Strengthening Security of RSA-OAEP

被引:0
|
作者
Boldyreva, Alexandra [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
关键词
ENCRYPTION; CRYPTOSYSTEM; PROOFS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
OAEP is one of the few standardized and widely deployed public-key encryption schemes. It was designed by Bellare and Rogaway as a scheme based on a trapdoor permutation such as RSA. RSA-OAEP is standardized in RSA's PKCS #1 v2.1 and is part of several standards. RSA-OAEP was shown to be IND-CCA secure in the random oracle model under the standard RSA assumption. However, the reduction is riot tight, meaning that the guaranteed level of security is not very high for a practical parameter choice. We first observe that the situation is even worse because the analysis was done in the single-query setting, i.e. where an adversary gets a single challenge ciphertext. This does not take into account the fact that in reality an adversary can observe multiple ciphertexts of related messages. The results about the multi-query setting imply that the guaranteed concrete security can degrade by a factor of q, which is the number of challenge ciphertexts an adversary can get. We re-visit a very simple but riot well-known modification of the RSA-OAEP encryption which asks that the RSA function is only applied to a, part of the OAEP transform. We show that in addition to the previously shown fact that security of this scheme is tightly related to the hardness of the RSA problem, security does riot degrade as the number of ciphertexts an adversary can see increases. Moreover, this scheme can be used to encrypt long messages without using hybrid encryption. We believe that this modification to the RSA-OAEP is easy to implement, and the benefits it provides deserves the attention of standard bodies.
引用
收藏
页码:399 / 413
页数:15
相关论文
共 50 条
  • [21] Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
    Targhi, Ehsan Ebrahimi
    Unruh, Dominique
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 192 - 216
  • [22] On the security of RSA encryption in TLS
    Jonsson, J
    Kaliski, BS
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 127 - 142
  • [23] An Algorithm to Enhance Security in RSA
    Minni, Rohit
    Sultania, Kaushal
    Mishra, Saurabh
    Vincent, Durai Raj
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [24] Security dynamics buys RSA
    Davis, S
    [J]. INTERNET WORLD, 1996, 7 (07): : 18 - 18
  • [25] On the BRIP algorithms security for RSA
    Amiel, Frederic
    Feix, Benoit
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART DEVICES, CONVERGENCE AND NEXT GENERATION NETWORKS, 2008, 5019 : 136 - +
  • [26] The security of individual RSA bits
    Håstad, J
    Näslund, M
    [J]. 39TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1998, : 510 - 519
  • [27] On the security of an RSA based encryption scheme
    Müller, S
    [J]. INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 135 - 148
  • [28] A Hybrid Security Algorithm for RSA Cryptosystem
    Panda, Prabhat K.
    Chattopadhyay, Sudipta
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [29] THE RSA-SECURITY-CONFERENCE 1995
    HEINLEIN, EB
    [J]. COMPUTERS & SECURITY, 1995, 14 (01) : 24 - 26
  • [30] Security Analysis of RSA-BSSA
    Lysyanskaya, Anna
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2023, 13940 LNCS : 251 - 280