On the Bit Security of Cryptographic Primitives

被引:19
|
作者
Micciancio, Daniele [1 ]
Walter, Michael [2 ]
机构
[1] Univ Calif San Diego, San Diego, CA USA
[2] IST Austria, Klosterneuburg, Austria
关键词
D O I
10.1007/978-3-319-78381-9_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a formal quantitative notion of "bit security" for a general type of cryptographic games (capturing both decision and search problems), aimed at capturing the intuition that a cryptographic primitive with k-bit security is as hard to break as an ideal cryptographic function requiring a brute force attack on a k-bit key space. Our new definition matches the notion of bit security commonly used by cryptographers and cryptanalysts when studying search (e.g., key recovery) problems, where the use of the traditional definition is well established. However, it produces a quantitatively different metric in the case of decision (indistinguishability) problems, where the use of (a straightforward generalization of) the traditional definition is more problematic and leads to a number of paradoxical situations or mismatches between theoretical/provable security and practical/common sense intuition. Key to our new definition is to consider adversaries that may explicitly declare failure of the attack. We support and justify the new definition by proving a number of technical results, including tight reductions between several standard cryptographic problems, a new hybrid theorem that preserves bit security, and an application to the security analysis of indistinguishability primitives making use of (approximate) floating point numbers. This is the first result showing that (standard precision) 53-bit floating point numbers can be used to achieve 100-bit security in the context of cryptographic primitives with general indistinguishability-based security definitions. Previous results of this type applied only to search problems, or special types of decision problems.
引用
下载
收藏
页码:3 / 28
页数:26
相关论文
共 50 条
  • [1] Security Amplification for Interactive Cryptographic Primitives
    Dodis, Yevgeniy
    Impagliazzo, Russell
    Jaiswal, Ragesh
    Kabanets, Valentine
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 128 - +
  • [2] On Bitcoin Security in the Presence of Broken Cryptographic Primitives
    Giechaskiel, Ilias
    Cremers, Cas
    Rasmussen, Kasper B.
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 201 - 222
  • [3] A limitation on security evaluation of cryptographic primitives with fixed keys
    Kawai, Yutaka
    Hanaoka, Goichiro
    Ohta, Kazuo
    Kunihiro, Noboru
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1663 - 1675
  • [4] Unpredictable cryptographic primitives for the Robust Wireless Network Security
    Asimi, Younes
    Asimi, Ahmed
    Guezzaz, Azidine
    Tbatou, Zakariae
    Sadqi, Yassine
    15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 316 - 321
  • [5] On the round security of symmetric-key cryptographic primitives
    Ramzan, Z
    Reyzin, L
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
  • [6] Cryptographic primitives
    Garrett, P
    PUBLIC-KEY CRYPTOGRAPHY, 2005, 62 : 1 - 62
  • [7] Evaluation of Cryptographic Primitives Security Based on Proximity to the Latin Square
    Palagushin, Vladimir V.
    Khomonenko, Anatoly D.
    Adadurov, Sergey E.
    2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 266 - 271
  • [8] A Study of Cryptographic Backdoors in Cryptographic Primitives
    Easttom, Chuck
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 1664 - 1669
  • [9] On the Design of Cryptographic Primitives
    Pino Caballero-Gil
    Amparo Fúster-Sabater
    Acta Applicandae Mathematica, 2006, 93 : 279 - 297
  • [10] Java']Java security architecture and extensions - Application independence of cryptographic primitives
    Roth, V
    DR DOBBS JOURNAL, 2002, 27 (04): : 34 - +