On the Bit Security of Cryptographic Primitives

被引:23
|
作者
Micciancio, Daniele [1 ]
Walter, Michael [2 ]
机构
[1] Univ Calif San Diego, San Diego, CA USA
[2] IST Austria, Klosterneuburg, Austria
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I | 2018年 / 10820卷
关键词
D O I
10.1007/978-3-319-78381-9_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a formal quantitative notion of "bit security" for a general type of cryptographic games (capturing both decision and search problems), aimed at capturing the intuition that a cryptographic primitive with k-bit security is as hard to break as an ideal cryptographic function requiring a brute force attack on a k-bit key space. Our new definition matches the notion of bit security commonly used by cryptographers and cryptanalysts when studying search (e.g., key recovery) problems, where the use of the traditional definition is well established. However, it produces a quantitatively different metric in the case of decision (indistinguishability) problems, where the use of (a straightforward generalization of) the traditional definition is more problematic and leads to a number of paradoxical situations or mismatches between theoretical/provable security and practical/common sense intuition. Key to our new definition is to consider adversaries that may explicitly declare failure of the attack. We support and justify the new definition by proving a number of technical results, including tight reductions between several standard cryptographic problems, a new hybrid theorem that preserves bit security, and an application to the security analysis of indistinguishability primitives making use of (approximate) floating point numbers. This is the first result showing that (standard precision) 53-bit floating point numbers can be used to achieve 100-bit security in the context of cryptographic primitives with general indistinguishability-based security definitions. Previous results of this type applied only to search problems, or special types of decision problems.
引用
收藏
页码:3 / 28
页数:26
相关论文
共 50 条
  • [41] Encoding Cryptographic Primitives in a Calculus with Polyadic Synchronisation
    Martinho, Joana
    Ravara, Antonio
    JOURNAL OF AUTOMATED REASONING, 2011, 46 (3-4) : 293 - 323
  • [42] The performance measurement of cryptographic primitives on Palm devices
    Wong, DS
    Fuentes, HH
    Chan, AH
    17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 92 - 101
  • [43] The black-box model for cryptographic primitives
    Schnorr, CP
    Vaudenay, S
    JOURNAL OF CRYPTOLOGY, 1998, 11 (02) : 125 - 140
  • [44] CryptoKnight: Generating and Modelling Compiled Cryptographic Primitives
    Hill, Gregory
    Bellekens, Xavier
    INFORMATION, 2018, 9 (09)
  • [45] Diffusive primitives in the design of modern cryptographic algorithms
    Jamel, Sapiee Haji
    Deris, Mustafa Mat
    2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3, 2008, : 707 - 710
  • [46] Automated Identification of Cryptographic Primitives in Binary Programs
    Groebert, Felix
    Willems, Carsten
    Holz, Thorsten
    RECENT ADVANCES IN INTRUSION DETECTION, 2011, 6961 : 41 - +
  • [47] Cryptographic primitives based on compact knapsack problem
    Rizos, George S.
    Draziotis, Konstantinos A.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [48] Watermarking Public-Key Cryptographic Primitives
    Goyal, Rishab
    Kim, Sam
    Manohar, Nathan
    Waters, Brent
    Wu, David J.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 367 - 398
  • [49] Evaluation of cryptographic primitives on modern microcontroller platforms
    Stancu, Florin Alexandru
    Tranca, Cristian Dumitru
    Chiroiu, Mihai Daniel
    Rughinis, Razvan
    2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2018,
  • [50] Cryptographic primitives for information authentication - State of the art
    Preneel, B
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 49 - 104