Strengthening Security of RSA-OAEP

被引:0
|
作者
Boldyreva, Alexandra [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
关键词
ENCRYPTION; CRYPTOSYSTEM; PROOFS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
OAEP is one of the few standardized and widely deployed public-key encryption schemes. It was designed by Bellare and Rogaway as a scheme based on a trapdoor permutation such as RSA. RSA-OAEP is standardized in RSA's PKCS #1 v2.1 and is part of several standards. RSA-OAEP was shown to be IND-CCA secure in the random oracle model under the standard RSA assumption. However, the reduction is riot tight, meaning that the guaranteed level of security is not very high for a practical parameter choice. We first observe that the situation is even worse because the analysis was done in the single-query setting, i.e. where an adversary gets a single challenge ciphertext. This does not take into account the fact that in reality an adversary can observe multiple ciphertexts of related messages. The results about the multi-query setting imply that the guaranteed concrete security can degrade by a factor of q, which is the number of challenge ciphertexts an adversary can get. We re-visit a very simple but riot well-known modification of the RSA-OAEP encryption which asks that the RSA function is only applied to a, part of the OAEP transform. We show that in addition to the previously shown fact that security of this scheme is tightly related to the hardness of the RSA problem, security does riot degrade as the number of ciphertexts an adversary can see increases. Moreover, this scheme can be used to encrypt long messages without using hybrid encryption. We believe that this modification to the RSA-OAEP is easy to implement, and the benefits it provides deserves the attention of standard bodies.
引用
收藏
页码:399 / 413
页数:15
相关论文
共 50 条
  • [31] Data security in cloud using RSA
    Yellamma, Pachipala
    Narasimham, Challa
    sreenivas, Velagapudi
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [32] Dual RSA and its security analysis
    Sun, Hung-Min
    Wu, Mu-En
    Ting, Wei-Chi
    Hinek, M. Jason
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (08) : 2922 - 2933
  • [33] Security Analysis of RSA-BSSA
    Lysyanskaya, Anna
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT I, 2023, 13940 : 251 - 280
  • [34] Strengthening IT security for nuclear safety and security
    Evrard, Par Lydie
    [J]. IAEA Bulletin, 2023, 64 (02): : 22 - 23
  • [35] On the Security of RSA-PSS in the Wild
    Kakvi, Saqib A.
    [J]. PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), 2019, : 23 - 34
  • [36] SOME VARIATIONS ON RSA SIGNATURES AND THEIR SECURITY
    DEJONGE, W
    CHAUM, D
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 49 - 59
  • [37] Security Issues of Novel RSA Variant
    Nitaj, Abderrahmane
    Ariffin, Muhammad Rezal Bin Kamel
    Adenan, Nurul Nur Hanisah
    Lau, Terry Shue Chien
    Chen, Jiahui
    [J]. IEEE ACCESS, 2022, 10 : 53788 - 53796
  • [38] On the security of multi-prime RSA
    Hinek, M. Jason
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2008, 2 (02) : 117 - 147
  • [39] Weak forward security in mediated RSA
    Tsudik, G
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 45 - 54
  • [40] Strengthening Maritime Security
    Hunter, Duncan
    [J]. SEA TECHNOLOGY, 2016, 57 (01) : 33 - 34