On the Bit Security of Cryptographic Primitives

被引:19
|
作者
Micciancio, Daniele [1 ]
Walter, Michael [2 ]
机构
[1] Univ Calif San Diego, San Diego, CA USA
[2] IST Austria, Klosterneuburg, Austria
关键词
D O I
10.1007/978-3-319-78381-9_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a formal quantitative notion of "bit security" for a general type of cryptographic games (capturing both decision and search problems), aimed at capturing the intuition that a cryptographic primitive with k-bit security is as hard to break as an ideal cryptographic function requiring a brute force attack on a k-bit key space. Our new definition matches the notion of bit security commonly used by cryptographers and cryptanalysts when studying search (e.g., key recovery) problems, where the use of the traditional definition is well established. However, it produces a quantitatively different metric in the case of decision (indistinguishability) problems, where the use of (a straightforward generalization of) the traditional definition is more problematic and leads to a number of paradoxical situations or mismatches between theoretical/provable security and practical/common sense intuition. Key to our new definition is to consider adversaries that may explicitly declare failure of the attack. We support and justify the new definition by proving a number of technical results, including tight reductions between several standard cryptographic problems, a new hybrid theorem that preserves bit security, and an application to the security analysis of indistinguishability primitives making use of (approximate) floating point numbers. This is the first result showing that (standard precision) 53-bit floating point numbers can be used to achieve 100-bit security in the context of cryptographic primitives with general indistinguishability-based security definitions. Previous results of this type applied only to search problems, or special types of decision problems.
引用
下载
收藏
页码:3 / 28
页数:26
相关论文
共 50 条
  • [31] Encoding Cryptographic Primitives in a Calculus with Polyadic Synchronisation
    Joana Martinho
    António Ravara
    Journal of Automated Reasoning, 2011, 46 : 293 - 323
  • [32] New class of the FPGA efficient cryptographic primitives
    Moldovyan, NA
    Eremeev, MA
    Sklavos, N
    Koufopavlou, O
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 2, PROCEEDINGS, 2004, : 553 - 556
  • [33] The Black-Box Model for Cryptographic Primitives
    Claus Peter Schnorr
    Serge Vaudenay
    Journal of Cryptology, 1998, 11 : 125 - 140
  • [34] Obfuscated Arbitrary Computation using Cryptographic Primitives
    Tsoutsos, Nektarios Georgios
    Maniatakos, Michail
    2015 10TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2015, : 5 - 8
  • [35] Random Organic Nanolaser Arrays for Cryptographic Primitives
    Feng, Jiangang
    Wen, Wen
    Wei, Xiao
    Jiang, Xiangyu
    Cao, Moyuan
    Wang, Xuedong
    Zhang, Xiqi
    Jiang, Lei
    Wu, Yuchen
    ADVANCED MATERIALS, 2019, 31 (36)
  • [36] New number-theoretic cryptographic primitives
    Brier, Eric
    Ferradi, Houda
    Joye, Marc
    Naccache, David
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 224 - 235
  • [37] ANALYSIS OF SOME CRYPTOGRAPHIC PRIMITIVES ON COMPUTER CLUSTERS
    Semenov, A. A.
    Zaikin, O. S.
    Bespalov, D., V
    Burov, P. S.
    Hmelnov, A. E.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 120 - 130
  • [38] Cryptographic primitives enforcing communication and storage complexity
    Golle, P
    Jarecki, S
    Mironov, I
    FINANCIAL CRYPTOGRAPHY, 2003, 2357 : 120 - 135
  • [39] Pseudo-free families and cryptographic primitives
    Anokhin, Mikhail
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2022, 16 (01) : 114 - 140
  • [40] Encoding Cryptographic Primitives in a Calculus with Polyadic Synchronisation
    Martinho, Joana
    Ravara, Antonio
    JOURNAL OF AUTOMATED REASONING, 2011, 46 (3-4) : 293 - 323