cryptology, homomorphisms and graph theory

49
Cryptology, homomorphisms and graph theory Rogla, May 2013 Enes Pasalic

Upload: others

Post on 07-Jan-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cryptology, homomorphisms and graph theory

Cryptology, homomorphisms

and graph theory

Rogla, May 2013 Enes Pasalic

Page 2: Cryptology, homomorphisms and graph theory

2

Applications of cryptography

Page 3: Cryptology, homomorphisms and graph theory

3

Cryptography in a nutshell

� Talking about cryptography – not hacking !!

design and implementation

of secure systems

crypto primitives; RSA,AES

PRG, etc.

Critical !!

modes of operations;protocols Semi-Critical !!

Not-Critical

Page 4: Cryptology, homomorphisms and graph theory

4

Missusing protocols

User

Bank server

user name

challenge

response

Account auth.

challengeuser name; response

server problem

user name;response

Transfer auth

challenge

LOGGED IN

Wrong code

user name

challenge

Page 5: Cryptology, homomorphisms and graph theory

5

Why standard primitives are secure ?

� Because thousands of academics are designing and cryptanalyzing these primitives

� Do you really care when using public key crypto based on :

- Factoring problem – RSA

- Discrete log problem – ElGammal . . .

- or using finite nonabelian (e.g. Braid) groups, based on solving equations in noncommutative groups, polycyclic groups ...

� As long as the primitive has undergone public scrutiny you are doing fine

Page 6: Cryptology, homomorphisms and graph theory

6

BLAKE hash function YES or NOT ?

� BLAKE entered the final phase of NIST competition (5 left) –probably a hash standard

equipment cost 700 000$

in 2015to find collision !

Page 7: Cryptology, homomorphisms and graph theory

7

BLAKE is secure even though ...

� Janoš Vidali, Peter Nose, Enes Pasalic. Collisions for variants of the BLAKE hash function, IPL, 2010

� Attacks on simplified version, BLAKE not compromized !

Flipping a single bitcauses c.a. half of bits

to change, etc.

Page 8: Cryptology, homomorphisms and graph theory

8

Loose ”Guidelines” - secure implementation

� Use well-analyzed primitives, AES, RSA, SHA - xx, unless you come from military (black box scenario :)

� Update your primitives, check if still using MD5 ☺ (even SHA-1 will need an update soon)

� Implement all the steps of protocols (try not to speed up algorithm by cheating !)

� How do you generate the keys ? Where do you store them ?

� Open source usage ? IV vector is reset to 0 when you lose elektricity ?

Page 9: Cryptology, homomorphisms and graph theory

9

Copyright, PKC, homomorphic encryption ...

� Imagine that all encryption algorithms are copyrighted, I would be doing fine how about you ?

� Only possibility seems to be pattent applications (possibly on stand-alone basis or with some support) ...

� Cloud computing and homomorphic encryption seem to be very hot topic, though probably not for ARRS

� + 30 year open problem to embed fully homomorphic encryptionscheme

Page 10: Cryptology, homomorphisms and graph theory

10

One-way functions

Page 11: Cryptology, homomorphisms and graph theory

11

Trapdoor one-way function

� The public key cryptography realizes these ideas. Based on some old number theoretical problems.

Page 12: Cryptology, homomorphisms and graph theory

12

RSA – Public key cryptosystem

Page 13: Cryptology, homomorphisms and graph theory

13

RSA encryption/decryption

Page 14: Cryptology, homomorphisms and graph theory

14

Decryption - proof

Page 15: Cryptology, homomorphisms and graph theory

15

Proving that decryption works

� We have to show that med=m. Recall that

.1 1 ( 1)( 1( ))= +k ke pd qnφ = + − −

Page 16: Cryptology, homomorphisms and graph theory

16

Homomorphic property of RSA (multiplicative)

Research problem: To increase speed of encryption/decryptionbinary weight of e and d should be small. Can we derive a

lower bound on wt(e ) + wt( d ) !

Page 17: Cryptology, homomorphisms and graph theory

17

Pallier E-voting – additive homomorphism

� Suppose Alice, Bob and Oscar are running in an election. Only 6 people voted in the election.

00 00 01 = 1

00 01 00 = 4

00 01 00 = 4

00 00 01 = 1

01 00 00 = 16

00 00 01 = 1 6

5

4

3

2

1

AliceBobOscarVote

Page 18: Cryptology, homomorphisms and graph theory

18

Short mathematical description

x

Page 19: Cryptology, homomorphisms and graph theory

19

Pallier voting - counting

� Let p = 5 and q = 7. Then n = 35, n2 = 1225. g is chosen to be 141 (so that n | ord(g) ). For the first vote x1 = 1, r is randomly chosen as 4.

� Then,

eK (x1,r1) = eK (1, 4) = gx1 * r1n = 1411 * 435 = 359 mod 1225

x1 r eK (x1,r)

1 4 3594 17 1734 26 486

1 12 108816 11 5411 32 163

Page 20: Cryptology, homomorphisms and graph theory

20

Encryption/decryption

Page 21: Cryptology, homomorphisms and graph theory

21

Cryptography and graph theory

(a few words)

Page 22: Cryptology, homomorphisms and graph theory

22

RFID Technology

Reader to tag signal

• Dropping field

• Modified Miller Encoding

Tag to reader signal

• Modulating field

• Manchester Encoding

Page 23: Cryptology, homomorphisms and graph theory

23

RFID Applications

Identify friend

or foe (1942)

Event ticketing

Car keys

Public transport

ticketing

Electronic

passport

Supply chain

management

RFID Powder Access control

Anti-theft

Page 24: Cryptology, homomorphisms and graph theory

24

MIFARE

Page 25: Cryptology, homomorphisms and graph theory

25

MIFARE Classic

Page 26: Cryptology, homomorphisms and graph theory

26

Manufacturer response- freedom of publishing ?

Page 27: Cryptology, homomorphisms and graph theory

27

MIFARE – attacking smart cards

� Attacking MIFARE (2 seconds on a laptop)

Page 28: Cryptology, homomorphisms and graph theory

28

Stream ciphers

Nonlinear combiner (RFID applications)

x1

xn

Problem : Design secure Boolean function f !

Page 29: Cryptology, homomorphisms and graph theory

29

ZUC algorithm – SNOW variant

� SNOW 1.0 and 2.0 were developed in Lund in early 2000 (while I was developing better primitives Thomas and Patrik were designing a cipher ☺ )

� SNOW 3.0 was developed for 3G using some nonlinear ”secure”permutations over GF(2^8) of mine (resistant to algebraic attacks)

� After a few more modifications SNOW 3.0 became ZUC – very strong design comprehending all inteligent design strategies developed last 30 years

Page 30: Cryptology, homomorphisms and graph theory

30

SNOW 3G - design

New compared to SNOW 2.0S-box S2 somewhere on my hard disc

Page 31: Cryptology, homomorphisms and graph theory

31

ZUC algorithm

Page 32: Cryptology, homomorphisms and graph theory

32

Useful transforms for cryptography

� Main tool is Walsh-Hadamard spectra (graphs)

1 3 2 3( ) 1 ANFf x x x x x= ⊕ ⊕ ⊕ ff

W

( ) ( )( 1) x y

f

x V

W y f x W alsh H adam ard transform•

= − − −∑

M

3 2 1

0 0 0 1

0 0 1 0

0 1 0 1

0 1 1 0

1 0 0 0

1 0 1 1

1 1 0 1

1 1 1 0

x x x f

V=GF(2)n

Page 33: Cryptology, homomorphisms and graph theory

33

Cayley graph representation

� Set of vertices V – set of pointsCayley graph

3 2 1

0 0 0 1

0 0 1 0

0 1 0 1

0 1 1 0

1 0 0 0

1 0 1 1

1 1 0 1

1 1 1 0

x x x f

Page 34: Cryptology, homomorphisms and graph theory

34

Cayley graph - eigenvalues

Find the roots – (4,2,0-2,0,2,0,2)

Page 35: Cryptology, homomorphisms and graph theory

35

Some open problems

� How to find ”good” functions through Cayley graphs ?

� What are ”good” functions ?

� high degree

� algebraic immunity (no low degree function g such that fg =0)

� large distance to affine functions and other cryptographic criteria

� Algebraic representation currently seems to be more suitable than graph

theoretical tools or ...

� Research problem: What is graph like if f is constant or affine on some

k – dimensional flat (k – normality) ? What is the graph of linear

combinations of several functions ? .....

Page 36: Cryptology, homomorphisms and graph theory

36

Hypergraphs

1

326

5 7 4

Hypergraph: A set (called “vertices”) and a set of sets of

vertices (called “edges” or sometimes “hyperedges”).

� Example of a 3-uniform hypergraph: The “Fano Plane”, V = {1,2,3,4,5,6,7} and

� E = {{1,2,4},{2,3,5},{3,4,6},{4,5,7},{5,6,1},{6,7,2},{7,1,3}}.

Page 37: Cryptology, homomorphisms and graph theory

37

Transversals and annihilators

� Algebraic attacks commonly use annihilators of f i.e. existence of low degree g s.t. f g =0. (more variants)

� In 2008, Zhang, Pieprzyk and Zhang showed that transversal T - subset of V of a ”Boolean hypergraph”

correspond to annihilator of f !

� Problem : Transversals found by greedy algorithm not optimal (lowest degree) and

� No connection to f g = h for low degree g, h.

j jT e e E∩ ≠ ∅ ∀ ∈

Page 38: Cryptology, homomorphisms and graph theory

38

Page 39: Cryptology, homomorphisms and graph theory

39

Page 40: Cryptology, homomorphisms and graph theory

40

Page 41: Cryptology, homomorphisms and graph theory

41

Page 42: Cryptology, homomorphisms and graph theory

42

Page 43: Cryptology, homomorphisms and graph theory

43

Page 44: Cryptology, homomorphisms and graph theory

44

Page 45: Cryptology, homomorphisms and graph theory

45

Page 46: Cryptology, homomorphisms and graph theory

46

Some final comments

� Lots of quadratic planar mappings

Page 47: Cryptology, homomorphisms and graph theory

47

Bent functions over GF(p)

Page 48: Cryptology, homomorphisms and graph theory

48

Corresponding graphs

Page 49: Cryptology, homomorphisms and graph theory

49

Thanks for your

patience !