Top Banner
Cryptology, homomorphisms and graph theory Rogla, May 2013 Enes Pasalic
49

Cryptology, homomorphisms and graph theory

Jan 07, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptology, homomorphisms and graph theory

Cryptology, homomorphisms

and graph theory

Rogla, May 2013 Enes Pasalic

Page 2: Cryptology, homomorphisms and graph theory

2

Applications of cryptography

Page 3: Cryptology, homomorphisms and graph theory

3

Cryptography in a nutshell

� Talking about cryptography – not hacking !!

design and implementation

of secure systems

crypto primitives; RSA,AES

PRG, etc.

Critical !!

modes of operations;protocols Semi-Critical !!

Not-Critical

Page 4: Cryptology, homomorphisms and graph theory

4

Missusing protocols

User

Bank server

user name

challenge

response

Account auth.

challengeuser name; response

server problem

user name;response

Transfer auth

challenge

LOGGED IN

Wrong code

user name

challenge

Page 5: Cryptology, homomorphisms and graph theory

5

Why standard primitives are secure ?

� Because thousands of academics are designing and cryptanalyzing these primitives

� Do you really care when using public key crypto based on :

- Factoring problem – RSA

- Discrete log problem – ElGammal . . .

- or using finite nonabelian (e.g. Braid) groups, based on solving equations in noncommutative groups, polycyclic groups ...

� As long as the primitive has undergone public scrutiny you are doing fine

Page 6: Cryptology, homomorphisms and graph theory

6

BLAKE hash function YES or NOT ?

� BLAKE entered the final phase of NIST competition (5 left) –probably a hash standard

equipment cost 700 000$

in 2015to find collision !

Page 7: Cryptology, homomorphisms and graph theory

7

BLAKE is secure even though ...

� Janoš Vidali, Peter Nose, Enes Pasalic. Collisions for variants of the BLAKE hash function, IPL, 2010

� Attacks on simplified version, BLAKE not compromized !

Flipping a single bitcauses c.a. half of bits

to change, etc.

Page 8: Cryptology, homomorphisms and graph theory

8

Loose ”Guidelines” - secure implementation

� Use well-analyzed primitives, AES, RSA, SHA - xx, unless you come from military (black box scenario :)

� Update your primitives, check if still using MD5 ☺ (even SHA-1 will need an update soon)

� Implement all the steps of protocols (try not to speed up algorithm by cheating !)

� How do you generate the keys ? Where do you store them ?

� Open source usage ? IV vector is reset to 0 when you lose elektricity ?

Page 9: Cryptology, homomorphisms and graph theory

9

Copyright, PKC, homomorphic encryption ...

� Imagine that all encryption algorithms are copyrighted, I would be doing fine how about you ?

� Only possibility seems to be pattent applications (possibly on stand-alone basis or with some support) ...

� Cloud computing and homomorphic encryption seem to be very hot topic, though probably not for ARRS

� + 30 year open problem to embed fully homomorphic encryptionscheme

Page 10: Cryptology, homomorphisms and graph theory

10

One-way functions

Page 11: Cryptology, homomorphisms and graph theory

11

Trapdoor one-way function

� The public key cryptography realizes these ideas. Based on some old number theoretical problems.

Page 12: Cryptology, homomorphisms and graph theory

12

RSA – Public key cryptosystem

Page 13: Cryptology, homomorphisms and graph theory

13

RSA encryption/decryption

Page 14: Cryptology, homomorphisms and graph theory

14

Decryption - proof

Page 15: Cryptology, homomorphisms and graph theory

15

Proving that decryption works

� We have to show that med=m. Recall that

.1 1 ( 1)( 1( ))= +k ke pd qnφ = + − −

Page 16: Cryptology, homomorphisms and graph theory

16

Homomorphic property of RSA (multiplicative)

Research problem: To increase speed of encryption/decryptionbinary weight of e and d should be small. Can we derive a

lower bound on wt(e ) + wt( d ) !

Page 17: Cryptology, homomorphisms and graph theory

17

Pallier E-voting – additive homomorphism

� Suppose Alice, Bob and Oscar are running in an election. Only 6 people voted in the election.

00 00 01 = 1

00 01 00 = 4

00 01 00 = 4

00 00 01 = 1

01 00 00 = 16

00 00 01 = 1 6

5

4

3

2

1

AliceBobOscarVote

Page 18: Cryptology, homomorphisms and graph theory

18

Short mathematical description

x

Page 19: Cryptology, homomorphisms and graph theory

19

Pallier voting - counting

� Let p = 5 and q = 7. Then n = 35, n2 = 1225. g is chosen to be 141 (so that n | ord(g) ). For the first vote x1 = 1, r is randomly chosen as 4.

� Then,

eK (x1,r1) = eK (1, 4) = gx1 * r1n = 1411 * 435 = 359 mod 1225

x1 r eK (x1,r)

1 4 3594 17 1734 26 486

1 12 108816 11 5411 32 163

Page 20: Cryptology, homomorphisms and graph theory

20

Encryption/decryption

Page 21: Cryptology, homomorphisms and graph theory

21

Cryptography and graph theory

(a few words)

Page 22: Cryptology, homomorphisms and graph theory

22

RFID Technology

Reader to tag signal

• Dropping field

• Modified Miller Encoding

Tag to reader signal

• Modulating field

• Manchester Encoding

Page 23: Cryptology, homomorphisms and graph theory

23

RFID Applications

Identify friend

or foe (1942)

Event ticketing

Car keys

Public transport

ticketing

Electronic

passport

Supply chain

management

RFID Powder Access control

Anti-theft

Page 24: Cryptology, homomorphisms and graph theory

24

MIFARE

Page 25: Cryptology, homomorphisms and graph theory

25

MIFARE Classic

Page 26: Cryptology, homomorphisms and graph theory

26

Manufacturer response- freedom of publishing ?

Page 27: Cryptology, homomorphisms and graph theory

27

MIFARE – attacking smart cards

� Attacking MIFARE (2 seconds on a laptop)

Page 28: Cryptology, homomorphisms and graph theory

28

Stream ciphers

Nonlinear combiner (RFID applications)

x1

xn

Problem : Design secure Boolean function f !

Page 29: Cryptology, homomorphisms and graph theory

29

ZUC algorithm – SNOW variant

� SNOW 1.0 and 2.0 were developed in Lund in early 2000 (while I was developing better primitives Thomas and Patrik were designing a cipher ☺ )

� SNOW 3.0 was developed for 3G using some nonlinear ”secure”permutations over GF(2^8) of mine (resistant to algebraic attacks)

� After a few more modifications SNOW 3.0 became ZUC – very strong design comprehending all inteligent design strategies developed last 30 years

Page 30: Cryptology, homomorphisms and graph theory

30

SNOW 3G - design

New compared to SNOW 2.0S-box S2 somewhere on my hard disc

Page 31: Cryptology, homomorphisms and graph theory

31

ZUC algorithm

Page 32: Cryptology, homomorphisms and graph theory

32

Useful transforms for cryptography

� Main tool is Walsh-Hadamard spectra (graphs)

1 3 2 3( ) 1 ANFf x x x x x= ⊕ ⊕ ⊕ ff

W

( ) ( )( 1) x y

f

x V

W y f x W alsh H adam ard transform•

= − − −∑

M

3 2 1

0 0 0 1

0 0 1 0

0 1 0 1

0 1 1 0

1 0 0 0

1 0 1 1

1 1 0 1

1 1 1 0

x x x f

V=GF(2)n

Page 33: Cryptology, homomorphisms and graph theory

33

Cayley graph representation

� Set of vertices V – set of pointsCayley graph

3 2 1

0 0 0 1

0 0 1 0

0 1 0 1

0 1 1 0

1 0 0 0

1 0 1 1

1 1 0 1

1 1 1 0

x x x f

Page 34: Cryptology, homomorphisms and graph theory

34

Cayley graph - eigenvalues

Find the roots – (4,2,0-2,0,2,0,2)

Page 35: Cryptology, homomorphisms and graph theory

35

Some open problems

� How to find ”good” functions through Cayley graphs ?

� What are ”good” functions ?

� high degree

� algebraic immunity (no low degree function g such that fg =0)

� large distance to affine functions and other cryptographic criteria

� Algebraic representation currently seems to be more suitable than graph

theoretical tools or ...

� Research problem: What is graph like if f is constant or affine on some

k – dimensional flat (k – normality) ? What is the graph of linear

combinations of several functions ? .....

Page 36: Cryptology, homomorphisms and graph theory

36

Hypergraphs

1

326

5 7 4

Hypergraph: A set (called “vertices”) and a set of sets of

vertices (called “edges” or sometimes “hyperedges”).

� Example of a 3-uniform hypergraph: The “Fano Plane”, V = {1,2,3,4,5,6,7} and

� E = {{1,2,4},{2,3,5},{3,4,6},{4,5,7},{5,6,1},{6,7,2},{7,1,3}}.

Page 37: Cryptology, homomorphisms and graph theory

37

Transversals and annihilators

� Algebraic attacks commonly use annihilators of f i.e. existence of low degree g s.t. f g =0. (more variants)

� In 2008, Zhang, Pieprzyk and Zhang showed that transversal T - subset of V of a ”Boolean hypergraph”

correspond to annihilator of f !

� Problem : Transversals found by greedy algorithm not optimal (lowest degree) and

� No connection to f g = h for low degree g, h.

j jT e e E∩ ≠ ∅ ∀ ∈

Page 38: Cryptology, homomorphisms and graph theory

38

Page 39: Cryptology, homomorphisms and graph theory

39

Page 40: Cryptology, homomorphisms and graph theory

40

Page 41: Cryptology, homomorphisms and graph theory

41

Page 42: Cryptology, homomorphisms and graph theory

42

Page 43: Cryptology, homomorphisms and graph theory

43

Page 44: Cryptology, homomorphisms and graph theory

44

Page 45: Cryptology, homomorphisms and graph theory

45

Page 46: Cryptology, homomorphisms and graph theory

46

Some final comments

� Lots of quadratic planar mappings

Page 47: Cryptology, homomorphisms and graph theory

47

Bent functions over GF(p)

Page 48: Cryptology, homomorphisms and graph theory

48

Corresponding graphs

Page 49: Cryptology, homomorphisms and graph theory

49

Thanks for your

patience !