. EMAIL: [email protected] †MIT and Weizmann Institute. Supported in part by NSF grants CCF-0514167, CCF-0635297, NSF-0729011 and the Israel Science Foundation 700/08. EMAIL: [email protected] ‡MIT and IBM Research. Supported in part by NSF grants CCF-0635297 and Israel Science Foundation 700/08. EMAIL: [email protected]
منابع مشابه
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side-channel attack against cryptosystems, termed the “memory attack”, was proposed recently. In this attack, a significant fraction of the bits of a secret key of a cryptographic algorithm can be measured by an adversary if the secret key is ever stored in a part of memory...
متن کاملA new security proof for FMNV continuous non-malleable encoding scheme
A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...
متن کاملInvestigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants
In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...
متن کاملOn Small Secret Key Attack against RSA with High Bits Known Prime Factor
It is well known that if the higher half bits of a prime factor are known or the secret key is small enough then the RSA cryptosystem is broken (e.g. [Coppersmith, J. Cryptology, 1997] and [Boneh-Durfee, Eurocrypt’99]). Recently, Sarkar-MaitraSarkar [Cryptology ePrint Archiv, 2008/315] proposed attacks against RSA under the conditions that the higher bits of a prime factor is known and the secr...
متن کاملPerformance Analysis of Countermeasures against Timing Attack in RSA Algorithm
Public key cryptography is based on two keys, in which decryption key is private key. Among the different cryptanalytic attacks, timing attack is one of the possible attacks on RSA that determines bits of private key. This is done by determining time for each iteration in computing modular exponentiation. There are different mechanisms to counter such attack. Among them, blinding method and ran...
متن کامل