provable security: some caveats

16
Ari Juels RSA Laboratories 3 November 1999 Provable Security: Some Caveats

Upload: mariko-ryan

Post on 30-Dec-2015

44 views

Category:

Documents


4 download

DESCRIPTION

Provable Security: Some Caveats. Ari Juels RSA Laboratories 3 November 1999. What is provable security?. Is this provable security?. Ivan Damgård : Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. 328-335 -- CRYPTO ‘88. Or this follow-on?. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Provable Security:  Some Caveats

Ari Juels RSA Laboratories3 November 1999

Provable Security: Some Caveats

Page 2: Provable Security:  Some Caveats

What is provable security?

Page 3: Provable Security:  Some Caveats

Is this provable security?

Ivan Damgård: Payment Systems and Credential

Mechanisms with Provable Security Against Abuse

by Individuals. 328-335 -- CRYPTO ‘88

Page 4: Provable Security:  Some Caveats

Or this follow-on?

Birgit Pfitzmann, Michael Waidner:

How to Break and Repair a "Provably Secure"

Untraceable Payment System. 338-350 , CRYPTO ‘91

Page 5: Provable Security:  Some Caveats

Is this provable security?

M. Ajtai and C. Dwork. A public-key cryptosystem with worst-case/

average-case equivalence. In Proc. 29th ACM STOC, pp. 284-293,

1997

Page 6: Provable Security:  Some Caveats

A follow-on

P. Nguyen and J. Stern.

Cryptanalysis of the Ajtai-Dwork Cryptosystem

Proc. Of Crypto 98, pp. 223-242

Page 7: Provable Security:  Some Caveats

Problems with provable security

Who shall guard the guardians? Who’s to say that a proof is correct?

Worst case security Average case security Asymptotic security Real world security

Page 8: Provable Security:  Some Caveats

But even with a more precise notion of ‘‘provable security’’...

Page 9: Provable Security:  Some Caveats

Amdahl’s Law

Part 1 Part 2 Part 3 Part 4

Page 10: Provable Security:  Some Caveats

Amdahl’s Law

Part 1 Part 2 Part 3 Part 4

…Accelerating a small piece doesn’t help much

Page 11: Provable Security:  Some Caveats

“Amdahl’s Law of Security”

Part 1 Part 2 Part 3 Part 4

Crypto

Page 12: Provable Security:  Some Caveats

“Amdahl’s Law of Security”

Part 1 Part 2 Part 3 Part 4

…Strengthening secure part doesn’t help much

Page 13: Provable Security:  Some Caveats

Provable Security Strengthens Most Secure Part

As far as we know, cryptography is rarely weakest point in system. Instead, it’s:

– Bad password selection– Social engineering– Bad software implementation

Page 14: Provable Security:  Some Caveats

Where do you wnt to go today?re

WWhere do you want to go today?

A major security problem...

Page 15: Provable Security:  Some Caveats

Provable security

May distract from more critical vulnerabilities– Hackers just go around the crypto

May yield more complex algorithms, and therefore make correct implementation less likely

Slow down implementations and encourage avoidance of crypto

Page 16: Provable Security:  Some Caveats

What lessons to be learned?

Emphasis on extensive expert and empirical testing as a basis for security as with, e.g., RSA– Can be in addition to proofs

Emphasis on simple proofs and algorithms and on ‘exact security’